• Title/Summary/Keyword: Security risk

Search Result 1,331, Processing Time 0.043 seconds

Extenuating Food Integrity Risk through Supply Chain Integration: The Case of Halal Food

  • Ali, Mohd Helmi;Tan, Kim Hua;Pawar, Kulwant;Makhbul, Zafir Mohd
    • Industrial Engineering and Management Systems
    • /
    • v.13 no.2
    • /
    • pp.154-162
    • /
    • 2014
  • Effects of food scandals on religious belief, human health and even on causes of death indicate that firms and consumers are vulnerable to integrity risks in the global supply chain. Mitigating the integrity risk and maintaining the credence quality products like halal food is very challenging, if not impossible. Our aim in this research is to show that supply chain integration can mitigate the halal food integrity risk. To illustrate this idea, we have conducted case studies and interviews in seven Malaysian chicken supply chain focal firms. We unpack the halal integrity risks along the supply chain, such as production risk, raw material risk, food security risk, outsourcing practices risk, service risk, and logistics risk. The research argues that supply chain integration, such as internal integration and external integration practices, could minimize the halal integrity risk. The advantages of supply chain integration in mitigating the halal integrity risk are also highlighted in this paper.

Understanding Relationships Among Risk Factors in Container Port Operation UsingBayesian Network

  • Tsenskhuu Nyamjav;Min-Ho Ha
    • Journal of Navigation and Port Research
    • /
    • v.47 no.2
    • /
    • pp.93-99
    • /
    • 2023
  • This study aimed to determine relationships among risk factors influencing container port operation using Bayesian network. Risk factors identified from prior studies were classified into five groups: human error, machinery error, environmental risk, security risk, and natural disasters. P anel experts discussed identified risk factors to fulfil conditional probability tables of the interdependence model. The interdependence model was also validated by sensitivity analysis and provided an interrelation of factors influencing the direction of each other. Results of the interdependence model were partially in line with results from prior studies while practices in the global port industry confirmed interrelationships of risk factors. In addition, the relationship between top-ranked risk factors can provide a schematic drawing of the model. Accordingly, results of this study can expand the prior research in the Korean port industry, which may help port authorities improve risk management and reduce losses from the risk.

A Study on National Mining Investment Security Analysis for the Overseas Mineral Resources Investment Business (해외 광물자원 투자 사업을 위한 국가위험도 분석 연구)

  • Ko, Eun-Mi;Choi, Soen-Gyu;Kim, Chang-Seong;Kim, Seong-Yong;Pak, Sang-Joon
    • Economic and Environmental Geology
    • /
    • v.41 no.5
    • /
    • pp.475-484
    • /
    • 2008
  • In this study, we analyzed national mining investment security and country risk, and suggested a new index for exploration and development investment for mining projects in abroad by an analysis of relationship between these grades and mineral resource development investment. For this, potential risks for mining in mineral-rich countries are assessed, and the risk of the exploration and development investment for mining projects is relatively evaluated by OECD country risk. It is noted that countries of the lower ranks in OECD are consistently good agreement with the high grade in Behre Dolbear Group Inc. for favorable mineral exploitation, whereas the higher ranks have shown diverse and high risks for the mining investigation and development. Consequently, it is necessary that assessment of the relationship between mineral resource index and country risk for mining projects to be investigated and developed in future should be applied before business decision of mineral investigation projects in abroad.

Continuous-authentication Method based on the Risk Profile associated with Context-awareness to Lock Smart Devices (스마트 기기 잠금을 위한 상황인지 위험도기반의 지속인증기법)

  • Kim, Jihwan;Lee, Younho
    • Journal of KIISE
    • /
    • v.43 no.11
    • /
    • pp.1259-1269
    • /
    • 2016
  • In order to block the access of the information in the smartphone of a user by other users, it is checked if the current user is the owner or not in the smartphone authentication process, whenever a user begins to use a smartphone. This makes smartphone users in front of frequent smartphone authentications, which leads significant inconvenience to them. Because of such inconvenience, users tend not to use the smartphone authentication anymore. Finally, their smartphones become very vulnerable against malicious access. This paper proposes a progressive authentication method on the android-platform in order to solve the problem described above. With the proposed method, smartphones can identify relevant risks based on users' past experiences and determine whether an authentication is needed. Because authentication occurs only when the identified risk level is high, it can achieve both a high-level of security in the high-level risk situation and user convenience in the low-level risk situation.

Review on Prior Evaluation for Terrorism Risk of High-rise Buildings (초고층건축물의 테러 위험도 사전평가에 관한 연구)

  • Seong, Bin;Lee, Yoon-Ho
    • Korean Security Journal
    • /
    • no.36
    • /
    • pp.293-316
    • /
    • 2013
  • Today's high-rise buildings are increasing concern about the safety and evacuation of people related to the fire and threat from outside. Terrorism breaking out in high-rise buildings, a symbol of the national economy results in a number of casualties, economic loss, social fear and damage to national status. That's why high-rise building has also emerged as a target of major terrorist attacks, compared to other types of buildings. We have 54 high-rise buildings in 15 regions over the country. The Ministry of Land, Infrastructure and Transport and Seoul Metropolitan Government have offered the guidelines to prevent terrorist attacks toward high-rise buildings. Since the 9/11 terrorist attacks, the U.S. Federal Emergency Management Agency (FEMA) has developed and taken advantage of the Risk Management Manual Series. According to this manual, pre-assessment is conducted for the prevention of terrorism and particularly in FEMA 455, risk of the surrounding areas, vulnerability, possibility from terrorist attacks are checked. After the check, experts classify the risk of terrorist attacks toward the high-rise buildings and according to the risk classification, architects, security experts and structure engineers can carry out terrorism prevention program for high-rise buildings. The U.K. NaCTSO has also offered the terrorism prevention guidelines. Therefore, the Ministry of Land, Infrastructure and Transport and Seoul Metropolitan Government should make more concrete guidelines for high-rise buildings such as what U.S. FEMA and U.K. NaCTSO implement, including prior evaluation technique for terrorism risk.

  • PDF

IT Systems Risk Analysis Using Object Oriented Asset Classification Model (객체지향 자산분류모델을 이용한 위험분석에 관한연구)

  • Lee, Hyeak-Ro;Ahn, Seong-Jin
    • Journal of Internet Computing and Services
    • /
    • v.9 no.4
    • /
    • pp.79-84
    • /
    • 2008
  • In these days, many organizations try to manage their assets in safe way due to fast change in information-communication environment. In Korea, risk analysis and vulnerability analysis for security improvement of critical asset is booming by enforcement of Act on security of information and communication infrastructure. It is obligate that each critical information infrastructure needs to get vulnerability analysis. In this paper, we proposed Object Oriented Asset Classification model for asset analysis and risk analysis.

  • PDF

A Study on BIM based Process Risk Management Model (BIM 기반의 프로젝트 단계별 리스크관리 모델에 관한 연구)

  • Jeon, Seung-Ho;Choi, Myung-Seok;Lee, Joo-Ho
    • Journal of Korean Society of societal Security
    • /
    • v.3 no.1
    • /
    • pp.61-66
    • /
    • 2010
  • Recently a construction industry introduces information technology that brings about many advantages in the early planning phase, design phase and construction phase. Nevertheless a BIM has a many benefits, it has limits which are not only usually using 3D modeling but also limit of making full use of practical affairs because of a lack of connecting varietals of progress of work. To solve these uppermost limits, this research is presenting unified systems to use in risk management which are efficient management of space and non-space information, space analysis.

  • PDF

A Risk Analysis Simulation Model for Security Management of IT System (IT시스템 보안관리 위험분석 시뮬레이션 모델)

  • Kim, Kang;Cho, Kyoung-Sik
    • Journal of the Korea Society of Computer and Information
    • /
    • v.8 no.2
    • /
    • pp.75-81
    • /
    • 2003
  • The Korea standard model is not fitted to general company in many faces because it is made for the public institution. This report suggests the risk analysis Simulation model of Security Management based on korea standard model , to apply and operate for general companies possibly. This model tries to show many standards, come subjectively in the character of the risk analysis, objectively and generally, and tries to give you the possible countermove, which can be operated and actual , for the countermove analysis and presentation.

  • PDF

Determining Contingency Ranking Using the Probabilistic Method of the Power System (확률적 방법을 이용한 전력계통의 상정사고 순위 결정)

  • Kim, Kyoung-Young;Lee, Seung-Hyuk;Kim, Jin-O;Kim, Tae-Kyun
    • Proceedings of the KIEE Conference
    • /
    • 2003.07a
    • /
    • pp.113-115
    • /
    • 2003
  • The electric power industry throughout the world is undergoing considerable changes from the vertically integrated utility structure to the deregulated market. However, the deregulated electricity market is operated with respect to theory of economical efficiency, and therefore, the system operator requires data with fast contingency ranking for security of the bulk power system. This paper presents fast calculation method for determining contingency ranking using the weather dependant probabilistic risk index(PRI). The probabilistic risk index can be classified into normal weather and adverse weather. This paper proposes calculation method using the probabilistic risk index in determining contingency ranking requiring for security under the deregulated electricity market.

  • PDF

A Determining Contingency Ranking Using the Weather Effects of the Power System (날씨효과를 고려한 전력계통의 상정사고 순위 결정)

  • Kim, Kyoung-Young;Park, Jong-Jin;Kim, Jin-O;Kim, Tae-Gyun;Choo, Jin-Bu
    • Proceedings of the KIEE Conference
    • /
    • 2003.11a
    • /
    • pp.134-136
    • /
    • 2003
  • The deregulated electricity market is operated with respect to theory of economical efficiency, and therefore, the system operator requires data with fast contingency ranking for security of the bulk power system. This paper compares the weather dependant probabilistic risk index(PRI) with the system performance index for power flow in the IEEE-RBTS. also, the system performance index for power flow presents the power system stability. The probabilistic risk index can be classified into normal weather and adverse weather. This paper proposes calculation method using the probabilistic risk index in determining contingency ranking requiring for security under the deregulated electricity market.

  • PDF