• Title/Summary/Keyword: "information governance"

Search Result 610, Processing Time 0.031 seconds

The Effects of ESG Performance on the Relationship between Tax Risk and Cost of Capital: An Empirical Analysis of Korean Multinational Corporations

  • Jeong-Yeon Kang;Im-Hyeon Kim
    • Journal of Korea Trade
    • /
    • v.27 no.1
    • /
    • pp.1-18
    • /
    • 2023
  • Purpose - Using a sample of Korean multinational corporations, we examine whether the relationship between tax risk and the implied cost of capital discriminates between the environmental, social, and corporate governance (ESG) of highly rated firms. Design/methodology - Firms with high tax risks have an increased uncertainty of future cash flows. Therefore, as the volatility of future cash flow increases, information asymmetry and the required return increases. Highly rated ESG firms can reduce information asymmetry, thereby weakening the positive relationship between tax risk and cost of capital. We employ the standard deviation of the cash effective tax rate as proxy of tax risk. We utilize the ESG rating data of the Korea Corporate Governance Service (KCGS). We use a PEG model, MPEG model, and GM model to measure the implied cost of capital. Findings - We find a positive association between the implied cost of capital and tax risk. The positive relationship between tax risk and the implied cost of capital weakens in highly rated ESG firms. Highly rated ESG firms prefer a stable tax position to invest after-tax cash flows into sustainable management. Therefore, the negative effects of tax risk on cost of capital can be reduced. Originality/value - This study provides empirical evidence that ESG activities can mitigate the negative impact of tax risk on the cost of capital for Korean multinational corporations. In a business environment where ESG activities are more important, the empirical results that ESG activities can reduce the corporate risk of Korean FDI companies are expected to provide implications for the ESG activities of multinational corporations.

A Study on CIO Centered IT Governance for Strategic Management (전략경영을 위한 CIO 중심의 IT 거버넌스 수립 방안 연구)

  • Cho, Sung-Nam;Chung, Taik-Yeong;Ahn, Sung-Soo;Park, Chan-Jin;Kim, Han-Kook
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2008.05a
    • /
    • pp.863-866
    • /
    • 2008
  • 최근 많은 조직들이 IT를 경영전략의 핵심적 요소로 인식하고 IT투자를 확대하면서 IT의 효율적 관리와 전략적 활용의 중요성이 커짐에 따라 CIO 기능 강화와 IT 거버넌스 체제 구축에 많은 노력을 기울이고 있다. 그러나 아직까지는 학계나 산업계에서 IT 거버넌스의 개념이 통일되어 있지 못하고, 구성요소와 체계 및 실행방법 등도 조직의 특성에 따라 매우 다양하게 접근되고 있다. 정부출연연 KISTI를 모델로 삼아 KISTI 정보화에 대한 총괄기획, 정책수립, 운영 프로세스 관리, 정보화사업 관리 등 기관정보화에 대한 총괄자로서의 CIO 역할과 IT 거버넌스 체제 구축 방안 연구를 통해 종합적이고 효율적인 정보화 추진 및 자산 관리 운영을 하고자 한다.

A Study on the KERIS Introduction of ITA to Which Segment Architecture is Applied (세그먼트 아키텍처 방법을 적용한 한국교육학술정보원 ITA 도입 방안 연구)

  • Park, Hyeong-Yong;Han, Chang-Oh;Kim, Seo-Hoon;Kim, Hyoung-Jin
    • Journal of Information Technology Services
    • /
    • v.7 no.4
    • /
    • pp.119-138
    • /
    • 2008
  • The KERIS having a central role in education information has selected IT Architecture as a means to provide high quality service for customers; based on this, it intends to lay the groundwork for general information projects to come and perform the IT Governance, the management system for information system. The KERIS set up a mid- and long-term road map in order to introduce and utilize ITA and has been preparing for the introduction of architecture to a proper business sector using architecture approaches by segments(sectors) since 2005. This study presented several cases which organizations can refer to when they introduce architecture while promoting an architecture project; and the details were discussed as follows.ition stage, but planned decision-making will take over when it is proven to be effective with information searching.

Mitigating Threats and Security Metrics in Cloud Computing

  • Kar, Jayaprakash;Mishra, Manoj Ranjan
    • Journal of Information Processing Systems
    • /
    • v.12 no.2
    • /
    • pp.226-233
    • /
    • 2016
  • Cloud computing is a distributed computing model that has lot of drawbacks and faces difficulties. Many new innovative and emerging techniques take advantage of its features. In this paper, we explore the security threats to and Risk Assessments for cloud computing, attack mitigation frameworks, and the risk-based dynamic access control for cloud computing. Common security threats to cloud computing have been explored and these threats are addressed through acceptable measures via governance and effective risk management using a tailored Security Risk Approach. Most existing Threat and Risk Assessment (TRA) schemes for cloud services use a converse thinking approach to develop theoretical solutions for minimizing the risk of security breaches at a minimal cost. In our study, we propose an improved Attack-Defense Tree mechanism designated as iADTree, for solving the TRA problem in cloud computing environments.

Modeling of Policy Making for Big Data (빅데이터를 위한 정책결정 설계)

  • Lee, Sangwon;Park, Sungbum;Kim, Sunghyun;Chae, Seong Wook
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2015.01a
    • /
    • pp.281-282
    • /
    • 2015
  • Data, by itself, will not reveal the optimal policy choice. Nor will data alone tell us what problems to focus on or how to direct resources. It should be recognized upfront that data-driven policy making cannot provide all the answers to the challenges of good governance. Policy decisions always depend on a combination of facts, analysis, judgment, and values. In this paper, we research on factors to design an organizational policy making for Big Data.

  • PDF

Business Process Reengineering of an Information Exchange Management System for a Nationwide Cyber Threat Intelligence

  • Pramadi, Yogha Restu;Rosmansyah, Yousep;Kim, Myonghee;Park, Man-Gon
    • Journal of Korea Multimedia Society
    • /
    • v.20 no.2
    • /
    • pp.279-288
    • /
    • 2017
  • Nowadays, nations cyber security capabilities play an important role in a nation's defense. Security-critical infrastructures such as national defenses, public services, and financial services are now exposed to Advanced Persistent Threats (APT) and their resistance to such attacks effects the nations stability. Currently Cyber Threat Intelligence (CTI) is widely used by organizations to mitigate and deter APT for its ability to proactively protect their assets by using evidence-based knowledge. The evidence-based knowledge information can be exchanged among organizations and used by the receiving party to strengthen their cyber security management. This paper will discuss on the business process reengineering of the CTI information exchange management for a nationwide scaled control and governance by the government to better protect their national information security assets.

The Relationship between Control Mechanism and Commitment in Information Systems Outsourcing : The Mediating effects of Trust (아웃소싱 기업간 통제와 관계 몰입에 있어서 신뢰 매개 역할에 관한 연구)

  • Choi, Jae Woong;Han, Man Yong;Jung, Byoung Ho
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.6 no.4
    • /
    • pp.251-265
    • /
    • 2010
  • Recently, with increasing interest in the subject of interfirm relationship mechanism, some information systems researchers point out that existing outsourcing theories are limited in explaining the choice of governance mechanisms in interfirm relational exchanges. Recognizing the importance of trust-commitment, this study focuses on the relationship of between control mechanism and commitment. Especially the role of trust as mediator is mainly researched. A mediation model was suggested on the basis of theoretical linkages from prior relevant studies. The research model was empirically tested with 73 IS outsourcing projects. The findings have significant impactions for further research and practice. Findings are as follows: First, outcome control, process control, social control had positive effects on trust and commitment. Second, inter-organizational trust played as a partial mediator on the relationship between control mechanisms and commitment. Based on these findings, the implication and the limitation of the study were presented including some directions for future studies.

5% Rule Disclosure and Stock Trading Volume : Evidence from Korea

  • KIM, Eung-Gil;KIM, Sook-Min
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.6 no.4
    • /
    • pp.297-307
    • /
    • 2019
  • Despite the fact that the implementation of 5% rule is widely recognized to enhance the transparency of capital market and fairness of corporate governance market, a few evidences present information effect of 5% rule. Using 7,088 non-financial firm-year observations listed on the Korea Stock Exchange from 2006 to 2012, we analyze the relation between trading volume and 5% rule disclosure. The results show that the daily and abnormal trading volume is increased when 5% rule disclosure is released. Moreover, the trading volume is significantly increased during cooling period. Specifically, trading volume is significantly greater when one day before cooling period or the expiration day of cooling period. We also find the information effect of firms with stable ownership structure before 5% rule disclosure is relatively smaller than the firms with unstable ownership structure with unstable ownership structure. These results imply that capital market participants use the information from 5% rule disclosure and reflect in their real economic decision.

IoT Industry & Security Technology Trends

  • Park, Se-Hwan;Park, Jong-Kyu
    • International journal of advanced smart convergence
    • /
    • v.5 no.3
    • /
    • pp.27-31
    • /
    • 2016
  • High-tech industries in a state well enough to troubleshoot hacking information introduction a big barrier to delay the growth of the market related to IoT(Internet of Things) as is likely to be on the rise. This early on, security issues introduced in the solution, a comprehensive solution, including the institutional laws/precautions needed. Recent examples of frequent security threats while IoT is the biggest issue of introducing state-of-the-art industry information due to the vulnerable security hacking. This high-tech industries in order to bridge the information responsible for the target attribute, target range, and the protection of security and how to protect the subject, IoT environment (domestic industrial environment) considering the approach is needed. IoTs with health care and a wide variety of services, such as wearable devices emerge. This ensures that RFID/USN-based P2P/P2M/M2M connection is the implementation of the community. In this study, the issue on the high-tech industrial information and the vulnerable security issues of IoT are described.

Information Service Quality Management in Data Governance Perspective (in Public Information Sharing System) (데이터 거버넌스 관점의 정보서비스 품질관리 (행정정보공동이용시스템 중심으로))

  • Go, Woon-Hyuk;Min, Dae-Hong;Lee, Sung-Hyun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2012.11a
    • /
    • pp.1402-1405
    • /
    • 2012
  • 데이터 품질의 패러다임 변화에 따라 기업에서는 효과적인 의사결정지원을 위한 정보서비스의 품질 관리가 중요하다. 본 연구에서는 설문조사를 통해 데이터 거버넌스 관점에서 행정기관 간 정보연계를 통해 민본 녹색 행정을 위한 '행정정보공동이용시스템'의 데이터 품질관련 현황을 분석하였다. 이와 관련하여 향후 정확하고 안전한 행정정보의 공동이용을 위한 정보서비스 품질관리체계 구축을 위한 대안으로서 데이터 거버넌스 관점의 행정정보 공유 데이터 품질관리체계 구축을 제시하는 바이다.