• Title/Summary/Keyword: asset protection and management

Search Result 53, Processing Time 0.037 seconds

A Study on the Effects of the Information Asset Protection Performance on the Organization Performance: Management Activity and Control Activity (정보자산보호 성과가 조직성과에 미치는 영향에 관한 연구: 관리활동과 통제활동을 중심으로)

  • Kim, Kyung-Kyu;Shin, Ho-Kyoung;Park, Sung-Sik;Kim, Beom-Soo
    • Journal of Information Management
    • /
    • v.40 no.3
    • /
    • pp.61-77
    • /
    • 2009
  • Recently, enterprises are protecting information assets with the various means of control and management. Nevertheless, they are confronted with the dilemma which the higher securitylevel they request, the lesser efficiency and productivity in short terms they acquire by the inconvenience of business process. In addition, in spite of the steady increase of organization's investment on information protection, the systematic way for the performance measurement of information protection has not been suggested, so that in reality, it is difficult to make the decision to invest on information-protection and elicit the direction to improve it. For this reason, this study intended to establish the concept of the protection and security of information assets of enterprises and to categorize the type of activities to protect information assets into management activity and control activity, and analyze the effects of management activity and control activity for information asset protection on the performance of information asset protection activity and organization. For this research, questionnaire survey was conducted with literature study and the PLS(Partial Least Square) was used to analyze the measurement model and hypotheses testing. The PLS analysis results indicate that management activity for information asset protection affects information asset protection performance. Further, organizational performance is influenced by information asset protection performance. Practical implications of these findings and future research implications are also discussed.

A Study on The Managing Practices in SLM for Multimedia System (멀티미디어 시스템 정보보호수준관리를 위한 관리형 프랙티스에 관한 연구)

  • Kim, Tai-Hoon;Cho, Sung-Eon
    • Journal of Advanced Navigation Technology
    • /
    • v.12 no.6
    • /
    • pp.673-680
    • /
    • 2008
  • Multimedia system security can be categorized into groups such as protection of multimedia asset itself and protection of multimedia systems which can process multimedia asset. Divided consideration for these two factors will not hurt the importance of security management. In this paper, managing practices for keeping security level of multimedia systems are induced and categorized.

  • PDF

The Effect of Composition and Security Activities for Information Security Architecture on Information Asset Protection and Organizational Performance (정보보호 아키텍처 구성과 보안활동이 정보자산보호 및 조직성과에 미치는 영향)

  • Jeong, Gu-Heon;Yi, Dong-Wook;Jeong, Seung-Ryul
    • The KIPS Transactions:PartD
    • /
    • v.17D no.3
    • /
    • pp.223-232
    • /
    • 2010
  • This study was carried out for the purpose of inquiring into the effect of composition and security activities for information security architecture on information asset protection and organizational performance in terms of general information security. This study made a survey on 300 workers in the government, public institutions and private companies, which it showed that management factors of risk identification and risk analysis, in general, have an usefulness to composition and security activities for information security architecture to prevent inside information leakage. And the understanding and training factors of IT architecture and its component were rejected, requiring the limited composition and security activities for information security architecture. In other words, from the reality, which most institutions and organizations are introducing and operating the information security architecture, and restrictively carrying out the training in this, the training for a new understanding of architecture and its component as an independent variable made so much importance, or it did not greatly contribute to the control or management activities for information security as the generalized process, but strict security activities through the generalization of risk identification and risk analysis management had a so much big effect on the significant organizational performance.

A Comparative Study of risk based LOS(Level of service) of the Regional Water Supply (자산관리 상수도분야 리스크 기반 서비스수준)

  • Cho, Inuh;Lee, Youngjai
    • Journal of Korean Society of Water and Wastewater
    • /
    • v.29 no.3
    • /
    • pp.305-317
    • /
    • 2015
  • The function failure of present major facilities is likely to lead to failure of related systems and/or whole facilities, increasing the necessity for protection of infrastructures, main structures, and major industrial facilities. In addition, safe and efficient management for urban infrastructure (waterworks and sewerage facilities, electricity, telecommunications, roads, etc) installed in the basement or on large cities grounds at various public areas is required. Recently in response to this demand, efforts for vitalizing asset management are being made such as enacting related laws and developing asset management system in the U.S., Australia, Europe and other advanced countries with the concept for a new maintenance. In our county, identifying maintenance system problems such as aging and rapid increasing of existing infrastructures and decision-making about updating maintenance is required for systematic and organizational maintenance. In this study, by comparing and observing the LOS(Level of Service) of each countries' waterworks and risk-based LOS, we suggest the direction of future urban water infrastructure management systems for more effective management.

A review of recent research advances on structural health monitoring in Western Australia

  • Li, Jun;Hao, Hong
    • Structural Monitoring and Maintenance
    • /
    • v.3 no.1
    • /
    • pp.33-49
    • /
    • 2016
  • Structural Health Monitoring (SHM) has been attracting numerous research efforts around the world because it targets at monitoring structural conditions and performance to prevent catastrophic failure, and to provide quantitative data for engineers and infrastructure owners to design a reliable and economical asset management strategy. In the past decade, with supports from Australian Research Council (ARC), Cooperative Research Center for Infrastructure and Engineering Asset Management (CIEAM), CSIRO and industry partners, intensive research works have been conducted in the School of Civil, Environmental and Mining Engineering, University of Western Australia and Centre for Infrastructural Monitoring and Protection, Curtin University on various techniques of SHM. The researches include the development of hardware, software and various algorithms, such as various signal processing techniques for operational modal analysis, modal analysis toolbox, non-model based methods for assessing the shear connection in composite bridges and identifying the free spanning and supports conditions of pipelines, vibration based structural damage identification and model updating approaches considering uncertainty and noise effects, structural identification under moving loads, guided wave propagation technique for detecting debonding damage, and relative displacement sensors for SHM in composite and steel truss bridges. This paper aims at summarizing and reviewing the recent research advances on SHM of civil infrastructure in Western Australia.

IMPLEMENTATION OF STRUCTURAL DIAGRAM FOR INTELLECTUAL PROPERTY MANAGEMENT AND PROTECTION(IPMP)

  • Park, Jung-Hee;Lee, Ki-Dong;Lee, Sang-Jae
    • 한국디지털정책학회:학술대회논문집
    • /
    • 2004.11a
    • /
    • pp.435-448
    • /
    • 2004
  • While Internet promises ubiquitous access, it also creates a fundamental challenge to the traditional ownership toward digital assets traded in e-commerce market. Sharing digital information freely through shared networks leads to many untapped business opportunities, but uncontrolled digital asset transaction undermines many electronic business models. Thus, in this Internet age, proper protection and safe delivery of Intellectual Property (IP) and its representation as digital assets would be a crucial ingredient of building trust in upcoming e-business environment. In this paper, we give a general structural diagram of Intellectual Property Management and Protection (IPMP) and implement an IPMP prototype based on the RSA encryption algorithm and XrML (eXtensible rights Markup Language) WORK tags to show how proper protection and safe delivery of the intellectual property is achieved. This study concludes that IPMP mechanism may contribute significantly to the volume and quality of e-commerce market.

  • PDF

Management and Supervision Measures for Virtual Asset Ecosystem (가상자산 생태계 관리・감독 방안)

  • Sehyun Lee;Sangyeon Lee;Hee-Dong Yang
    • Knowledge Management Research
    • /
    • v.24 no.3
    • /
    • pp.73-94
    • /
    • 2023
  • With the virtual asset market's rapid growth, government regulations on listing and trading procedures are expected. However, specific measures are currently lacking. To ensure stable inclusion in the institutional framework, precise regulations are needed for market development and investor protection. This study compares self-regulatory guidelines of the top domestic virtual asset exchanges with Korea Exchange's Preliminary Listing Examination Standards (2022) to enhance timeliness and relevance. It defines IEO, IPO, and ICO concepts and addresses conflicts of interest in IEO. Analyzing delisted virtual assets, it categorizes issues and classifies listing examination guidelines into formal and qualitative requirements. The study examines self-regulatory guidelines based on continuity, transparency, stability, corporate characteristics, and investor protection criteria, along with five special requirements for virtual assets. Improvement measures include regular disclosures of governance structure, circulation volume, and the establishment of independent audit institutions. This research further analyzes delisting cases, classifies issues, and proposes solutions. Considering stock market similarities, it offers measures based on the institutional framework.

Cybersecurity Risk Assessment of a Diverse Protection System Using Attack Trees (공격 트리를 이용한 다양성보호계통 사이버보안 위험 평가)

  • Jung Sungmin;Kim Taekyung
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.19 no.3
    • /
    • pp.25-38
    • /
    • 2023
  • Instrumentation and control systems measure and control various variables of nuclear facilities to operate nuclear power plants safely. A diverse protection system, a representative instrumentation and control system, generates a reactor trip and turbine trip signal by high pressure in a pressurizer and containment to satisfy the design requirements 10CFR50.62. Also, it generates an auxiliary feedwater actuation signal by low water levels in steam generators. Cybersecurity has become more critical as digital technology is gradually applied to solve problems such as performance degradation due to aging of analog equipment, increased maintenance costs, and product discontinuation. This paper analyzed possible cybersecurity threat scenarios in the diverse protection system using attack trees. Based on the analyzed cybersecurity threat scenario, we calculated the probability of attack occurrence and confirmed the cybersecurity risk in connection with the asset value.

A Practical Security Risk Analysis Process and Tool for Information System

  • Chung, Yoon-Jung;Kim, In-Jung;Lee, Do-Hoon
    • Journal of Information Processing Systems
    • /
    • v.2 no.2
    • /
    • pp.95-100
    • /
    • 2006
  • While conventional business administration-based information technology management methods are applied to the risk analysis of information systems, no security risk analysis techniques have been used in relation to information protection. In particular, given the rapid diffusion of information systems and the demand for information protection, it is vital to develop security risk analysis techniques. Therefore, this paper will suggest an ideal risk analysis process for information systems. To prove the usefulness of this security risk analysis process, this paper will show the results of managed, physical and technical security risk analysis that are derived from investigating and analyzing the conventional information protection items of an information system.

Improvement of ISMS Certification Components for Virtual Asset Services: Focusing on CCSS Certification Comparison (안전한 가상자산 서비스를 위한 ISMS 인증항목 개선에 관한 연구: CCSS 인증제도 비교를 중심으로)

  • Kim, Eun Ji;Koo, Ja Hwan;Kim, Ung Mo
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.11 no.8
    • /
    • pp.249-258
    • /
    • 2022
  • Since the advent of Bitcoin, various virtual assets have been actively traded through virtual asset services of virtual asset exchanges. Recently, security accidents have frequently occurred in virtual asset exchanges, so the government is obligated to obtain information security management system (ISMS) certification to strengthen information protection of virtual asset exchanges, and 56 additional specialized items have been established. In this paper, we compared the domain importance of ISMS and CryptoCurrency Security Standard (CCSS) which is a set of requirements for all information systems that make use of cryptocurrencies, and analyzed the results after mapping them to gain insight into the characteristics of each certification system. Improvements for 4 items of High Level were derived by classifying the priorities for improvement items into 3 stages: High, Medium, and Low. These results can provide priority for virtual asset and information system security, support method and systematic decision-making on improvement of certified items, and contribute to vitalization of virtual asset transactions by enhancing the reliability and safety of virtual asset services.