• Title/Summary/Keyword: optimal investment

Search Result 404, Processing Time 0.032 seconds

Game Theoretic Optimization of Investment Portfolio Considering the Performance of Information Security Countermeasure (정보보호 대책의 성능을 고려한 투자 포트폴리오의 게임 이론적 최적화)

  • Lee, Sang-Hoon;Kim, Tae-Sung
    • Journal of Intelligence and Information Systems
    • /
    • v.26 no.3
    • /
    • pp.37-50
    • /
    • 2020
  • Information security has become an important issue in the world. Various information and communication technologies, such as the Internet of Things, big data, cloud, and artificial intelligence, are developing, and the need for information security is increasing. Although the necessity of information security is expanding according to the development of information and communication technology, interest in information security investment is insufficient. In general, measuring the effect of information security investment is difficult, so appropriate investment is not being practice, and organizations are decreasing their information security investment. In addition, since the types and specification of information security measures are diverse, it is difficult to compare and evaluate the information security countermeasures objectively, and there is a lack of decision-making methods about information security investment. To develop the organization, policies and decisions related to information security are essential, and measuring the effect of information security investment is necessary. Therefore, this study proposes a method of constructing an investment portfolio for information security measures using game theory and derives an optimal defence probability. Using the two-person game model, the information security manager and the attacker are assumed to be the game players, and the information security countermeasures and information security threats are assumed as the strategy of the players, respectively. A zero-sum game that the sum of the players' payoffs is zero is assumed, and we derive a solution of a mixed strategy game in which a strategy is selected according to probability distribution among strategies. In the real world, there are various types of information security threats exist, so multiple information security measures should be considered to maintain the appropriate information security level of information systems. We assume that the defence ratio of the information security countermeasures is known, and we derive the optimal solution of the mixed strategy game using linear programming. The contributions of this study are as follows. First, we conduct analysis using real performance data of information security measures. Information security managers of organizations can use the methodology suggested in this study to make practical decisions when establishing investment portfolio for information security countermeasures. Second, the investment weight of information security countermeasures is derived. Since we derive the weight of each information security measure, not just whether or not information security measures have been invested, it is easy to construct an information security investment portfolio in a situation where investment decisions need to be made in consideration of a number of information security countermeasures. Finally, it is possible to find the optimal defence probability after constructing an investment portfolio of information security countermeasures. The information security managers of organizations can measure the specific investment effect by drawing out information security countermeasures that fit the organization's information security investment budget. Also, numerical examples are presented and computational results are analyzed. Based on the performance of various information security countermeasures: Firewall, IPS, and Antivirus, data related to information security measures are collected to construct a portfolio of information security countermeasures. The defence ratio of the information security countermeasures is created using a uniform distribution, and a coverage of performance is derived based on the report of each information security countermeasure. According to numerical examples that considered Firewall, IPS, and Antivirus as information security countermeasures, the investment weights of Firewall, IPS, and Antivirus are optimized to 60.74%, 39.26%, and 0%, respectively. The result shows that the defence probability of the organization is maximized to 83.87%. When the methodology and examples of this study are used in practice, information security managers can consider various types of information security measures, and the appropriate investment level of each measure can be reflected in the organization's budget.

A Study on Design of Production System Using Multiple Characteristics Robust Design in Uncertain Environment (불확실한 환경에서의 다특성치 강건설계를 이용한 생산시스템 설계에 관한 연구)

  • 양광모;서장훈;박진홍;강경식
    • Proceedings of the Safety Management and Science Conference
    • /
    • 2004.05a
    • /
    • pp.61-65
    • /
    • 2004
  • As technique that can contribute in quality improvement in design process to overcome shortcoming of traditional quality control, call design or development department quality control activity that is achieved to reduce gun damage shuddering at circle minimizing change or side effect of product performance as off-line quality control. This paper discuss optimal process design of investment projects expansion and replacement investment on each line or individual in the production. Generally optimal plant design has add to a few method by Subsidiary means with use a especial method. And then in this paper, a Robust design is presented, which may be effective to the processes appraisal or improvement. We propose that should make a optimal plant design model for reducing field failure rate to assign by real data on different factors in plant system. Using this model, robust design of taguchi method used in this comprehensive method for reducing field failure rate in plant system.

  • PDF

Applications of System Loss Sensitivity Index to Power Systems (손실감도지표의 전력계통 적용)

  • Lee, Sang-Jung
    • The Transactions of the Korean Institute of Electrical Engineers A
    • /
    • v.49 no.2
    • /
    • pp.56-61
    • /
    • 2000
  • In the paper, the system loss sensitivity index that implies the incremental system loss with respect to the change of bus power is derived using optimization technique. The index λ reaches $\infty$ at critical loading point and can be applied to actual power systems for following purposes. 1) Evaluation of system voltage stability 2)Optimal investment of reactive power focused on minimizing system loss and maximizing system voltage stability 3)Optimal re-location of reactive power focused on minimizing system loss and maximizing system voltage stability 4)Optimal load shedding in case of severe system contingency focused on minimizing system loss and maximizing system voltage stability. Case studies for each application have proved their effectiveness.

  • PDF

스위칭 옵션을 고려한 IT 벤처 기업 가치 평가에 관한 사례 연구

  • 이현정;정종욱;이정동;김태유
    • Proceedings of the Korea Technology Innovation Society Conference
    • /
    • 2001.11a
    • /
    • pp.307-337
    • /
    • 2001
  • In this paper, we propose the valuation frame of the IT(Information Technology) ventures using ROV(Real Options Valuation) model. Generally, ROV can comprises the traditional valuation method such as DCF(Discounted Cash Flow), which can measure only the tangible value of a firm from the expected future earnings, in that ROV can additionally measure the intangible value such as the strategic value of a firm in the uncertain environment. We set up the hypothetic IT venture future investment plan and assume that there are a growth option and a switching option consequently along the investment time horizon, which are caused by each characteristics of ventures and IT technologies, especially modularity. In the case that there are several embedded real options in the firm's investment plan in a row, we should apply the compound option pricing model as a real option valuation model in order to consider the value interaction between real options. In an addition, we present the results of optimal investment timing analysis using real options approach and compare them. with those of the original assumed investment timing.

  • PDF

Analysis of Investment Time for a Residential Photovoltaic Power System in China and Thailand Applying a Real Option Model and SAM Data (Real Option 모형과 SAM데이터를 활용한 중국과 태국의 주거용 태양광 투자 시점 분석)

  • Moon, Yongma
    • The Journal of Society for e-Business Studies
    • /
    • v.24 no.2
    • /
    • pp.125-141
    • /
    • 2019
  • This paper provides economic analysis for a residential photovoltaic (PV) power system of 5 districts in China and Thailand, using SAM (System Advisor Model) data. Unlike existing literature, the analysis is conducted from the investment timing perspective, as applying to a real option model which can incorporate the cost uncertainty of the PV system and a resident's option to delay the investment. This study shows that the gap of optimal investment times between a real option model and a generally used net present value model ranges from about 6 to 14 years. Also, we found a contracting result for a particular district that, while the investment is appropriate according to the net present value model, it is more reasonable to delay the PV system investment in terms of the real option model.

Optimization of Information Security Investment Portfolios based on Data Breach Statistics: A Genetic Algorithm Approach (침해사고 통계 기반 정보보호 투자 포트폴리오 최적화: 유전자 알고리즘 접근법)

  • Jung-Hyun Lim;Tae-Sung Kim
    • Information Systems Review
    • /
    • v.22 no.2
    • /
    • pp.201-217
    • /
    • 2020
  • Information security is an essential element not only to ensure the operation of the company and trust with customers but also to mitigate uncertain damage by preventing information data breach. Therefore, It is important to select appropriate information security countermeasures and determine the appropriate level of investment. This study presents a decision support model for the appropriate investment amount for each countermeasure as well as an optimal portfolio of information countermeasures within a limited budget. We analyze statistics on the types of information security breach by industry and derive an optimal portfolio of information security countermeasures by using genetic algorithms. The results of this study suggest guidelines for investing in information security countermeasures in various industries and help to support objective information security investment decisions.

An Optimal Investment Planning Model for Improving the Reliability of Layered Air Defense System based on a Network Model (다층 대공방어 체계의 신뢰도 향상을 위한 네트워크 모델 기반의 최적 투자 계획 모델)

  • Lee, Jinho;Chung, Suk-Moon
    • Journal of the Korea Society for Simulation
    • /
    • v.26 no.3
    • /
    • pp.105-113
    • /
    • 2017
  • This study considers an optimal investment planning for improving survivability from an air threat in the layered air defense system. To establish an optimization model, we first represent the layered air defense system as a network model, and then, present two optimization models minimizing the failure probability of counteracting an air threat subject to budget limitation, in which one deals with whether to invest and the other enables continuous investment on the subset of nodes. Nonlinear objective functions are linearized using log function, and we suggest dynamic programming algorithm and linear programing for solving the proposed models. After designing a layered air defense system based on a virtual scenario, we solve the two optimization problems and analyze the corresponding optimal solutions. This provides necessity and an approach for an effective investment planning of the layered air defense system.

Optimal Size Determination of Flood Mitigation Facilities in a Watershed Using Geo-Spatial Information System and Economic Analysis: Focused on Dam Height Raise Project (지형공간정보체계와 경제성분석을 활용한 유역단위 홍수저감시설 규모결정 방안 연구 - 댐증고사업을 중심으로 -)

  • Choi, Cheon-Kyu;Kim, Gil-Ho;Yeo, Kyu-Dong;Shim, Myung-Pil;Choi, Yun-Seok
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.16 no.4
    • /
    • pp.64-78
    • /
    • 2013
  • To achieve economic efficiency in a basin flood mitigation planning, it is important to determine optimal sizes of investment alternatives. Investment alternative means decision proposals composed with one more individual proposals, and it is not easy to determine an optimal one because there are so many individual proposals. This study aims to propose the approach of determining the optimal project size for raising dam height. This study applies two scenarios to determine investment alternatives for the 4 dams in the Yeongsan River basin. 'Scenario1' calculates flood mitigation for each individual proposal. And 'Scenario2' calculates that for each investment alternative composed with one more individual proposals. As the results, 'Scenario2' is better than 'Scenario1' for selecting a economically optimal dam height considering watershed conditions comprehensively.

Railroad Travel Demand Estimation System Suggestion (철도수송수요 예측시스템 제안)

  • Min, Jae-Hong
    • Proceedings of the KSR Conference
    • /
    • 2003.10b
    • /
    • pp.3-7
    • /
    • 2003
  • It is very difficult to find optimal train operation plan when analyzing the economic investment using traditional railroad travel demand estimation method. Train operation plan depends on travel demand and vice versa. To solve this problem, this study suggests a demand estimation method to address an optimal train operation scheme with the modal spilt using initial train operation plan and trip assignment.

  • PDF

AN OPTIMAL CONSUMPTION AND INVESTMENT PROBLEM WITH CES UTILITY AND NEGATIVE WEALTH CONSTRAINTS

  • Roh, Kum-Hwan
    • East Asian mathematical journal
    • /
    • v.34 no.3
    • /
    • pp.331-338
    • /
    • 2018
  • We investigate the optimal consumption and portfolio strategies of an agent who has a constant elasticity of substitution (CES) utility function under the negative wealth constraint. We use the martingale method to derive the closed-form solution, and we give some numerical implications.