• Title/Summary/Keyword: Asset management System

Search Result 375, Processing Time 0.025 seconds

A Comparative Study on perception of Consumer parents and Service Provider on the Adult Guardship System (성년후견제도에 대한 성년후견수요자의 부모와 서비스 제공자의 인식 비교 연구)

  • Chun, Dong Il;Kim, Kyoung Ran;Je, Cheol Ung
    • Journal of Digital Convergence
    • /
    • v.11 no.4
    • /
    • pp.11-23
    • /
    • 2013
  • Adult guardianship system is about to launch in July 2013 in South Korea. For its successful first step, this study examined social awareness on the adult guardianship system and compared the awareness of parents and the awareness of service providers in the handicapped adult guardianship program to draw political implications on how to improve the system. As a result, this study found that people had higher awareness on adult guardianship (78.9%) but their understanding was lower (35.2%). Secondly, prospected guardians were found to have stronger demand on hospital use and financial management than on their asset management. About 63.3% of them showed an intention to use the system in the future. Lastly, both parent group and service provider group were found to have awareness at a similar level to each other on civilian guardian types, cost, who to bear coat and how much, and details of the program.

An Approach to Managing Requirements as a Core Asset in Software Product-Line (소프트웨어 프로덕트 라인에서 핵심 자산으로서 요구사항을 관리하는 방법)

  • 문미경;염근혁
    • Journal of KIISE:Software and Applications
    • /
    • v.31 no.8
    • /
    • pp.1010-1026
    • /
    • 2004
  • The goal of product line engineering is to support the systematic development of a set of similar software systems by understanding and controlling their common and distinguishing characteristics. The product line engineering is a process that develops reusable core assets and develops a set of software-intensive systems from a common set of core assets in a prescribed way. Currently, many software development technologies are accomplished in context of product line. However, much of the product line engineering research have focused on the reuse of work products relating to the software's architecture, detail design, and code. The product lines fulfill the promise of tailor-made systems built specifically for the needs of particular customers or customer groups. In particular, commonality and variability play central roles in the all product line development processes. These must be treated already during the requirement analysis phase. Requirements in product line engineering are basis of software development just like as traditional system development engineering, and basis of deciding other core assets' property - commonalities and variabilities. However, it is difficult to elicit, analyze and manage correct requirements. Therefore, it is necessary to develop systematic methods which can develop and manage requirement as core asset, which can be stable in anticipative change and can be well adapted to unpredictable change. In this paper, we suggest a method of managing requirements as core asset in product line. Through this method, the reuse of domain requirements can be enhanced. As a result, the cost and time of software development can be reduced and the productivity can be increased.

Development of Outage Data Management System to Calculate the Probability for KEPCO Transmission Systems (한전계통의 송전망 고장확률 산정을 위한 상정고장 DB 관리시스텀(ezCas) 개발)

  • Cha S. T.;Jeon D. H.;Kim T. K.;Jeon M. R.;Choo J. B.;Kim J. O.;Lee S .H
    • Proceedings of the KIEE Conference
    • /
    • summer
    • /
    • pp.88-90
    • /
    • 2004
  • Data are a critical utility asset. Collecting correct data on site leads to accurate information. Data, when gathered with foresight & properly formatted, are useful to both existing database and easily transferable to newer, more comprehensive historical outage data. However, when investigating data items options, the task, can be an arduous one, often requiring the efforts of entire committees. This paper firstly discusses the KEPCO's past 10 years of historical outage data which include meterological data, and also by several elements of the National Weather Service, failure rate, outage duration, and probability classification, etc. Then, these collected data are automatically stored in an Outage Data Management System (ODMS), which allows for easy access and display. ODMS has a straight-forward and easy-to-use interface. It lets you to navigate through modules very easily and allows insertion, deletion or editing of data. In particular, this will further provide the KEPCO that not only helps with probabilistic security assessment but also provides a platform for future development of Probability Estimation Program (PEP).

  • PDF

Role of Forensic Accounting to Strengthen Corporate Governance : An Empirical Study

  • Bhasin, Madan Lal
    • The Journal of Economics, Marketing and Management
    • /
    • v.5 no.1
    • /
    • pp.1-20
    • /
    • 2017
  • An increasing number of researchers are finding that 'poor' CG is a leading factor in dismal performance, manipulated financial reports, and unhappy stakeholders. Undoubtedly, qualified, trained and mature Chartered Forensic Accountants (CFA's) can prove to be a valuable asset to the corporate sector, and gradually help to improve their CG system. The fundamental objective of this study is to find out "how can we integrate the expertise of the FA to improve the overall CG scenario prevalent in India?" This is a preliminary investigation of the necessary skills, educational and training requirements for CFA's to improve CG system. During 2011-12, a questionnaire-based survey was conducted in the NCR of India using a sample size of 120 practicing chartered accountants, accounting academics, and potential users of FA services. Results indicate that potential practitioners, academics and users agree that "critical thinking, written & oral communication, legal knowledge, auditing skills, deductive analysis, investigative flexibility, analytical proficiency and unstructured problem-solving are the most important skills required for the CFAs." Moreover, we found that all of the skills investigated in this study are 'potentially' important for the CFAs, which the educators at the Universities should use as an overall guide while designing their FA curriculum."

Development of requirements for information security management system (ISO 27001) with CPTED in account (셉테드(CPTED)를 고려한 정보보안 관리시스템(ISO 27001)의 요구사항 개발)

  • Lim, Heon-Wook
    • Convergence Security Journal
    • /
    • v.21 no.1
    • /
    • pp.19-24
    • /
    • 2021
  • The purpose of this study was to add CPTED to the information security area. The control items of ISO 27001 (11 types) and the application principles of CPTED (6 types) were mapped. And the relevance between the items was verified through the FGI meeting through 12 security experts. As a result of the survey, the control items with a relevance of at least 60% on average are security policy, physical and environmental security, accident management, and conformity. As a result, the comprehensive policy was shared with CPTED's items as a whole. The specialized control items are security organization, asset management, personnel security, operation management, access control, system maintenance, and continuity management. However, specialized control items were mapped with each item of CPTED. Therefore, information security certification and septed are related. As a result, environmental security can be added to the three major areas of security: administrative security, technical security, and physical security.

Effect Analysis of Long-range Artillery Intercept System According to its Component Arrangement (장사정포 요격체계 구성요소 배치에 따른 효과 분석)

  • Kim, Taegu;Yun, Nahae;Kim, YeonJoo;Park, Inchul;Shim, Donghyouk
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.45 no.1
    • /
    • pp.41-52
    • /
    • 2022
  • Development of a long-range artillery intercept system to counter the threat of enemy long-range artillery is in progress. This intercept system is a complex combination of several components. In addition, the ability to engage simultaneously is emphasized due to the characteristic of having to respond to numerous enemy bullets. In this study, the performance according to the arrangement of the detection asset and missile launchers, which are key components of the system, is analyzed. A simulation experiment was performed assuming the enemy attack at various azimuth and launch angles. As a result of the analysis, the radar seems to provide sufficient detection capability in any situation, but in the case of the launcher, the effect of the enemy's launch angle can be critical. It is recommended to place both radar and launchers behind the protection target.

A Risk Analysis Methodology for Information Systems Security Management (정보시스템 보안관리를 위한 위험분석 방법론)

  • 이문구
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.41 no.6
    • /
    • pp.13-22
    • /
    • 2004
  • This study proposes a risk analysis methodology for information system security management in which the complexity on the procedure that the existing risk analysis methodology is reduced to the least. The proposed risk analysis methodology is composed of 3 phases as follows: beforehand processing phase, counter measure setting phase, post processing phase. The basic risk analysis phase is a basic security management phase in which fixed items are checked when the information security system is not yet established or a means for the minimum security control is necessary for a short period of time. In the detailed risk analysis phase, elements of asset a vulnerability, and threat are analysed, and using a risk degree production table produced from these elements, the risk degree is classified into 13 cases. In regard to the risk, the 13 types of risk degree will execute physical, administrative, and technical measures through ways such as accepting, rejecting, reducing, and transferring. Also, an evaluation on a remaining risk of information system is performed through a penetration test, and security policy set up and post management phase is to be carried out.

Building a framework of successful knowledge management for value creation (가치창출을 위한 성공적 지식경영프레임웍의 구축)

  • Seo, Jun-Seok;Jung, Sang-Chul
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.13 no.6
    • /
    • pp.2528-2539
    • /
    • 2012
  • In the 21st century, knowledge is an important asset to improve productivity in the business world. In today's rapidly changing business environment, companies have rigorously brought in knowledge management system in order to secure the sustainable competitiveness and effective knowledge management. Knowledge management has now become mandatory, not optional. Today many companies which have built knowledge management on top of information technology and hardware-based infrastructure are having a difficulty in creating organizational culture in knowledge management. Even though companies have invested substantial time and money in knowledge management, the performances have not met their expectations. To solve this problem, software oriented strategy for knowledge management such as education and networking is more needed rather than hardware oriented strategy such as information technology systems. Though the knowledge management framework suggested in this study is exploratory, this study contributes to the clarification of the critical elements that companies which are about to build knowledge management should take in account.

Causal model of Urban Households' Subjective Financial Security (체계론에 근거한 주관적 재정안정도에 대한 인과적 모형)

  • 김연정
    • Journal of the Korean Home Economics Association
    • /
    • v.29 no.4
    • /
    • pp.151-165
    • /
    • 1991
  • The purpose of this study was to examine causal model of resources and demands, family financial management and subjective financial security among urban households based on system theory. For this purpose, the data were collected by the questionnaire sheets. 455 housewives participated this survey in Seoul. And the data were analyzed by various statistical methods such as Frequency, Percentile, ANOVA, F-test, Pearson's correlation analysis, Multipe Regression Analysis, and Path Analysis. The results of this research were as follows: 1. There were significant differences in the Subjective Financial Security according to resource variables and demand yariables. Those variables were such as housewive's age, education, occupation, househead's occupation, per capita income, aspiration, expectancy, perception of financial progress and relative deprivation. 2. The higher family financial management level, the higher level of Subjective Financial security. And the higher family financial management plan·implement level, the higher level of Subjective Financial security. 3. The lower debt/asset ratio, the higher level of Subjective Financial security. 4. Aspiration, per capita income an financial managemant variables showed direct effect on Subjective Financial security among all variables affecting the urban households' Subjective financial security. While housewive's education level, aspiration, per capita income and husband's occupation affected indirectly on the Subjective Financial security through family financial managemant.

  • PDF

Information Risk and Cost of Equity: The Role of Stock Price Crash Risk

  • SALEEM, Sana;USMAN, Muhammad
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.8 no.1
    • /
    • pp.623-635
    • /
    • 2021
  • The purpose of this research is to examine the impact of information risk on the Cost of Equity (COE) and whether the risk of a stock price crash mediates the relation between information risk and COE. To test the dynamic nature of the proposed model, the two-step system GMM dynamic panel estimators are applied to all the non-financial firms listed on the Pakistan Stock Exchange (PSX) from 2007- 2018. The results of this study show that all three types of information risk, as well as the risk of the share price crash, increases the COE. The crash risk strengthens the impact of information risk on the COE. Moreover, these three information risks are correlated with each other and an increase in information quality reduces the effect of asymmetric information and improves the investor interpreting ability, while an increase in private information decreases the transparency. The finding is crucial for asset pricing, portfolio management, and information disclosure. This study contributes to the literature by providing novel findings on the impact of three different types of information risk, i.e. private information, quality of information, and transparency of information on the COE as well as whether crash risk mediates the relationship.