• Title/Summary/Keyword: policy information model

Search Result 2,151, Processing Time 0.027 seconds

Using Real Options Pricing to Value Public R&D Investment in the Deep Seabed Manganese Nodule Project

  • Choi, Hyo-Yeon;Kwak, Seung-Jun;Yoo, Seung-Hoon
    • Asian Journal of Innovation and Policy
    • /
    • v.5 no.2
    • /
    • pp.197-207
    • /
    • 2016
  • This paper seeks to measure the monetary value of technical development in the deep seabed manganese nodule mining by applying the compound option model (COM). The COM is appropriate for the project in terms of its decision-making structure and embedded uncertainty. The estimation results show that the deep seabed mining project has more economic potential than shown by the previously obtained results from the discounted cash flow (DCF) analysis. In addition, it is reasonable to invest in the project taking the various uncertainty factors into consideration, because the ratio of the value to the cost of the project is far higher than one. This information can be utilized in national ocean policy decision-making.

Information Security of Organization and Employees in Social Exchange Perspective : Using Structure-Conduct-Outcome Framework (SCO Framework을 적용한 조직과 조직원의 정보보안 준수 관계 연구)

  • Hwang, In-Ho;Kim, Sanghyun
    • The Journal of Information Systems
    • /
    • v.28 no.4
    • /
    • pp.105-129
    • /
    • 2019
  • Purpose Issues related to information security have been a crucial topic of interest to researchers and practitioners in the IT/IS field. This study develops a research model based on a Structure-Conduct-Outcome (SCO) framework for the social exchange relationship between employees and organizations regarding information security. Design/methodology/approach In applying an SCO framework to information security, structure and conduct are activities imposed on employees within an organizational context; outcomes are activities that protect information security from an employee. Data were collected from 438 employees working in manufacturing and service firms currently implementing an information security policy in South Korea. Structural equation modeling (SEM) with AMOS 22.0 is used to test the validation of the measurement model and the proposed casual relationships in the research model. Findings The results demonstrate support for the relationships between predicting variables in organization structure (security policy and physical security system) and the outcome variables in organization conduct (top management support, security education program, and security visibility). Results confirm that the three variables in organization conduct had a positive effect on individual outcome (security knowledge and compliance intention).

E-Smart Health Information Adoption Processes: Central versus Peripheral Route

  • Koo, Chulmo;Lim, Min Kyung;Park, Keeho
    • Asia pacific journal of information systems
    • /
    • v.24 no.1
    • /
    • pp.65-91
    • /
    • 2014
  • Our study adopted ELM (Elaboration Likelihood Model) to measure the impact of central and peripheral cues on e-healthcare website behavior and its consequence on perceived loyalty of users. While most of ELM studies did not elaborate the antecedent of both central and peripheral cues, we measured the antecedents of those information processing routes to clarify how technical and quality factors (i.e. information organization, security concern, and website attractiveness) develop the nature of either central or peripheral route. We found that information organization was the main antecedent of information quality presented on the website. Second, the results revealed that website security has a positive effect on website credibility. Third, we also found that website attractiveness was positively associated with website credibility. Fourth, consistent with elaboration likelihood model, the empirical findings suggested that information quality (central cue) and website credibility (peripheral cue) were strong predictors of behavior intention to use health website. Our findings also suggested that behavior intention to use health website significantly influenced perceived loyalty.

An Analysis of the Public Awareness on National Policy on Protection of Personal Information: using SERVQUAL (SERVQUAL 기법을 이용한 국가 개인정보보호 정책에 대한 국민 인식의 분석)

  • Lee, Kyung-bok;Yoon, Ki-chan;Shim, Mina;Lim, Jong-in;Park, Tae Hyoung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.4
    • /
    • pp.1037-1055
    • /
    • 2016
  • After the enactment of the Personal Information Protection Act, policies and activities for the personal information protection have been actively promoted. However the people are showing negative attitudes about personal information, as the ongoing personal data leakages. Therefore, authors tried to empirical analysis of the effectiveness of national policy on the protection of personal information, using SERVQUAL model, focused on the people's perception, in order to identify that how the people recognized current policy. Authors find that the public has perceived the effectiveness of the policy positively, but the level of their awareness is low. And we identify that the people are highly aware of the policy's effectiveness for Immediacy, Convenience and Responsibility, while they have the lowest effectiveness for Efficiency. The policy's improvement focused on the public's low expectations/perceptions and effectiveness awareness, is required in order to develop people-oriented national privacy policy that are satisfied by the people.

A Role-Based Access Control Model ensuring Confidentiality and Integrity (비밀성과 무결성을 보장하는 역할기반 접근제어모델)

  • Byun Chang-Woo;Park Seog
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.3
    • /
    • pp.13-29
    • /
    • 2005
  • An important characteristic of role-based access control model(RBAC) is that by itself it is policy neutral. This means RBAC articulates security policy without embodying particular security policy. Because of this reason, there are several researches to configure RBAC to enforce traditional mandatory access control(MAC) policy and discretionary access control(DAC) policy. Specifically, to simulate MAC using RBAC several researches configure a few RBAC components(user, role, role-hierarchy, user-role assignment and session) for keeping no-read-up rule and no-write-down rule ensuring one-direction information flow from low security level to high security level. We show these researches does not ensure confidentiality. In addition, we show the fact that these researches overlook violation of integrity due to some constraints of keeping confidentiality. In this paper we propose a RBAC model satisfying both confidentiality and integrity. We reexamine a few RBAC components and constructs additional constraints.

Elaboration of Real Options Model and the Adequacy of Volatility

  • Sung, Tae-Eung;Park, Hyun-Woo
    • Asian Journal of Innovation and Policy
    • /
    • v.6 no.2
    • /
    • pp.225-244
    • /
    • 2017
  • When evaluating the economic value of technology or business project, we need to consider the period and cost for commercialization. Since the discounted cash flow (DCF) method has limitations in that it can not consider consecutive investment or does not reflect the probabilistic property of commercialization cost, we often take it desirable to apply the concept of real options with key metrics of underlying asset value, commercialization cost, and volatility, while regarding the value of technology and investment as the opportunity value. We at this moment provide more elaborated real options model with the effective region of volatility, which reflects the uncertainty in the option pricing model (OPM).

An Efficient Repository Model for Online Software Education

  • Lee, Won Joo;Baek, Yuncheol;Yang, Byung Seok
    • Journal of the Korea Society of Computer and Information
    • /
    • v.21 no.12
    • /
    • pp.219-226
    • /
    • 2016
  • In this paper, we propose an efficient repository model for online software education. The software education of app development consists of 7 stages: coding & debugging, submit, collaboration, review, validate, deployment, certification. Proposed repository model supports all 7 stages efficiently. In the coding & debugging stage, the students repeat coding and debugging of source. In the submit stage, the output of previous process such as source codes, project, and videos, are uploaded to repository server. In the collaboration stage, other students or experts can optimize or upgrade version of source code, project, and videos stored in the repository. In the review stage, mentors can review and send feedbacks to students. In the validate stage, the specialists validate the source code, project, and the videos. In the deployment stage, the verified source code, project, and videos are deployed. In the certification stage, the source code, project, and the videos are evaluated to issue the certificate.

Improvement of the Automobile Control Software Testing Process Using a Test Maturity Model

  • Jang, Jin-Wook
    • Journal of Information Processing Systems
    • /
    • v.14 no.3
    • /
    • pp.607-620
    • /
    • 2018
  • The problem surrounding methods of implementing the software testing process has come under the spotlight in recent times. However, as compliance with the software testing process does not necessarily bring with it immediate economic benefits, IT companies need to pursue more aggressive efforts to improve the process, and the software industry needs to makes every effort to improve the software testing process by evaluating the Test Maturity Model integration (TMMi). Furthermore, as the software test process is only at the initial level, high-quality software cannot be guaranteed. This paper applies TMMi model to Automobile control software testing process, including test policy and strategy, test planning, test monitoring and control, test design and execution, and test environment goal. The results suggest improvement of the automobile control software testing process based on Test maturity model. As a result, this study suggest IT organization's test process improve method.

Security Policy Model for the Intrusion Detection and Response on Enterprise Security Management System (통합보안 관리시스템의 침입탐지 몇 대응을 위한 보안 정책 모델)

  • 손우용;송정길
    • Journal of the Korea Society of Computer and Information
    • /
    • v.9 no.2
    • /
    • pp.81-87
    • /
    • 2004
  • Very various intrusion by development of systems that is based on network is spread. To detect and respond this intrusion, security solutions such as firewall or IDS are bringing and management of security system that load these becomes more harder. Moreover, because environment of systems that require security is various, hard to manage establishing suitable security policy Therefore, need model about enterprise management of various security system and intrusion detection of each systems and response. In this paper, improve PBNM structure that manage wide network resources and presented suitable model in intrusion detection and response of security system. Also, designed policy-based enterprise security management system for effective intrusion detection and response by applying presented model to enterprise security management system.

  • PDF

Strategic Management of Government-sponsored Research Institutes: A Case of Korea Basic Science Institute(KBSI) (출연(연)의 전략경영의 사례: 한국기초과학지원연구원)

  • Park Jeong-Soo;Ahn Chi-Soo;Kim In-Ho;Chung Sun-Yang
    • Proceedings of the Korea Technology Innovation Society Conference
    • /
    • 2005.05a
    • /
    • pp.306-320
    • /
    • 2005
  • Government-sponsored Research Institutes(GRIs) have made a great contribution to the development of Korea's Science and Technology(S&T). However, recently GRIs are facing the challenge of many problems. For instance, absence of reasonable strategies, insufficient resources and so on. Therefore, many GRIs are being asked for solving their problems with successful strategic management. This paper suggests a strategic management model to solve their problems and to cope with the changing S&T environment. In this paper, The strategic management model for GRIs which was thoroughly considered strategic management process suggested to response the need of their change and to perform their strategic management successfully. As a case of GRIs to apply this model, in this paper, Korea Basic Science Institute(KBSI) that is part of the Korea Research Council of Fundamental Science and Technology(KRCF) was analyzed. As a result of analysis with this model which applied to KBSI, various strategies and alternatives were suggested.

  • PDF