• Title/Summary/Keyword: Risk Information

Search Result 6,200, Processing Time 0.03 seconds

Study on Foreign Exchange Risk Insurance, Risk Premium Hedge Ratio in WTO/OECD (WTO/OECD하에서 환변동보험의 헤지 성과분석연구)

  • Lee, Eun-Jae;Oh, Tae-Hyung
    • International Commerce and Information Review
    • /
    • v.9 no.3
    • /
    • pp.151-160
    • /
    • 2007
  • The purpose of this study is to estimate the risk premium hedge ratio in foreign exchange risk of the foreign exchange rate insurance. The applicants of exchange rate insurance and Korea Export Insurance Corporation will be facing the risk in change of currency and guaranteed currency’s swap point upon contract being made. Also upon making decision of hedging exchange rate insurance, the company will need to be aware of the risk causing due to change in swap point.

  • PDF

Risk Analysis for Information Systems: An Integrative Framework (정보시스템의 위험도 분석에 관한 연구: 통합적인 분석 틀을 중심으로)

  • Kim, Young-Gul;Lee, Jong-Man;Lee, Jae-Nam
    • Asia pacific journal of information systems
    • /
    • v.8 no.2
    • /
    • pp.37-51
    • /
    • 1998
  • This study attempts to draw a blueprint of risk analysis for Information Systems (IS). We introduce two main variables for measuring IS risk - business-impact intensity and IS-vulnerability index - through the investigation of information characteristics, business processes and human-related factors. IS-vulnerability index consists of two factors such as degree of openness and degree of preparedness to the threats. Based on these factors, we built two integrative frameworks for risk analysis and management: One is a conceptual framework to enhance the understandability of IS risk itself; the other is an integrative framework to improve the managerial insight of overall IS risk. We then conducted a field study to empirically validate the proposed framework using a structural equations modeling method. We found that IS maturity and business-impact intensity were positively correlated to degree of openness to the threats, while IS maturity was negatively correlated to degree of preparedness to the threats.

  • PDF

A Comparative Study on the Application of RISP in the Context of Risk Types -Focusing on Typhoon and Hydrofluoric Acid Spill Risks (위험 유형에 따른 위험 정보 탐색과 처리 과정 연구 -불산 유출과 태풍 관련 위험 상황 비교 중심)

  • Huh, Seohyeon;Kim, Yungwook
    • Korean journal of communication and information
    • /
    • v.70
    • /
    • pp.246-276
    • /
    • 2015
  • From a historical perspective of risk communication, risks can be classified by their associated level of responsibility. In the case of technical risks such as hazardous chemical accidents, people perceive that risk-related organizations have a high level of responsibility; however, they do not in traditional risks such as natural disasters. This study aims to examine risk information seeking and processing, as seen in two types of risk, based on the Risk Information Seeking and Processing(RISP) model. For this purpose, hypotheses and a research question are developed with current domestic risk issues, and the results show significant differences in risk information seeking and processing between the two types of risk. Specifically, in the case of the chemical spill accident, negative emotion against relevant institutions makes different information seeking and processing compared to the natural disaster. The low level responsibility risk such as typhoon comparatively follows the flow of the original RISP model. However, the high level responsibility risk such as the hydrofluoric acid spill did not match with the RISP model. Based on the research results, theoretical implications were discussed.

  • PDF

A study on Security Risk Analysis Methods in Overseas (해외의 보안위험분석 방법론 현황 및 분석)

  • 이성만;이필중
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 1994.11a
    • /
    • pp.288-302
    • /
    • 1994
  • A security risk analysis provides all information system with the capability to investigate and estimate the status of its security, and gives a guideline for establishing a safeguard against any means of security threats. The information system needs tile judicious and accurate why for performing a risk analysis since security policy and risk analysis of tile information system are based on risk analysis, The risk analysis is composed of two methods. mathematical approach and diagramming technique. Mathematical approach cannot yield a precise description of the real world. However, diagramming technique is more pragmatic since it overcomes this limitation. In this paper, we studied tile security risk analysis methods proposed in overseas such as INFOSEC [4], SRAG [5], FIPS65[6], and JRAM[7].

  • PDF

A Qualitative Study on Risk Reduction Behaviors in Purchase Process of the Counterfeit of Fashion Luxury Brands - Focused on Risk Reduction Behaviors on Psychological Risk Perceptions -

  • Kim, Il
    • Journal of Fashion Business
    • /
    • v.9 no.3
    • /
    • pp.22-36
    • /
    • 2005
  • This research is to classify psychological risk perceptions in purchases process at counterfeit at fashion luxury brands, into a risk perception on purchase activity itself and a risk perception on the post-purchase situation, and to analyze types and characteristics at risk reduction behaviors to reduce each risk perception. In this research a qualitative method was employed, and research-related data were collected and analyzed through in-depth interviews. Results were shown that risk reduction behaviors at psychological risk perception on purchase activity itself included rationalization of purchase, accompanied purchase, reduction and discontinuance of purchase, and that risk reduction behaviors of psychological risk perception on the post-purchase situation included information search, establishment of selection criteria, establishment of marginal limit, selective purchase, planned and compared purchase, and reduction and discontinuance of purchase. Previous researches suggested brand loyalty, selection of famous brands, utilization of information agents by marketers, pre-purchase usage and guaranteed purchase, but these risk reduction methods were not utilized, this probably being interpreted as a result of characteristics of counterfeit. In addition, risk reduction behavior of one type tended to reduce risk perception of several other types, and risk reduction behaviors of various types were utilized to reduce a certain type's risk perception. Not only types of risk perception but also levels of risk perception appeared to have exerted influence to risk reduction behaviors.

Exploratory Study on Risk Factors by Project Performance Areas in Software Project Management (정보시스템 프로젝트의 성과영역별 위험요인에 관한 탐색적 연구)

  • Lee Seogjun;Kim HaeJung;Suh Hyunsuk
    • Journal of Information Technology Applications and Management
    • /
    • v.11 no.4
    • /
    • pp.103-120
    • /
    • 2004
  • Identifying validated risk factors in software risk management is imperative for project managers. Although validated risk lists were provided by previous researchers, risk list associated with software project performance areas was not provided as yet. This paper represents a first step toward understanding risk lists by various project performance areas (time, cost, and quality) to help project managers alleviating the possibility of software project failure. Four simultaneous exploratory surveys were conducted with 29 experienced software project managers. Three different risk factor ranking sets for each project performance area were compared with, the risk ranking, which was provided without clarifying specific project performance areas. The risk lists and their corresponding perceived importance were different from previous research results. This implies that identifying risk factors for specific project performance areas can provide additional information for project managers. We concluded by discussing implications of our finds for both research and improving risk management practice.

  • PDF

Development of the Evaluation Framework for the Risk Management of Information Systems Outsourcing : Focusing on Nonprofit Organizations (정보시스템 아웃소싱 위험요인 평가 프레임?의 개발: 비영리 조직을 중심으로)

  • Kim Chang-Su;Baek Myeung-Kee
    • The Journal of Information Systems
    • /
    • v.13 no.1
    • /
    • pp.39-57
    • /
    • 2004
  • As a result of the fast development of Information communication technology, the competitive advantage of companies and the service quality of nonprofit organizations has been largely changed. Corresponding to this kind of change, companies have tried to make production improvement, competitive strengthening, and organizational innovation. Meanwhile, the nonprofit organizations directed by the government are pursuing the service innovation from general administration area to the public service for civilians. In relation to this, risk management of the company's information systems outsourcing has largely been studied until now. However, the study of risk management for nonprofit organization information systems outsourcing has rarely been made. In this paper, to provide the theoretical base for further research, we have attempted to develop the evaluation framework for risk management of information systems outsourcing considering the characteristics of nonprofit organizations.

  • PDF

Risk Perceived by Consumers in Apparel Buying Situation ( II ) Types of Risk Reduction Methods and Their Relationships with Risk Types and Consumers' Demographic Variables (의복구매시 소비자가 지각하는 위험에 관한 연구(II) -위험감소방안의 유형분류, 위험유형 및 소비자 인구통계적 변인과의 관련을 중심으로 -)

  • Kim Chan Ju
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.16 no.1 s.41
    • /
    • pp.73-83
    • /
    • 1992
  • This paper examined risk reduction methods utilized by consumers in apparel buying situation in multidimensional conceptual framework, and analyzed the relationships between risk types, consumer demographic variables and preferences of risk reduction methods. Samples of 224 consumers were deliberately selected to include various demographic characteristics such as sex, age, educational level, occupation, income level. The results of the principal axis factor analysis indicated that 26 item risk reduction methods could be summarized into 6 meaningful factors; Marketer-dominated Information Sources Use (MIS), Prepurchase Deliberation / Observation i Dependence on Past Buying Experience (DOE), Independent Information Sources Use (lIS), Interpersonal Information Sources Use (PIS), Brand Loyalty (BL), Label Reading / Guarantee Buying (RG). DOE were used most whereas IIS used least. Correlations of various types of risk perceived with the preference of risk reduction methods were significant especially for positive relationship between psychologi-cal and/or economic risk and DOE, and between social risk and/or fashionability loss and MIS. Results of ANOVA and Duncan test suggested that sex, age, educational level, occupation of consumers can act as ones of determinant variables on making differences in the use of risk reduction methods.

  • PDF

A quantitative assessment method of network information security vulnerability detection risk based on the meta feature system of network security data

  • Lin, Weiwei;Yang, Chaofan;Zhang, Zeqing;Xue, Xingsi;Haga, Reiko
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.12
    • /
    • pp.4531-4544
    • /
    • 2021
  • Because the traditional network information security vulnerability risk assessment method does not set the weight, it is easy for security personnel to fail to evaluate the value of information security vulnerability risk according to the calculation value of network centrality, resulting in poor evaluation effect. Therefore, based on the network security data element feature system, this study designed a quantitative assessment method of network information security vulnerability detection risk under single transmission state. In the case of single transmission state, the multi-dimensional analysis of network information security vulnerability is carried out by using the analysis model. On this basis, the weight is set, and the intrinsic attribute value of information security vulnerability is quantified by using the qualitative method. In order to comprehensively evaluate information security vulnerability, the efficacy coefficient method is used to transform information security vulnerability associated risk, and the information security vulnerability risk value is obtained, so as to realize the quantitative evaluation of network information security vulnerability detection under single transmission state. The calculated values of network centrality of the traditional method and the proposed method are tested respectively, and the evaluation of the two methods is evaluated according to the calculated results. The experimental results show that the proposed method can be used to calculate the network centrality value in the complex information security vulnerability space network, and the output evaluation result has a high signal-to-noise ratio, and the evaluation effect is obviously better than the traditional method.

Information Technology Implementation in Supply Risk and Performance (공급위험과 성과를 위한 정보 기술 실행)

  • Kim, Minkyun;Chai, Sangmi
    • Management & Information Systems Review
    • /
    • v.33 no.1
    • /
    • pp.237-261
    • /
    • 2014
  • This study is to investigate the impact of information technology implementation on supply chain risk and performance. It focuses on how information technology adoption affects supply risk as well as performance. It collected one hundred fifty nine responses from supply executives and supply and purchasing managers of U.S manufacturing firms by applying a survey methodology. The research results provide empirical evidence that the use of information technology in the supply chain mitigates supply risk and improves performance. More importantly, information technology adoption involves three aspects: inbound and outbound communications, internal communications and administration and finally, mitigation of supply risks and improved performance via order taking and procurement. This research emphasizes the importance of IT implementation in supply risk management. It also points out how information technology adoption facilitates the impact of information technology in risk mitigation in the supply chain and in performance. Thus, supply and purchasing managers need to consider IT implementation and adoption when establishing their risk mitigating strategies within the supply chains.

  • PDF