• Title/Summary/Keyword: 자산평가

Search Result 623, Processing Time 0.027 seconds

Analysis of RFID/USN Technology based Infrastructure Asset Management (사회기반시설물 자산관리에 RFID/USN 기술의 도입 방안)

  • Kim, Jung-Ryul;Chae, Myung-Jin;Park, Jae-Woc;Lee, Giu;Cho, Moon-Young
    • Proceedings of the Korean Institute Of Construction Engineering and Management
    • /
    • 2008.11a
    • /
    • pp.772-775
    • /
    • 2008
  • According to Korean Ministry of Land, Transportation and Maritime Affairs, total national SOC(Social Overhead Capital) stock comes up to 500 billion dollars. Until now, although the construction of SOC is more important than the maintenance of them in Korea, it is necessary to introduce of valuation based total asset management concept in nowadays. In this paper describes problems of exsiting data collection method, needs of Information Technology and introduction of RFID/USN(Radio Frequency IDentification/Ubiquitous Sensor Network) in data collection stage.

  • PDF

The Applicability and Limits of Housing Wealth as the Measure of Socioeconomic Status (경제적 지위 측정값으로의 주택자산의 적용 가능성과 한계: 수도권 지역의 아파트 거주자를 중심으로)

  • Lee, Myoung-Jin
    • Survey Research
    • /
    • v.8 no.2
    • /
    • pp.1-19
    • /
    • 2007
  • This paper explores the extent to which property scale, in particular housing price is useful as the measure of an individual's economic status. Its main object is to compare the distributions of the measure of housing wealth and other objective or subject measures, i,e., reported income and subjective class identification. Additionally, their relations to other variables are examined. An analysis of distributions and cross-tables based upon national survey of 2005 family and the database of apartment price of Kookmin Bank are used. It is shown that the measure of housing wealth differs from other economic status measures in terms of distribution and the relations to other variables, such as attitude variables and consumption-related variables. Its results also suggest that the measure of housing wealth can be applied to various areas as a new measure of an individual's objective economic status, in such a way to improve applicability of social survey.

  • PDF

A Study on the Performance-Based Bridge Asset Valuation Methods Considering Hazard (교량의 위험성을 고려한 성능기반 자산가치 평가방법에 관한 연구)

  • Yong-Jun Lee;Kyung-Hoon Park;Jong-Wan Sun
    • Journal of the Korea institute for structural maintenance and inspection
    • /
    • v.28 no.5
    • /
    • pp.30-37
    • /
    • 2024
  • The valuation of infrastructure assets is typically conducted using the straight-line method, which employs the depreciated replacement cost as a basis. However, this approach has the limitation of failing to accurately reflect the actual value of the facility. In light of these considerations, the performance-based depreciation (PBD) method has been proposed as a means of evaluating the asset value of bridges on the basis of their performance, although it is not designed to take account of the environmental characteristics of individual bridges. This study proposes a hazard-performance based depreciation (HPBD) method that considers the risk level of individual bridges in the PBD method proposed in previous studies. The applicability of the proposed method was evaluated on more than 8,000 bridges. The risk factors for deterioration of bridges were selected, the hazard level of individual bridges was evaluated, and weights based on the hazard level were applied to the PBD method. The evaluation resulted in a present value comparable to that of the PBD method and a relatively high future value. It is postulated that the HPBD method, which considers the risk characteristics of individual bridges, can be used for a more reasonable evaluation and decision-making process.

Comparison of IT Security Risk Analysis and Internal Control Evaluation (정보시스템 보안을 위한 위험분석활동과 내부통제평가와의 비교)

  • Cho, Sungbaek;Kim, Kuinam J.
    • Convergence Security Journal
    • /
    • v.3 no.3
    • /
    • pp.81-90
    • /
    • 2003
  • Risk analysis and internal control evaluation are key security management activities for securing organizational assets. Risk analysis is used to identify areas that need safeguarding while internal control evaluation is used to check whether the current control system is effective with a reasonable degree of assurance. Risk analysis usually focuses on unauthorised activities of unauthorised people and has not paid much attention to threats that could be committed by authorized users. As attention to fraud increases, these threats should be appropriately treated within organizations. This paper compares the difference between these two approaches.

  • PDF

The Developments of changes in shareholders wealth around merger announcement. (건설업종 신용평점 모형의 개발과 검증)

  • Lee, Seong-Hyo
    • The Korean Journal of Financial Management
    • /
    • v.19 no.2
    • /
    • pp.111-134
    • /
    • 2002
  • 본 연구에서는 건설업종에 특화된 신용평가 모형을 개발하여 건설업종에 대한 부도 예측력를 제고하고자 하였다. 건설업은 여타 업종과는 다른 재무적 특성을 지니고 있다. 특히, 재무적 안정성이 취약하고 자산의 대부분이 매출채권, 재고자산으로 구성되어 유동성이 극히 낮은 실정이다. 본 연구는 이러한 건설업종의 특성을 충분히 감안한 신용평가 모형을 개발하고자 한것이다. 신용평가 모형 중 그 현실적 유용성이 높아 많이 이용되어 오던 신용평점 모형을 개발하였다. 총 2,475개 건설업체를 대상으로 모형구조 및 각종 계량지표 및 비계량지표에 대한 분석을 주로 평균차이 검증과 로짓분석에 의거 선정하였다. 그 결과 새로운 신용평점 모형은 매출액 경상이익률, 총 현금흐름 대 차입금 비율 등 9개의 재무지표와 5분류의 비재무지표로 구성되었다. 이 모형을 기존의 신용평점모형과 비교한 결과 신규모형의 변별력이 높은 것으로 나타났다. 본 연구가 제시한 신용평점모형과 그 개발 방법이 향후 금융기관들의 부실을 줄이고 결과적으로 수익성을 개선하는데 일조하리라 기대된다.

  • PDF

Case Study for Information System Vulnerability Assessment through Improved OCTAVE Approach (개선된 OCTAVE 접근방법을 이용한 정보시스템 취약성 평가 사례연구)

  • 김기윤;양동구
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.5
    • /
    • pp.69-79
    • /
    • 2003
  • We analyze key business process by using IDEF method in the perspective of business continuity, identify key information assets by using Skandia model, and use Nessus Version 1.4.2 to assess vulnerability about the sever of library information system according to OCTAVE(The Operationally Critical Threat, Asset, and Vulnerability Evaluation) approach. We suggest the vulnerability assessment case for introducing improved OCTAVE method including IDEF method and Skandia model.

A study for Cybersecurity Risk Management by Blockade and Defense Level Analysis (봉쇄와 보안장비 수준 기반 정보보호 위험관리 수준 측정 연구)

  • Han, Choong-Hee;Han, ChangHee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.6
    • /
    • pp.1261-1266
    • /
    • 2021
  • Existing information security risk assessment methods focus on evaluating the vulnerability of information assets. However, when the form of information assets changes and new types of information assets emerge, there is a limitation in that the evaluation standards for them are also added or deleted. Existing methods have insufficient research on the path through which cyber threats are introduced. In particular, there is very little research on blocking the inflow path for web-based information systems with public IPs. Therefore, this paper introduces the main research contents of the BDLA (Blockade and Defense Level Analysis)-based information security risk assessment model. In addition, by applying the BDLA-based information security risk assessment model, the information security risk level was studied by measuring the blockade level and security equipment level of 17 public institutions.