• 제목/요약/키워드: Software risk

검색결과 872건 처리시간 0.028초

AHP 기법에 의한 금융위험관리 소프트웨어 평가에 관한 연구 (A Study on the Evaluation of Commercial Softwares for Bank Risk Management by AHP)

  • 최희성;황규승
    • 한국경영과학회지
    • /
    • 제16권2호
    • /
    • pp.51-51
    • /
    • 1991
  • Recently financial institutions in Korea are experiencing an unfamiliar challenge in terms of their operational risk management due to the volatility of global financial market and the incessant development of new financial products. In this paper, we present an AHP(Analytic Hierarchy Process) model to evaluate the effectiveness of commercial softwares for risk management in banking. The AHP model considers software's performance. utility, serviceability and durability as major evaluation criteria. The weight of each criterion is generated by the questionnaire survey given to practitioners in risk management in domestic commercial banks.

AHP 기법에 의한 금융위험관리 소프트웨어 평가에 관한 연구 (A Study on the Evaluation of Commercial Softwares for Bank Risk Management by AHP)

  • 최희승;황규승
    • 경영과학
    • /
    • 제16권2호
    • /
    • pp.51-59
    • /
    • 1999
  • Recently financial institutions in Korea are experiencing an unfamiliar challenge in terms of their operational risk management due to the volatility of global financial market and the incessant development of new financial products. In this paper, we present an AHP(Analytic Hierarchy Process) model to evaluate the effectiveness of commercial softwares for risk management in banking. The AHP model considers software's performance. utility, serviceability and durability as major evaluation criteria. The weight of each criterion is generated by the questionnaire survey given to practitioners in risk management in domestic commercial banks.

  • PDF

A software tool for integrated risk assessment of spent fuel transportation and storage

  • Yun, Mirae;Christian, Robby;Kim, Bo Gyung;Almomani, Belal;Ham, Jaehyun;Lee, Sanghoon;Kang, Hyun Gook
    • Nuclear Engineering and Technology
    • /
    • 제49권4호
    • /
    • pp.721-733
    • /
    • 2017
  • When temporary spent fuel storage pools at nuclear power plants reach their capacity limit, the spent fuel must be moved to an alternative storage facility. However, radioactive materials must be handled and stored carefully to avoid severe consequences to the environment. In this study, the risks of three potential accident scenarios (i.e., maritime transportation, an aircraft crashing into an interim storage facility, and on-site transportation) associated with the spent fuel transportation process were analyzed using a probabilistic approach. For each scenario, the probabilities and the consequences were calculated separately to assess the risks: the probabilities were calculated using existing data and statistical models, and the consequences were calculated using computation models. Risk assessment software was developed to conveniently integrate the three scenarios. The risks were analyzed using the developed software according to the shipment route, building characteristics, and spent fuel handling environment. As a result of the risk analysis with varying accident conditions, transportation and storage strategies with relatively low risk were developed for regulators and licensees. The focus of this study was the risk assessment methodology; however, the applied model and input data have some uncertainties. Further research to reduce these uncertainties will improve the accuracy of this model.

Computer Security에 관한 소고 - 사고범죄예방을 중심으로 - (A Study on Computer Security and Controls)

  • 이종철
    • 산업경영시스템학회지
    • /
    • 제4권4호
    • /
    • pp.25-34
    • /
    • 1981
  • Recently there has been a marked increase in concern for security in computerized operations. The purposes of computer security controls are to protect against the unauthorized access to and modification of data processing resources, unauthorised access to and modification of data files and software, and the misuse of authorized activities. The controls relate to the physical security of the data processing department and of the areas within the data processing department : to the security of the data files, programs, and system software : and to the human interaction with the data files, programs, and system software. The controls that will be discussed in this paper include : I. Risk on the computer use. II. Methods of risk counter measure. III. Role of system auditing.

  • PDF

Web browser secureness with respect to CVSS

  • Joh, HyunChul
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2014년도 추계학술발표대회
    • /
    • pp.464-465
    • /
    • 2014
  • Analysis of characteristics in software vulnerabilities can be used to assess security risks and to determine the resources needed to develop patches quickly to handle vulnerability discovered. Being a new research area, the quantitative aspects of software vulnerabilities and risk assessments have not been fully investigated. However, further detailed studies are required related to the security risk assessment, using rigorous analysis of actual data which can assist decision makers to maximize the returns on their security related efforts. In this paper, quantitative software vulnerability analysis has been presented for major Web browsers (Internet Explorer (IE), Firefox (FX), Chrome (CR) and Safari (SF)) with respect to the Common Vulnerability Scoring System (CVSS). The results show that, almost all the time, vulnerabilities are compromised from remote networks with no authentication required systems, and exploitation aftermath is getting worse.

자동차 안전성을 위한 소프트웨어 FMEA 가이드라인 (The Software FMEA Guideline for Vehicle Safety)

  • 최준열;김용길;조준형;최윤자
    • 한국멀티미디어학회논문지
    • /
    • 제21권9호
    • /
    • pp.1099-1109
    • /
    • 2018
  • Most of the automotive electronic systems are equipped with control software. ISO 26262 standard has been published to prevent unreasonable risk due to E/E system malfunction. And many automotive companies apply ISO 26262 for safe series product. In ISO 26262 standard, the product quality improves through deductive and inductive safety analysis in all processes including system and software development phase. However, there are few studies on software safety analysis than systems. In the paper, we study the software FMEA(Failure Mode Effect Analysis) technique for product quality of vehicular embedded software. And we propose an effective guideline of software FMEA as EPB industrial practice.

소프트웨어 불법복제 의도에 미치는 영향요인에 관한 연구 (A Study on the Predictors of Intention to Pirate Software)

  • 김중한
    • 한국IT서비스학회지
    • /
    • 제12권2호
    • /
    • pp.131-152
    • /
    • 2013
  • Many studies have reported that software piracy is prevalent in today's society. As software is more closely integrated with across industries, software piracy would put more burdens on national economy. In spite of software anti-piracy efforts, the phenomenon has been getting worse. It is necessary to change the focus of current deterrence strategies. For better understanding of unethical behavioral intention, a research model of potential determinants for the software piracy is developed and empirically tested. The results from the study show that the planned behavior model variables-attitude, subjective norms, and perceived behavioral control-have impact on intention to commit software piracy. In addition to the variables, past behavior, perceived benefits and risk were found to be significant predictors of attitude toward software piracy. However, neither attitude nor intention was influenced by facilitating conditions. Moreover, the effect of past piracy behavior on attitude was strongly mediated by perceived benefits. Implications for research and practice are discussed.

The Optimal Release Time in Cost Model Using PCLS Model

  • Song, Kwang Yoon;Chang, In Hong;Choi, Min Su;Lee, Da Hye
    • 통합자연과학논문집
    • /
    • 제9권3호
    • /
    • pp.206-214
    • /
    • 2016
  • The basic goal of software development is to produce high quality software at low cost. Therefore, when to stop software testing and release the software product is a significant point in the software development. The software cost model is an effective tool used to help software developers control costs and determine the release time. In this paper, we discuss the cost model to apply all 6 models with consideration of time to remove errors, cost of removing each error and risk cost due to software failure. We show the impact of cost coefficients and parameter values on the expected total cost by changing the values and comparing the optimal release times.

보현산천문대 CCD 카메라 제어 소프트웨어 알고리즘 (ON THE ALGORITHM FOR BOAO CCD CAMERA CONTROL SOFTWARE)

  • 육인수;박병곤
    • 천문학논총
    • /
    • 제11권1호
    • /
    • pp.147-161
    • /
    • 1996
  • The development of universal CCD camera control software for all BOAO CCD camera systems is proposed. The new software, running under Sun SPARCstation and motif based X window system with SunOS 4.1.3 operating system, replaces existing control software based on NeXTstation color and NeXTstep 2.1 operating system which is no more produced now. Several new features of the new software is introduced, some of which are 1) the image contrast is enhanced by color manipulation and display, 2) image zooming and trimming, 3) any size of image can be displayed in the scrolled window, and 4) the offset between telescope pointing position and CCD center is easily calculated by alt-azi map. Along with the above new features, the new software has advantages including ease of maintenance and upgrading and elimination of risk caused by hardware damage. Since September 1, the software beta version is being used by observers and there is not seen severe problem regarding the software itself, but several requests to equip more features to the software will be mirrored to future release.

  • PDF

소프트웨어 사용자 집단에 따른 불법복제 의도에 미치는 요인 비교 연구 (A Comparative Study of Factors Influencing Software Piracy : Focused on Different Software User Groups)

  • 김중환
    • 한국IT서비스학회지
    • /
    • 제14권2호
    • /
    • pp.15-31
    • /
    • 2015
  • Software piracy is widespread throughout the world. It has negative effects on the software industry and the intellectual property market. Despite various deterrent policies, the phenomenon has been getting severe. The current study investigated the antecedents of software piracy attitudes and intention. In order to identify factors and their relationship, a research model for illegal piracy behavior was developed and empirically examined through a path analysis using structural equation model. Also, this study employed a multiple group structural equation model to investigate differences in structural weights across PC software user group and smartphone application user group. It was revealed that perceived benefit, habit, social factor, self-efficacy had positive effect on attitude toward software piracy, whereas perceived risk had a decreasing influence on attitude. Relationships between piracy attitudes and intentions were significant as well. Furthermore, the cross validation between two groups showed the path coefficients of habit to attitude and attitude to intention were significantly different. Implications for research and practice are discussed.