• Title/Summary/Keyword: External assets

Search Result 79, Processing Time 0.019 seconds

Effect of corporate social contribution on corporate financial performance (기업의 사회공헌활동이 기업의 재무성과에 미치는 영향)

  • Oh, Deok Kyo;Cin, Beom Cheol;Lee, Eui Young
    • International Area Studies Review
    • /
    • v.20 no.3
    • /
    • pp.101-121
    • /
    • 2016
  • This research is purposed to analyze the effect of firms' current socially responsible management on the future corporate financial performance with specified areas of socially responsible management according to the beneficiaries. Tobin's Q statistic and return on assets are calculated and exploited as measures of corporate financial performance. as of empirical analysis results, we found that the social contributions in the consumer area and external social contribution at time t influence the Tobin's Q statistic at time (t+1) in the aggregate analysis. as it is revealed that there is no effect in the firms with the outstanding social performance to the future corporate financial performance, we understand that the capital market is very sensitive to the external social contribution including consumers of firms with the weak social performance rather than the social contribution of socially outstanding firms. This sensitivity of capital market can effectively enhance the social contribution of firms, in particular listed firms with the weak social performance.

An Exploratory Research for the Conceptualization Failure knowledge (실패지식의 개념화를 위한 탐색적 연구)

  • Shim, Hyungseok
    • Knowledge Management Research
    • /
    • v.12 no.4
    • /
    • pp.121-132
    • /
    • 2011
  • Failure, the research object, means situations when goals and their results are different, which has developed presenting various aspects from ancient times and modern times. Failure is a complex concept which essentially requires judgement, and also a relative concept which can be changed depending on how you set up time base and standard. There are four stages for failure study to have been developed from studying failure through historical facts to the approach of organizational theory and it has been studied by looking at the failure of an organization according to different categories such as a developmental stage, a type of business, a period and a course. Compared with success science, failure study has not been studied sufficiently and also the level of its analysis is low. Thus, since lessons of failure tend to repeat themselves instead of being didactically accumulated, there need more studies on this. This thesis identified the main cause of the failure through various studies regarding failure which have been conducted at home and abroad. What the main cause of the failure that more than three studies mentioned have in common was that it occurred because organizations concentrated on the inside without communicating with external environment. The key point of failure study is to analyze failure, utilize it as assets, and create a frame of failure management. This thesis focused on delivering fragmentary knowledge on failure study, but case studies regarding this subject should be done in the future.

  • PDF

An Analysis of the Efficiency and Productivity of Domestic Construction Companies (국내 건설기업의 효율성 및 생산성 분석)

  • Joo, Su-Min;Lee, Suchul;Hong, Jong-Yi
    • Journal of Information Technology Applications and Management
    • /
    • v.27 no.1
    • /
    • pp.1-13
    • /
    • 2020
  • This study aims to measure the efficiency and productivity change of 30 domestic construction companies from 2010 to 2018 using data envelopment analysis(DEA) and Malmquist productivity index (MI). In particular, we used the number of employees, capital stock, and non-current assets as input variables, and sales and net income as ouput variables for the analysis. The dataset used for the analysis of efficiency and productivity changes is the employee profile and financial statements for the companies from 2010 to 2018. We found that the MI of the 30 companies is greater than one since 2013. This is because many years of TEC (Technical Efficiency Change) is greater than 1, which means that the productivity index increases as the TEC increases. In addition, the MI value was less than 1, which lowered the productivity of construction firms in 2018. The results of the study may help decision makers to find effective future management plans by analyzing the internal and external factors.

A Study on DSMS Framework for Data Security Certification (데이터보안인증을 위한 DSMS 프레임워크 구축 연구)

  • Yoo, Seung Jae
    • Convergence Security Journal
    • /
    • v.19 no.4
    • /
    • pp.107-113
    • /
    • 2019
  • Data security is the planning, implementation and implementation of security policies and procedures for the proper audit and authorization of access to and use of data and information assets. In addition, data serviced through internal / external networks, servers, applications, etc. are the core objects of information protection and can be said to focus on the protection of data stored in DB and DB in the category of information security of database and data. This study is a preliminary study to design a proper Data Security Management System (DSMS) model based on the data security certification system and the US Federal Security Management Act (FISMA). And we study the major security certification systems such as ISO27001 and NIST's Cybersecurity Framework, and also study the state of implementation in the data security manager solution that is currently implemented as a security platform for preventing personal data leakage and strengthening corporate security.

Design and Implimentation of Intrusion Detection System on Contents Security (컨텐츠 보안 침입 탐지 시스템 설계 및 구현)

  • Kim, Young Sun;Seo, Choon Weon
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.52 no.11
    • /
    • pp.164-168
    • /
    • 2015
  • As Internet use is widespread advertising through the Web, shopping, banking, etc. As the various services offered by the network, the need for Web security is increasing. A security system for the protection of information assets and systems against various types of external hacking threats and unlawful intrusion will require. Intrusion Detection Tool of the paper web will have is to increase the security level, to prevent the loss of resources and labor spent by the individual monitoring of the web. Security intrusion detection system analyzes the cause of the problem of the security vulnerability and exposure of the information on the Web. Using a monitor to determine a fast support of security is to design a security system for the purpose of protecting the information security vulnerability and exposure information.

A Study of the Performance Degradation Factors of An Internal Network (내부 네트워크의 성능저하요인에 관한 연구)

  • Jeon, Jeon-Hoon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.1B
    • /
    • pp.43-50
    • /
    • 2011
  • Recently, Hacking Attacks are appearing as a various Attack techniques with evolution of the Network and most of the network through a various Security Systems are responding to an attack. In addition, it should be placed adding the Security Systems to protect the Internal Network's Information Assets from External attacks. But, The use of Security Systems and Network deployment inside the network makes a significant impact on Security and Performance. Therefore, In this paper, it will be to analyze the Performance Degradation Factors of the Internal Network according to the Security System's use and placement. In a future, This paper is expected to serve as a valuable information for the Network Performance and Security improvements.

Assessment of Energy Organizations' External Conditions in the Russian Federation: A Sector Analysis

  • Vyborova, E.N.;Salyakhova, E.A.
    • Asian Journal of Business Environment
    • /
    • v.4 no.2
    • /
    • pp.17-21
    • /
    • 2014
  • Purpose - The paper analyzes basic indicators characterizing the volume of energy sector activity in the Russian Federation, Privolzhsky Federal district, Republic of Tatarstan. Research design, data, and methodology - The study analyzed data from the Privolzhsky Federal district, specifically, industrial production volume, electricity production, energy consumption, energy-balance data, capital investments, and capital investment structure. An array of data has been investigated in recent years. The dataset's dynamics were analyzed in 1998. Fixed capital investment dynamics were studied in 1946 the figures were converted to a comparable form using the index method. Trends were analyzed using multivariate statistics methods and the Statgraphics software package. Results - Hypothesis 1. There are sectoral disproportions in energy flows,taking into account the volume of electricity production and consumption. Trends in electricity production in general coincide with industrial production volume trends. Energy flows have disparities in individual territorial units, and in general. Hypothesis 2. The degree of sectoral economic stability decreases with insufficient levels of investment in fixed capital energy organizations. Conclusions - Because totalelectricity production is largely determined by fixed capital investments, the study of their trends and patterns will coordinate efforts on investment operations in this area.

Vulnerability and Security Management System from the Perspective of the Cloud Service Users (클라우드 서비스 사용자 관점에서의 취약점과 보안관리체계)

  • Choi, Young-Jin;Ra, Jong-Hei;Ky, Hong Pil;Lee, Sang-Hak
    • Journal of Information Technology and Architecture
    • /
    • v.9 no.4
    • /
    • pp.401-411
    • /
    • 2012
  • There has been increased interest for cloud computing services that can promote cost savings while increasing investment in information resources. Cloud computing, however, has a disadvantage physically located in the external information resources to take advantage of the economic benefits, the advantages and increase the vulnerability of information protection and control of information assets. In this study, due to the unique properties of the new services, including vulnerability, the vulnerability of cloud computing derive the vulnerability of cloud computing and control items were derived through the mapping between vulnerability and control items, that are not being managed to identify vulnerabilities Cloud computing risk factors are presented.

Design Proposal of Seoul City Hall Plaza (서울시청 앞 광장 조성 계획)

  • 이민우;안세헌;조경진
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.31 no.3
    • /
    • pp.34-45
    • /
    • 2003
  • The motivation for transforming the Seoul City Hall plaza into place for pedestrians was prompted by the 2002 World cup event. This place has diverse time layers ranging from the Yi-dynasty to the present. Around city hall, diverse cultural assets and distinctive architecture are scattered. The place is a kind of melting pot that represents different times and cultures in the city. Transforming place for cars into place for citizens suggest several implications in city making policy such as high priority for pedestrians in urban design and enhancement of the public open spaces through downtown remodelling. Our plan is to propose the idea of Media plaza. One of the characteristics of Seoul now can be summarized as Media because the W industry and infrastructure are well developed in the city. ´Seoul Media Plaza´ adopts high-tech infrastructures such as RGB color post, multi box, I-Gate, etc as design materials. Three concepts of the plan are ´evolutionary plan´, ´flexible plan´, and ´participatory plan´. First, the plan will embrace the future changes of external conditions. Second, the plan should be flexible to accomodate the diverse activities in the plaza. Another special aspect of the plan is a kind of open plan. The ground surface of the plaza will be changed in its pattern and shape by citizen participation. Finally, the ´Seoul Media Plaza´ attempts to represent the spirit of Seoul and to connect the past, the present and the future while promoting citizen participation.

Conservation Methods for Historic Rural Settlements - with focus on foreign precedents - (농촌 정주형 역사환경 보전방법론 고찰 - 외국 선례를 중심으로 -)

  • 강동진
    • Journal of Korean Society of Rural Planning
    • /
    • v.4 no.2
    • /
    • pp.41-57
    • /
    • 1998
  • Now, the conservation policy of historic environments in Korea which started in early 1980's, is in a danger. In addition, because of economic crisis started last year, the concerns for historic environments are growing weaker. However, this situation can be a good opportunity to prepare for the coming conservation works, The purpose of this study is to find clues for conservation of historic environments by considering foreign precedents. For concrete results, this study selects historic rural settlements as a case and focuses on the relationship among related people in the light of the their rights. Based on the consideration of foreign precedents, three different characters in the conservation process could be identified compared with korean cases; 1) Except partial works of public sector, generally the conservation process is under the control of nonprofit groups and residents themselves, 2) Conservation methods include with the proper change process for the sustainable settlement, and avoid the unconditional past-oriented approach, 3) Conservation methods are composed of not only the preservation of external forms such as assets but also the continuous participation and management of the community. And the most important clue which has been extracted is that the diverse rights of related people in the historic rural settlements should be kept in balance thoroughly.

  • PDF