• Title/Summary/Keyword: Risk Information

Search Result 6,157, Processing Time 0.037 seconds

How to Manage Cloud Risks Based on the BMIS Model

  • Song, Youjin;Pang, Yasheng
    • Journal of Information Processing Systems
    • /
    • v.10 no.1
    • /
    • pp.132-144
    • /
    • 2014
  • Information always comes with security and risk problems. There is the saying that, "The tall tree catches much wind," and the risks from cloud services will absolutely be more varied and more severe. Nowadays, handling these risks is no longer just a technology problem. So far, a good deal of literature that focuses on risk or security management and frameworks in information systems has already been submitted. This paper analyzes the causal risk factors in cloud environments through critical success factors, from a business perspective. We then integrated these critical success factors into a business model for information security by mapping out 10 principles related to cloud risks. Thus, we were able to figure out which aspects should be given more consideration in the actual transactions of cloud services, and were able to make a business-level and general-risk control model for cloud computing.

Testing the Mediating Role of Perceived Risk of COVID-19 and the Moderating Role of Age in the Relationship between COVID-19 related Information Sensitivity and Personal Preventive Behaviors

  • Hong, Kyung-Wan;Kim, Hyeon-Cheol
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.14 no.2
    • /
    • pp.1-9
    • /
    • 2022
  • The influence of information sensitivity during the COVID-19 pandemic on perceived risk and personal preventive behaviors of consumers in China had been investigated. The participants were Chinese individuals experiencing the pandemic as it happened. Participants voluntarily completed an online questionnaire to provide their COVID-19 information sensitivity, their perceived COVID-19 risk, preventive behavior and their respective age. Our study discovered that COVID-19 information sensitivity positively influence perceived risk and preventive behavior. Moreover, young individuals show higher levels of online information sensitivity, which influenced their personal protective behavior when compared to that of middle-aged and elderly participants. Furthermore, Perceived risk significantly affected preventive behaviors. The results of this study may assist the government and marketeers in comprehending information sensitivity which can affect consumers' protective behavior toward reducing COVID-19 infections.

A Study on Factors Influencing User's Security Behavioral Intention for Choosing Password (패스워드 선택을 위한 사용자의 보안행위의도에 영향을 미치는 요인)

  • Kim, Jong-Ki;Kang, Da-Yeon;Jeon, Jin-Hwan
    • The Journal of Information Systems
    • /
    • v.17 no.1
    • /
    • pp.23-43
    • /
    • 2008
  • Nowadays, openness and accessibility of information systems increase security threats from inside and outside of organization. Appropriate password is supposed to bring out security effects such as preventing misuses and banning illegal users. This study emphasizes on choosing passwords from perspective of information security and investigated user's security awareness affecting behavioral intention. The research model proposed in this study includes user's security belief which is influenced by risk awareness factors such as information assets, threats and vulnerability elements. The risk awareness factors ale derived from risk analysis methodologies for information security. User's risk awareness is a factor influencing the security belief, attitude toward security behavior, and security behavioral intention. According to the result of this study, while vulnerability is not related to the risk awareness, information assets and threats are related to the user's risk awareness. There is a significant relationship between risk awareness and security belief. Also, user's security behavioral intention is significantly affected by security attitude.

Strategies for Establishing of the Systemic Collecting and Sharing of Food Risk Information (체계적인 식품 위해 정보 수집.공유 체계 구축 방안)

  • Choi, Sung-Rak
    • Journal of the East Asian Society of Dietary Life
    • /
    • v.17 no.3
    • /
    • pp.456-462
    • /
    • 2007
  • Food safety has been a growing consumer concern over the last few decades, and remains a priority for consumers, the food industry, and regulatory agencies alike. Although consumer concern for food safety has increased, consumer confidence has decreased. The emphasis on food safety is related to that of preliminary risk management. The ability to collect and provide food risk information is a key element in enhancing the way food safety authorities protect consumers from risk. This review aims to investigate the current situations of international organizations, as well as several countries' systems for collecting and providing food risk information. Through the comparison and analysis of each system, this review proposes strategies to establish a systematic collecting of information and provision of infrastructure in Korea. To develop an information collection system suited to Korea's situation, it is necessary for Korea to strengthen interactions and cooperation with other trade partners through the enlargement of international networks. Such efforts on food risk communication should be made by providing high quality and clear information.

  • PDF

Differences in Preventive Activities among Smokers

  • KIM, Kapseon
    • The Korean Journal of Food & Health Convergence
    • /
    • v.7 no.1
    • /
    • pp.17-26
    • /
    • 2021
  • The purpose of this study was to develop strategies and policies for smoking prevention that are tailored to the characteristics of different groups of smokers. The structured survey was conducted with regular smokers. The results were as follows: It has been demonstrated that Risk Perception Attitude framework can be used as a major research framework to predict behavioral changes related to the prevention of smoking. The smokers were divided into four attitude groups based on perceived risks and self-efficacy: indifference, proactive, avoidance, and responsive. The smoker groups showed significant differences in information seeking, information avoidance, prevention behavior and addiction degree. Especially, the difference in prevention behavior depended on the self-efficacy when the perceived risk level was high. Information avoidance was the lowest when the perceived risk level was high and the self-efficacy was low. Information seeking was lowest when the perceived risk level was low. When the level of self-efficacy was high, if the perceived risk level was high, prevention behavior was actively performed. Therefore, the self-efficacy was related to preventive behavior, and the perceived low-risk played a role in hindering information seeking. Smoking prevention strategies are important to raise awareness of the risk of smoking and to improve the positive willingness of smokers to quit smoking through self-efficacy.

Mitigating Threats and Security Metrics in Cloud Computing

  • Kar, Jayaprakash;Mishra, Manoj Ranjan
    • Journal of Information Processing Systems
    • /
    • v.12 no.2
    • /
    • pp.226-233
    • /
    • 2016
  • Cloud computing is a distributed computing model that has lot of drawbacks and faces difficulties. Many new innovative and emerging techniques take advantage of its features. In this paper, we explore the security threats to and Risk Assessments for cloud computing, attack mitigation frameworks, and the risk-based dynamic access control for cloud computing. Common security threats to cloud computing have been explored and these threats are addressed through acceptable measures via governance and effective risk management using a tailored Security Risk Approach. Most existing Threat and Risk Assessment (TRA) schemes for cloud services use a converse thinking approach to develop theoretical solutions for minimizing the risk of security breaches at a minimal cost. In our study, we propose an improved Attack-Defense Tree mechanism designated as iADTree, for solving the TRA problem in cloud computing environments.

Two Models to Assess Fuzzy Risk of Natural Disaster in China

  • Chongfu, Huang
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.7 no.1
    • /
    • pp.16-26
    • /
    • 1997
  • China is one of the few countries where natural disaster strike frequently and cause heavy damage. In this paper, we mathematically develop two models to assess fuzzy risk of natural disaster in China. One is to assess the risk based on database of historical disaster effects by using information diffusion method relevant in fuzzy information analysis. In another model, we give an overview over advanced method to calculate the risk of release, exposure and consequence assessent, where information distribution technique is used to calculate basic fuzzy relationships showing historical experience of natural disasters, and fuzzy approximate inference is employed to study loss risk based on these basic relationships. We also present an examples to show how to use the first model. Result show that the model is effective for natural disaster risk assessment.

  • PDF

The Study of Developing an Index for Evaluating (위험분석모델의 정보시스템 구축방법론 적용에 관한 연구)

  • 박동석;안성진;정진욱
    • Convergence Security Journal
    • /
    • v.2 no.2
    • /
    • pp.67-75
    • /
    • 2002
  • The purpose of this study is to reflect the risk analysis results acquired while building an information system of an organization by applying a risk analysis model capable of analyzing the confronted risk, on the information system build methodology. Risk analysis, a method of utilizing the functional relation between risk, vulnerability and countermeasure of information assets, is used to evaluate the overall information risk level by analyzing the influence range of vulnerability imposed in the information asset of an organization, and the applications of the countermeasures on the frequency and intensity of the corresponding risk.

  • PDF

The Influences of Risk Perceptions and Clothing Involvements on Information Search Behavior (지각된 위험과 의복관여도가 정보탐색 활동에 미치는 영향 -대학생을 중심으로-)

  • 임경복
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.25 no.2
    • /
    • pp.206-216
    • /
    • 2001
  • This study was intended to identify the information search behavior according to the risk perception and clothing involvement. The data were collected via a questionnaire from 369 students of Semyung University in Checheon and data were analyzed by frequency, factor analysis, Cronbachs alpha and multiple regression. The results of this study were as follows; 1. Multiple regression revealed the fact that each type of involvement dimensions were influenced by the risk perception dimensions. Among four involvement dimensions, importance of clothing was the best influenced factor according to the risk perceptions. 2. Also information search behavior was influenced by risk perception and fashion involvement. Among four information search behaviors, industry providing search was the best influenced factor by the risk perception and clothing involvement.

  • PDF

A Study on the Development of Railway Risk Assessment Information Management System (철도 위험도평가 전산시스템(RAIMS)의 설계 및 개발에 관한 연구)

  • Park, Chan-Woo;Kwak, Sang-Log;Park, Joo-Nam;Wang, Jong-Bae
    • Proceedings of the KSR Conference
    • /
    • 2006.11b
    • /
    • pp.1059-1064
    • /
    • 2006
  • Risk assessment of a railway system should be periodically conducted managing a large amount of accumulating accident/incident data and scenarios, which generally requires enormous time and efforts. Therefore, special information management system is essential for railway risk assessment, where data needed for decisions on managing the railway safety could be promptly supported. In this study, we develop the framework of a railway risk assessment information management system (RAIMS). The RAIMS is composed of two main modules: 1) hazard data processing module; 2) and risk assessment module. Hazard data could be turned into risk information using these two modules. The RAIMS will be useful in finding hazard conditions, quantitatively assessing the risk, and providing pertinent risk measures, eventually serving to prevent railway accidents and reduce severities of railway accidents.

  • PDF