• Title/Summary/Keyword: Information Risks

Search Result 1,344, Processing Time 0.034 seconds

Risk Assessment and Decision-Making of a Listed Enterprise's L/C Settlement Based on Fuzzy Probability and Bayesian Game Theory

  • Cheng, Zhang;Huang, Nanni
    • Journal of Information Processing Systems
    • /
    • v.16 no.2
    • /
    • pp.318-328
    • /
    • 2020
  • Letter of Credit (L/C) is currently a very popular international settlement method frequently used in international trade processes amongst countries around the globe. Compared with other international settlement methods, however, L/C has some obvious shortcomings. Firstly, it is not easy to use due to the sophisticated processes its usage involves. Secondly, it is sometimes accompanied by a few risks and some uncertainty. Thus, highly efficient methods need to be used to assess and control these risks. To begin with, FAHP and KMV methods are used to resolve the problem of incomplete information associated with L/C and then, on this basis, Bayesian game theory is used in order to make more scientific and reasonable decisions with respect to international trade.

A Contingent Analyses on the Relationship Between the Characteristics of Internet Shopping Mall and User Acceptance (인터넷 쇼핑몰의 특성과 사용자 수용간의 상황적 관계분석)

  • Suh, Kun-Soo
    • Asia pacific journal of information systems
    • /
    • v.11 no.2
    • /
    • pp.23-55
    • /
    • 2001
  • It is generally agreed that realizing the full potential of the internet shopping mall(ISM) requires careful identification of customer needs and expectations. However, a quantitative framework to explain and predict users' behavior toward ISM has not been well established because the research on the user acceptance of ISM is still in its infancy. This study proposes a model which uses factor analysis to identify factors of ISM characteristics and individual characteristics affecting user acceptance of ISM. Predictive models based on the multiple regression analyses select the factors and their interactions with individual characteristics that significantly influence user acceptance. Results show that five factors including economy, convenience, credibility, reliability, information risks, and performance risks affects user acceptance. In addition, individual differences in terms of innovativeness, playfulness, and recreational shopping traits have both direct and interaction effects on user acceptance. The implication of this study is that, although user attitudes towards ISM characteristics in general are important to their acceptance behavior, the level of importance depends upon different user groups.

  • PDF

Enhance Health Risks Prediction Mechanism in the Cloud Using RT-TKRIBC Technique

  • Konduru, Venkateswara Raju;Bharamgoudra, Manjula R
    • Journal of information and communication convergence engineering
    • /
    • v.19 no.3
    • /
    • pp.166-174
    • /
    • 2021
  • A large volume of patient data is generated from various devices used in healthcare applications. With increase in the volume of data generated in the healthcare industry, more wellness monitoring is required. A cloud-enabled analysis of healthcare data that predicts patient risk factors is required. Machine learning techniques have been developed to address these medical care problems. A novel technique called the radix-trie-based Tanimoto kernel regressive infomax boost classification (RT-TKRIBC) technique is introduced to analyze the heterogeneous health data in the cloud to predict the health risks and send alerts. The infomax boost ensemble technique improves the prediction accuracy by finding the maximum mutual information, thereby minimizing the mean square error. The performance evaluation of the proposed RT-TKRIBC technique is realized through extensive simulations in the cloud environment, which provides better prediction accuracy and less prediction time than those provided by the state-of-the-art methods.

The Priority of Internal Control Factors for Information Systems based on Individual Characteristics (개인 특성에 따른 정보시스템 내부통제요소 중요도에 관한 연구)

  • 박종은;이우형;이명호
    • Korean Management Science Review
    • /
    • v.21 no.1
    • /
    • pp.57-76
    • /
    • 2004
  • The development of informational technology has lead to a sharp change in not only the existing way of operations and management, but the way of human life or thinking as well. Those shifts of the paradigm in information technology have also affected Individuals to the organizational structure. A series of unexpected problems was, however, accompanied by the advance in informational technology, which had broaden its own area of application. Those problems include the losses of property or data the malfunction of systems and their wastefulness would result in, continuous increases in computer crimes, reliability and efficiency of the functional process with the development of information systems, such as the processing problems of inaccurate data, economical issues, and subjects related to safety, as interruptions of privacy, which would result from lots of one's exposure to the drains of personal information. Accordingly, Auditors' roles of information systems, for now, is more important than anything else in that they are responsible for the objective assessment of relevance and effectiveness of internal control systems under the environment of information systems. The objective of the study is, so as to obtain safety of information systems: First, to provide data to line-design internal control systems after finding internal control factors to prevent and eliminate the risks of information systems. Second, to evaluate the priorities of internal control factors with their effective management being considered as the key to settle the problems of risks of information systems. Third, to discriminate what factors affect In evaluating the relative degrees of Importance of internal control factors.

A Comparative Study on the Application of RISP in the Context of Risk Types -Focusing on Typhoon and Hydrofluoric Acid Spill Risks (위험 유형에 따른 위험 정보 탐색과 처리 과정 연구 -불산 유출과 태풍 관련 위험 상황 비교 중심)

  • Huh, Seohyeon;Kim, Yungwook
    • Korean journal of communication and information
    • /
    • v.70
    • /
    • pp.246-276
    • /
    • 2015
  • From a historical perspective of risk communication, risks can be classified by their associated level of responsibility. In the case of technical risks such as hazardous chemical accidents, people perceive that risk-related organizations have a high level of responsibility; however, they do not in traditional risks such as natural disasters. This study aims to examine risk information seeking and processing, as seen in two types of risk, based on the Risk Information Seeking and Processing(RISP) model. For this purpose, hypotheses and a research question are developed with current domestic risk issues, and the results show significant differences in risk information seeking and processing between the two types of risk. Specifically, in the case of the chemical spill accident, negative emotion against relevant institutions makes different information seeking and processing compared to the natural disaster. The low level responsibility risk such as typhoon comparatively follows the flow of the original RISP model. However, the high level responsibility risk such as the hydrofluoric acid spill did not match with the RISP model. Based on the research results, theoretical implications were discussed.

  • PDF

A Study on IT Outsourcing Policy Based on Operational Risks of Financial Industries (금융보안 리스크 기반의 IT도급 정책 연구)

  • Choi, Chang-Lai;Yun, Jang-Ho;Lee, Kyung-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.4
    • /
    • pp.681-694
    • /
    • 2014
  • For the continuous financial incidents occurred in 2011, Korean government has announced the amendment on electronic finance supervision regulation including human resources, organization and budget. The major part of the regulation is mainly focused on human resources and budget. It states that company has to employ at least 5 percent of IT staff out of total staff, and at least 5 percent of security staff in IT staff employment number. Budget for security should be at least 7 percent of total IT budgets. This paper studies IT outsourcing policy based on operational risks of financial industries caused by amendment of regulation. This paper provides the policy decision procedure for resolving the 3rd party problems and suggests the effective operation policy to 3rd party for the program quality improvement and case studies at the IT task classification.

Consumer use of social media for food risk information: Survey findings in the United States and implications for the Korean context

  • Shim, Min Sun
    • Korean Journal of Health Education and Promotion
    • /
    • v.33 no.3
    • /
    • pp.83-93
    • /
    • 2016
  • Objectives: This study aimed (1) to share findings from the U.S. on customer use of social media for information seeking and sharing about food recall risks, and (2) to discuss the implications of the findings for the context of food safety and risk communication in Korea. Methods: A cross-sectional survey was conducted with 1,026 social media users aged 18 years or older in the U.S., recruited from the Knowledge Network's nationally representative panel. Results: About 26 percent of respondents used social media either to seek or share food recall information in the past year, with social networking sites being the most popular tool. With respect to social media use for information seeking, being married, perceived risk of getting foodborne diseases, and trust in Internet were significant, positive predictors; being Whites and trust in health professionals were negative predictors. Social media use for information sharing was positively associated with education, being married, foodborne disease history, and perceived risk of foodborne diseases; Whites, income, and trust in health professionals were negative predictors. Conclusions: The study gives theoretical, methodological, and practical implications for the context of food safety and risks in Korea.

Cookies (쿠키)

  • Yeon, Jea-Young
    • 한국IT서비스학회:학술대회논문집
    • /
    • 2008.05a
    • /
    • pp.567-571
    • /
    • 2008
  • As computer technology grows, the risk of personal information leak on the internet is also increasing. A so-called "cookie" is used as one of the ways personal information leaks. A cookie offers convenience on the internet but serves as a major reason for personal information leakage at the same time. In this paper, we discuss risks and potential managements of a cookie.

  • PDF

The Characteristics of Return Factor, Information Search and Perceived Risks by Return Experience in Internet Clothing Purchase (인터넷 쇼핑몰 소비자의 의류제품 반품 경험에 따른 반품 요인, 정보 탐색, 위험 지각 특성)

  • Ji, Hye-Kyung
    • Journal of the Korea Fashion and Costume Design Association
    • /
    • v.10 no.3
    • /
    • pp.149-161
    • /
    • 2008
  • Internet shopping provides convenience to consumers, however, in recent years the consumer's return rate and return-related disputes continue to increase. This article examines the characteristics of return behavior through return experiences of internet clothing purchases. For an empirical study, questionnaires were handed out to 317 undergraduate male and female students, in which the results had been used for data analysis. Data were analyzed through SPSS 12.0 software, descriptive statistics, factor analysis, t-test, ANDVA analysis, Duncan test, and $x^2-test$. The results are the following: The analysis of consumers' return factor for clothes in Internet shopping showed there are five factors: product and quality, delivery, impulse buying, change of mind, and service. There is a significant difference in product quality of return factors depending on the availability of the return experience. Thus, consumers with return experience showed more return tendency owing to product quality factor than consumers without return experience. The availability of consumer's return experience was significantly related to information search. Consumers with return experience showed more consistent information search than consumers without return experience. There were significant differences in perceived risks depending on the availability and degree of consumer's return experience. In other words, consumers with return experience perceived more account related risk than consumers without return experience. Moreover, the more return experience the consumer has, the more risks consumers perceived in product performance.

  • PDF

Blog-based Schedule Risk Management System (블로그 기반 공정리스크 관리시스템)

  • Jin, Soo-Myeong;Yoon, You-Sang;Jang, Myung-Hoon;Suh, Sang-Wook
    • Korean Journal of Construction Engineering and Management
    • /
    • v.10 no.5
    • /
    • pp.47-56
    • /
    • 2009
  • As contemporary society becomes information-oriented, major construction companies have recently invested in information management, but small and medium ones have not. Though the small and medium companies recognize the information management is necessary and important, they don't have an ability to possess technical expertises. The purpose of this study is to develop a Schedule Risk Control System based on blogs using IT and web technologies for construction managers in small and medium construction companies. The system makes a chance to identify risk factors and prepare for responses to settle risks happened in preconstruction phases, and enables the managers and headquarters to predict and handle schedule risks by sharing information about risks on the blogs.