• Title/Summary/Keyword: 위험통제

Search Result 550, Processing Time 0.03 seconds

A Role-Based Delegation Model Using Role Hierarchy with Restricted Permission Inheritance (권한상속제한 역할계층을 이용한 역할기반 위임 모델)

  • 박종순;이영록;이형효;노봉남;조상래
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.4
    • /
    • pp.129-138
    • /
    • 2003
  • Role-Based Access Control(RBAC) model is becoming a promising model for enterprise environments with various organization structures. In terms of role hierarchy, each senior role inherits all the permissions of its junior roles in the role hierarchy, and a user who is a member of senior role is authorized to carry out the inherited permissions as well as his/her own ones. But there is a possibility for senior role members to abuse permissions. Since senior role members need not have all the authority of junior roles in the real world, enterprise environments require a restricted inheritance rather than a unconditional or blocked inheritance. In this paper, we propose a new role-based delegation model using the role hierarchy model with restricted inheritance functionality, in which security administrator can easily control permission inheritance behavior using sub-roles. Also, we describe how role-based user-to-user, role-to-role delegations are accomplished in the model and the characteristics of the proposed role-based delegation model.

The Effect of Thirst on Impulsive Purchasing: Focusing on the Mediation of Self-Control (갈증이 충동구매에 미치는 영향: 자기통제의 매개효과를 중심으로)

  • Lee, Sinae;Min, Dongwon
    • Journal of Digital Convergence
    • /
    • v.19 no.2
    • /
    • pp.143-150
    • /
    • 2021
  • Prior research on consumer psychology has primarily focused on when and why consumers exhibit impulsive behavior, such as impulse buying. This study focuses on physical stimulation during an impulse purchase as another meaningful factor. Specifically, this study examines whether thirst depletes cognitive resources. The results of two experiments show that impulse purchase tendency increases when consumers are thirsty (Exp. 1), and that the loss of self-control is based on the relationship between thirst and impulse purchase tendency (Exp. 2). These findings suggest that physical stimulation, such as thirst, may be a useful indicator of impulsive behavior in consumers.

The Effect of Type of Largest Shareholder Change on Losses: Focusing on Firm Risk (최대주주 변경의 유형이 적자보고에 미치는 영향: 기업위험을 중심으로)

  • Kim, Hye-Ri
    • Journal of Digital Convergence
    • /
    • v.18 no.6
    • /
    • pp.237-244
    • /
    • 2020
  • The purpose of this study is to empirically analyze the effect of information related to the largest shareholder's change on the likelihood of reporting a loss for firms listed on the Korea Exchange. Specifically, this study conducts a logit regression analysis to examine the firm's loss reporting with frequent changes in the largest shareholder among the largest shareholder change types. So, it controls the impact of a firm's loss reporting, such as the previous year's loss reporting and discretionary accruals. As a result of the analysis, firms whose largest shareholder have changed more than 2 times in the accounting period are found to have higher firm risk in loss reporting than other firms. The results of this analysis confirm that frequent changes in the largest shareholder, which are disclosures of investment risks on the Korea Exchange, may result in investment risk situations such as loss reporting.

The research regarding an information system risk management process characteristics (정보시스템 위험관리 프로세스 특성에 관한 연구)

  • Kim, Tai-Dal;Lee, Hyung-Won
    • The KIPS Transactions:PartD
    • /
    • v.14D no.3 s.113
    • /
    • pp.303-310
    • /
    • 2007
  • Information system failure is various such as program test unpreparedness, physical facilities for damage prevention unpreparedness from simple software error. Although cross is trifling the result causes vast damage. Recently, became difficult by simple outside security system to solve this problem. Now, synthetic countermove establishment and suitable confrontation connected with danger came in necessary visual point about general Information Technology of enterprise. In connection with, in this paper, various informations and system and control about data that can happen information inside and outside considering integrity for IT resource, solubility, confidentiality within organization studied about special quality to model synthetic Risk Management System that can of course and cope in danger.

Risk Management and Telecommunications Research for customers of the accident location (사고선박의 고객위치파악용 위험관리 통신연구)

  • Kwak, Eun-young;Park, Dea-woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.331-335
    • /
    • 2016
  • When a boating accident, such as a January number three, the customer's risk management issues emerged. Ships and accident risk in confined spaces such as risk management to locate the customer and dangers of probation is available. In this paper, aboard after consent to obtain information for customers to wrist to customers, webbing or portable device embedded in devices and Wireless sensor information Input was attached, disposable consumer information. Customer on board the ship setting for location analysis and positioning according to information communication protocol, ships, each customer's real-time location information on the screen, 3 the foundation of d customers on the floor Can be designed to inform. Threshold designed to reduce the error of the information to analyze the position in current position and errors. Also, to system attacks would control the situation of accident and emergency jaenanguk server with real-time information transmission of information outside the emergency during a disaster, search and Disaster relief to be possible.

  • PDF

Valve monitoring system design and implementation using an infrared sensor and ZigBee (Zigbee와 적외선 센서를 활용한 밸브 개폐 모니터링 시스템 설계 및 구현)

  • Sim, Hyun;Oh, Jae-Chul
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.10 no.1
    • /
    • pp.73-80
    • /
    • 2015
  • The valve device is installed in hazardous areas, such as a chemical plant explosion has been sealed with fire protection device to prevent the risk of explosion. In this paper, due to the explosion-proof devices using external power the device can not be used in infrared sensors and Zigbee sensor valve device by measuring the open degree of valve opening and closing of the danger zone to check whether. Valve opening and closing operation log screen time, we propose a low-power operation monitoring system administrators to manage and control the plant. Develop power control relay board apply an improved algorithm to apply the asynchronous LPL power management. The plant monitoring system and explosion-proof valve opening and closing the valve system with the intelligent device designed and implemented and tested it.

A Study on the Security Management for Critical Key Infrastructure(SCADA) (중요핵심기반시설(SCADA)에 대한 보안 관리 연구)

  • Kim InJung;Chung YoonJung;Koh JaeYoung;Won Dongho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.8C
    • /
    • pp.838-848
    • /
    • 2005
  • Most of the national critical key infrastructure, such as power, piped gas and water supply facilities, or the high-speed railroad, is run on the SCADA system. Recently, concerns have been raised about the possibility of these facilities being attacked by cyber terrorists, hacking, or viruses. Thus, it is time to adopt the relevant security management techniques. This paper attempts to propose such security management techniques, including information protection measures and troubleshooting, based on a risk analysis process concerning assets, threats/vulnerability, and hazards, and to examine the security management status of critical key infrastructure in the U.S. and Japan.

A Study on the Risk Management of Oil Tanker Operation (유조선 운항에 따른 위험관리에 관한 소고)

  • 윤대근;박상갑
    • Journal of the Korean Institute of Navigation
    • /
    • v.25 no.1
    • /
    • pp.33-44
    • /
    • 2001
  • Tankers have somewhat different shapes in construction and working condition compared with normal merchant ship. If an accident occurs, normal merchant ship's damages will mostly be confined to ship and cargo, but those of tankers will result in oil spills and catastrophic loss beyond our imagination. So, first we must understand risk factors, pre-loss control and post-loss control, legal regulations about its indemnification and marine insurance for oil tanker operation. When unexpected accidents happen, despite pre-loss control, it is possible to cover those kinds of losses by insurance. To control these losses, however, it is important to establish compensation for oil pollution and arrange for oil pollution preventing system. In spite of these oil pollution preventing systems, we have rarely seen that pollution from oil tankers could be solved. So this paper was studied more fundamental and overall control measures for the risk management of oil tanker operation.

  • PDF

Development of Security Level Evaluation Tool(ISSPET) Based on Information Security System (정보보호 시스템기반의 보안 수준 평가 도구(ISSPET) 개발)

  • Soh, Woo-Young;Kim, Wan-Kyung;Kim, Seak-Soo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.8
    • /
    • pp.1911-1919
    • /
    • 2009
  • Currently, the evaluation technology for the security systems of risk analysis level measurement is maintained by only the developed countries including U.S and U.K, and the evaluation technology and its infrastructure are insufficient for the evaluation technology of security threat analysis level measurement in Korea. Therefore this paper presents the development of the security control items and the evaluation tool(ISSPET) for the security level performance. It is expected to evaluate the security management level of the current system and its security environment through analyzing the security management level of security systems using ISSPET.

A Synthetic Model for Managing Market Risk of Financial Institutions (금융기관의 이자율, 환율, 주식수익률 변동위험에 대한 종합적 관리기법)

  • Kim, Tae-Hyuk
    • The Korean Journal of Financial Management
    • /
    • v.18 no.1
    • /
    • pp.107-128
    • /
    • 2001
  • 금융기관이 직면하는 시장위험관리와 관련된 연구는 이자율과 주식가격 변동위험, 또는 환율과 이자율 변동위험만을 고려한 자산배분모델이므로 그 모형의 정교성에도 불구하고 국제금융기관의 시장위험관리 모형으로 이용하기에는 부족한 점이 있다. 시장위험인 VAR를 측정하는 방법 중 포트폴리오 VAR 측정방법인 델타-노말 방법을 응용하여 금융기관이 시장위험을 종합적으로 관리하는 한편, 기대수익을 최대화시키는 자산-부채의 최적배분에 대한 모형을 유도할 수 있다. 본 논문은 포트폴리오 접근법을 이용하여 금융기관의 시장위험을 종합적으로 관리할 수 있는 모형을 개발하는 동시에 미국, 일본, 영국, 독일의 주요 금융자산의 가격변동자료를 바탕으로 실증적 분석을 시도하였다. 이론적 모형과 관련하여 국제금융기관이 시장위험을 통제하는 한편 목표수익을 달성하는데 필요한 $m_1$ 종류의 국내자산과 부채의 규모, $m_2$ 종류의 외화자산과 부채의 규모를 동시적으로 결정할 수 있는 모델을 개발하였다. 이 모형은 금융기관의 위험포지션과 목표수익이 변동함에 따라 재구성되어야 할 국내외 자산과 부채의 포트폴리오에 대한 종류와 규모를 구체적으로 파악할 수 있게 한다. 실증분석을 위해 미국에 본점을 두고 미국, 일본, 영국, 독일에서 영업활동을 하는 국제금융기관이 16개의 국내외 금융자산을 이용 가능한 것으로 가정하였다. 1995년 1월부터 1999년 6월까지 이들 금융자산의 월별자료와 각 국 통화의 대 U.S. 달러 환율을 이용하여 목표이익 10,000천 달러를 실현하는 한편 이자율과 환율 위험을 최소화시키는 자산, 부채의 적정구성에 관한 결과를 제시하였다.구의 성과로는 특정 투자자 집단이 주가의 움직임에 따라 매매를 하는 수동적 전략의 의미보다는 적극적으로 주가를 움직이는 주체로서 외국인투자자와 일부 기관투자자의 존재를 확인할 수 있었다는 점이며, 주가 움직임에 따른 개인투자자와 일부 기관 투자자의 수동적 매매 스타일과 기관투자자 사이의 투자스타일의 이질성을 통계적으로 확인할 수 있었다는 데에 있다.남아 각국과 우리나라간에는 주가변동에 시차가 없는 것으로 나타났다. 그러나 각국간 표준시차 및 거래소 거래시간을 고려하면 미국, 영국, 독일의 경우에도 그 시차는 1일이내이거나 거의 시차가 없는 것으로 판단된다. 발견되어 선물의 선도효과가 지배적임을 발견하였다.적 일정하게 하는 소비행동을 목표로 삼고 소비와 투자에 대한 의사결정을 내리고 있음이 실증분석을 통하여 밝혀졌다. 투자자들은 무위험 자산과 위험성 자산을 동시에 고려하여 포트폴리오를 구성하는 투자활동을 행동에 옮기고 있다.서, Loser포트폴리오를 매수보유하는 반전거래전략이 Winner포트폴리오를 매수보유하는 계속거래전략보다 적합한 전략임을 알 수 있었다. 다섯째, Loser포트폴리오와 Winner포트폴리오를 각각 투자대상종목으로써 매수보유한 반전거래전략과 계속거래 전략에 대한 유용성을 비교검증한 Loser포트폴리오와 Winner포트폴리오 각각의 1개월 평균초과수익률에 의하면, 반전거래전략의 Loser포트폴리오가 계속거래전략의 Winner포트폴리오보다 약 5배정도의 높은 1개월 평균초과수익률을 실현하였고, 반전거래전략의 유용성을 충분히 발휘하기 위하여 장단기의 투자기간을 설정할 경우에 6개월에서 36개월로 이동함에 따라 6개월부터 24개월까지는 초과수익률이 상승하지만,

  • PDF