• Title/Summary/Keyword: Cyber asset

Search Result 54, Processing Time 0.029 seconds

The Effect on Firm's Performance of Employee Stock Option (종업원의 주식보상시스템이 기업성과에 미치는 영향)

  • Park, Jong-Hyuk
    • Management & Information Systems Review
    • /
    • v.28 no.1
    • /
    • pp.71-97
    • /
    • 2009
  • In this study, I compare the ability of alternative accounting method for employee stock option to reflect firm value using the Ohlson's(1995) valuation model for 200 firms. The each methods, I compare are employee stock option expense recognition based on the K-GAAP disclosures, and asset recognition at the grant date based on the SFAS No. 123 Exposure Draft: Accounting for stock-based compensation. The model include: (1) a model that uses reported earnings, equity book value, and compensation expense based on the K-GAAP disclosures; (2) a model that uses pro-forma earnings, equity book value and adds a measure of the unrecognized asset arising form granting of employee stock options. Finding form estimating equations that the K-GAAP method for calculating compensation has no explanatory power, and the SFAS No.123 Draft Exposure method for arising asset and fair value compensation better captures than market's perception of the economic impact of stock options on firm values. However, the correlation of employee stock option compensation expense is positive. These results suggest that incentive benefits derived from employee stock option plans outweigh the cost associated with plan. In addition, I couldn't find evidence that company in KOSDAQ that have high growth potential benefit more from employee stock option plan compared to lager, more mature firm in SEC.

  • PDF

A Study on the Security Management for Critical Key Infrastructure(SCADA) (중요핵심기반시설(SCADA)에 대한 보안 관리 연구)

  • Kim InJung;Chung YoonJung;Koh JaeYoung;Won Dongho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.8C
    • /
    • pp.838-848
    • /
    • 2005
  • Most of the national critical key infrastructure, such as power, piped gas and water supply facilities, or the high-speed railroad, is run on the SCADA system. Recently, concerns have been raised about the possibility of these facilities being attacked by cyber terrorists, hacking, or viruses. Thus, it is time to adopt the relevant security management techniques. This paper attempts to propose such security management techniques, including information protection measures and troubleshooting, based on a risk analysis process concerning assets, threats/vulnerability, and hazards, and to examine the security management status of critical key infrastructure in the U.S. and Japan.

Study on the System Implementation for a Reliable Auction Right Analysis System with a Focus on Commercial Zone Analysis (상권분석시스템을 통한 신뢰성 기반의 상가건물 권리분석 프로그램 개발에 관한 연구)

  • Kim, Sangbeom
    • Journal of Digital Contents Society
    • /
    • v.16 no.5
    • /
    • pp.767-773
    • /
    • 2015
  • This study suggests a reliable auction right analysis system that improves the existing auction right analysis in a sense that the system is more applicable to a real economic world. The existing study has used an auction successful bidding price rate and an auction successful contract price for its estimation of the auction right analysis. But in this paper the degree of market vitality which is provided from the commercial zone analysis is used as an input variable so the expected auction price can be estimated and the auction right analysis is conducted in that manner.

A Study of Effectiveness of the Improved Security Operation Model Based on Vulnerability Database (취약점 데이터베이스 기반 개선된 보안관제 모델의 효과성 연구)

  • Hyun, Suk-woo;Kwon, Taekyoung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.5
    • /
    • pp.1167-1177
    • /
    • 2019
  • In this paper, the improved security operation model based on the vulnerability database is studied. The proposed model consists of information protection equipment, vulnerability database, and a dashboard that visualizes and provides the results of interworking with detected logs. The evaluation of the model is analyzed by setting up a simulated attack scenario in a virtual infrastructure. In contrast to the traditional method, it is possible to respond quickly to threats of attacks specific to the security vulnerabilities that the asset has, and to find redundancy between detection rules with a secure agent, thereby creating an optimal detection rule.

A Study of Financial Structure, Profitability, Growth and Financial Risk of Food Service Franchisor (외식산업프랜차이즈본사의 재무구조, 수익성, 성장성 및 재무위험에 관한 연구)

  • Choi, Hoang-Taig
    • The Korean Journal of Franchise Management
    • /
    • v.5 no.1
    • /
    • pp.85-108
    • /
    • 2014
  • This study provides the information about size, financial structure, profitability and growth of franchisors using financial data(asset, liability, equity, sales volume, operating income and net income) in uniform franchise offering circular of fair trade commission. The data were collected from 1,050 franchisors in various business fields: fast food, family restaurant, bakery, agriculture & fishery and liquor shop in the uniform franchise offering circular in 2012 and 2011. Results of this study are as follows: For company size, median of total assets was KRW 675 million and the accumulated median assets rate was 0.48%, but the accumulated median company numbers were 49.9%, which showed small size. For financial structure, 525 companies were below 200% debt ratio, while 314 (29.9%) companies were in over 200% debt, and 211 (20.1%) companies were impaired in capital. These also showed financial structure was vulunerable. For profitability, median of ROA for total companies were only 4.72%, which showed low profitability. For growth, median of growth rate for sales were 7.57% per year, which showed mature industry. In overall, the results showed franchisors should improve their financial status.

A Study on Cyber Security Threat and Security Requirements for Industrial Wireless Communication Devices (산업용 무선통신기기 사이버 보안위협 및 보안요구사항에 관한 연구)

  • Lee, Jiseop;Park, Kyungmi;Kim, Sinkyu
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.4
    • /
    • pp.757-770
    • /
    • 2020
  • Industrial Control System(ICS) is a system that measures, monitors, and controls various distributed assets, and is used in industrial facilities such as energy, chemical, transportation, water treatment, and manufacturing plants or critial infrastructure. Because ICS system errors and interruptions can cause serious problem and asset damage, research on prevention and minimization of security threats in industrial control systems has been carried out. Previously wireless communication was applied in limited fields to minimize security risks, but the demand for industrial wireless communication devices is increasing due to ease of maintenance and cost advantages. In this paper, we analyzed the security threats of industrial wireless communication devices supporting WirelessHART and ISA100.11a. Based on the analysis results, we proposed the security requirements for adopting and operating industrial wireless communication devices. We expect that the proposed requirements can mitigate security threats of industrial wireless devices in ICS.

Analyzing Home Network System Adaptation Status in Apartments (아파트 홈네트워크 시스템 적용실태 조사연구)

  • Lee Sun-A;Chang Kyung-Moon;Kim Jae-Jun
    • Proceedings of the Korean Institute Of Construction Engineering and Management
    • /
    • 2004.11a
    • /
    • pp.571-574
    • /
    • 2004
  • It is rapidly expanding to provide Home Digital Service based on the Home Network System in intelligent apartment. Fortunately, Korea has one of the highest rates of Internet penetration and access in the world. Construction companies used the Home Network system as a strategy of differentiation and it is available to the customers to raise their asset value. Besides, the government has a positive response to accept the new movements to make the digital environment with 'u-Korea (Ubiquitous Korea)' as the slogan. However, the level of providing Home Digital Service is actually at the beginning. The develop the home network industry more effectively, the related industries' cooperation is essential. The purpose of this study is to propose a providing model of Home Network System for the construction company and to make a method to response the fast change of technology development and customer's request at the point of construction companies' view.

  • PDF

Vulnerability Analysis on the Mobile Core Network using OpenAirInterface (OpenAirInterface를 통한 모바일 코어네트워크 보안위협 분석)

  • Oh, In Su;Park, Jun Young;Jung, Eun Seon;Yim, Kang Bin
    • Smart Media Journal
    • /
    • v.9 no.3
    • /
    • pp.71-79
    • /
    • 2020
  • Mobile network is used by many users worldwide for diverse services, including phone-call, messaging and data transfer over the Internet. However, this network may experience massive damage if it is exposed to cyber-attacks or denial-of-service attacks via wireless communication interference. Because the mobile network is also used as an emergency network in cases of disaster, evaluation or verification for security and safety is necessary as an important nation-wide asset. However, it is not easy to analyze the mobile core network because it's built and serviced by private service providers, exclusively operated, and there is even no separate network for testing. Thus, in this paper, a virtual mobile network is built using OpenAirInterface, which is implemented based on 3GPP standards and provided as an open source software, and the structure and protocols of the core network are analyzed. In particular, the S1AP protocol messages captured on S1-MME, the interface between the base station eNodeB and the mobility manager MME, are analyzed to identify potential security threats by evaluating the effect of the messages sent from the user terminal UE to the mobile core network.

How to Strengthen Convergeance of Special Operations through High-Tech Intertwinement (첨단과학기술의 융복합을 통한 특수작전의 융합성 강화 방안)

  • Sang-Keun Cho;Kang-Il Seo;Min-Seop Jung;Jun-Seong Yoo;Chul-Ki Min;Sang-Hyuk Park
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.2
    • /
    • pp.301-306
    • /
    • 2023
  • Convergeance in the military operations can be attained by simultaneously integrating effects based on sensor, C2, shooter asset in multi-domain and there is no exception to special operations. However, because of challenges from enemy, terrain, geopraphy, and weather, it's not easy to intertwine effects created from ground, sea, air, cyber and electromagnetic spectrum, and space in special operations conducted in deep area. This study presented how to intertwine high-tech such as long-rane reconnaissance·strike drone, cutting-edge sensor, jamming pod, and modular repeater in order to offset aforementioned challenges. Several new high-tech are able to strengthen convergeance of special operations in accordance with the development of the 4th industrial revolution. Therefore, follow-up studies need to be continued making an efforts to search for them.

A Study on the Impact of ESG Performance on Firm Risk (ESG 성과가 기업위험에 미치는 영향에 관한 연구)

  • Jung-Hyuck Choy
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.3
    • /
    • pp.19-26
    • /
    • 2023
  • The impact of environmental, social and governance (ESG) performance on investors' decision-making is growing. Investors' focus on the financial performance of firms in the past is expanding to the non-financial performance of the interests of stakeholders surrounding firms. Against this backdrop, this study conducted a panel regression analysis on firms evaluated by Korea Corporate Governance Service to analyze the impact of ESG performance, a firm's non-financial performance, on firm risk. According to the analysis, ESG performance has a negative (-) effect on all three firm risks (systematic risk, unsystematic risk, and total risk), indicating that the stakeholder theory and risk management theory are supported. The implications of this study are: First, ESG reduces not only unsystematic risk but also broad and indiscriminate systematic risk; Second, investors can reduce the risk of their investment portfolio by executing ESG investments; Third, companies can achieve stable financial performance even in adverse circumstances by utilizing the insurance function of ESG management; Lastly, the government can enhance the stability of the financial market while improving the financial soundness of firms through reasonable ESG-related regulations.