• Title/Summary/Keyword: External Environment Risks

Search Result 25, Processing Time 0.026 seconds

The Impact of Business Risk-Based Audit Approach on Reducing Unsystematic Risks: Evidence from Jordanian Banks

  • AL-QUDAH, Laith A.
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.8 no.1
    • /
    • pp.343-352
    • /
    • 2021
  • This study aims to identify the impact of the audit approach based on business risks (i.e., external environment risk, operations risk, information risk) in reducing unsystematic risks (i.e., operational risk, credit risk, liquidity risk, capital risk, and administrative risk) in Jordanian banks. To reduce the effect of unsystematic risks and, thus, improve banking performance, an audit approach based on business risks has emerged. To achieve the objectives, this study relied on descriptive statistics and the regression approach to study twenty-five Jordanian banks. The researcher used the intentional sampling method represented by employees of the accounting, financial and control departments in Jordanian banks. Seventeen banks contributed to the study, with a percentage of 68%, totaling 356 employees. A questionnaire was designed to obtain the data, and due to homogeneity among the sampling members, a purposive sample was drawn and 300 questionnaires were distributed. The results of the study found a statistically significant effect of the audit approach based on business risks with its combined dimensions on reducing unsystematic risks in Jordanian banks. The results of the study also found a statistically significant effect of the business risk-based audit approach with its combined dimensions on reducing operational risks in Jordanian banks.

Bivariate reliability models with multiple dynamic competing risks (다중 동적 Competing Risks 모형을 갖는 이변량 신뢰성 모형에 관한 연구)

  • Kim, Juyoung;Cha, Ji Hwan
    • Journal of the Korean Data and Information Science Society
    • /
    • v.27 no.3
    • /
    • pp.711-724
    • /
    • 2016
  • Under variable complex operating environment, various factors can affect the lifetimes of systems. In this research, we study bivariate reliability models having multiple dynamic competing risks. As competing risks, in addition to the natural failure, we consider the increased stress caused by the failure of one component, external shocks, and the level of stress of the working environment at the same time. Considering two reliability models which take into account all of these competing risks, we derive bivariate life distributions. Furthermore, we compare these two models and also compare the distributions of maximum and minimum statistics in the two models.

Measures for Automaker's Legal Risks from Security Threats in Connected Car Development Lifecycle

  • Kim, Dong Hee;Baek, Seung Jo;Lim, Jongin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.2
    • /
    • pp.865-882
    • /
    • 2017
  • To improve passenger convenience and safety, today's vehicle is evolving into a "connected vehicle," which mounts various sensors, electronic control devices, and wired/wireless communication devices. However, as the number of connections to external networks via the various electronic devices of connected vehicles increases and the internal structures of vehicles become more complex, there is an increasing chance of encountering issues such as malfunctions due to various functional defects and hacking. Recalls and indemnifications due to such hacking or defects, which may occur as vehicles evolve into connected vehicles, are becoming a new risk for automakers, causing devastating financial losses. Therefore, automakers need to make voluntary efforts to comply with security ethics and strengthen their responsibilities. In this study, we investigated potential security issues that may occur under a connected vehicle environment (vehicle-to-vehicle, vehicle-to-infrastructure, and internal communication). Furthermore, we analyzed several case studies related to automaker's legal risks and responsibilities and identified the security requirements and necessary roles to be played by each player in the automobile development process (design, manufacturing, sales, and post-sales management) to enhance their responsibility, along with measures to manage their legal risks.

Establishing Risk Management Process for Improved Business Value of a Multi-Purpose Building Project (복합 시설 프로젝트의 사업 가치 향상을 위한 리스크 관리 프로세스 구축 방안)

  • Lee, Jong-Sik;Cho, Seung-Ho
    • Journal of the Korea institute for structural maintenance and inspection
    • /
    • v.22 no.1
    • /
    • pp.64-71
    • /
    • 2018
  • Project Management Institute of America separates the types of risk with external risks and internal risks. The external risk is an uncontrollable risk in projects such as changes of policy and related systems, climate, natural disasters, exchange rates and so on. The internal risk is an existing risk in the project itself that is controllable items in the project. Technical risks in project management are cost, quality, time, safety and environment. Therefore, both the external and internal risks should be managed to perform the construction project successfully. In particular, we can secure the quality and safety of facilities through the technical risk management. The importance of potential risk management has been emerging as a major interest and the lack of risk management delays projects and increases construction costs with negative effects of the building safety since the complex building, which is composed of a great number of facilities, consists of many project units and there are conflicts between various participants and stake-holders. This study presents the ways of establishing risk management processes to ensure the safety of the complex building. To that end, establishing procedure of risk management processes is presented and types of risk and factors in construction projects and counter strategies are presented as available risk information on the stages.

Statistical Approach for Corrosion Prediction Under Fuzzy Soil Environment

  • Kim, Mincheol;Inakazu, Toyono;Koizumi, Akira;Koo, Jayong
    • Environmental Engineering Research
    • /
    • v.18 no.1
    • /
    • pp.37-43
    • /
    • 2013
  • Water distribution pipes installed underground have potential risks of pipe failure and burst. After years of use, pipe walls tend to be corroded due to aggressive soil environments where they are located. The present study aims to assess the degree of external corrosion of a distribution pipe network. In situ data obtained through test pit excavation and direct sampling are carefully collated and assessed. A statistical approach is useful to predict severity of pipe corrosion at present and in future. First, criteria functions defined by discriminant function analysis are formulated to judge whether the pipes are seriously corroded. Data utilized in the analyses are those related to soil property, i.e., soil resistivity, pH, water content, and chloride ion. Secondly, corrosion factors that significantly affect pipe wall pitting (vertical) and spread (horizontal) on the pipe surface are identified with a view to quantifying a degree of the pipe corrosion. Finally, a most reliable model represented in the form of a multiple regression equation is developed for this purpose. From these analyses, it can be concluded that our proposed model is effective to predict the severity and rate of pipe corrosion utilizing selected factors that reflect the fuzzy soil environment.

Optimization of Explosive Compounds (TNT and RDX) Biodegradation by Indigenous Microorganisms Activated by External Carbon Source (외부탄소원으로 활성화된 토착미생물에 의한 화약물질(TNT and RDX) 분해 최적화)

  • Park, Jieun;Bae, Bumhan
    • Journal of Soil and Groundwater Environment
    • /
    • v.19 no.3
    • /
    • pp.56-65
    • /
    • 2014
  • Contamination of explosive compounds in the soils of military shooting range may pose risks to human and ecosystems. As shooting ranges are located at remote places, active remediation processes with hardwares and equipments are less practical to implement than natural solutions such as bioremediaton. In this study, a series of experiments was conducted to select a suitable carbon source and to optimize dosing rate for the enhanced bioremediation of explosive compounds in surface soils and sediments of shooting ranges with indigenous microorganisms activated by external carbon source. Treatability study using slurry phase reactors showed that the presence of indigenous microbial community capable of explosive compounds degradation in the shooting range soils, and starch was a more effective carbon source than glucose and acetic acid in the removal of TNT. However, at higher starch/soil ratio, i.e., 2.0, the acute toxicity of the liquid phase increased possibly due to transformation products of TNT. RDX degradation by indigenous microorganisms was also stimulated by the addition of starch but the acute toxicity of the liquid phase decreased with the increase of starch/soil ratio. Taken together, the optimum range of starch/soil ratio for the degradation of explosive compounds without significant increase in acute toxicity was found to be 0.2 of starch/soil.

A Study on the New Management System Considering Shadow IT (Shadow IT를 고려한 새로운 관리체계 도입에 관한 연구)

  • Yoo, Jiyeon;Jeong, Nayoung
    • Journal of Information Technology Services
    • /
    • v.15 no.3
    • /
    • pp.33-50
    • /
    • 2016
  • In a dynamic IT environment, employees often utilize external IT resources to work more efficiently and flexibly. However, the use of external IT resources beyond its control may cause difficulties in the company. This is known as "Shadow IT." In spite of efficiency gains or cost savings, Shadow IT presents problems for companies such as the outflow of enterprise data. To address these problems, appropriate measures are required to maintain a balance between flexibility and control. Therefore, in this study, we developed a new information security management system called AIIMS (Advanced IT service & Information security Management System) and the Shadow IT Evaluation Model. The proposed model reflects a Shadow IT's attributes such as innovativeness, effectiveness, and ripple effect. AIIMS consists of five fields: current analysis; Shadow IT management plans; management process; education and training; and internal audit. There are additional management items and sub-items within these five fields. Using AIIMS, we expect to not only mitigate the potential risks of Shadow IT but also create successful business outcomes. Now is the time to draw to the Light in the Shadow IT.

A Practical Attack on In-Vehicle Network Using Repacked Android Applications (커넥티드 카 환경에서 안드로이드 앱 리패키징을 이용한 자동차 강제 제어 공격)

  • Lee, Jung Ho;Woo, Samuel;Lee, Se Young;Lee, Dong Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.3
    • /
    • pp.679-691
    • /
    • 2016
  • As vehicle started to contain many different communication devices, collecting external information became possible in IoT environment. In such environment, remotely controling vehicle is possible when vehicle information is obtained by looking in to vehicle network through smart device. However, android based smart device applications are vulnerable to malicious modulation and redistribution. Modulated android application can lead to vehicle information disclosure that could bring about vehicle control accident which becomes threat to drivers. furthermore, since vehicles today does not contain security methods to protect it, they are very vulnerable to security threats which can cause serious damage to users and properties. In this paper, many different vehicle management android applications that are sold in Google Play has been analyzed. With this information, possible threats that could happen in vehicle management applications are being analysed to prove the risks. the experiment is done on actual vehicle to prove the risks. Also, access control method to protect the vehicle against malicious actions that could happen through external network in IoT environment is suggested in the paper.

AN INTEGRATED APPROACH TO RISK-BASED POST-CLOSURE SAFETY EVALUATION OF COMPLEX RADIATION EXPOSURE SITUATIONS IN RADIOACTIVE WASTE DISPOSAL

  • Seo, Eun-Jin;Jeong, Chan-Woo;Sato, Seichi
    • Journal of Radiation Protection and Research
    • /
    • v.35 no.1
    • /
    • pp.6-11
    • /
    • 2010
  • Embodying the safety of radioactive waste disposal requires the relevant safety criteria and the corresponding stylized methods to demonstrate its compliance with the criteria. This paper proposes a conceptual model of risk-based safety evaluation for integrating complex potential radiation exposure situations in radioactive waste disposal. For demonstrating compliance with a risk constraint, the approach deals with important exposure scenarios from the viewpoint of the receptor to estimate the resulting risk. For respective exposure situations, it considers the occurrence probabilities of the relevant exposure scenarios as their probability of giving rise to doses to estimate the total risk to a representative person by aggregating the respective risks. In this model, an exposure scenario is simply constructed with three components:radionuclide release, radionuclide migration and environment contamination, and interaction between the contaminated media and the receptor. A set of exposure scenarios and the representative person are established from reasonable combinations of the components, based on a balance of their occurrence probabilities and the consequences. In addition, the probability of an exposure scenario is estimated on the assumption that the initiating external factors influence release mechanisms and transport pathways, and its effect on the interaction between the environment and the receptor may be covered in terms of the representative person. This integrated approach enables a systematic risk assessment for complex exposure situations of radioactive waste disposal and facilitates the evaluation of compliance with risk constraints.

Cohort Profile: Gachon Regional Occupational Cohort Study (GROCS)

  • Lee, Wanhyung;Lee, Yongho;Lee, Junhyeong;Kim, Uijin;Han, Eunsun;Ham, Seunghon;Choi, Won-Jun;Kang, Seong-Kyu
    • Safety and Health at Work
    • /
    • v.13 no.1
    • /
    • pp.112-116
    • /
    • 2022
  • Background/Aims: The Gachon Regional Occupational Cohort Study (GROCS) is a large-scale longitudinal study of occupational safety and health data (covering Work Environment Monitoring, Workers' Health Surveillance, and Occupational Health Service) conducted by the Gachon University Gil Medical Center (GUGMC) in Incheon, Republic of Korea. We conducted GROCS to identify the health effects of workers' occupational risks, behavior, socioeconomic status, and life style. Methods: The GROCS includes data from Work Environment Monitoring, Workers' Health Surveillance, and Occupational Health Service. The baseline year for all data collection was 2018. Work Environment Monitoring was conducted in 240 companies located in Incheon. General Health Examination and Special Health Examination were performed on 32,725 and 9,504 workers, respectively. Occupational Health Services were provided to 16,883 workers in 171 companies. These data have been collected and operated at an external data management institution and were provided as a retrospective cohort after removing personal identification information. Results: In 2018, the total number of companies was 2,854, among which which 488 special Health Examination, 171 Work Environment Monitoring, and 240 Occupational Health Service. The proportion of companies undergoing Special Health Examination was 17.1%, the proportion of companies undergoing Work Environment Monitoring was 8.4%, and the proportion of Companies undergoing Occupational Health Service was 6.0%. Conclusion: GROCS expects researchers to utilize its useful and reliable resource for occupational health and surveillance with for academic or political purposes to lead to improved workers' health and working environment.