• Title/Summary/Keyword: financial losses

Search Result 169, Processing Time 0.027 seconds

Regional Analysis of Load Loss in Power Distribution Lines Based on Smartgrid Big Data (스마트그리드 빅데이터 기반 지역별 배전선로 부하손실 분석)

  • Jae-Hun, Cho;Hae-Sung, Lee;Han-Min, Lim;Byung-Sung, Lee;Chae-Joo, Moon
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.17 no.6
    • /
    • pp.1013-1024
    • /
    • 2022
  • In addition to the assessment measure of electric quality levels, load loss are also a factor in hindering the financial profits of electrical sales companies. Therefore, accurate analysis of load losses generated from distributed power networks is very important. The accurate calculation of load losses in the distribution line has been carried out for a long time in many research institutes as well as power utilities around the world. But it is increasingly difficult to calculate the exact amount of loss due to the increase in the congestion of distribution power network due to the linkage of distributed energy resources(DER). In this paper, we develop smart grid big data infrastructure in order to accurately analyze the load loss of the distribution power network due to the connection of DERs. Through the preprocess of data selected from the smart grid big data, we develop a load loss analysis model that eliminated 'veracity' which is one of the characteristics of smart grid big data. Our analysis results can be used for facility investment plans or network operation plans to maintain stable supply reliability and power quality.

Real-time Sign Language Recognition Using an Armband with EMG and IMU Sensors (근전도와 관성센서가 내장된 암밴드를 이용한 실시간 수화 인식)

  • Kim, Seongjung;Lee, Hansoo;Kim, Jongman;Ahn, Soonjae;Kim, Youngho
    • Journal of rehabilitation welfare engineering & assistive technology
    • /
    • v.10 no.4
    • /
    • pp.329-336
    • /
    • 2016
  • Deaf people using sign language are experiencing social inequalities and financial losses due to communication restrictions. In this paper, real-time pattern recognition algorithm was applied to distinguish American Sign Language using an armband sensor(8-channel EMG sensors and one IMU) to enable communication between the deaf and the hearing people. The validation test was carried out with 11 people. Learning pattern classifier was established by gradually increasing the number of training database. Results showed that the recognition accuracy was over 97% with 20 training samples and over 99% with 30 training samples. The present study shows that sign language recognition using armband sensor is more convenient and well-performed.

How does the Stock Market Reacts to Information Security Investment of Firms in Korea : An Exploratory Study (기업의 정보보안 투자에 시장이 어떻게 반응하는지에 대한 탐색적 연구)

  • Park, Jaeyoung;Jung, Woojin;Kim, Beomsoo
    • Journal of Information Technology Services
    • /
    • v.17 no.1
    • /
    • pp.33-45
    • /
    • 2018
  • Recently, many South Korean firms have suffered financial losses and damaged corporate images from the data breaches. Accordingly, a firm should manage their IT assets securely through an information security investment. However, the difficulty of measuring the return on an information security investment is one of the critical obstacles for firms in making such investment decisions. There have been a number of studies on the effect of IT investment so far, but there are few researches on information security investment. In this paper, based on a sample of 76 investment announcements of firms whose stocks are publicly traded in the South Korea's stock market between 2001 and 2017, we examines the market reaction to information security investment by using event study methodology. The results of the main effects indicate that self-developed is significantly related to cumulative average abnormal returns (CAARs), while no significant effect was observed for discloser, investment characteristics and firm characteristics. In addition, we find that the market reacts more favorably to the news announced by the subject of investment than the vendor, in case of investments with commercial exploitation. One of main contributions in our study is that it has revealed the factors affecting the market reaction to announcement of information security investment. It is also expected that, in practice, corporate executives will be able to help make an information security investment decision.

Valuation of Pure Internet Business : An Exploratory Study (국내 순수 인터넷 기업평가에 관한 탐색적 연구)

  • 김정욱;정승렬;이재정
    • Korean Management Science Review
    • /
    • v.17 no.3
    • /
    • pp.61-71
    • /
    • 2000
  • Due to the potential growing capability that reflects future value, the market value of internet business companies (IB) are still evaluated high although major players like Amazon continuously suffer losses. Then, how do investors valuate the potential growing capabilities given that traditional financial/accounting based valuation approaches seem to be inappropriate for IB. This study attempts to provide an answer to this issue. We, therefore, analyzed the predictability of various accounting and non-accounting variables for IB value. These include book value, net income, unique visitors, page view, reach rate, public float and institutional holdings. Because of being in infant stage and difficulties in obtaining necessary web traffic data, sample of 20 pure IB were selected from Korea Stock Exchange Market, KOSDAQ, and informal market. The results of this study showed that web traffic date had the strongest relationship with IB value. In particular, unique visitors and reach rate were found to be best predictors for IB value while page view was reasonable indicator. Interestingly, net income was not found to related to IB value. This calls for an attention to the typical characteristics of IB that my hinder the usage of traditional valuation approaches for IB. Another results revealed that none of both public float and institutional holdings was significantly associated with IB value, indicating market’s supply-demand factors were less important than traffic information.

  • PDF

A Study on The Leak of Core Business Technologies Using Preventative Security Methods Such as Clustering (군집화를 이용한 기업 핵심기술 유출자 분류에 관한 연구)

  • Huh, Seung-Pyo;Lee, Dae-Sung;Kim, Kui-Nam
    • Convergence Security Journal
    • /
    • v.10 no.3
    • /
    • pp.23-28
    • /
    • 2010
  • Recently, the leak of domestic core technology of major business in Korea and the subsequent damage, has been increasing every year. Financial losses due to this leak are estimated to be about 220 trillion, which is equivalent to the gross budget of Korea Besides, the majority of the leaks are caused by former and current staff members, cooperated businesses, scientists and invesment companies. This shows that the source of the leaks are internal personnel. In this manner, we can infer that the management and plan of personnel security has not implemented sound practices to prevent technology leak by people. Therefore, this thesis suggests classifying methods of technology leak through clustering, one of the data mining methods about the information of internal personnel to prevent core technology leak from businesses.

A Smart Framework for Mobile Botnet Detection Using Static Analysis

  • Anwar, Shahid;Zolkipli, Mohamad Fadli;Mezhuyev, Vitaliy;Inayat, Zakira
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.6
    • /
    • pp.2591-2611
    • /
    • 2020
  • Botnets have become one of the most significant threats to Internet-connected smartphones. A botnet is a combination of infected devices communicating through a command server under the control of botmaster for malicious purposes. Nowadays, the number and variety of botnets attacks have increased drastically, especially on the Android platform. Severe network disruptions through massive coordinated attacks result in large financial and ethical losses. The increase in the number of botnet attacks brings the challenges for detection of harmful software. This study proposes a smart framework for mobile botnet detection using static analysis. This technique combines permissions, activities, broadcast receivers, background services, API and uses the machine-learning algorithm to detect mobile botnets applications. The prototype was implemented and used to validate the performance, accuracy, and scalability of the proposed framework by evaluating 3000 android applications. The obtained results show the proposed framework obtained 98.20% accuracy with a low 0.1140 false-positive rate.

Designing on Security zone to improve Cookie File Security level (쿠키파일의 보안성을 향상하기 위한 보안영역 설계)

  • Seo, Hee-Suk;Choi, Yo-Han
    • The Journal of Korean Association of Computer Education
    • /
    • v.14 no.6
    • /
    • pp.75-81
    • /
    • 2011
  • Cookie is simple text file, which contains records of web service which provided to user. some of data included in Cookie has user's private information. When attacker has Cookie which included user's private information, will causing financial losses. In this paper we designed security section which can improve vulnerable Cookie's security level. Through research and vulnerability analysis of Cookie file, we find out how to implement security area to offer efficient security area and design security area for cookie file. Also we checked security level to performance evaluation. Through this security level, we can keep user's private information secure using Cookie's improve security level which stored in user's personal computer.

  • PDF

Green Six Sigma for Green Growth Implementation (녹색성장 실행을 위한 그린 6시그마)

  • Kim, Dong-Chun;Hong, Sung-Hoon;Shin, Wan-Seon
    • Journal of Korean Society for Quality Management
    • /
    • v.38 no.4
    • /
    • pp.521-530
    • /
    • 2010
  • Global regulatory pressures relating climate change and environmental responsibility are asking companies to find out the best way for sustaining their continuous business growths. It could be known that inadequate management for environmental issues are bad for business, negatively affecting brand image, causing unnecessary losses and costs for environmental preservation. For this reason, environmentally conscious green business growth has been recognized as an essential requirement for a company to stay in business. Many companies are looking for green business opportunities of improving their environmental and financial results, and struggling with how green fits into their business. In this paper, the Green Six Sigma, an environmentally conscious Six Sigma methodology, is presented as a way to find solutions for green growths. The Six Sigma is known as a disciplined, data-driven approach and methodology for achieving world-class performance in any process from manufacturing to transactional. In chronological order, the Six Sigma has been evolved from Motorola's quality-oriented methodology to GE's cost-oriented lean approach, and is being evolved and developed as an environment-oriented green growth approach. There is no doubt that the Green Six Sigma, as an engine of green growth, is a power tool for achieving competitive business performance and reducing the impact on the environment.

Measures for Automaker's Legal Risks from Security Threats in Connected Car Development Lifecycle

  • Kim, Dong Hee;Baek, Seung Jo;Lim, Jongin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.2
    • /
    • pp.865-882
    • /
    • 2017
  • To improve passenger convenience and safety, today's vehicle is evolving into a "connected vehicle," which mounts various sensors, electronic control devices, and wired/wireless communication devices. However, as the number of connections to external networks via the various electronic devices of connected vehicles increases and the internal structures of vehicles become more complex, there is an increasing chance of encountering issues such as malfunctions due to various functional defects and hacking. Recalls and indemnifications due to such hacking or defects, which may occur as vehicles evolve into connected vehicles, are becoming a new risk for automakers, causing devastating financial losses. Therefore, automakers need to make voluntary efforts to comply with security ethics and strengthen their responsibilities. In this study, we investigated potential security issues that may occur under a connected vehicle environment (vehicle-to-vehicle, vehicle-to-infrastructure, and internal communication). Furthermore, we analyzed several case studies related to automaker's legal risks and responsibilities and identified the security requirements and necessary roles to be played by each player in the automobile development process (design, manufacturing, sales, and post-sales management) to enhance their responsibility, along with measures to manage their legal risks.

Roles of Health Technology Assessment for Better Health and Universal Health Coverage in Korea (우리나라 보건의료 발전을 위한 의료기술평가의 역할)

  • Lee, Young Sung
    • Health Policy and Management
    • /
    • v.28 no.3
    • /
    • pp.263-271
    • /
    • 2018
  • Health technology assessment (HTA) is defined as multidisciplinary policy analysis to look into the medical, economic, social, and ethical implications of the development, distribution, and use of health technology. Following the recent changes in the social environment, there are increasing needs to improve Korea's healthcare environment by, inter alia, assessing health technologies in an organized, timely manner in accordance with the government's strategies to ensure that citizens' medical expenses are kept at a stable level. Dedicated to HTA and research, the National Evidence-based Healthcare Collaborating Agency (NECA) analyzes and provides grounds on the clinical safety, efficacy, and economic feasibility of health technologies. HTA offers the most suitable grounds for decision making not only by healthcare professionals but also by policy makers and citizens as seen in a case in 2009 where research revealed that glucosamine lacked preventive and treatment effects for osteoarthritis and glucosamine was subsequently excluded from the National Health Insurance's benefit list to stop the insurance scheme from suffering financial losses and citizens from paying unnecessary medical expenses. For the development of HTA in Korea, the NECA will continue exerting itself to accomplish its mission of providing policy support by health technology reassessment, promoting the establishment and use of big data and HTA platforms for public interest, and developing a new value-based HTA system.