• Title/Summary/Keyword: assets control

Search Result 169, Processing Time 0.034 seconds

The Impact of Macroeconomic Variables on the Profitability of Korean Ocean-Going Shipping Companies

  • Kim, Myoung-Hee;Lee, Ki-Hwan
    • Journal of Navigation and Port Research
    • /
    • v.43 no.2
    • /
    • pp.134-141
    • /
    • 2019
  • The objective of this study was to establish whether global macroeconomic indicators affect the profitability of Korean shipping companies by using panel regression analysis. OROA (operating return on assets) and ROA (ratio of net profit to assets) were selected as proxy variables for profitability. OROA and ROA were used as dependent variables. The world GDP growth rate, interest rate, exchange rate, stock index, bunker price, freight, demand and supply of the world shipping market were set as independent variables. The size of the firm was added to the control variable. For small-sized firms, OROA was not affect by macroeconomic indicators. However, ROA was affected by variables such as interest rates, bunker prices, and size of firms. For medium-sized firms, OROA was affected by demand, supply, GDP, freight, and asset variables. However, macroeconomic indicators did not affect ROA. For large-sized firms, freight, GDP, and stock index (SCI; Shanghai Composite Index) have an effect on OROA. ROA was analyzed to be influenced by bunker price and SCI.

A Study on the Indoor Climate Control of Artificial Grotto on Natral Environmental Phnomenon (자연환경상태에서 인공석굴법당의 실내기후조절에 관한 연구)

  • Choi, Young-Sik;Cho, Young-Wha
    • Journal of the Korean Society of Industry Convergence
    • /
    • v.2 no.1
    • /
    • pp.131-137
    • /
    • 1999
  • It is very important that we try to keep our traditional historical assets in the original form for a long time. Artificial grotto has a very long and old history of about 1250 years in Korea. Yet, for the past several years there are many factors ruinning this historical treasure. Recently, specialist are new scientifically examining artificial grotto and evaluating its current condition. If you only judge these historical assets from the exterior structural environmental approach your scientific conclusion will not be complete. No one has studied artificial grotto from the viewpoint of indoor climate environmental. Therefore, I have surveyed and prepared a report of investigation as well as countermeasure so to understand the impact of indoor climate environmental on artificial grotto. The purpose of this paper is to first survey the existing research data based on exterior structural environment. Secondly, closely evaluate the new data of artificial grotto from the viewpoint of indoor environmental control by a natural climate phenomenon in Korea.

  • PDF

Impacts of Capital Structure on Business Efficiency of Listed Joint Stock Commercial Banks in Vietnam Stock Market

  • DOAN, Quyen Thuc;HO, Thu Thi Hoai;DOAN, Quynh Huong
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.9 no.8
    • /
    • pp.99-108
    • /
    • 2022
  • This study aims to examine the influence of capital structure on the business efficiency of joint stock commercial banks listed on the Vietnamese stock market. The article uses data collected from the financial statements of 15 prominent joint-stock commercial banks out of 27 joint-stock commercial banks listed in Vietnam from 2011 to 2021. The research uses E-view software in quantitative analysis to build regression models to determine the relationship and the impact of capital structure factors on the business efficiency of listed joint stock commercial banks. Research results show that ROA is affected by 2 variables of capital structure. It is the sum of customer deposits to total assets and total liabilities to total equity. Total debt to total equity and total customer deposits to total assets both have a negative effect on ROA. For the regression results of ROA with all control variables, the control variables have a positive relationship with the dependent variable. The article has provided recommendations based on the research findings to determine the proper capital structure. Managers must solve the outstanding amount of mobilized capital in previous years, combined with the bad debt handling activities that have arisen.

A Study on the Effects of the Information Asset Protection Performance on the Organization Performance: Management Activity and Control Activity (정보자산보호 성과가 조직성과에 미치는 영향에 관한 연구: 관리활동과 통제활동을 중심으로)

  • Kim, Kyung-Kyu;Shin, Ho-Kyoung;Park, Sung-Sik;Kim, Beom-Soo
    • Journal of Information Management
    • /
    • v.40 no.3
    • /
    • pp.61-77
    • /
    • 2009
  • Recently, enterprises are protecting information assets with the various means of control and management. Nevertheless, they are confronted with the dilemma which the higher securitylevel they request, the lesser efficiency and productivity in short terms they acquire by the inconvenience of business process. In addition, in spite of the steady increase of organization's investment on information protection, the systematic way for the performance measurement of information protection has not been suggested, so that in reality, it is difficult to make the decision to invest on information-protection and elicit the direction to improve it. For this reason, this study intended to establish the concept of the protection and security of information assets of enterprises and to categorize the type of activities to protect information assets into management activity and control activity, and analyze the effects of management activity and control activity for information asset protection on the performance of information asset protection activity and organization. For this research, questionnaire survey was conducted with literature study and the PLS(Partial Least Square) was used to analyze the measurement model and hypotheses testing. The PLS analysis results indicate that management activity for information asset protection affects information asset protection performance. Further, organizational performance is influenced by information asset protection performance. Practical implications of these findings and future research implications are also discussed.

The IOA-Based Intelligent Information Protection System for Response of Advanced Persistent Threats (IOA 기반의 지능형지속위협 대응 위한 지능형 정보보호시스템)

  • Ryu, Chang-su
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.11
    • /
    • pp.2067-2072
    • /
    • 2016
  • Recently, due to the development of attack techniques that can circumvent existing information protection systems, continuous threats in a form unrecognized by the user have threatened information assets. Therefore, it is necessary to support the prompt responses to anticipated attempts of APT attacks, bypass access attacks, and encryption packet attacks, which the existing systems have difficulty defending against through a single response, and to continuously monitor information protection systems with a defense strategy based on Indicators of Attack (IOA). In this paper, I suggest a centralized intelligent information protection system to support the intelligent response to a violation by discerning important assets through prevention control in a performance impact assessment about information properties in order to block the attack routes of APT; establishing information control policies through weakness/risk analyses in order to remove the risks in advance; establishing detection control by restricting interior/exterior bypass networks to server access and monitoring encrypted communications; and lastly, performing related corrective control through backup/restoration.

A Study on Vulnerability Assessment for the Digital Assets in NPP Based on Analytical Methods (분석적 방법을 적용한 원전디지털자산 취약점 평가 연구)

  • Kim, In-kyung;Kwon, Kook-heui
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.6
    • /
    • pp.1539-1552
    • /
    • 2018
  • The necessity of establishing a more secure cyber security system is emerging to protect NPP against cyber attacks as nuclear facilities become increasingly reliant on digital system. Proper security measures should be established through periodic analysis and evaluation of vulnerabilities. However, as Nuclear facilities has safety characteristics as their top priority and it requires a lot of time and cost to construct regarding the activities for vulnerability analysis, it is difficult to apply the existing vulnerability analysis environment and analysis tools. In this study, We propose a analytical vulnerability assessment method to overcome the limitations of existing vulnerability analysis methods through analysis the existing vulnerability analysis methods and the issues to be considered when applying the vulnerability analysis method.

Effect of Risk Factors on the Management of Working Capital in Hospital Management (병원경영의 위험요인이 운전자본 관리에 미치는 영향)

  • Ha, Au-Hyun
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.8
    • /
    • pp.187-193
    • /
    • 2020
  • This study analyzed how risk factors in management affect the management of working capital in general hospitals in Korea. The data used accounting information for three years (2016~2017 and 2018) of 271 general hospitals using the medical institution accounting information disclosure system. The independent variables were the working capital level and the cash conversion cycle, The dependent variables were operational risk and market risk, Control variables were selected as components of working capital(cash, accounts receivable, inventory assets, accounts payable). According to the study, the lower the operational risk, the higher the level of working capital hospitals in Korea. Working capital decisions were confirmed to be attributable to operating risks, cash, inventory assets and accounts payable. And the lower the market risk (Operating Margin), the higher the cash conversion cycle. Therefore, it is necessary to review appropriate management measures of operational risks, cash, inventory assets and accounts payable identified as operating capital determinants so that medical institutions can also have economic response capabilities in consideration of the specificity of their operations.

Small Business Technological Assets Protection Factors Analysis Using Logistic Regression Analysis (로지스틱 회귀분석을 이용한 중소기업 기술보호 요인 분석)

  • Hong, Jun Suk;Park, Won Hyung;Kim, Yanghoon;Kook, Kwang Ho
    • The Journal of Society for e-Business Studies
    • /
    • v.20 no.3
    • /
    • pp.1-10
    • /
    • 2015
  • The main objective of this study was to identify the factors that can maximize the effect of preventing technology leakage by government support. Therefore we used the 2013 small business technology protection capabilities and level of research which is conducted by the Small and Medium Business Administration, and have analyzed the presence of small business technological assets leakage protection eand skills. Multiple logistic regression analysis was performed to identify 1,518 small companies (43 big companies are excluded) which are divided into 155 technological assets leaked small business and non-leaked 1363 small business. The most important factors associated with technology leakage were entrant control system, security audit, employee absence of security activities and important data protection measures. This result shows that if the government can support more for these details, technological asset leakage prevention effect is expected to be maximized.

A Study on ICS Security Information Collection Method Using CTI Model (CTI 모델 활용 제어시스템 보안정보 수집 방안 연구)

  • Choi, Jongwon;Kim, Yesol;Min, Byung-gil
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.2
    • /
    • pp.471-484
    • /
    • 2018
  • Recently, cyber threats are frequently occurring in ICS(industrial control systems) of government agencies, infrastructure, and manufacturing companies. In order to cope with such cyber threats, it is necessary to apply CTI to ICS. For this purpose, a security information collection system is needed. However, it is difficult to install security solution in control devices such as PLC. Therefor, it is difficult to collect security information of ICS. In addition, there is a problem that the security information format generated in various assets is different. Therefore, in this paper, we propose an efficient method to collect ICS security information. We utilize CybOX/STIX/TAXII CTI models that are easy to apply to ICS. Using this model, we designed the formats to collect security information of ICS assets. We created formats for system logs, IDS logs, and EWS application logs of ICS assets using Windows and Linux. In addition, we designed and implemented a security information collection system that reflects the designed formats. This system can be used to apply monitoring system and CTI to future ICS.

Comparison of IT Security Risk Analysis and Internal Control Evaluation (정보시스템 보안을 위한 위험분석활동과 내부통제평가와의 비교)

  • Cho, Sungbaek;Kim, Kuinam J.
    • Convergence Security Journal
    • /
    • v.3 no.3
    • /
    • pp.81-90
    • /
    • 2003
  • Risk analysis and internal control evaluation are key security management activities for securing organizational assets. Risk analysis is used to identify areas that need safeguarding while internal control evaluation is used to check whether the current control system is effective with a reasonable degree of assurance. Risk analysis usually focuses on unauthorised activities of unauthorised people and has not paid much attention to threats that could be committed by authorized users. As attention to fraud increases, these threats should be appropriately treated within organizations. This paper compares the difference between these two approaches.

  • PDF