• Title/Summary/Keyword: Information Asset

Search Result 844, Processing Time 0.034 seconds

Two-Dimensional Qualitative Asset Analysis Method based on Business Process-Oriented Asset Evaluation

  • Eom, Jung-Ho;Park, Seon-Ho;Kim, Tae-Kyung;Chung, Tai-Myoung
    • Journal of Information Processing Systems
    • /
    • v.1 no.1 s.1
    • /
    • pp.79-85
    • /
    • 2005
  • In this paper, we dealt with substantial asset analysis methodology applied to two-dimensional asset classification and qualitative evaluation method according to the business process. Most of the existent risk analysis methodology and tools presented classification by asset type and physical evaluation by a quantitative method. We focused our research on qualitative evaluation with 2-dimensional asset classification. It converts from quantitative asset value with purchase cost, recovery and exchange cost, etc. to qualitative evaluation considering specific factors related to the business process. In the first phase, we classified the IT assets into tangible and intangible assets, including human and information data asset, and evaluated their value. Then, we converted the quantitative asset value to the qualitative asset value using a conversion standard table. In the second phase, we reclassified the assets using 2-dimensional classification factors reflecting the business process, and applied weight to the first evaluation results. This method is to consider the organization characteristics, IT asset structure scheme and business process. Therefore, we can evaluate the concrete and substantial asset value corresponding to the organization business process, even if they are the same asset type.

Exploring Corporate Knowledge Management Cases Based on Business Function Oriented Knowledge Asset Classification Schema (비즈니스 기능 중심 지식자산 분류체계에 따른 기업 지식관리 사례 탐색)

  • Kim, In-Sook;Choi, Byoung-Gu;Lee, Hee-Seok
    • Information Systems Review
    • /
    • v.3 no.2
    • /
    • pp.245-260
    • /
    • 2001
  • While past knowledge management researches have focused on conceptualization and strategic implications, knowledge asset researches attempt to provide practical guidelines for companies. However, each research classifies knowledge asset from its own perspective, and thus it is not a trivial task to leverage consistent and inclusive criteria in managing corporate knowledge asset. The objective of this paper is to develop a knowledge asset classification schema on the basis of the three business functions: customer relationship management, product innovation, and infrastructure management. To demonstrate the feasibility of our schema, it has been applied to 9 Korean corporations. Knowledge assets are evaluated according to core capabilities, which are main drivers of sustainable competitive advantages. The results of case study show that the leveraged classification schema reflects current knowledge asset management and characteristics of corporations. Our finding is that most top-quality knowledge management corporations are likely to develop well-balanced knowledge asset.

  • PDF

A Study on the Introduction of the Work Breakdown Structure for Infrastructure Asset Management

  • Jeong, Seongyun
    • International conference on construction engineering and project management
    • /
    • 2015.10a
    • /
    • pp.691-692
    • /
    • 2015
  • Several scholars in South Korea have predicted that maintenance costs of social infrastructure will sharply increase from the mid-2020s, and cause budgetary deficits among facilities management agencies. Interest in infrastructure asset management (IAM) is rising as a solution to such problem. In this study, an information system for asset valuation that reflects the salvage value and deferred cost of social infrastructure based on WBS (work breakdown structure) was developed in consideration of IAM. To reuse the construction cost information such as the acquisition cost, the interconnection between CBS (cost breakdown structure) and WBS was considered. Furthermore, asset valuation information was developed with XML schema to facilitate the exchange and reuse of the information among project participants.

  • PDF

Social Engineering Attack Graph for Security Risk Assessment: Social Engineering Attack Graph framework(SEAG)

  • Kim, Jun Seok;Kang, Hyunjae;Kim, Jinsoo;Kim, Huy Kang
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.11
    • /
    • pp.75-84
    • /
    • 2018
  • Social engineering attack means to get information of Social engineering attack means to get information of opponent without technical attack or to induce opponent to provide information directly. In particular, social engineering does not approach opponents through technical attacks, so it is difficult to prevent all attacks with high-tech security equipment. Each company plans employee education and social training as a countermeasure to prevent social engineering. However, it is difficult for a security officer to obtain a practical education(training) effect, and it is also difficult to measure it visually. Therefore, to measure the social engineering threat, we use the results of social engineering training result to calculate the risk by system asset and propose a attack graph based probability. The security officer uses the results of social engineering training to analyze the security threats by asset and suggests a framework for quick security response. Through the framework presented in this paper, we measure the qualitative social engineering threats, collect system asset information, and calculate the asset risk to generate probability based attack graphs. As a result, the security officer can graphically monitor the degree of vulnerability of the asset's authority system, asset information and preferences along with social engineering training results. It aims to make it practical for companies to utilize as a key indicator for establishing a systematic security strategy in the enterprise.

A Study on the Effects of the Information Asset Protection Performance on the Organization Performance: Management Activity and Control Activity (정보자산보호 성과가 조직성과에 미치는 영향에 관한 연구: 관리활동과 통제활동을 중심으로)

  • Kim, Kyung-Kyu;Shin, Ho-Kyoung;Park, Sung-Sik;Kim, Beom-Soo
    • Journal of Information Management
    • /
    • v.40 no.3
    • /
    • pp.61-77
    • /
    • 2009
  • Recently, enterprises are protecting information assets with the various means of control and management. Nevertheless, they are confronted with the dilemma which the higher securitylevel they request, the lesser efficiency and productivity in short terms they acquire by the inconvenience of business process. In addition, in spite of the steady increase of organization's investment on information protection, the systematic way for the performance measurement of information protection has not been suggested, so that in reality, it is difficult to make the decision to invest on information-protection and elicit the direction to improve it. For this reason, this study intended to establish the concept of the protection and security of information assets of enterprises and to categorize the type of activities to protect information assets into management activity and control activity, and analyze the effects of management activity and control activity for information asset protection on the performance of information asset protection activity and organization. For this research, questionnaire survey was conducted with literature study and the PLS(Partial Least Square) was used to analyze the measurement model and hypotheses testing. The PLS analysis results indicate that management activity for information asset protection affects information asset protection performance. Further, organizational performance is influenced by information asset protection performance. Practical implications of these findings and future research implications are also discussed.

Asset-based Mapping Approach to Design for Poverty Informations (자산기반매핑을 이용한 가난정보 구축에 관한 연구)

  • Liou, Jaeik;Kim, Jae-Yun
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.5 no.3
    • /
    • pp.55-67
    • /
    • 2002
  • Various researches and practices on asset management and asset-based mapping have been done with regard to engineering, industry, business and stocks marketing areas. Their notions and concepts are differently interpreted in response to different requirements. There are considerable research outcomes of management, operation and maintenance for physical, natural and digital assets. However, existing concept of asset management might have limitations to deal with diverse tangible or intangible assets at the individual/household/community level. In this paper, a conceptual framework of Hexad asset model is designed to explicate increase, decrease and other changes of assets flows as a geometric pathway. Particularly, consideration of lands and housing as important physical and natural assets to escape poverty not only leads to creation of an excellent 3D digital asset management, but also reaches to a new approach to asset-based mapping for a poverty information management and system.

  • PDF

A study of determination probability function to the hidden inheritance in SR DEVS (SR DEVS에서 숨겨진 상속에 대한 결정확률 함수의 연구)

  • Park, Sang-Joon;Lee, Jong-Chan
    • Journal of the Korea Society of Computer and Information
    • /
    • v.20 no.1
    • /
    • pp.137-142
    • /
    • 2015
  • In the object inheritance of SR DEVS, partial or overall asset inheritance can be possible. To a asset inherited from parent object, by respective dedicated function a child object can implement partial or whole asset, or not. Even though a child has a inherited asset, if the asset is the hidden property its implementation will not be provided. A inherited asset cannot be showed in whole asset implementation, or it can be implemented by special system state. Here, the whole asset implementation means may include time parameter. In this paper, we describe a determination probability scheme for partial or whole asset inherited from the parent object to determine the hidden inheritance. By the determination probability function it is decided that the inherited asset will be hidden or normal asset.

OPTIMAL PORTFOLIO FOR MULTI-TYPE ASSET MODELS USING FILTERED VARIOUS INFORMATION

  • Oh, Jae-Pill
    • Journal of the Korean Society for Industrial and Applied Mathematics
    • /
    • v.15 no.4
    • /
    • pp.277-290
    • /
    • 2011
  • We define some multi-type asset models derved from L$\acute{e}$vy proceses which emphasize coefficients of stochastic differential equations. Also these asset models can be represented by Doleance-Dade linear equations derived from jump-type semimartingales which are decomposed by various terms of time basically. For these asset models, we can construct optimal portfolio strategy by using filtered various information at each check time.

Development of Tunnel Asset Management (TAM) Program

  • Hamed Zamenian;Dae-Hyun (Dan) Koo
    • International conference on construction engineering and project management
    • /
    • 2013.01a
    • /
    • pp.576-582
    • /
    • 2013
  • Typical highway infrastructure systems include roadway pavement, drainage systems, tunneling, and other hardware components such as guardrails, traffic signs, and lighting. Tunnels in a highway system have provided significant advantages to overcoming various natural challenges including crossing underneath bodies of water or through mountainous areas. While only a few tunnel failure cases have been reported, the failure rate is likely to increase as these assets age and because agencies have not emphasized tunneling asset management. A tunnel system undergoes a deterioration life cycle pattern that is similar to other infrastructure systems. There are very few agencies in the United States implementing comprehensive tunnel asset management programs. While current tunnel asset management programs focus on inspection, maintenance, and operation safety, there is an increasing need for the development of a comprehensive life cycle tunnel asset management program. This paper describes a conceptual framework for a comprehensive tunnel asset management program. The framework consists of three basic phases including a strategic plan, a tactical plan, and an operational plan to provide better information to the decision makers. The strategic plan is a basic long term approach of tunnel asset management. The tactical plan determines specific objectives and the operational plan actually applies asset management objectives in practice. The information includes operational condition, structural condition, efficiency of the system, emergency response, and life cycle cost analysis for tunnel capital improvement project planning.

  • PDF

A Study on Information Management System for Efficient Asset Management (효율적인 자산관리를 위한 정보관리 체계 구축 방안에 대한 기초연구)

  • Kim, Do-Min;Seo, Hee-Chang;Kim, Ju-Hyung;Kim, Jae-Jun
    • Proceedings of the Korean Institute of Building Construction Conference
    • /
    • 2012.11a
    • /
    • pp.121-123
    • /
    • 2012
  • Since the financial crisis in 1997, the paradigm in property has been changed. So the domestic asset management market was generated and developed. While developing the asset management, however, there were a variety of problems about management of property information and asset management specialist shortage. For effective property management, this study propose the strategy of making information management system.

  • PDF