• Title/Summary/Keyword: 자산관리 시스템

Search Result 386, Processing Time 0.029 seconds

A Case Study of the Economic Performance Measurement of Information System Integration in Public Sector (공공부문 정보시스템 통합의 경제적 성과 측정 사례연구)

  • Jung, Hae-Yong;Ra, Jong-Hei
    • Journal of Digital Convergence
    • /
    • v.8 no.4
    • /
    • pp.185-204
    • /
    • 2010
  • This case study quantifies the savings that can be realized through integration in National Computing & Information Agency (NCIA) of the Korea Government. It is based on the process of the NCIA development project that consolidating and integrating distributed 24 agencies. And it used the widely accepted Gartner TCO (Total Cost of Ownership) Solution and applies that methodology consistently before and after integration. Specific measurement items for examining the information system integration saving cost are developed pilot test for 2 agencies through compare TCO before integration and TCO after integration. The results of measuring on information system integration in NCIA are showed lots of economic cost reduction in TCO by integrating and consolidating each computing environment in agency. Especially in detail, NCIA realized the most savings in IT Capital Cost including development of hardware, software and recovery system. Also IT Support Cost and IT Administration Cost examined more savings than before IT integration.

  • PDF

Real-Estate Price Prediction in South Korea via Machine Learning Modeling (머신러닝 기법을 통한 대한민국 부동산 가격 변동 예측)

  • Nam, Sanghyun;Han, Taeho;Kim, Leeju;Lee, Eunji
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.20 no.6
    • /
    • pp.15-20
    • /
    • 2020
  • Recently, the real estate is of high interest. This is because real estate, which was considered only a residential environment in the past, is recognized as a stable investment target due to the ever-growing demand on it. In particular, in the case of the domestic market, despite the decrease in the number of people, the number of single-person households and the influx of people to large cities are accelerating, and real estate prices are rising sharply around the metropolitan area. Therefore, accurately predicting the prospects of the future real estate market becomes a very important issue not only for individual asset management but also for government policy establishment. In this paper, we developed a program to predict future real estate market prices by learning past real estate sales data using machine learning techniques. The data on the market price of real estate provided by the Korea Appraisal Board and the Ministry of Land, Infrastructure and Transport were used, and the average sales price forecast for 2022 by region is presented. The developed program is publicly available so that it could be used in various forms.

The Effect of PCAOB on Auditing Fee (외국회계감독기구의 등록이 감사보수에 미치는 영향)

  • Yoon, Min;Lee, Jin-Soo
    • Journal of Digital Convergence
    • /
    • v.14 no.12
    • /
    • pp.111-120
    • /
    • 2016
  • PCAOB conducts the direct supervision for the PCAOB registered accounting firm. Therefore, if an accounting firm is registered with the PCAOB, it will thoroughly manage for their quality management systems. The registered auditor can be expected to have better quality of the audit. This study carried out the analysis using the audit fee which proxies for audit quality. The results of analysis are as follows. After controlling for foreign accounting firms affiliated status, company size, risky assets, leverage, ROA, and market-related variables, PCAOB is a significant explanatory variable for the audit fees. The results of this study support the hypothesis that PCAOB-registered auditors will provide a good audit quality.

The Effectiveness of Information Protection and Improvement Plan Based on SMEs Consulting Case

  • Kim, Jae-Nam
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.11
    • /
    • pp.201-208
    • /
    • 2019
  • In the phono-sapiens era of the intelligence information society, most business activities are increasingly dependent on networks and information systems. SMEs, which occupy the majority of Korean companies, are increasingly possessing the value and technology of their information assets, and their ability to protect core technologies that are the driving force of corporate growth will be the most important competitiveness of enterprises. Accordingly, the Ministry of Science and ICT and the Korea Internet & Security Agency(KISA) provides a foundation for minimizing the damage from cyber threats such as hacking and information leakage by evaluating the current information protection level of SMEs and enhancing information protection capability by supporting a high level of customized information protection consulting. In this study, we analyze the effectiveness of information protection based on the results of KISA SMEs consulting. In addition, by identifying problems and limitations derived from SMEs information protection consulting results, SMEs should propose measures to improve information security of SMEs that can manage information protection management system more efficiently and effectively.

Artificial Intelligence Based LOS Determination for the Cyclists-Pedestrians Mixed Road Using Mobile Mapping System (인공지능 기반 MMS를 활용한 자전거보행자겸용도로 서비스 수준 산정)

  • Tae-Young Lee;Myung-Sik Do
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.22 no.3
    • /
    • pp.62-72
    • /
    • 2023
  • Recently, the importance of monitoring and management measures for bicycle road related facilities has been increasing. However, research on the monitoring and evaluation of users' safety and convenience in walking spaces including bicycle path is insufficient. In this study, we would like to construct health monitoring data for cylists-pedestrians mixed road using a mobile mapping system, and propose a plan to calculate the level of service of the mixed roads from the perspective of pedestrians and cyclists using artificial intelligence based object detection techniques. The monitoring and level of service calculation method of cylists-pedestrians mixed roads proposed in this study is expected to be used as basic information for planning and management such as maintenance and reconstruction of walking spaces in preparation for the increase of electric bicycles and personal mobility in the future.

Ontology Modeling and Its Application for Managing Control Points (기준점 관리를 위한 온톨로지 모델링과 적용 방안)

  • Cui, Yulan;Hwang, Hyun-Suk;Shin, Seong-Hyun;Suh, Yong-Cheol;Kim, Chang-Soo
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.11 no.3
    • /
    • pp.34-42
    • /
    • 2008
  • The control points are important assets of countries which express the most accurate location information that is used in surveying land and other measurements. The location information has played an important role in our daily lives with the development of ubiquitous technology. While many researchers have recently applied new technology like RFID(Radio-Frequency Identification) to the effective management of control points, the research into data retrieval and the interoperability of control point data is still primitive step. Therefore, we construct a data modeling to effectively manage control points using ontology data structure and focus on semantic retrieval method. Our retrieval system can provide the inferred and associated information among data using Prot$\acute{e}$g$\acute{e}$-OWL tool. Our system has advantages in reducing the number of repeated queries by hierarchy searching and improving the searching time by association searching. Also, we propose an effective method to construct retrieval systems being able to edit items of categories and properties without editing the related codes.

  • PDF

Quasi-public operating Bus nature of the public interest as a moral hazard - Game theoretical approach as the Yeosu area cases (도덕적 해이로서 공익적 성격의 버스운송 체계 - 여수 시내버스 사례에 대한 게임이론적 접근)

  • Lee, Moo-Seong
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.10 no.11
    • /
    • pp.1285-1296
    • /
    • 2015
  • As examples of the region's transition to quasi-public goods a previous stage of full public goods also extremely limited in research. However, in this way can it compensate for this paper as a system to minimize moral hazard by electronic information and communication systems focused on safety in accordance with the methods and gave public goods introduction of grafting of electronic information systems played the Yeosu area to specific cases I went to the deployment.

A Study on the Establishment of Anti-Drone system for the Protection of National Important Facilities (국가중요시설 방호를 위한 안티드론 시스템 구축 방안 연구)

  • Hwang, Soon-phil;Kim, Doo-hwan
    • Journal of Digital Convergence
    • /
    • v.18 no.11
    • /
    • pp.247-257
    • /
    • 2020
  • The Purpose of this study is to present effective Anti-Drone systems to protect national important facilities against drones that are illegally used by crime groups and terrorists with malicious intents. In order to accomplish the purpose of the study, technical and policy reports regarding Anti-Drone systems, open documents from manufacturers and various research papers are reviewed, and in-depth interviews with experts were conducted. Studies have shown that it is effective to overlay and mix different detection systems so that they can improve detection rates by supplementing each other's advantages and disadvantages, and that the means of incapacitation need to acquire flexibility by using both soft-kill and hard-kill methods in accordance with operational environment for the effective usage. In other words, the establishment of an illegal drone pre-management system, mixed and overlapping detection assets, determining appropriate countermeasures, and multiple distribution of means of incapacitation. The establishment of a protection system for important national facilities through the operation of overlapping and complex anti-drone systems is the most urgent task.

Proposal of Detection Module for Fighter Aircraft Data Modulation Attack (전투기 데이터 변조 공격행위에 대한 탐지모듈 제안)

  • Hong, Byoung-jin;Kim, Wan-ju;Kim, Ho-keun;Lim, Jae-sung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.1
    • /
    • pp.5-16
    • /
    • 2019
  • Modern state-of-the-art military aviation assets are operated with independent embedded real-time operating systems(RTOS). These embedded systems are made with a high level of information assurance. However, once the systems are introduced and installed on individual platforms for sustaining operational employment, the systems are not actively managed and as a result the platforms become exposed to serious threats. In this paper, we analyzed vulnerability factors in the processing of mission planning data and maintenance-related data for fighter aircraft. We defined the method and form of cyber attacks that modulate air data using these vulnerabilities. We then proposed a detection module for integrity detection. The designed module can preemptively respond to potential cyber threats targeting high - value aviation assets by checking and preemptively responding to malware infection during flight data processing of fighter aircraft.

Comparison of SIEM Solutions for Network Security (네트워크 보안을 위한 SIEM 솔루션 비교 분석)

  • Lee, Jong-Hwa;Bang, Jiwon;Kim, Jong-Wouk;Choi, Mi-Jung
    • KNOM Review
    • /
    • v.22 no.1
    • /
    • pp.11-19
    • /
    • 2019
  • As technology develops, the latest security threats on the network applied to users are increasing. By attacking industrial or corporate systems with malicious purposes, hackers cause many social problems such as confidential information leakage, cyber terrorism, infringement of information assets, and financial damage. Due to the complex and diversified threats, the current security personnel alone are not enough to detect and analyze all threats. In particular, the Supervisory Control And Data Acquisition (SCADA) used in industrial infrastructures that collect, analyze, and return static data 24 hours a day, 265 days a year, is very vulnerable to real-time security threats. This paper introduces security information and event management (SIEM), a powerful integrated security management system that can monitor the state of the system in real time and detect security threats. Next, we compare SIEM solutions from various companies with the open source SIEM (OSSIM) from AlienVault, which is distributed as an open source, and present cases using the OSSIM and how to utilize it.