• Title/Summary/Keyword: 정보보호경제성

Search Result 269, Processing Time 0.024 seconds

Listing on KOSDAQ. Does it mitigate firm's financial constraint? (코스닥 상장이 기업의 금융제약 완화에 미친 영향 : 연구개발투자에 대한 현금흐름 민감도 분석)

  • Lee, Ho
    • Proceedings of the Korea Technology Innovation Society Conference
    • /
    • 2017.11a
    • /
    • pp.779-797
    • /
    • 2017
  • 완전자본시장에서는 기업의 투자활동이 자금조달 방법과 무관하지만, 현실경제에서는 정보비대칭성으로 인해 외부자금 조달이 제약되는 금융제약 현상이 발생할 수 있다. 금융제약 현상은 기업의 규모가 작거나, 업력이 짧을수록, 그리고 하이테크 산업의 기업일수록 심화된다는 것이 일반적인 시각이다. 우리나라 코스닥 시장은 상대적으로 금융제약에 노출되는 기업들이 주로 상장되는 시장으로, 본 연구는 코스닥 상장이 개별 기업의 금융제약을 완화하는데 효과가 있었는지에 대해서 분석하였다. 분석 결과 금융제약 완화효과가 확인되었으며, 이러한 효과가 통합 증권선물거래소(현(現) 한국거래소)가 출범 후 강화된 것으로 나타났다. 이는 투자자 보호 측면의 체질개선이 거래량 및 코스닥 지수 등에는 일부 부정적이었을 수 있으나, 시장 안정화를 통해 기업의 자금조달을 도왔다는 것을 시사한다.

  • PDF

A Methodology for Integrating Security into the Automotive Development Process (자동차 개발 프로세스에서의 보안 내재화 방법론)

  • Jeong, Seungyeon;Kang, Sooyoung;Kim, Seungjoo
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.9 no.12
    • /
    • pp.387-402
    • /
    • 2020
  • Conventional automotive development has mainly focused on ensuring correctness and safety and security has been relatively neglected. However, as the number of automotive hacking cases has increased due to the increased Internet connectivity of automobiles, international organizations such as the United Nations Economic Commission for Europe(UNECE) are preparing cybersecurity regulations to ensure security for automotive development. As with other IT products, automotive cybersecurity regulation also emphasize the concept of "Security by Design", which considers security from the beginning of development. In particular, since automotive development has a long lifecycle and complex supply chain, it is very difficult to change the architecture after development, and thus Security by Design is much more important than existing IT products. The problem, however, is that no specific methodology for Security by Design has been proposed on automotive development process. This paper, therefore, proposes a specific methodology for Security by Design on Automotive development. Through this methodology, automotive manufacturers can simultaneously consider aspects of functional safety, and security in automotive development process, and will also be able to respond to the upcoming certification of UNECE automotive cybersecurity regulations.

A study of RMT buyer detection for the collapse of GFG in MMORPG (MMORPG에서 GFG 쇠퇴를 위한 현금거래 구매자 탐지 방안에 관한 연구)

  • Kang, Sung Wook;Lee, Jin;Lee, Jaehyuk;Kim, Huy Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.4
    • /
    • pp.849-861
    • /
    • 2015
  • As the rise in popularity of online games, the users start exchanging rare items for real money. As RMT (Real Money Trade) is prevalent, GFG (Gold Farming Group) who abuse RMT shows up. GFG causes social problems such as identity theft, privacy leaks. Because they needs many bot characters to gather game items. In addition, GFG induce RMT that makes in-game problems such as a destroying game economy, account hacking. Therefore, It is very important work to collapse GFG at the perspective of social and in-game. In this paper, we proposed a fundamental method for detecting RMT buyers for the collapse of GFG at the perspective of buyer by Law of Demand and Supply. We found two type of RMT by analyzing actual game data and detected RMT buyers with high recall ratio of 98% by ruled-based detection.

Convergence Security Technology of OPC-UA Protocol Gateway based on DPI & Self-Similarity for Smart Factory Network (스마트 팩토리 망에서 DPI와 자기 유사도 기술 기반의 OPC-UA 프로토콜 게이트웨이 융합 보안 기술)

  • Shim, Jae-Yoon;Lee, June-Kyoung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.5
    • /
    • pp.1305-1311
    • /
    • 2016
  • The smart factory, a combination of ICT technology to the entire production process of a product, means can you intelligent factory is to achieve such reduction and process improvement of the production cost. To implement the smart factory, inevitably must have an internal equipment connections to the external network, this is by equipment which is operated by the existing closure network is exposed to the outside network, the security vulnerability so that gender is increased. In order to solve this problem, it is possible to apply security solutions that are used in normal environments. However, it is impossible to have just completely blocking security threats that can occur in a smart factory network. Further, considering the economic damage that can occur during security breach accident, which cannot be not a serious problem. Therefore, in this paper, a look to know the security measures that can be applied to smart factory, to introduce the main fusion security technology necessary to smart factory dedicated security gateway.

Are There Any Solutions for the Cybersecurity Education Gap in the Public Sector? (공공부문의 사이버보안 교육격차 해소를 위한 탐색적 연구)

  • Lee, Song-ha;Jun, Hyo-Jung;Kim, Tae-Sung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.5
    • /
    • pp.973-985
    • /
    • 2021
  • South Korea has been guaranteed the efficiency and the convenience of administrative work based on long-term experience and well-established ICT infrastructure. Vice versa, South Korea is always exposed to various scale cyber-attacks. It is an important element of national competitiveness to secure cybersecurity resilience and response in the public sector. For this, the well-trained cybersecurity professionals' retention and support for their capacity development through retraining are critical. As the Special Act on Balanced National Development, most public agencies moved to provincial areas, but the provincial areas are not ready for this, thus the workforce can't get enough retaining courses. We study to analyze whether there is a gap in cybersecurity educational opportunities or needs in the public sector depending on regions, institution type, and personal traits. This paper aims to suggest solutions for the cybersecurity education gap in the public sector based on the empirical analysis results.

Bayesian Network Analysis for the Dynamic Prediction of Financial Performance Using Corporate Social Responsibility Activities (베이지안 네트워크를 이용한 기업의 사회적 책임활동과 재무성과)

  • Sun, Eun-Jung
    • Management & Information Systems Review
    • /
    • v.34 no.5
    • /
    • pp.71-92
    • /
    • 2015
  • This study analyzes the impact of Corporate Social Responsibility (CSR) activities on financial performances using Bayesian Network. The research tries to overcome the issues of the uniform assumption of a linear function between financial performance and CSR activities in multiple regression analysis widely used in previous studies. It is required to infer a causal relationship between activities of CSR which have an impact on the financial performances. Identifying the relationship would empower the firms to improve their financial performance by informing the decision makers about the different CSR activities that influence the financial performance of the firms. This research proposes General Bayesian Network (GBN) and presents Markov Blanket induced from GBN. It is empirically demonstrated that all the proposals presented in this study are statistically significant by the results of the research conducted by Korean Economic Justice Institute (KEJI) under Citizen's Coalition for Economic Justice (CCEJ) which investigated approximately 200 companies in Korea based on Korean Economic Justice Institute Index (KEJI index) from 2005 to 2011. The Bayesian Network to effectively infer the properties affecting financial performances through the probabilistic causal relationship. Moreover, I found that there is a causal relationship among CSR activities variable; that is Environment protection is related to Customer protection, Employee satisfaction, and firm size; Soundness is related to Total CSR Evaluation Score, Debt-Assets Ratio. Though the what-if analysis, I suggest to the sensitive factor among the explanatory variables.

  • PDF

Probleme nach geltendem Recht „Richtlinien für die Verwendung von Gesundheitsdaten" ('보건의료 데이터 활용 가이드라인'의 현행법상 문제점)

  • Lee, Seok-Bae
    • The Korean Society of Law and Medicine
    • /
    • v.22 no.4
    • /
    • pp.3-35
    • /
    • 2021
  • Inmitten der Flut der privaten und öffentlichen Information gilt die riesige Informationsmenge als Schlüsselressource im Zeitalter der 4. industriellen Revolution, repräsentiert durch Big-Data. Das Interesse an diesen wächst weltweit. Es gibt eine aktive Diskussion darüber, wie man Daten sichert und akkumuliert und wie man die gesammelten Daten sicher und effektiv nutzt. Gesundheitsdaten werden vor allem als die wertvollste Ressource bewertet, für die Big-DataTechnologie eingesetzt wird. Um Gesundheitsdaten sinnvoll zu nutzen, müssen verteilte Gesundheitsdaten integriert und den Benutzern in einer Form zur Verfügung gestellt werden, die für Forschung oder Inspektion verwendet werden kann. In einer Situation, in der große Länder um den Aufbau bzw. die Führung der Datenwirtschaft konkurrieren, wurden im August 2020 auch in Südkorea die sog. „3-Daten-Gesetze" geändert, die das Datenschutzgesetz(DSG) enthälten. Das DSG führte das Konzept der pseudonymen Informationen ein und baute eine Rechtsgrundlage für deren Verwendung auf. Als Folgemaßnahme kündigte die, Kommission für den Schutz personenbezogener Daten(Personal Information Protection Commission: PIPC)' die „Richtlinien für die Bahandlung mit pseudonymen Informationen" und, Ministerium für Gesundheit und Wohlfahrt' die „Richtlinien für die Verwendung von Gesundheitsdaten" an. Gesundheitsdaten stehen direkt in Zusammenhang mit Leben und Körper des Menschen und damit enthalten viele sensible Daten. Es handelt sich also um ein System, das aus einer vorsichtigeren und konservativeren Sicht unter der Voraussetzung verwendet werden kann, personenbezogene Daten sicherer zu schützen. Um die Hauptinhalte der „Richtlinien für Verwendung von Gesundheitsdaten" zu analysieren, überprüften wir zunächst die Hauptinhalte des überarbeiteten DSG. Danach durch die Analyse der wesentlichen Inhalte der „Richtlinien für Verwendung von Gesundheitsdaten" wurden Probleme wie Konflikte mit anderen Gesetzen und Verbesserungsmaßnahmen überprüft.

기업간(企業間) 분업(分業)의 효율성(效率性) 증진(增進)과 중견기업(中堅企業)의 역할(役割)

  • Kim, Ju-Hun
    • KDI Journal of Economic Policy
    • /
    • v.18 no.2
    • /
    • pp.63-116
    • /
    • 1996
  • 우리나라 제조업(製造業)의 수직적(垂直的) 구조(構造)는 선진공업국에 비하여 소(小) 영세기업(零細企業)의 비중이 월등히 높은 피라미드형의 형태를 보이며 80년대말 이후 소기업군의 확대는 더욱 두드러지고 있다. 이처럼 소기업의 비중이 높아진 것은 제조업체들이 가격경쟁력(價格競爭力)을 높이기 위하여 생산비용이 높게 드는 자체생산(自體生産)을 가능한 한 줄이고 임금(賃金)이 낮은 중소기업으로 생산공정을 이양해 왔기 때문이다. 소기업 비중이 높은 분업구조는 가격경쟁력이 중시되어 생산을 분업화해야 하는 경제체제에서는 높은 효율성(效率性)을 발휘한다고 평가할 수 있다. 90년대에 이르러 중소기업이 저가(低價)의 생산요소(生産要素)를 조달받기 어려운 경제여건이 조성되면서 중소기업의 경영불안이 높아지는 등 가격경쟁력을 유지하기 위한 생산분업체제(生産分業體制)는 한계(限界)에 도달한 것으로 보인다. 따라서 대기업과 중소기업간 분업도 기술(技術) 중심의 분업관계(分業關係)로 전환되어야 할 단계에 이르렀다고 볼 수 있다. 그러나 종전과 같이 소기업(小企業)에 의존하는 분업구조(分業構造)로는 기술분업(技術分業)이 정착되기 어렵다. 왜냐하면 연구개발, 전문인력의 고용 등 기술개발과 관련된 기업활동에는 생산량에 관계없이 고정비용(固定費用)이 들어서 기술개발 비용과 위험을 분산시키려면 기업의 생산규모가 상당히 커져야 하기 때문이다. 이는 소기업 중심의 분업구조가 중견기업(中堅企業)중심의 구조로 개편(改編)되어야 함을 의미한다. 중견기업이 육성되려면 첫째, 대기업과 직거래하는 중소업체(中小業體)의 수(數)가 축소되어야 한다. 거래업체수의 과다는 기업규모를 영세하게 만드는 가장 직접적 요인이기 때문이다. 그러나 거래업체의 정리과정에서 기존업체들이 중소기업 보호여론을 등에 업고 반발할 수 있고, 대기업이 교섭력을 강화하기 위한 수단으로 악용할 수 있으므로 객관적이고 투명한 정리기준의 제시가 전제되어야 한다. 둘째, 대기업의 중소기업에 대한 대폭적 자본참여(資本參與)가 허용되어야 한다. 대기업의 자본참여는 중소기업 지배를 강화할 것으로 우려되어 현재는 극히 부분적으로 허용하고 있으나, 개방경제하에서는 대기업과 국내 중소기업간의 협력관계를 유지시키는 효과적 수단으로 작용하게 될 것이다. 셋째, 은행 등 금융자본(金融資本)의 중견기업에 대한 투자(投資) 활성화(活性化)가 필요하다. 금융자율화로 금융기관의 수익성이 강조되는 상태에서 금융자본이 거래업체의 주주(株主)로서 참여하면 경영정보를 손쉽게 파악할 수 있어 우량업체의 신속한 육성이 가능해질 수 있다.

  • PDF

Analyzing the Factors Affecting the Successful Deployment of the Open Source Based Institutional Repositories (오픈액세스기반 기관리포지터리 성공에 미치는 요인 분석)

  • Hwang, Hye-Kyong;Lee, Jee-Yeon
    • Journal of the Korean Society for information Management
    • /
    • v.26 no.4
    • /
    • pp.35-58
    • /
    • 2009
  • One of the main goals of providing open access is to vitalize the exchange of academic information by allowing access to the scholarly research outputs for everyone without the legal, financial, and technical barriers. We regard the use of the institutional repository as an open access enabler. In this study, we tried to make the factors, which enable the successful deployment of the institutional repository, explicit. We utilized literature review and case studies to generate the potential success factors for the institutional repository deployment. We verified the factors by having in-depth interviews with the subject matter experts. The resulting factors were organized as organizational, political, and technical ones. The organizational factors included the strong open access support by the organization heads. Under the policy factors, a number of issues such as selection of the core contents, minimum quality control, protection of the copyrights, forming supporting groups through active advertising, long-term preservation, incentive, and mandate, were included. The technical factors included easy submission, support for interoperability, and support for the publication activities.

Exploring the Effect of Gamification and Privacy Concerns upon Behavioural Intention to Use Fitness Apps (게임화 및 개인정보 염려가 피트니스 앱 사용의도에 미치는 영향)

  • Melisa Gunhan;Hyojung Song;Taeha Kim
    • Information Systems Review
    • /
    • v.26 no.2
    • /
    • pp.185-203
    • /
    • 2024
  • This study empirically explores the influence of gamification elements and privacy concerns on users' intention to use fitness apps, based on the technology acceptance model (TAM). This research classifies gamification in fitness apps into three categories: achievement-related elements, social-related elements, and immersion-related elements. Although previous research investigated the gamification of fitness apps, few studies combined the impact of gamification with privacy concerns. Considering the significant amount of sensitive personal data collected by fitness apps, we recognize the importance of data privacy and aim to address this gap in research. To achieve this goal, we collected and analyzed data from 187 Korean fitness app users through an online questionnaire. The results confirm the highly significant influence of perceived ease of use, perceived usefulness, and achievement-related gamification elements. Social-related gamification elements, immersion-related gamification elements, and privacy concerns however show insignificant results for the intention to use fitness apps in the Korean market. Location and time limit the generalizability of this study; however, the findings of this study nonetheless offer valuable insights for practitioners and developers to enhance the design and development of their applications.