• Title/Summary/Keyword: IT Assets

Search Result 1,261, Processing Time 0.026 seconds

Effect of Risk Factors on the Management of Working Capital in Hospital Management (병원경영의 위험요인이 운전자본 관리에 미치는 영향)

  • Ha, Au-Hyun
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.8
    • /
    • pp.187-193
    • /
    • 2020
  • This study analyzed how risk factors in management affect the management of working capital in general hospitals in Korea. The data used accounting information for three years (2016~2017 and 2018) of 271 general hospitals using the medical institution accounting information disclosure system. The independent variables were the working capital level and the cash conversion cycle, The dependent variables were operational risk and market risk, Control variables were selected as components of working capital(cash, accounts receivable, inventory assets, accounts payable). According to the study, the lower the operational risk, the higher the level of working capital hospitals in Korea. Working capital decisions were confirmed to be attributable to operating risks, cash, inventory assets and accounts payable. And the lower the market risk (Operating Margin), the higher the cash conversion cycle. Therefore, it is necessary to review appropriate management measures of operational risks, cash, inventory assets and accounts payable identified as operating capital determinants so that medical institutions can also have economic response capabilities in consideration of the specificity of their operations.

The Effects of Household Income Drops on Household Economic Status (경제위기상황에서의 소득감소에 따른 가계경제구조 대응행태고찰)

  • 양세정
    • Journal of Families and Better Life
    • /
    • v.20 no.6
    • /
    • pp.81-93
    • /
    • 2002
  • The purpose of this study is to analyze the effects of household income drops on household economic status during economic crisis periods. Using the data taken from Korean Household Panel Study for 1996 and 1998, it was investigated how household income change affected household income, expenditure, and assets/debt. The economic status change of the income-decreased group was compared with that of the income-increased group. The major findings were as follows: Average income of the total sample was 1,905 thousand won in 1996, while 1,419 thousand won in 1998. The household of which income was decreased during the period was 65.1% of total sample. Average income of the group was reduced from 2,263 thousand won to 1,239 thousand won. Among income sources, the amount of income from real asset was found to be the highest decreasing rate, and the amounts of both business and employed-work income were reduced almost up to an half of those in two years ago. The amounts for all expenditure categories were also decreased with decreasing household income. Especially the expenditures for food away from home, leisure, durable, recreation, and vehicle-related expense were found to have the highest income elasticity. The households with decreased income were found to reduce household expenditures by 377 thousand won per month, which was 70.9% of that in 1996. Decreases in household income resulted in decreases in net wealth by 10,170 thousand won. With decreases in household income, the amounts of total insurance and private savings such as gye were decreased, and so were the amounts of real assets and monetary assets.

Study of Conversions Security Management System, Co-Relation Rule-Set scenario and architecture for incidence detection (융합보안관제환경을 위한 아키텍처 구축 및 활용 방안에 대한 연구)

  • Hwang, Donguk;Lee, Sanghun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.2
    • /
    • pp.353-371
    • /
    • 2014
  • We already have seen many studies and articles about the methodology responding the security risks and threats. But we still have some controversial subjects to be settled. Now, we are living in the era that we should focus on how to use the security systems instead of how to make it. In this point of view, a company need to find out the answer for these questions, which security risks have to be handled in a corporate, which system is better for responding the security threats, and how we can build necessary security architecture in case of developing systems. In this article, we'd like to study on-site scenarios threatening the corporate assets, the limit on dealing with these threats, and how to consolidate the security events and information from enormous assets. Also, we'd like to search for the direction form the actual cases which have shown the desired effect from converging the assets and network informations.

An Approach to Developing Service Descriptions Based on Product Line (프로덕트 라인 기반 서비스 명세 생성 방법)

  • Park, Joon-Seok;Moon, Mi-Kyeong;Yeom, Keun-Hyuk
    • The KIPS Transactions:PartD
    • /
    • v.16D no.5
    • /
    • pp.747-754
    • /
    • 2009
  • Software product line engineering is an approach to creating core assets by systematically exploits common that can be highly reusableand different characteristics in related system families that is domain. By adapting this approachin object and component paradigm, software productivity is extended. Recently, Software development paradigm is changed to service oriented paradigm which is using services that are core assets. Therefore, to develop service oriented software more flexible, systematic and to enhance business agility about business changes, we need adaptation of product line to creation of services that are core assets. In this paper, we propose an approach to create and specify domain service through combine of product line and service oriented paradigm. Domain service explicitly specifies commonality and variability by domain service common/optional property variability, operation type variability, message type variability. By using this approach, it can support efficient and flexible service oriented development by producing various services through customization of domain service for the purpose.

A Study on the Components and Competitiveness of the Teheran Valley as an Urban Innovation District (대도시 혁신지구로서 테헤란밸리의 구성요소와 경쟁력 연구)

  • Rhee, Hyosun
    • Journal of the Economic Geographical Society of Korea
    • /
    • v.22 no.3
    • /
    • pp.321-336
    • /
    • 2019
  • The ICT industry has developed into an industry that generates national competitiveness. The policy to support the ICT industry, initiated by the government, has been activated mainly on the Teheran Road of Gangnam-gu in Seoul. In this regard, this study examined the emergence background and formation factors of the new innovation district in the urban area of the Teheran Valley. In addition, this study examined the characteristics of the innovation district in the integrated urban and industrial parks with various facilities and institutions supporting the startup. This study examined the status of the Teheran Valley as an urban innovation district by dividing the indicators of the urban innovation district in the Teheran Valley into economic assets, spatial and physical assets, network assets, and human capital. It also examined the ICT technology leading the innovation and analyzed the implications for regional economic development.

nhancing Anonymity Protection in RWA Token Trading Using Blockchain Exchange Platforms (블록체인 거래소 플랫폼을 활용한 RWA 토큰 거래에서의 개인정보보호 개선 방안)

  • Jaeseong Lee;Junghee Lee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.4
    • /
    • pp.641-649
    • /
    • 2024
  • This paper addresses the issue of anonymity protection in the trading of Real-World Asset (RWA) tokens, a prominent topic in the cryptocurrency market in recent years. The principle of transparency inherent in blockchain technology makes it challenging to ensure the anonymity of traders. Although there have been instances in existing blockchain research where mixer services have been utilized to protect the privacy of Fungible Tokens (FTs), and prior studies have explored the privacy protection for Non-Fungible Tokens (NFTs), RWA tokens, which can embody characteristics of both FTs and NFTs and are tied to physical assets, present a complex challenge in achieving the goal of anonymity protection through any single method. This paper proposes a hypothetical token trading platform, ARTeX, and describes the trading process to analyze measures for protecting the anonymity of RWA token transactions.

A Study on the Development of Convergence Security with the Changes in Security Environments (시큐리티 환경변화에 따른 융합보안의 대두와 물리보안업체의 대응)

  • Ahn, Hwang-Kwon
    • Convergence Security Journal
    • /
    • v.11 no.5
    • /
    • pp.31-40
    • /
    • 2011
  • As new technologies emerge and threats become increasingly complex and unpredictable, security professionals who are living in the age of information face an increasingly complex array of challenges. In recent, virtually all organizations with physical and IT assets protect those assets in a variety of methods. There are physical systems to protect facilities and their contents from unlawful trespassing. It is important to note that the integration of physical and IT security is to be required: When done correctly, the integration starts with laws, strategies, policies and procedures. Integration of physical and IT security systems is done not for its own sake but in support of security policies and procedures. Significant security improvements can be made by integrating physical and IT security management without necessarily integrating physical and logical electronic security systems. Up to now, the private security industries of the Republic of Korea have been operated and developed by the separation of physical security and industrial security. However, considering the fast changing security environments, physical security companies should turn their attention to security convergence field to cope with the new trends in the security matters. At the same time, governmental supports on the improvement of various laws, regulations and policies in such a way to meet the realistic needs of the industries should be followed.

A Study on the Visualization and Utilization of Mapbox Online Map based on Citizen Science Using Park Tree Database - Focused on Data by Tree species in Seoul Forest Park - (공원 수목 데이터베이스를 활용한 시민 과학 기반 Mapbox 온라인 지도 시각화 및 활용 연구 - 서울숲 공원의 수종별 수목 데이터를 활용하여 -)

  • Kim, Do-Eun;Kim, Sung-hwan;Choi, Seong-woo;Son, Yong-Hoon;Zoh, Kyung-jin
    • Journal of the Korean Society of Environmental Restoration Technology
    • /
    • v.25 no.4
    • /
    • pp.49-65
    • /
    • 2022
  • Since trees in the city are green assets that create a healthy environment for the city, systematic management of trees improves urban ecosystem services. The sporadic urban tree information centered on the site is vast, and it is difficult to manage the data, so efforts to increase efficiency are needed. This paper summarizes tree data inventory based on data constructed by Seoul Green Trust activists and constructs and discloses online database maps using Tableau Software. In order to verify the utilization of the map, we divided into consumer and supplier aspects to collect various opinions and reflect feedback to implement tree database maps for each area and species of Seoul Forest. As a result, the utilization value of tree database in urban parks was presented. The technical significance of this study is to systematically record the process of constructing and implementing a dashboard directly using the Mapbox platform and Tableau Software in the field of landscaping for the first time in Korea. In addition, the implications and supplements of landscape information were derived by collecting user opinions on the results. This can be used as an exploratory basis in the process of developing online-based services such as web and apps by utilizing landscaping tree information in the future. Although the visualization database currently constructed has limitations that ordinary users cannot interact in both directions because it utilizes business intelligence tools in terms of service provision it has affirmed both the database construction and its usability in web public format. In the future it is essential to investigate the assets of the trees in the city park and to build a database as a public asset of the city. The survey participants positively recognized that information is intuitively presented based on the map and responded that it is necessary to provide information on the overall urban assets such as small parks and roadside trees by using open source maps in the future.

A Study on the Container Charges of Pusan Container Terminal (부산 콘테이너 부두의 하역료에 관한 연구 - 공영기업 차원의 요금산정을 중심으로 -)

  • Lee, Cheol-Yeong;Lee, Kwang-Hee
    • Journal of Korean Port Research
    • /
    • v.3 no.1
    • /
    • pp.3-33
    • /
    • 1989
  • The amount of the Korean export & import in 1987 reached $88.3 billion which was 1.75% of the total world trade and the proportion of foreign dependence to G.N.P was 74.5%. From these facts, we can infer that the development of national economy is largely dependent upon trade. Therefore the role of transportation, especially Ocean transportation, as a basis of economic development through trade is one of the main factors that can not be passed over. Here, We can define that a port as a subsystem of transportation determines the efficiency of the total transportation system. Thus, the purpose of this paper is to contribute in improvement of the efficiency in port, reinforcement of the international competitiveness for exporting goods by the analysis of the cargo handling charges. In order to do this, this paper deals the case of B.C.T.O.C. Furthermore, this study gives some important informations related to the level of tariffs for establishing an autonomous port administration. The Summary of the conclusions of this paper is as follows ; 1) The object of port administration in Korea has been emphasized on the maximization of efficiency in using the port facilities. Nowadays, however, it should be moved to a direction that port is operated under the compound aims considering the public interests and economy. 2) For a criterian of tariff calculation, A tariff system based on the cost accounting is desirable. In general it is recommended that the cost for construction, management, and operation of port is compensated by the revenue from port operation. Therefore, it is necessary for the administration bodies of each port to establish a tariff system on the basis of the independent profit system. 3) For the investigation of actors of tariff adjustment by the Break-even point analysis, (1) When we conducted the B.E.P analysis using total cost as cost term, we got 3.8% discount in tariff at 12% of target profit rate and 1.5% discount at 15% of rate. when we set the target profit rate as 17% we could have the proper tariff level. (2) When using operating cost as cost term, we got 13.1% discount in tariff at 12% of target profit rate and 10.9% discount at 15% of rate. When setting the target profit rat as 28%, we could have the proper tariff level. 4) Comparing with the tariffs of foreign ports for the basic terminal rate, The tariff level of B.C.T.O.C showed 33% of stevedoring charge and 80% of marshalling charge incurred at Kobe port. The comparison with Singapore port gave 50% of transhipment charge and 17% - 20 % of stevedoring charge. 5) We found that the financial structure of B.C.T.O.C was better than those of other companies and the worth fixed assets ratio was too low. The fact of low worth fixed assets ratio implies that the cargo handling facilities should be increased. Moreover, The return of assets for B.T.T.O.C was good but non-operating expenses were still contained too much in. Therefore, we think that it is necessary for B.C.T.O.C. to rationalize business management. Although the present cargo handing charge for B.C.T.O.C is a proper level in terms of a public corporation, for the final recommendation in connection to the results, It is required to take the rationalization process for business management.

  • PDF

Comparative Analysis of Network-based Vulnerability Scanner for application in Nuclear Power Plants (원전 적용을 위한 네트워크 기반 취약점 스캐너의 비교 분석)

  • Lim, Su-chang;Kim, Do-yeon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.10
    • /
    • pp.1392-1397
    • /
    • 2018
  • Nuclear power plants(NPPs) are protected as core facilities managed by major countries. Applying general IT technology to facilities of NPPs, the proportion of utilizing the digitized resources for the rest of the assets except for the existing installed analog type operating resources is increasing. Using the network to control the IT assets of NPPs can provide significant benefits, but the potential vulnerability of existing IT resources can lead to significant cyber security breaches that threaten the entire NPPs. In this paper, we analyze the nuclear cyber security vulnerability regulatory requirements, characteristics of existing vulnerability scanners and their requirements and investigate commercial and free vulnerability scanners. Based on the proposed application method, we can improve the efficiency of checking the network security vulnerability of NPPs when applying vulnerability scanner to NPPs.