• Title/Summary/Keyword: 핵심자산

Search Result 264, Processing Time 0.027 seconds

Assessing Suitability for Practical Use of Market Approach Through the Observation Process of Technology Transactions Information (기술거래정보 관찰과정을 통한 시장접근법 활용적합성 분석방법)

  • Kim, Keun-Hwan;Shim, We;Kang, Jong-Seok;Park, Hyun-Woo;Moon, Yeong-Ho
    • Journal of Korea Technology Innovation Society
    • /
    • v.15 no.2
    • /
    • pp.262-276
    • /
    • 2012
  • Transactions activation of intangible assets has become became a key factor for corporate survival and successful business in the knowledge economy. Thus, demand in correctly valuating technology has increased. The market approach is the reliable method because of the premise that the market value of an asset is directly related to the prices of comparable, competitive ones. However, it can be practically impossible in many cases because it is hard to find identical transactions, which are generally closely guarded business secrets. As a result, most of technology valuation is conducted by the income approach and this approach is used to derive estimates for such unobserved variables. In September 2011, the Ministry of Knowledge Economy enacted a law for operational guideline standards for technology valuation to encourage the domestic technology valuation market. The enforcement recommended that the market approach have precedence over other approaches. If this approach cannot be applied, then the valuator should writing that he used other approaches. In practice, it is hard to know whether or not information about comparable transactions exists. The proposed process provides valuators to assess suitability for practical use of market approach through the observation process of technology transactions information. At the same time, it offers them the opportunity to gain validity when using other approaches.

  • PDF

Composition and Policy Direction of Compensation Insurance Against Customer Information Infringements in Financial Transactions (금융거래 고객정보 침해사고 보상보험의 구성 및 정책방향)

  • Kim, Jong Hwan;Lim, Jong In
    • The Journal of Society for e-Business Studies
    • /
    • v.19 no.3
    • /
    • pp.1-21
    • /
    • 2014
  • Personal information is a requisite for financial transactions as well as a core asset of financial companies. However, as a side effect of the information society, personal information infringements have emerged as significant social risks, causing realized loss to individuals and companies. This study analyzes results of financial and emotional loss in terms of consumer loss and also presents usefulness of insurance in order to minimize such actual damages as a means of risk transfer. In addition, this study investigates components and premium calculation principles of compensation insurance against personal information invasion and finally presents policies to activate these insurance product. As a method of risk management, insurance not only is a useful tool to guarantee consumer protection and companies' financial soundness simultaneously but also provides a basis of quantitative measurement of IT risks.

Current Status and Prospect of Techniques for Identification of Sabotage Targets (에너지 시스템의 사보타지 표적 인식 기법의 현황 및 전망)

  • Kim, Seong-Ho;Choi, Y.;Jung, W.S.;Kim, K.Y.;Yang, J.E.
    • Proceedings of the Korea Society for Energy Engineering kosee Conference
    • /
    • 2007.11a
    • /
    • pp.288-293
    • /
    • 2007
  • 미국 911 테러 발생 이후로, 국가 기반시설(예: 송/배전 전력망, 석유/가스 파이프라인, 원자력 발전소, 정보통신 시설, 교통 시설, 금융 시설, 매스미디어 시설 등)에 대한 테러리스트의 사보타지 리스크를 관리하는 도전문제에 정부 차원이나, 기업 차원에서 국내외적으로 뜨거운 이목이 집중되고 있다. 그 가운데 에너지 시스템, 특히 원자력 발전소의 물리적 보안은 국가 안보 차원에서 매우 중대한 이슈가 되고 있다. 이는 사보타지로 인한 이러한 시스템의 파손이 국민, 작업자, 또는 외부 환경에 방사성물질 누출과 같은 중대한 결말을 초래할 수 있기 때문이다. 원전과 같은 복잡 시스템에서 설계 기준 위협이 초래할 수 있는 이러한 결말은 그 시스템의 특정 핵심 표적(예: 부품, 구역, 자산, 행위, 인원)의 방호를 통해 효과적으로 방어될 수 있다. 다시 말하면, 표적 인식에서는 어떻게 방어할 것인가에 앞서서 무엇을 방어할 것인가를 다루려는 것이다. 이 연구의 주요 목적은 여태까지 개발된 다양한 표적 인식 기법의 개발 추세를 소개하고 향후 전망을 제시하는 데에 있다. 이를 통해 표적 인식 기법의 수월성, 신뢰성, 및 경제성을 제고할 수 있으리라 본다. 표적 인식 기술의 활용성 측면에서 볼 때, 표적 인식은 하드웨어 적이거나 소프트웨어적인 방호 시스템의 설계에 필수적이므로, 신뢰성 높은 표적 인식은 다음과 같은 긍정적인 파급 효과를 줄일 수 있다: 1) 사보타지 리스크 감소에 직간접적으로 기여할 수 있다; 2) 제한적인 보안 재원을 효율적으로 할당할 수 있다; 3) 보안 대응군대의 훈련 시나리오를 개발할 수 있다; 4) 발전소 규제요건인 안전조치 계획을 비용이나 보안 측면에서 향상시켜 국민 안심(public easiness)을 도모할 수 있다. 향후에는 보다 더 광의적인 복잡 시스템 사이에서 상호 연계적인 사보타지에 대한 표적 인식의 기법들이 점검될 필요성이 있다고 본다.

  • PDF

A Study for Enterprise Type Realtime Information Security Management System (기업의 상시 보안관리 체계 연구)

  • Noh, Shi-Yeong;Lim, Jong-in
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.3
    • /
    • pp.617-636
    • /
    • 2017
  • Many businesses have adopted the standard security management structure such as ISO27001 and K-ISMS for strengthening business's security management structure to protect their core information assets and have acquired partial output from such effort. However, many risk factors such as recent advances in Information Technology and evolution of intrusion methods have increased exponentially requiring the businesses to response even more quickly with better accuracy. For such purpose, a study of 'Real Time Security Management Structure for Business' based on security management process optimization, defining a set of security index for managing core security area and calculation of risk indices for precognition of intrusion risk area has been made. Also, a survey on opinions of an expert panel has been conducted. The effectiveness of studied structure was analyzed using AHP method as well. Using this study, security personnels of a company can improve efficiency of the preemptive responsive and quicker measure from the current security management structure.

A Design of Development Process Model of Product Lines for Developing Embedded Software (임베디드 소프트웨어 개발을 위한 제품계열 중심의 개발프로세스 모델 설계)

  • Hong, Ki-Sam;Yoon, Hee-Byung
    • Journal of KIISE:Software and Applications
    • /
    • v.33 no.11
    • /
    • pp.915-922
    • /
    • 2006
  • Recently, the requirements of the embedded software are getting diverse as the diversity of embedded software application fields increases. The systematic development methods are issued to deal with the dependency between hardware and software. However, the existing development methods have not considered the software's close connection to hardware and the high-level reusability for common requirements of several similar domains. In this paper, we propose a design method of development process model of product lines to support an efficient development method for embedded software. For this, we firstly suggest a domain scoping method and an IDEF0(Integration DEFinition)-based business model for extracting the efficient requirements. Next, we present a component deriving method based on the service architecture and an architecture design method after considering the hardware dependency. And we explain the artifacts of MSDFS(Multi Sensor Data Fusion System) at each design step in order to show how the proposed model can be applied to the embedded software development.

Aspectual Implementation Patterns for Feature-Oriented Product Line Engineering (특성 지향의 제품계열공학을 위한 애스팩트 구현 패턴)

  • Lee, Kwan-Woo
    • The KIPS Transactions:PartD
    • /
    • v.16D no.1
    • /
    • pp.93-104
    • /
    • 2009
  • Modular implementation of a feature is a first step toward feature-oriented product line engineering, which develops and then utilizes core assets to configure products in terms of features. Aspect-oriented programming provides effective mechanisms for improving the modularity of feature implementations. However, as features in general are not independent of each other, changes in the implementation of one feature may cause changes to or side effects in the implementation of other features. Moreover, since the time at which a feature is incorporated into products, called feature binding time, may be various from compile time through load time to run time, a feature may have to be implemented differently depending on when the feature is bound into a product. To make each feature implementation module as independent as possible, this paper proposes aspectual implementation patterns that can effectively separate feature dependencies as well as feature binding time from feature implementation modules. These patterns enable flexible composition of feature implementation modules without affecting other modules according to feature selection. The approaches are demonstrated and evaluated based on a product line of scientific calculator applications.

A Study on the Style Factors of Office Investment -An Analysis using Appraisal-based Returns- (오피스 투자의 스타일인자에 관한 연구 -평가기반 수익률을 기준으로-)

  • Min, Seonghun;Lee, Young Ho
    • Korea Real Estate Review
    • /
    • v.24 no.1
    • /
    • pp.53-62
    • /
    • 2014
  • A test on the significance of style factors which were revealed to be significant in U.S. and U.K. literature is conducted in this study using appraisal-based returns of offices in Korea. Region, size (appraisal value), value-growth propensity (yield gain gap) and leasing conditions (the number of tenants, the length of average leased period and the proportion of key tenant) are included in the analysis model as style factors. The empirical result suggests that firstly core region and large size are significant but they increase risk as well as return contrary to general belief, secondly value propensity significantly decreases risk as well as return as it does in U.S. and U.K., finally the number of tenants among leasing conditions decreases risk as well as return but the length of average leased period and the proportion of key tenant are not significant.

A study on the development of SRI(Security Risk Indicator)-based monitoring system to prevent the leakage of personally identifiable information (개인정보 유출 방지를 위한 SRI(Security Risk Indicator) 기반 모니터링 시스템 개발)

  • Park, Sung-Ju;Lim, Jong-In
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.3
    • /
    • pp.637-644
    • /
    • 2012
  • In our current information focused society, information is regarded as a core asset and the leakage of customers' information has emerged as a critical issue, especially in financial companies. It is very likely that the technology that safeguards which is currently in commercial use is not focused at an enterprise level but is fragmented by function or by only guards portions of a customer's personal information. Therefore, It is necessary to study the systems which monitor the indicators of access at an enterprise level in order to preemptively prevent the compromise of such data. This study takes an enterprise perspective on such systems for a financial company. I will focus on examination of the methods of implementation of the monitoring system, the application of pattern analysis and examination of Security Risk Indicators (SRI). A trial of the monitoring system provided security managers and related departments with proper screening capabilities of information. Therefore, it is possible to establish a systemic counter-plans based on detectable patterns.

A Study on the Extracting the Core Input and Output Variables in Construction Company using DEA and PCA (DEA와 PCA를 이용한 건설기업의 핵심 투입-산출변수 추출에 관한 연구)

  • Lee, Kyung-Joo;Park, Jung-Lo;Kim, Jae-Jun
    • Korean Journal of Construction Engineering and Management
    • /
    • v.13 no.5
    • /
    • pp.94-102
    • /
    • 2012
  • Recently, the global financial crisis and the increasing number of unsold houses in Korea are construction companies to assess their efficiency. The most important factor in analyzing the efficiency of a company is the input-output variable. However, systematic stud the core input-output variables, which have a great influence on the efficiency analysis. Thus, to the core input-output variables for efficiency analysis of construction companies, this study propose a model that includes all combinations of input-output variables and to find the core input-output variables using the Data Envelopment Analysis(DEA) model and Principal Component Analysis(PCA). Existing research and theories were studied variables and 21 models were established to measure efficiency. were obtained that the core input and output variable in 2006 the number of employees and sales. For 2008, the core input variable was capital stock and the core output variable was quarterly net profit. For 2010, the core input variable was fixed asset and the core output variable was sales. Through obtaining the variables that greatly affect the efficiency of construction companies, it is considered that individual construction companies will be able to prepare a priority strategy to enhance efficiency.

The Gap between Social Stratification in the Aftermath of the 1997 Financial Crisis: The Change of Living Conditions and Daily Life as a Consumer. (외환위기 이후 계층의 양극화: 변화된 일상과 소비생활)

  • Nam, Eun-Young
    • Survey Research
    • /
    • v.10 no.1
    • /
    • pp.1-32
    • /
    • 2009
  • This study examines the changes of income, everyday life and living condition of consumer in the aftermath of financial crisis. In this period financial crisis was the crucial factor behind various social problems such as the dissolution of families and individuals. This research explores the range and degree of impact on individuals and social groups after the financial crisis. We explore the social mobility in terns of maintaining middle class and falling into the lower class measured by middle class identification. The 60% of the middle class before the financial crisis maintained the middle class position and the rest of people left out of middle class and fell into lower class. The 60% of those who has been maintained and has just became the members of middle class were college - educated people. The great part of people whose income and assets has increased after financial crisis belongs to college - educated group. Many of those whose income have decreased belong to the high school educated group and blow, the older than 50 years old, self - employed without employee and unpaid family employee. Those whose income and assets decreased and those who experienced downward mobility have undergone changes in everyday life and living conditions as a consumer. Many of them experienced the unemployment, nonpayment or credit - delinquency, dissolution of family, worsening health condition, depression, feeling the impulse to commit suicide simultaneously. The poor consumer disposition, reduction of living expenses, sound consumer culture have expanded to people since economic crisis. The middle class reported that the cost of private education often goes beyond the family ability to pay. The lower class has suffered from the cost of living. In a meanwhile luxury goods preference, consumer consciousness for status symbol have continuously increased among all the classes since 1997. Thus fluctuations of one's income and social mobility during past 10 years were some of the major determinants which brought about the various damaging life events, changes of living conditions and everyday lives as a consumer.

  • PDF