• 제목/요약/키워드: risk efficient

검색결과 809건 처리시간 0.034초

Good Corporate Governance: A Case Study of Family Business in Indonesia

  • RUSTAM, Akie Rusaktiva;NARSA, I Made
    • The Journal of Asian Finance, Economics and Business
    • /
    • 제8권5호
    • /
    • pp.69-79
    • /
    • 2021
  • Good Corporate Governance (GCG) has been implemented by companies, especially companies that have gone public. However, many local companies still have not applied the principles of GCG. This study examines the implementation of the CG concept which is not fully implemented in family businesses in Indonesia. Besides, this research also aims to find out the role of the Internal Audit function in enhancing GCG practices. This research is a qualitative study that uses in-depth interviews, observation, and data triangulation, to gather evidence from exploratory case studies conducted in three family business firms. The results of this study found that CG is essential for the successful run of family businesses. After analyzing the data, we developed a new theory called Islamic Integrity Governance. The Internal Auditor plays a key role in improving GCG and a vibrant and agile internal audit function can be an indispensable resource supporting sound corporate governance. The internal auditor provides objective assurance and insight on the effectiveness and efficiency of risk management, internal control, and governance processes. Therefore, the Internal Auditor is an important pillar for effective and efficient GCG implementation. This theory concludes several concepts such as THTCL (Trustworthy, Honest, Transparent, Creative, Loyal). Internal auditors are needed because the concept of control is useful for improving GCG in business.

Preparation of radiolabeled polycyclic aromatic hydrocarbon assemblies for biological assessment of diesel exhaust particulates

  • Lee, Chang Heon;Shim, Ha Eun;Song, Lee;Jeon, Jongho
    • 대한방사성의약품학회지
    • /
    • 제4권2호
    • /
    • pp.90-94
    • /
    • 2018
  • The potential health risk from inhalational exposure of diesel exhaust particulates (DEP) has gained considerable scientific interests. However, the long-term in vivo behavior of DEP have not been clearly understood due to the difficulty of accurate analysis of these substances in a living subject. We herein demonstrate a detail protocol for the preparation of radiolabeled DEP using a radioactive-iodine-tagged pyrene analog. The purified $^{125}I$-labeled pyrene ($[^{125}I]1$) was obtained with a good radiochemical yield ($32{\pm}4%$, n=3) and high radiochemical purity (>99%) from the stannylated precursor 2. Next, the purified $[^{125}I]1$ was successfully assembled into the DEP suspension in an efficient manner. The radiolabeled DEP was highly stable in a mouse serum for 7 days without significant deiodination or dissociation of $[^{125}I]1$. These results clearly indicate that the present radiolabeling method will be useful for biodistribution study of carbonaceous particulates in vivo.

FTA를 적용한 태양광 발전 및 ESS 연계형 PCS의 안전성 평가 (Safety Assessment for PCS of Photovoltaic and Energy Storage System Applying FTA)

  • 김두현;김성철;김의식;남기공;정천기
    • 한국안전학회지
    • /
    • 제34권1호
    • /
    • pp.14-20
    • /
    • 2019
  • This paper presents a safety assessment based approach for the safe operation for PCS(Power Conditioning System) of photovoltaic and energy storage systems, applying FTA. The approach established top events as power outage and a failure likely to cause the largest damage among the potential risks of PCS. Then the Minimal Cut Set (MCS) and the importance of basic events were analyzed for implementing risk assessment. To cope with the objects, the components and their functions of PCS were categorized. To calculate the MCS frequency based on IEEE J Photovolt 2013, IEEE Std. 493-2007 and RAC (EPRD, NPRD), the failure rate and failure mode were produced regarding the basic events. In order to analyze the top event of failure and power outage, it was assumed that failures occurred in DC breaker, AC breaker, SMPS, DC filter, Inverter, CT, PT, DSP board, HMI, AC reactor, MC and EMI filter and Fault Tree was drawn. It is expected that the MCS and the importance of basic event resulting from this study will help find and remove the causes of failure and power outage in PCS for efficient safety management.

Probabilistic safety assessment-based importance analysis of cyber-attacks on nuclear power plants

  • Park, Jong Woo;Lee, Seung Jun
    • Nuclear Engineering and Technology
    • /
    • 제51권1호
    • /
    • pp.138-145
    • /
    • 2019
  • With the application of digital technology to safety-critical infrastructures, cyber-attacks have emerged as one of the new dangerous threats. In safety-critical infrastructures such as a nuclear power plant (NPP), a cyber-attack could have serious consequences by initiating dangerous events or rendering important safety systems unavailable. Since a cyber-attack is conducted intentionally, numerous possible cases should be considered for developing a cyber security system, such as the attack paths, methods, and potential target systems. Therefore, prior to developing a risk-informed cyber security strategy, the importance of cyber-attacks and significant critical digital assets (CDAs) should be analyzed. In this work, an importance analysis method for cyber-attacks on an NPP was proposed using the probabilistic safety assessment (PSA) method. To develop an importance analysis framework for cyber-attacks, possible cyber-attacks were identified with failure modes, and a PSA model for cyber-attacks was developed. For case studies, the quantitative evaluations of cyber-attack scenarios were performed using the proposed method. By using quantitative importance of cyber-attacks and identifying significant CDAs that must be defended against cyber-attacks, it is possible to develop an efficient and reliable defense strategy against cyber-attacks on NPPs.

Molecular Pathophysiology of Ossification of the Posterior Longitudinal Ligament (OPLL)

  • Nam, Dae Cheol;Lee, Hyun Jae;Lee, Choong Jae;Hwang, Sun-Chul
    • Biomolecules & Therapeutics
    • /
    • 제27권4호
    • /
    • pp.342-348
    • /
    • 2019
  • Ossification of the posterior longitudinal ligament (OPLL) can be defined as an ectopic ossification in the tissues of spinal ligament showing a hyperostotic condition. OPLL is developed mostly in the cervical spine and clinical presentations of OPLL are majorly myelopathy and/or radiculopathy, with serious neurological pathology resulting in paralysis of extremities and disturbances of motility lowering the quality of life. OPLL is known to be an idiopathic and multifactorial disease, which genetic factors and non-genetic factors including diet, obesity, physical strain on the posterior longitudinal ligament, age, and diabetes mellitus, are involved into the pathogenesis. Up to now, surgical management by decompressing the spinal cord is regarded as standard treatment for OPLL, although there might be the risk of development of reprogression of ossification. The molecular pathogenesis and efficient therapeutic strategy, especially pharmacotherapy and/or preventive intervention, of OPLL has not been clearly elucidated and suggested. Therefore, in this review, we tried to give an overview to the present research results on OPLL, in order to shed light on the potential pharmacotherapy based on molecular pathophysiologic aspect of OPLL, especially on the genetic/genomic factors involved into the etiology of OPLL.

Identity-based Provable Data Possession for Multicloud Storage with Parallel Key-Insulation

  • Nithya, S. Mary V.;Rhymend Uthariaraj, V.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제15권9호
    • /
    • pp.3322-3347
    • /
    • 2021
  • Cloud Storage is the primary component of many businesses on cloud. Majority of the enterprises today are adopting a multicloud strategy to keep away from vendor lock-in and to optimize cost. Auditing schemes are used to ascertain the integrity of cloud data. Of these schemes, only the Provable Data Possession schemes (PDP) are resilient to key-exposure. These PDP schemes are devised using Public Key Infrastructure (PKI-) based cryptography, Identity-based cryptography, etc. PKI-based systems suffer from certificate-related communication/computational complexities. The Identity-based schemes deal with the exposure of only the auditing secret key (audit key). But with the exposure of both the audit key and the secret key used to update the audit key, the auditing process itself becomes a complete failure. So, an Identity-based PDP scheme with Parallel Key-Insulation is proposed for multiple cloud storage. It reduces the risk of exposure of both the audit key and the secret key used to update the audit key. It preserves the data privacy from the Third Party Auditor, secure against malicious Cloud Service Providers and facilitates batch auditing. The resilience to key-exposure is proved using the CDH assumption. Compared to the existing Identity-based multicloud schemes, it is efficient in integrity verification.

Social Business in An Emerging Economy: An Empirical Study in Bangladesh

  • CHOWDHURY, Fatema Nusrat;MUSTAFA, Jasia;ISLAM, K.M. Anwarul;HASAN, K.B.M. Rajibul;ZAYED, Nurul Mohammad;RAISA, Tahsin Sharmila
    • The Journal of Asian Finance, Economics and Business
    • /
    • 제8권3호
    • /
    • pp.931-941
    • /
    • 2021
  • The study focuses on the relationship between SB, corporate social responsibility (CSR), and the emerging economy. Thereafter it highlights the types, principles, and funding cycle of SB with the evidence from Grameen Bank, which is a globally well-recognized microfinance venture in Bangladesh established by the Nobel Laureate Dr. Muhammad Yunus. This study employs qualitative analysis to illustrate an architectural overview of the SB model by collecting secondary data from various publications related to the topic and published data of Grameen Bank. Finally, this paper illustrates the SB model along with specified characteristics, systematic framework, and main approaches for sustainable context, which could be applied as a conceptual framework for SB in any context of the emerging economy. The findings of this study suggest that the SB model is the workflow having a hierarchy of five phases namely need identification, goal setting, solution-based business plan, business plan assessment, and business plan execution. Analyzing a range of social business interventions in a developing country, Bangladesh, through the lens of five key aspects demonstrates that social business is the most efficient way to sustainably maximize the social benefits and minimize specific social issues poverty of the people affected.

보안 시그니처 탐지를 위한 필터링 우선순위 알고리즘 구현 (Development on Filtering Priority Algorithm for Security Signature Search)

  • 전은아;김점구
    • 융합보안논문지
    • /
    • 제20권5호
    • /
    • pp.41-52
    • /
    • 2020
  • 본 논문은 보안 이벤트 위험성에 따른 능동적 대응을 위해서 우선순위 알고리즘을 구현하는 것이며, 이를 기반으로 효율적인 이벤트 처리를 수행하는 이벤트 스케줄러를 구현하고자 한다. CVE나 CVSS 같이 세계적으로 표준을 가지고 있는 기준에 따라, 보안 이벤트를 실행시켰을 때 점수를 매길 수 있는 기준을 마련하고, 정형화 하여 보다 객관적으로 우선순위를 정할 수 있도록 한다. 그래서 이를 바탕으로 보안 이벤트 데이터베이스를 구축하고, 이를 이용하여 스케줄링을 할 수 있도록 한다. 또한 보안 이벤트 스케줄링 우선순위 알고리즘을 우리나라 보안 이벤트 실정에 맞게 개발하고 적용함으로써 국내 기관 및 기업의 정보보호에 대한 신뢰성 확보와 산업 발전에 기여하게 될 것이다.

A Study on the Efficiency of the Foreign Exchange Markets: Evidence from Korea, Japan and China

  • Yoon, Il-Hyun;Kim, Yong-Min
    • 아태비즈니스연구
    • /
    • 제11권1호
    • /
    • pp.61-75
    • /
    • 2020
  • Purpose - The purpose of this study was to examine the efficiency of the foreign exchange markets in Korea, Japan and China. Design/methodology/approach - This study collected 1327 observations each of the daily closing exchange rates of the three currencies against the US dollar for the sample period from January 1, 2015 to January 31, 2020, based on the tests for autocorrelation, unit root tests and GARCH-M(1,1) model estimation. Findings - We have found that the autocorrelation test indicates the lack of autocorrelation and unit root test confirms the existence of unit roots in all times series of the three currencies, respectively. The GARCH-M(1,1) test results, however, suggest that the exchange rates do not follow a random walk process. In conclusion, the recent spot foreign exchange markets in Korea, Japan and China are believed to be informationally inefficient. Research implications or Originality - These findings have practical implications for both individual and institutional investors to be able to obtain excess returns on their investments in the foreign exchange markets in three countries by using appropriate risk management, portfolio strategy, technical analysis, etc. This study provides the first empirical examination on the foreign exchange market efficiency in the three biggest economies in Asia including China, which has been excluded from research due to its exchange rate regime.

An Empirical Investigation of Vendor Readiness to Assess Offshore Software Maintenance Outsourcing Project

  • Ikram, Atif;Jalil, Masita Abdul;Ngah, Amir Bin;Khan, Ahmad Salman;Mahmood, Yasir
    • International Journal of Computer Science & Network Security
    • /
    • 제22권3호
    • /
    • pp.229-235
    • /
    • 2022
  • The process of correcting, upgrading, and improving software products after they have been handed over to the consumer is known as software maintenance. Offshore software maintenance outsourcing (OSMO) clients benefit from cost savings, time savings, and improved quality software through OSMO. In most circumstances, the OSMO vendor makes a lot of money but not in all the cases. Especially, when the OSMO project offer is not properly assessed. An efficient outsourcing contract might yield successful outcomes for outsourced projects. But before sending a detailed proposal to bid on the OSMO project the vendor must have to assess the client's project (business offer) requirements. The purpose of this study is to find out common trends within the assessment of a OSMO project. A case study approach along with semi-structured interviews from eight companies concluded ten common practices and several roles. Among these practices, four (code structure, requirements, communication barriers and required infrastructure) were consistent amongst the responses .The findings, limitations and future work are discussed.