• Title/Summary/Keyword: Information Risks

Search Result 1,344, Processing Time 0.028 seconds

The Classification of the Perceived Risks Involved in E-Commerce and the Developments of Their Measures (전자상거래에서의 지각된 위험의 분류 및 측정도구 개발에 관한 연구)

  • Kang Young-Shin;Lee Choon-Yeul;Jeong Seung-Ryul
    • The Journal of Information Systems
    • /
    • v.15 no.1
    • /
    • pp.215-238
    • /
    • 2006
  • The purpose of this study is to develop the measures of the perceived risks involved in e-commerce. To do this, we first review the literature and examine the sub-constructs of the perceived risks. The risks classified are economic risk, product performance risk, social risk, technology/time loss risk, and privacy risk. Based on these findings, we identify the appropriate items for assessing these various risks. Then, we evaluate, basically using a structural equation model, the important several attributes of the measurs such as various validities and reliability. This study finally provides the rigorously tested measuring instruments of the construct of the perceived risks.

  • PDF

Analysis of Potential Risks for Garbage Collection and Wear Leveling Interference in FTL-based NAND Flash Memory

  • Kim, Sungho;Kwak, Jong Wook
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.3
    • /
    • pp.1-9
    • /
    • 2019
  • This paper presents three potential risks in an environment that simultaneously performs the garbage collection and wear leveling in NAND flash memory. These risks may not only disturb the lifespan improvement of NAND flash memory, but also impose an additional overhead of page migrations. In this paper, we analyze the interference of garbage collection and wear leveling and we also provide two theoretical considerations for lifespan prolongation of NAND flash memory. To prove two solutions of three risks, we construct a simulation, based on DiskSim 4.0 and confirm realistic impacts of three risks in NAND flash memory. In experimental results, we found negative impacts of three risks and confirmed the necessity for a coordinator module between garbage collection and wear leveling for reducing the overhead and prolonging the lifespan of NAND flash memory.

Vulnerability and Information Security Investment Under Interdependent Risks: A Theoretical Approach

  • Shim, Woo-Hyun
    • Asia pacific journal of information systems
    • /
    • v.21 no.4
    • /
    • pp.27-43
    • /
    • 2011
  • This article explores economic models that show the optimal level of information security investment in the presence of interdependent security risks, Using particular functional forms, the analysis shows that the relationship between the levels of security vulnerability and the levels of optimal security investments is affected by externalities caused by agents' correlated security risks. This article further illustrates that, compared to security investments in the situation of independent security risks, in order to maximize the expected benefits from security investments, an agent should invest a larger fraction of the expected loss from a security breach in the case of negative externalities, while an agent should spend a smaller fraction of the expected loss in the case of negative externalities.

A Case Study of Business Process Centered Risk Analysis for Information Technology Security (업무 프로세스 중심의 정보기술 보안 위험분석 적용 사례-클라이언트/서버 시스템 중심으로)

  • Ahn, Choon-Soo;Cho, Sung-Ku
    • IE interfaces
    • /
    • v.16 no.4
    • /
    • pp.421-431
    • /
    • 2003
  • Due to the increasing complexity of the information systems environment, modern information systems are facing more difficult and various security risks than ever, there by calling for a higher level of security safeguard. In this paper, an information technology security risk management model, which modified by adopting the concept of business processes, is applied to client/server distributed systems. The results demonstrate a high level of risk-detecting performance of the model, by detecting various kinds of security risks. In addition, a practical and efficient security control safeguard to cope with the identified security risks are suggested. Namely, using the proposed model, the risks on the assets in both of the I/O stage(on client side) and the request/processing stage(on server side), which can cause serious problems on business processes, are identified and the levels of the risks are analyzed. The analysis results show that maintenance of management and access control to application systems are critical in the I/O stage, while managerial security activities including training are critical in the request/processing stage.

Benefits and perceived risks of influencing the consumer's willingness to use customization service for rash guard design (래시가드 디자인 커스터마이징 서비스 이용에 영향을 미치는 소비자의 추구혜택과 지각된 위험)

  • Lee, Jung-Woo;Jang, Seyoon
    • The Research Journal of the Costume Culture
    • /
    • v.26 no.4
    • /
    • pp.598-612
    • /
    • 2018
  • This research aims to shed a light on the benefits and perceived risks to the willingness to use perceived by consumers, centering on design-customizing service catering to individuals' tastes and needs, and to study their impacts on the use of a design-customizing service. The validation of how benefits and perceived risks affect the intention to use showed that only aesthetic and self-expressive benefits had significant impacts on the willingness to use. However, only time/economic loss and self-design risks had negative impacts on the willingness to use a service. By gender, there was no difference in benefits and perceived risks to willingness to use for the benefit factors, whereas in terms of perceived risks to willingness to use factors. By age, there were also differences in the effects of benefits and perceived risks to purchase on the willingness to use a rash guard customizing service. There were variations in the perceived risks to the willingness to use and benefits depending on age. In particular, it was found that there were no perceived risks to the willingness to use for the age group of 10s. As design-customizing services based on individual tastes have drawn more attention recently, this research on the benefits and perceived risks to purchasing a rash guard design customizing service, as well as their effects on service use (particularly backed up by comparative analysis by gender and age), is expected to provide insights into design-customizing service strategy development.

A Study on the coverage of e-commerce insurance (전자상거래 보험의 담보범위에 관한 고찰)

  • Shin, Gun-Hoon
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.27
    • /
    • pp.129-161
    • /
    • 2005
  • Todays, computers in business world are potent facilitators that most companies could not without them, while they are only tools. They offer extremely efficient means of communication, particularly when connected to Internet. What I stress in this article is the risks accompanied by e-commerce rather than the advantages of Internet or e-commerce. The management of e-commerce companies, therefore, should keep in mind that the benefit of e-commerce through the Internet are accompanied by enhanced and new risks, cyber risks or e-commerce risks. For example, companies are exposed to computer system breakdown and business interruption risks owing to traditional and physical risks such as theft and fire etc, computer programming errors and defect softwares and outsider's attack such as hacking and virus. E-commerce companies are also exposed to tort liabilities owing to defamation, the infringement of intellectual property such as copyright, trademark and patent right, negligent misrepresent and breach of confidential information or privacy infringement. In this article, I would like to suggest e-commerce insurance or cyber liability insurance as a means of risk management rather than some technical devices, because there is not technically perfect defence against cyber risks. But e-commerce insurance has some gaps between risks confronted by companies and coverage needed by them, because it is at most 6 or 7 years since it has been introduced to market. Nevertheless, in my opinion, e-commerce insurance has offered the most perfect defence against cyber risks to e-commerce companies up to now.

  • PDF

A Study on the Determinants of Purchase Intention in Mobile Commerce: Focused on the Mediating Role of Perceived Rrisks and Perceived Benefits (지각된 위험과 지각된 혜택이 모바일 상거래 이용의도에 미치는 영향에 관한 연구)

  • Lee, Thae-Min;Lee, Eun-Young
    • Asia pacific journal of information systems
    • /
    • v.15 no.2
    • /
    • pp.1-21
    • /
    • 2005
  • This study is an empirical study about the effects of perceived risks and perceived benefits on purchase intention in mobile commerce. Perceived risks and perceived benefits are proposed as mediators that make a significant impact on purchase intention in mobile commerce. Also, this study compared the direct effect of perceived risks, perceived benefits and consumer subjective knowledge to purchase intention. As antecedents of perceived risks and perceived benefits, subjective knowledge, mobile Internet familiarity, credibility for the purchase and provided information level are proposed and verified. Results from this study are as follows: First, the effect of perceived risks to purchase intention is not significant whereas that of perceived benefits is significant. Second, this study revealed that mobile Internet familiarity, credibility for the purchase and information level are significantly related to mobile purchase intention through perceived benefit. Third, subjective knowledge makes a significant impact on purchase intention directly not mediated by perceived risk or perceived benefit. Based on these results, managerial implications for mobile commerce vitalization and marketing strategy are discussed. Finally, limitation for this research and further research issues are suggested.

The Mitigation Model Development for Minimizing IT Operational Risks (IT운영리스크 최소화를 위한 피해저감모델 구현에 관한 연구)

  • Lee, Young-Jai;Hwang, Myung-Soo
    • Journal of Information Technology Applications and Management
    • /
    • v.14 no.3
    • /
    • pp.95-113
    • /
    • 2007
  • To minimize IT operational risks and the opportunity cost for lost business hours. it is necessary to have preparedness in advance and mitigation activities for minimization of a loss due to the business discontinuity. There are few cases that banks have a policy on systematic management, system recovery and protection activities against system failure. and most developers and system administrators response based on their experience and the instinct. This article focuses on the mitigation model development for minimizing the incidents of disk unit in IT operational risks. The model will be represented by a network model which is composed of the three items as following: (1) the risk factors(causes, attributes and indicators) of IT operational risk. (2) a periodic time interval through an analysis of historical data. (3) an index or an operational regulations related to the examination of causes of an operational risk. This article will be helpful when enterprise needs to hierarchically analyze risk factors from various fields of IT(information security, information telecommunication, web application servers and so on) and develop a mitigation model. and it will also contribute to the reduction of operational risks on information systems.

  • PDF

The Study of Factors Related to Internet Auctions Participation (인터넷 경매참여 관련변인에 관한 연구)

  • Lee, Eun-Hee;Nam, Su-Jung
    • Journal of Families and Better Life
    • /
    • v.25 no.2 s.86
    • /
    • pp.123-135
    • /
    • 2007
  • This study investigated the influence of values associated with internet auctions and risks associated with participating in internet auctions. The results of this study were as follows: First, the values associated with internet auctions consisted of hedonic value, information value, and practical value. Among these values, hedonic value was the highest, and information value was the lowest. Second, He risks consisted of functional risk, privacy risk, socio-psychological risk, md financial risk. Among these risks, functional risk was the highest, and socio-psychological risk was the lowest. Results of regression analysis using demographic elements to inspect risk factors revealed sex, age, and income were statistically significant finally, with respect to demographic characteristics and influences of the aforementioned values and risks, the factors influencing participation in internet auctions were sex, age, hedonic value, functional risk and financial risk.

An Empirical Study on Export Risks Identification of Exporting Firms of Digital Goods (디지털재화수출기업의 수출위험인식에 관한 실증연구)

  • Kang, Hyun-Jae;Bae, Jung-Han
    • International Commerce and Information Review
    • /
    • v.9 no.3
    • /
    • pp.107-129
    • /
    • 2007
  • In 1990s, both development of internet and digital economy would make new products such as digital goods. Recently, digital goods composed of softwares, digital contents, and digital services have grown up rapidly in the world market. Characteristics of goods and transaction forms in the international trade of digital goods is different from those of traditional goods. Thus, this difference would appear a new risk that did not exist in the international trade of traditional goods. Identification and confirmation about unique export risks of digital goods would be necessary to the increase of export of digital goods needs; however, in spite of the importance, very few studies have been based on the export risks of digital goods particularly in research on the relationships between export risk management and export performance. This study classifies the types of export risks based on the previous studies, and examines the relationship between both management and identification of export risks.

  • PDF