Application of Taguchi model to valuation of information security technology considering security quality failure

Yujin Jeong, Byungun Yoon

Research output: Contribution to journalArticlepeer-review

3 Scopus citations

Abstract

As interests in intangible assets in a digital economy have been growing, technology valuation is becoming increasingly more important in information technology management. Most existing valuation methods do not reflect the unique characteristics of technology. Thus, this paper aims to suggest an approach for technology valuation that considers the nature of information security technology. First, technological value is evaluated by scoring value factors that are used to analyse the intrinsic characteristics and application of technology. Second, to evaluate the market value, the expected profit of the technology will be deduced by using an income approach, reflecting on the characteristics of information security products and services. The weighted sum of factors from the previous scoring process plays a role in adjusting the expected profit. Third, the Taguchi loss function is applied to calculate the amount of social loss incurred due to the lower quality level of security. The final result of technology valuation is presented by integrating the expected profit and social loss. The proposed approach is illustrated with a case of safe symmetric key algorithm, one of information security technologies in Korea. The results of technology valuation will provide objective information for technology transfer and the selection of R&D projects.

Original languageEnglish
Pages (from-to)1112-1134
Number of pages23
JournalTotal Quality Management and Business Excellence
Volume31
Issue number9-10
DOIs
StatePublished - 3 Jul 2020

Keywords

  • income approach
  • information security technology
  • information technology valuation
  • R&D project selection
  • security quality
  • social impacts
  • Taguchi loss function

Fingerprint

Dive into the research topics of 'Application of Taguchi model to valuation of information security technology considering security quality failure'. Together they form a unique fingerprint.

Cite this