• Title/Summary/Keyword: Internal assets

Search Result 108, Processing Time 0.025 seconds

Log Analysis Method of Separate Security Solution using Single Data Leakage Scenario (단일 정보유출 시나리오를 이용한 개별 보안솔루션 로그 분석 방법)

  • Park, Jang-Su;Lee, Im-Yeong
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.4 no.2
    • /
    • pp.65-72
    • /
    • 2015
  • According to recent statistics published by the National Industrial Security Center, former and current employees are responsible for 80.4% of companies' technology leakages, and employees of cooperative firms are responsible for another 9.6%. This means that 90% of technology leakages are intentionally or mistakenly caused by insiders. In a recent incident, a credit card company leaked private information, and the person responsible was an employee of a cooperative firm. These types of incidents have an adverse effect not only on a company's assets but also on its reputation. Therefore, most institutions implement various security solutions to prevent information from being leaked. However, security solutions are difficult to analyze and distinguish from one another because their logs are independently operated and managed. A large number of logs are created from various security solutions. This thesis investigates how to prevent internal data leakage by setting up individual scenarios for each security solution, analyzing each scenario's logs, and applying a monitoring system to each scenario.

The Influence on the Information Security Stressor on Information Security Compliance Intention : Focusing on the Moderation of Authentic Leadership (정보보안 스트레서가 정보보안 준수 의도에 미치는 영향: 진성 리더십의 조절 효과 중심)

  • Hwang, In-Ho
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.16 no.6
    • /
    • pp.1101-1112
    • /
    • 2021
  • Organizations continue to increase investment in information security(IS) policies and technologies to prevent external intrusion and internal exposure to information assets. However, as the organization's regulations and behavioral requirements for strict IS policy increase, employees may induce negative behaviors through IS-related stress. The purpose of this study is to suggest the effects of challenge and hindrance stressors on IS compliance intentions and to confirm how authentic leadership moderates the positive and negative effects of stressors. We reflected employees of the organization who are applying IS policy to their work as a study target and applied a survey to obtain a sample for research hypothesis verification. As a result of analysis through structural equation modeling, challenge and hindrance stressors affected IS compliance intentions, and authentic leadership moderated the effects of stressors on compliance intention. Our research helps to establish insiders support strategies to achieve internal IS goals, because the results suggested stressor conditions and leaders' behavioral directions that influence employees IS compliance behavior.

A study on the Buddist Temple Space through the religious composition (신앙구조(信仰構造)를 통해 본 사찰공간(寺刹空間) 구성(構成)에 관한 연구(硏究))

  • Kim, Seung-Je;Kim, Jin -Duck
    • Journal of the Korean Institute of Rural Architecture
    • /
    • v.4 no.3
    • /
    • pp.23-37
    • /
    • 2002
  • Buddhist Architecture should be set for worship and an ascetic life, which is its main function as it is a religious facility and its space and form can be considered as means to achieve efficiently a religious function. Every religion concludes its religious function through its ideas and form of faith based on scriptures and religious precepts. The thing should be paid attention to from this point of view is how Buddhist doctrines are reflected on the architecture and the background recognition about the fundamental doctrines and religious system should be preceded to clarify it. Existing researches have studied the characteristics of Buddhist temples on the point of functional view and architectural spacial view through phenomenal ways. Though fruitful results bore about the Korean space through that way, more internal viewpoint is required to clarify the fundamental regularities and spatial concepts indwelling in temple architecture. Considering what structural elements were required to compose one space in traditional Korean architecture is the fundamental subject and important. This thesis searches architectural characteristics through inquiring about the main building and annexes and understanding symbolic characteristics about the arrangement of the Buddhist statue and solemn things in the Buddhist temples of tangible cultural assets or above located in Seoul area.

  • PDF

Carbon Emission Disclosure, Good Corporate Governance, Financial Performance, and Firm Value

  • KURNIA, Pipin;DARLIS, Edfan;PUTR, Adhitya Agri
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.7 no.12
    • /
    • pp.223-231
    • /
    • 2020
  • This research aims to examine (1) the effect of carbon emission disclosure on firm value, (2) the effect of good corporate governance on firm value, (3) the mediating role of financial performance between carbon emission disclosure and firm value, and (4) the mediating role of financial performance between good corporate governance and firm value. The research sample includes 43 mining, agro, and manufacturing firms listed in the Indonesian Stock Exchange over the 2015-2017 period. Carbon emission disclosure is measured by an indicator of the Global Reporting Initiative Series of Environmental Aspect. Good corporate governance is measured by the corporate governance score of shareholder rights, boards of directors, outside directors, audit committee and internal auditor, and disclosure to investors. Financial performance is measured by return on assets, while firm value is measured by Tobin's Q. Data analysis uses the structural equation modeling. The result shows carbon emission disclosure and good corporate governance have no direct effect on firm value. On the other hand, financial performance mediates the effect of carbon emission disclosure and good corporate governance on firm value. It shows that higher carbon emission disclosure and good corporate governance are meaningless for the investor if they do not give any financial performance improvement.

Determinants of Debt Policy for Public Companies in Indonesia

  • MUKHIBAD, Hasan;SUBOWO, Subowo;MAHARIN, Denis Opi;MUKHTAR, Saparuddin
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.7 no.6
    • /
    • pp.29-37
    • /
    • 2020
  • This research seeks to determine the influence of investment opportunity set (IOS); profitability (Return on Assets - ROA), liquidity, business risk and firm size on debt policy. We used 42 manufacturing companies registered on the Indonesian Stock Exchange (Bursa Efek Indonesia) as object research. We used purposive sampling method to determined samples, consider the period observation from 2012 to 2016, and produce 168 units analysis. Data analysis uses the multiple regressions with the SPSS tools. The results of the study found that companies' debt policies in Indonesia are negatively affected by the liquidity. Investment opportunity set (IOS) has negative effect on debt policy. Meanwhile, ROA, Return on Invested Capital (ROIC), and firm size of a company has no impact on debt policy. These findings indicate that Indonesian manufacture companies do not see the high investment opportunity set and profitability as a policy basis for increasing debt. Moreover, the high profitability also does not cause companies to increase their debt ratio. Our study indicates that Indonesian manufacture companies use internal funds to fund their investment. This finding is a concern for creditors, as they can now see the ability of the companies, and especially their performance, in determining their credit policies.

Flow-based Anomaly Detection Using Access Behavior Profiling and Time-sequenced Relation Mining

  • Liu, Weixin;Zheng, Kangfeng;Wu, Bin;Wu, Chunhua;Niu, Xinxin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.6
    • /
    • pp.2781-2800
    • /
    • 2016
  • Emerging attacks aim to access proprietary assets and steal data for business or political motives, such as Operation Aurora and Operation Shady RAT. Skilled Intruders would likely remove their traces on targeted hosts, but their network movements, which are continuously recorded by network devices, cannot be easily eliminated by themselves. However, without complete knowledge about both inbound/outbound and internal traffic, it is difficult for security team to unveil hidden traces of intruders. In this paper, we propose an autonomous anomaly detection system based on behavior profiling and relation mining. The single-hop access profiling model employ a novel linear grouping algorithm PSOLGA to create behavior profiles for each individual server application discovered automatically in historical flow analysis. Besides that, the double-hop access relation model utilizes in-memory graph to mine time-sequenced access relations between different server applications. Using the behavior profiles and relation rules, this approach is able to detect possible anomalies and violations in real-time detection. Finally, the experimental results demonstrate that the designed models are promising in terms of accuracy and computational efficiency.

An Analysis of the Efficiency and Productivity of Domestic Construction Companies (국내 건설기업의 효율성 및 생산성 분석)

  • Joo, Su-Min;Lee, Suchul;Hong, Jong-Yi
    • Journal of Information Technology Applications and Management
    • /
    • v.27 no.1
    • /
    • pp.1-13
    • /
    • 2020
  • This study aims to measure the efficiency and productivity change of 30 domestic construction companies from 2010 to 2018 using data envelopment analysis(DEA) and Malmquist productivity index (MI). In particular, we used the number of employees, capital stock, and non-current assets as input variables, and sales and net income as ouput variables for the analysis. The dataset used for the analysis of efficiency and productivity changes is the employee profile and financial statements for the companies from 2010 to 2018. We found that the MI of the 30 companies is greater than one since 2013. This is because many years of TEC (Technical Efficiency Change) is greater than 1, which means that the productivity index increases as the TEC increases. In addition, the MI value was less than 1, which lowered the productivity of construction firms in 2018. The results of the study may help decision makers to find effective future management plans by analyzing the internal and external factors.

A Study on DSMS Framework for Data Security Certification (데이터보안인증을 위한 DSMS 프레임워크 구축 연구)

  • Yoo, Seung Jae
    • Convergence Security Journal
    • /
    • v.19 no.4
    • /
    • pp.107-113
    • /
    • 2019
  • Data security is the planning, implementation and implementation of security policies and procedures for the proper audit and authorization of access to and use of data and information assets. In addition, data serviced through internal / external networks, servers, applications, etc. are the core objects of information protection and can be said to focus on the protection of data stored in DB and DB in the category of information security of database and data. This study is a preliminary study to design a proper Data Security Management System (DSMS) model based on the data security certification system and the US Federal Security Management Act (FISMA). And we study the major security certification systems such as ISO27001 and NIST's Cybersecurity Framework, and also study the state of implementation in the data security manager solution that is currently implemented as a security platform for preventing personal data leakage and strengthening corporate security.

Determinants of Corporate R&D Investment: An Empirical Study Comparing Korea's IT Industry with Its Non-IT Industry

  • Lee, Myeong-Ho;Hwang, In-Jeong
    • ETRI Journal
    • /
    • v.25 no.4
    • /
    • pp.258-265
    • /
    • 2003
  • In our study, we extracted the market, finance, and government factors determining R&D investment of individual firms in the IT industry in Korea. We collected the financial data of 515 individual firms belonging to IT and non-IT industries between 1980 and 1999 from the Korea Investors Service's database and investigated the empirical relationship between the factors using an ordinary regression model, a fixed effects model, and a random effects model. The main findings of our study are as follows: i) The Herfindahl Index variable representing the degree of market concentration is statistically insignificant in explaining R&D expenditures in the IT manufacturing industry. ii) Assets, which is used as a proxy variable for firm size, have a positive and statistically significant coefficient. These two results suggest that the Schumpeterian Hypothesis may be only partially applied to the IT manufacturing industry in Korea. iii) The dividend variable has a negative value and is statistically significant, indicating that a tendency of high dividends can restrict the internal cash flow for R&D investment. iv) The sales variable representing growth potential shows a positive coefficient. v) The subsidy as a proxy variable for governmental R&D promotion policies is positively correlated with R&D expenditure. This suggests that government policy has played a significant role in promoting R&D activities of IT firms in Korea since 1980. vi) Using a dummy variable, we verified that firms reduced their R&D investments to secure sufficient liquidity under the restructuring pressure during Korea's 1998 and 1999 economic crisis.

  • PDF

A Study on the Analysis of Publicly Announced Combined Financial Statements and their Improvement Points (공시된 결합재무제표의 분석과 게선 방향에 관한 연구)

  • Park Sang-Bong
    • Management & Information Systems Review
    • /
    • v.6
    • /
    • pp.137-162
    • /
    • 2001
  • Our business conglomerates are sharing their fates economically because of mutual debt warranty among their own affiliates and excessive financial loans. For this reason, it is inevitably restrictive to obtain the whole information on such conglomerates by individual and consolidated financial statements. To solve this problem, the system of combined financial statement was introduced through modifications of the Act of the outside audit of corporations in 1988. As a result, 15 out of this nation's 30 major business conglomerates prepared and submitted their own combined financial statements. In this paper, all financial statements are grouped into financial and non-financial parts, based on characteristics of business control and combined financial statement. Then the business size, financial rate and internal transactions for each of the conglomerates are analyzed, based on which problems of the combined financial statement as announced publicly are clarified. For the system, this study suggests improvement points such as a sufficient publication of any possible situations and interest coordination caused between the date of business settlement and that of preparing combined financial statements by applying principles of sharing to the evaluation of valuable instrument papers for investment and by determining the amount, 5% accounting for the total amount of debt warranty, foreign exchange assets and debts.

  • PDF