• 제목/요약/키워드: Information Risks

검색결과 1,365건 처리시간 0.025초

IPO/M&A Exits by Venture Capital in India: Do Agency Risks Matter?

  • Joshi, Kshitija;Chandrashekar, Deepak
    • Asian Journal of Innovation and Policy
    • /
    • 제7권3호
    • /
    • pp.534-563
    • /
    • 2018
  • Venture Capital Firms (VCs) encounter severe information asymmetry risks at almost every stage in their investment lifecycle. This paper explores the agency risks arising from information asymmetry during the stage of exits by VCs from the funded companies in their portfolio and how that impacts the incidence of specific types of type of exits (IPOs/M&As). In this empirical study, by using the data on IPO and M&A exits from venture capital-funded companies, we show how the ability of prospective buyers to better resolve agency risks is directly correlated with the incidence of the above exit types. Using the technique of logistic regression, we demonstrate that factors such as syndication, specialization focus of the VC firm (in terms of stage and sector) and the level of its social capital (proxied by its age and experience) drive the success rate of exits. This is one of first studies in context of exits from VC funded companies in the Indian context.

Software Architecture Analysis for Risk Management

  • Kang, Byeong-Do;Lee, Roger Y.
    • 한국산업정보학회논문지
    • /
    • 제14권5호
    • /
    • pp.83-89
    • /
    • 2009
  • Management of risks is critical issue in the project management and it is important to ensure that risk management is done in a sensible way. Risk analysis is an activity geared towards risk mitigation in risk management technique. Many techniques to manage, analyze and reduce risks have been done previously but only few have addressed the design analysis to reduce risk and none have attempted to analyze architecture to manage risks. In this paper we try to find a solution through various analyzing various software architectural design concepts. We follow Pressman's method of analyzing architecture design, and then alter it to identify risks which are used in risk analysis process further in risk management process. The risks assessed are analyzed later in the risk management cycle.

온라인 채널에서의 패션 소비에 관한 구매위험의 구조적 개념 연구 (A study on the conceptual structure of purchase risks in fashion consumption through online channels)

  • 안상희
    • 복식문화연구
    • /
    • 제27권5호
    • /
    • pp.496-511
    • /
    • 2019
  • The purpose of this study was to create a theoretical structure for the concept of purchasing risks by identifying the structure of purchasing risks that lead to obstacles in the purchasing decisions of consumers in fashion consumption via online channels. This was a secondary research using books, articles, prior researches, and academic journals on the five topics of "characteristics of fashion consumption," "the concept of purchasing risks," "purchasing risks by product types," "purchasing risks by channel types," and "purchasing risks of fashion consumption on online shopping channels." According to the arguments of prior researches, the study divided the purchasing risks of fashion consumption through online shopping into four categories : (1) fundamental purchasing risks including financial risk and time loss risk pertaining to any product or channel, (2) online channel purchase risks, which include risks in payment, Information leaks, and delivery and return/exchange risk, (3) fashion product risk related to product quality or experience of other people, which includes social risks and risks associated with quality, and (4) the online channel${\times}$fashion product risks, which include the aesthetic and psychological hazards especially amplified in online channels. The four risk factors were then described with a concept map to systemize the multi-dimensional and stereoscopic psychological structure of purchasing risks. Of the four risk factors, consumers placed the most emphasis on the online channel${\times}$fashion product risks, hence, reducing this risk factor is of utmost priority for marketing of online shopping channels.

Enhancement of VECTOR Method by Adapting OCTAVE for Risk Analysis in Legacy System Migration

  • Hakemi, Aida;Jeong, Seung Ryul;Ghani, Imran;Sanaei, Mojtaba Ghanaatpisheh
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제8권6호
    • /
    • pp.2118-2138
    • /
    • 2014
  • Risks are involved in all phases of the software life cycle, and due to these risks, software can face various problems that can cause different negative outcomes and sometimes, in extreme cases, the failure of the software. Most of these risks lie in the legacy software migration process. These risks can create many problems, and in the worst case they can lead to the failure of the migration project. This paper explores different types of risk analysis methods such as CRAMM, CORAS, OCTAVE and VECTOR. After comparing these methods, the two suitable methods were chosen, namely, OCTAVE and VECTOR. Based on the use of these two methods, the project suggests an enhanced EOV method for risk analysis in the migration of legacy software.

IT 아웃소싱에 대한 전략적 인식과 위험이 아웃소싱의 정도에 미치는 영향 (The Effect of Strategic Recognition and Risks of IT Outsourcing on the Degree of Outsourcing)

  • 문용은
    • 한국경영과학회지
    • /
    • 제27권3호
    • /
    • pp.21-40
    • /
    • 2002
  • Recently, IT outsourcing has become a very important management strategy which implements information systems in organizations. This paper investigates the risks and strategic recognition as a key factors affecting on the degree of IT outsourcing. Specifically the risks of IT outsourcing and its four components-risk of control, risk of economical, risk of technical, risk of relational - are examined to be a negative effect on the degree of outsourcing. And strategic recognition about outsourcing is examined how to affect en the risks and the degree of IT outsourcing. To empirically test these relationships, data ere gathered from senior IT managers in 86 corporations. Results of this study show that the degree of outsourcing is strongly influenced by risk of control, risk of economical, risk of relational. But risk of technical does not influence on the degree of outsourcing. And strategic recognition about outsourcing is found that is negative effect on the risks of IT outsourcing and positive effect on the degree of IT outsourcing. The results provide a good framework to minimize the risks for IT outsourcing success.

안전보건 위험요인에 관한 정보 제공이 근로자의 주관적 건강상태에 미치는 영향 (The Effect of Providing Health and Safety Risk Information on the Subjective Health Status of Workers: Focusing on Workers using Protective Equipment)

  • 장원기;정혜선
    • 한국직업건강간호학회지
    • /
    • 제29권4호
    • /
    • pp.363-371
    • /
    • 2020
  • Purpose: This study aimed to evaluate the effect of information regarding health and safety risks on the subjective health status of workers using data from the Fifth Korean Working Conditions Survey. Methods: Among the survey respondents, 30,094 people classified as salaried workers, of which 8,513 (28.3%) used protective equipment. Results: Although the majority of workers using protective equipment reported being well-informed about safety and health risks, 15% of them were still insufficiently informed. Multivariate analyses have shown that the subjective health status of workers using protective equipment was significantly better if they received sufficient information. When the workers using protective equipment were classified by the kinds of hazards they were exposed to, the satisfaction of information was also significantly beneficial for the subjective health status of all groups. However, in workers who did not use protective equipment, information satisfaction did not appear to be a significant factor. Conclusion: These results suggest that when providing information on safety and health risks, it is necessary to focus on workers using protective equipment, for whom the effects of the policy are clearly expected.

스마트폰 위치기반 어플리케이션의 이용의도에 영향을 미치는 요인: 프라이버시 계산 모형의 적용 (Factors Influencing the Adoption of Location-Based Smartphone Applications: An Application of the Privacy Calculus Model)

  • 차훈상
    • Asia pacific journal of information systems
    • /
    • 제22권4호
    • /
    • pp.7-29
    • /
    • 2012
  • Smartphone and its applications (i.e. apps) are increasingly penetrating consumer markets. According to a recent report from Korea Communications Commission, nearly 50% of mobile subscribers in South Korea are smartphone users that accounts for over 25 million people. In particular, the importance of smartphone has risen as a geospatially-aware device that provides various location-based services (LBS) equipped with GPS capability. The popular LBS include map and navigation, traffic and transportation updates, shopping and coupon services, and location-sensitive social network services. Overall, the emerging location-based smartphone apps (LBA) offer significant value by providing greater connectivity, personalization, and information and entertainment in a location-specific context. Conversely, the rapid growth of LBA and their benefits have been accompanied by concerns over the collection and dissemination of individual users' personal information through ongoing tracking of their location, identity, preferences, and social behaviors. The majority of LBA users tend to agree and consent to the LBA provider's terms and privacy policy on use of location data to get the immediate services. This tendency further increases the potential risks of unprotected exposure of personal information and serious invasion and breaches of individual privacy. To address the complex issues surrounding LBA particularly from the user's behavioral perspective, this study applied the privacy calculus model (PCM) to explore the factors that influence the adoption of LBA. According to PCM, consumers are engaged in a dynamic adjustment process in which privacy risks are weighted against benefits of information disclosure. Consistent with the principal notion of PCM, we investigated how individual users make a risk-benefit assessment under which personalized service and locatability act as benefit-side factors and information privacy risks act as a risk-side factor accompanying LBA adoption. In addition, we consider the moderating role of trust on the service providers in the prohibiting effects of privacy risks on user intention to adopt LBA. Further we include perceived ease of use and usefulness as additional constructs to examine whether the technology acceptance model (TAM) can be applied in the context of LBA adoption. The research model with ten (10) hypotheses was tested using data gathered from 98 respondents through a quasi-experimental survey method. During the survey, each participant was asked to navigate the website where the experimental simulation of a LBA allows the participant to purchase time-and-location sensitive discounted tickets for nearby stores. Structural equations modeling using partial least square validated the instrument and the proposed model. The results showed that six (6) out of ten (10) hypotheses were supported. On the subject of the core PCM, H2 (locatability ${\rightarrow}$ intention to use LBA) and H3 (privacy risks ${\rightarrow}$ intention to use LBA) were supported, while H1 (personalization ${\rightarrow}$ intention to use LBA) was not supported. Further, we could not any interaction effects (personalization X privacy risks, H4 & locatability X privacy risks, H5) on the intention to use LBA. In terms of privacy risks and trust, as mentioned above we found the significant negative influence from privacy risks on intention to use (H3), but positive influence from trust, which supported H6 (trust ${\rightarrow}$ intention to use LBA). The moderating effect of trust on the negative relationship between privacy risks and intention to use LBA was tested and confirmed by supporting H7 (privacy risks X trust ${\rightarrow}$ intention to use LBA). The two hypotheses regarding to the TAM, including H8 (perceived ease of use ${\rightarrow}$ perceived usefulness) and H9 (perceived ease of use ${\rightarrow}$ intention to use LBA) were supported; however, H10 (perceived effectiveness ${\rightarrow}$ intention to use LBA) was not supported. Results of this study offer the following key findings and implications. First the application of PCM was found to be a good analysis framework in the context of LBA adoption. Many of the hypotheses in the model were confirmed and the high value of $R^2$ (i.,e., 51%) indicated a good fit of the model. In particular, locatability and privacy risks are found to be the appropriate PCM-based antecedent variables. Second, the existence of moderating effect of trust on service provider suggests that the same marginal change in the level of privacy risks may differentially influence the intention to use LBA. That is, while the privacy risks increasingly become important social issues and will negatively influence the intention to use LBA, it is critical for LBA providers to build consumer trust and confidence to successfully mitigate this negative impact. Lastly, we could not find sufficient evidence that the intention to use LBA is influenced by perceived usefulness, which has been very well supported in most previous TAM research. This may suggest that more future research should examine the validity of applying TAM and further extend or modify it in the context of LBA or other similar smartphone apps.

  • PDF

Empirical Validation of Personal Information Violation Risk for Cryptocurrency with Use Intention

  • Kim, Jeong-Wook;Choi, Chul-Yong
    • 한국컴퓨터정보학회논문지
    • /
    • 제23권9호
    • /
    • pp.141-156
    • /
    • 2018
  • The purpose of this study is how personal information violation risks affect the intention to use domestic cryptocurrency services. VAM(Value based Adoption Model) model is validated as a theoretical background, selecting perceived ease of use, perceived usefulness and perceived security as a benefit factors, and considers perceived cost, technical complexity, and risk of personal information violation risks as sacrifice factors. The method of this study used questionnaire survey to collect 150 data on user's perception on cryptocurrency services, and also performed a structural equation modeling method using by AMOS 23. The result of this paper shows that all hypotheses are accepted statistically significant except 2 hypothesis. This research is concluded that perceived value is affected on statistically positive impact on perceived ease of use, perceived usefulness and perceived security, and negative impact on risk of personal information violation risk, not statistically perceived fee and technical complexity.

Bayes estimation of entropy of exponential distribution based on multiply Type II censored competing risks data

  • Lee, Kyeongjun;Cho, Youngseuk
    • Journal of the Korean Data and Information Science Society
    • /
    • 제26권6호
    • /
    • pp.1573-1582
    • /
    • 2015
  • In lifetime data analysis, it is generally known that the lifetimes of test items may not be recorded exactly. There are also situations wherein the withdrawal of items prior to failure is prearranged in order to decrease the time or cost associated with experience. Moreover, it is generally known that more than one cause or risk factor may be present at the same time. Therefore, analysis of censored competing risks data are needed. In this article, we derive the Bayes estimators for the entropy function under the exponential distribution with an unknown scale parameter based on multiply Type II censored competing risks data. The Bayes estimators of entropy function for the exponential distribution with multiply Type II censored competing risks data under the squared error loss function (SELF), precautionary loss function (PLF) and DeGroot loss function (DLF) are provided. Lindley's approximate method is used to compute these estimators.We compare the proposed Bayes estimators in the sense of the mean squared error (MSE) for various multiply Type II censored competing risks data. Finally, a real data set has been analyzed for illustrative purposes.