• Title/Summary/Keyword: IT risk

Search Result 11,758, Processing Time 0.035 seconds

The Nature of Risk Assessment

  • The Korean Society for Preventive Medicine The Korean Society for Preventive Medicine
    • 대한예방의학회:학술대회논문집
    • /
    • 1994.02a
    • /
    • pp.23-56
    • /
    • 1994
  • Recent criticisms of the conduct and use of risk assessment by regulatory agencies have led to a wide range of proposed remedies, including changes in regulatory statutes and the development of new methods for assessing risk. The mandate to this Committee was more limited. Our objective was to examine whether alterations in institutional arrangements or procedures, particularly the organizational separation of risk assessment from regulatory decision-making and the use of uniform guidelines for inferring risk from available scientific information, can improve federal risk assessment activities. Before undertaking to determine whether organizational and procedural reforms could improve the performance and use of risk assessment in the federal government, the Committee examined the state of risk assessment and the regulatory environment in which it is performed. In this chapter, we define risk assessment and differentiate it from other elements in the regulatory process, analyze the types of judgments made in risk assessment, and examine its current government context. Because one chronic health hazard, cancer, was highlighted in the Committee's congressional mandate and has dominated public concern about public health risks in recent years, most of our report focuses on it. Furthermore, because activities in four agencies--the Environmental Protection Agency (EPA), the Food and Drug Administration (FDA), the Occupational Safety and Health Administration (OSHA), and the Consumer Product Safety Commission (CPSC)--have given rise to many of the proposals for changes in risk assessment practices, our review focuses on these four agencies. The conclusions of this report, although directed primarily at risk assessment of potential carcinogens as performed by these four agencies, may be applicable to other federal programs to reduce health risks.

  • PDF

Simulation-Based Operational Risk Assessment (시뮬레이션 기법을 이용한 운영리스크 평가)

  • Hwang, Myung-Soo;Lee, Young-Jai
    • Journal of Information Technology Services
    • /
    • v.4 no.1
    • /
    • pp.129-139
    • /
    • 2005
  • This paper proposes a framework of Operational Risk-based Business Continuity System(ORBCS), and develops protection system for operational risk through operational risk assessment and loss distribution approach based on risk management guideline announced in the basel II. In order to find out financial operational risk, business processes of domestic bank are assorted by seven event factors and eight business activities so that we can construct the system. After we find out KRI(Key Risk Indicator) index, tasks and risks, we calculated risk possibility and expected cost by analyzing quantitative data, questionnaire and qualitative approach for AHP model from the past events. Furthermore, we can assume unexpected cost loss by using loss distribution approach presented in the basel II. Each bank can also assume expected loss distributions of operational risk by seven event factors and eight business activities. In this research, we choose loss distribution approach so that we can calculate operational risk. In order to explain number of case happened, we choose poisson distribution, log-normal distribution for loss cost, and estimate model for Monte-Carlo simulation. Through this process which is measured by operational risk. of ABC bank, we find out that loss distribution approach explains closer unexpected cost directly compared than internal measurement approach, and makes less unexpected cost loss.

A Case Study on Risk Factors and Risk Management in a Large-scale Project (대규모 프로젝트의 위험요인과 위험관리에 관한 사례연구)

  • Hong, Sa-Neung
    • The Journal of Information Systems
    • /
    • v.19 no.1
    • /
    • pp.97-116
    • /
    • 2010
  • Failures of super large projects like IT Upgrade of Shinhan Financial Group can be a heavy blow not only to the company but even to the national economy. Research on the practices of risk management in those projects will provide invaluable lessons, enhancing capabilities and chances of successfully executing mission critical projects of the companies and the national economy as a whole. This paper analyzes the risk management of the Core Systems Reconstruction which was the most critical component of IT Upgrade. The analysis covers risk management plans, and identification and evolution, and control and monitoring of risk factors. This study confirms the major results of previous research on risk management in Korea. However, the analysis found as well some discrepancies of practices from the previous research results. This research also tracked the trajectories of evolution of risk factors and management. In particular, in depth analysis of control and monitoring is the first research in Korea on the "management" of risks in IT projects. The result of this research is expected to be a useful guide for theory development and practices of risk management in the future.

Influences of Consumer Perceived Risks and Valence of Word of Mouth Information on Purchase Intention in Social Commerce (소셜 커머스의 소비자 지각된 위험과 구전 방향성이 구매의도에 미치는 영향)

  • Shim, E Seok;Rhee, Hyong Jae
    • Journal of Information Technology Services
    • /
    • v.12 no.3
    • /
    • pp.73-93
    • /
    • 2013
  • This paper is a research on perceived risk of social commerce which has influence on purchase intention. This study uses a 3-dimension concept of perceived risk and then, deals with influencing a purchase intention. In addition, to search other influential variable to purchase intention, this study adds a variable with expected moderating effect. This study proposes several hypothesis and processes an experiment to test and attest these hypothesis. This study attempts to analyze the effect that perceived risk in social commerce has on purchase intention. By the results of data analysis, all dimensions of perceived risk are found to have significant negative effects on purchase intention. In addition, this study proves moderating roles of valence of WOM Information on purchase intention. Additional managerial implications are also discussed.

A Study on Cost Prediction of Highway Operating Risk through a Case Study of Power Failure (정전사고 사례분석을 통한 고속도로 운영 위험비용 산정에 대한 연구)

  • Kwon, Yong-Hoon;Kim, Kyong-Ju;Lim, Won-Seok;Park, Chan-Jin;Chae, Myung-Jin
    • Korean Journal of Construction Engineering and Management
    • /
    • v.10 no.1
    • /
    • pp.78-90
    • /
    • 2009
  • Recently, operation of highway is the complex digital Infrastructure based on complicated IT. The application of IT is increasing more and more in digital Infrastructure. Though IT is very convenient, if unpredicted operating risk of highway occurs, widespread damage can be large. When operating risk of highway occurs, road users are out of smoothly-run service because of the operating interruption. This risk causes unpredicted operating management cost and additional maintenance cost. It will excess over the planned operating cost, which may leads to users's unsafety and operator's insolvency because of income loss. Until now, related studies to find out the risk are not sufficient. The purpose of this study is to suggest risk cost items and to estimate the reasonable risk cost by using simulation method in case of occurring the huge power failure at the operating digitalized highway. This study indicates the several plans to hedge against risk cost and the management of highway project. From now on, it will be used as basic data to confirm the soundness of operating system in Digital Infrastructure.

Risk Management interaction model for Process of Information Security Governance (정보보호 거버넌스 프로세스를 위한 위험관리 상호작용 모델)

  • Song, You-Jin
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.1 no.2
    • /
    • pp.103-108
    • /
    • 2012
  • Recently, IT Governance has been applied to business management environment. In this paper, we study business model that can minimize information security risk using IT governance in cloud computing environment. Especially, we propose the interaction model that link risk management for subject of information security governance. In our model, synergy means the effective, strategic and secure business support. And interaction analysis of BMIS's 4 elements and 6 dynamic interconnections is required. Therefore we propose interaction model which can link risk management based on COSO ERM or COBIT Risk IT Framework.

Case Study of Risk Management on Communication Payload System Development (통신탑재체 개발 위험관리 Case Study)

  • Jeong, Cheol-Oh;Eun, Jong-Won
    • Journal of Aerospace System Engineering
    • /
    • v.5 no.2
    • /
    • pp.8-11
    • /
    • 2011
  • The scope of this paper is to show a risk management plan including how to perform risk assessment and to make a mitigation plan aspects of the communication payload system development. According to system engineering management guide of DoD of USA and risk management plan of satellite communication system, risk assessment and mitigation plan of communication payload system were performed. In this paper, it is indicated the process of risk management and risk assessment procedures as well as mathematical model for risk assessment of DoD guide. It is shown how risk assessment and mitigation plan have implemented in communication payload system development through case study.

Software Architecture Analysis for Risk Management

  • Kang, Byeong-Do;Lee, Roger Y.
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.14 no.5
    • /
    • pp.83-89
    • /
    • 2009
  • Management of risks is critical issue in the project management and it is important to ensure that risk management is done in a sensible way. Risk analysis is an activity geared towards risk mitigation in risk management technique. Many techniques to manage, analyze and reduce risks have been done previously but only few have addressed the design analysis to reduce risk and none have attempted to analyze architecture to manage risks. In this paper we try to find a solution through various analyzing various software architectural design concepts. We follow Pressman's method of analyzing architecture design, and then alter it to identify risks which are used in risk analysis process further in risk management process. The risks assessed are analyzed later in the risk management cycle.

A Study on the Key Performance Factors of Passenger Airbag and Injury Risk Prediction Technique Development (동승석 에어백 핵심 성능 인자 및 상해위험도 예측 기법 개발에 대한 연구)

  • Park, Dongkyou
    • Transactions of the Korean Society of Automotive Engineers
    • /
    • v.21 no.5
    • /
    • pp.130-135
    • /
    • 2013
  • Until now, passenger airbag design is based on the referred car design and many repetitive crash tests have been done to meet the crash performance. In this paper, it was suggested a new design process of passenger airbag. First, key performance factors were determined by analyzing the injury risk effectiveness of each performance factor. And it was made a relationship between injury risk and performance factor by using the response surface model. By using this one, it can be predicted the injury risk of head and neck. Predicted injury risk of optimal design was obtained through this injury risk prediction model and it was verified by FE analysis result within 18% error of head and 9% error of neck. It was shown that a target crash performance can be met by controlling the key performance factors only.

A study on the development of Enterprise Risk Management System in Airport Corporation (공항운영기업의 전사적 위험관리체계 분석 연구)

  • Seo, Byung Seok;Shin, Do Hyoung
    • Journal of the Korea Safety Management & Science
    • /
    • v.17 no.2
    • /
    • pp.1-11
    • /
    • 2015
  • Enterprise Risk Management(ERM) is aiming at the establishment of the risk management process to prevent and cope with risks in advance and is composed of Risk Identification, Risk Assessment, Risk Response and Monitoring. It is feedback through the Risk Re-identification. This study has analysed a sample of the risk management system of an airport operating corporation, for this purpose, relevant documents and examples of overseas airports have been reviewed. It has found that corporations establishing ERM have been performing identical procedures such as the process of Identification, Assessment, Effective Reporting, Communication and monitoring and so on. The A corporation has established the process for risk management and crisis management and organized for its organization and system. The risk management has the same process such as above. In this process, when the symptoms of critical crisis have been recognized, it has been transformed into crisis management system, through which, corporate-wide response has been conducted in the process of crisis status analysis, response and follow-up management. This study expects to contribute to systematic foundation for future business continuity on the basis of risks and response procedures acknowledged by this study.