• Title/Summary/Keyword: Information Risks

Search Result 1,365, Processing Time 0.027 seconds

A Study on Smart Grid and Cyber Security Strategy (지능형 전력망 도입과 사이버보안 전략)

  • Lee, Sang-Keun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.5
    • /
    • pp.95-108
    • /
    • 2011
  • Smart Grids are intelligent next generating Electric Power System (EPS) that provide environment-friendliness, high-efficiency, and high-trustworthiness by integrating information and communication technology with electric power technology. Smart grids help to supply power more efficiently and safely than past systems by bilaterally exchanging information between the user and power producer. In addition, it alleviates environmental problems by using renewable energy resources. However, smart grids have many cyber security risks because of the bilateral service, the increase of small and medium-sized energy resources, and the installation of multi-sensors or control devices. These cyber risks can cause critical problems within a national grid through even small errors. Therefore, in order to reduce these risks, it is necessary to establish a cyber security strategy and apply it from the developmental stage to the implementation stage. This thesis analyzes and recommends security strategy in order to resolve the security risks. By applying cyber security strategy to a smart grid, it will provide a stepping-stone to creating a safe and dependable smart grid.

Health Information Behavior of Indonesians During the COVID-19 Pandemic: A Sensemaking Perspective

  • Rusdan Kamil;Laksmi Laksmi
    • Journal of Information Science Theory and Practice
    • /
    • v.12 no.2
    • /
    • pp.49-63
    • /
    • 2024
  • Information behavior played a significant role in minimizing the risks of the COVID-19 pandemic. When faced with such a situation, an individual needs information for decision-making and in order to determine the best course of action relating to their health. This study aims to explore information behavior during each phase of the COVID-19 pandemic in Indonesia, which is known for its close-knit collective culture. A sensemaking approach is used, which emphasizes the process individuals go through to understand their situation and give meaning to the information they are getting from their environment. Data was collected through in-depth interviews with 10 participants to obtain a description of their information behaviors during the pandemic. Data analysis was carried out using open, axial, and selective coding. We propose a sensemaking-based information behavior strategy framework for mitigating risk and reducing ongoing health crises. Changes in information behavior strategies, including search, prevention, and restriction of information exposure, were random at the beginning of the pandemic, but became more regular in later phases. This was influenced by the "knowledge gap fulfillment" and "use of local knowledge" among the participants throughout the pandemic. In conclusion, the participants developed a sensemaking process including an understanding of the pandemic situation and the risks that they faced. They used a number of information behavior strategies to prevent transmission, and their perception of the risks changed across the course of the pandemic, up til the situation began to be considered back to normal again in Indonesia.

Differences Between Client's and Supplier's receptions of IT Outsourcing Risks (IT아웃소싱 위험에 대한 고객과 공급업체와의 인식 차이)

  • Kim, Kyung-Ihl
    • Journal of Convergence for Information Technology
    • /
    • v.8 no.5
    • /
    • pp.237-242
    • /
    • 2018
  • Researchers have suggested successful risk management as a key factor in successful IT outsourcing projects implementation. The documented investigations, however, have mainly addressed risk management only from a single perspective of either clients or IT vendors. This study explored the potential perception inconsistency regarding the risks between the client and the vendor for IT outsourcing projects by using a quasi-Delphi approach. The analysis results indicated some inconsistencies in the risks perceived by the two parties: (1) the clients regarded (a) lack of vendor commitment to the project and (b) poor vendor selection criteria and process as top critical risks but the vendors didn't; and (2) on the other hand, the vendors perceived (a) unclear requirements and (b) lack of experience and expertise with project activities as significant risks but the clients didn't. Insights into how the client and the vendor perceive risks may help both parties determine how to partner and manage project risks collaboratively to succeed in outsourcing.

The Effect of Perceived Risks on the Consumer Satisfaction in the Use of Cellular Phone (소비자 위험인지가 소비자 만족도에 미치는 영향 -이동전화 사용을 중심으로-)

  • Huh, Kyung-Ok
    • Journal of Global Scholars of Marketing Science
    • /
    • v.11
    • /
    • pp.165-182
    • /
    • 2003
  • This study aimed to investigate the extent of risks perceived by consumers in terms of health and economy while using cellular phone services. In addition, it also examined the factors influencing the level of risks and their effects on the level of satisfaction after using it. Major findings were as follows. First, the level of perceived risks were higher for married consumers. Consumers with high income felt economic risks lowly. Second, perceived economic risks influenced the level of satisfaction after using cellular phone, but not perceived health risks. Third, overall, consumers who rely on objective information source, possess high credibility on their cellular phone service companies, and own high level of knowledge how to properly use those phones, were more satisfied after using it.

  • PDF

A Study on the Causal Relationship of Perceived Risks, Service Quality and Customer Satisfaction in Ubiquitous Environment by Using Spatial Information (유비쿼터스 환경에서 공간정보 활용에 따른 고객의 지각된 위험, 서비스 품질과 고객만족의 구조적 관계 연구)

  • Kim, Yong-Beom;Chung, Nam-Ho
    • Journal of the Korea Safety Management & Science
    • /
    • v.10 no.3
    • /
    • pp.145-154
    • /
    • 2008
  • The Location Based Services (LBS) comprise spatial information and mobile technology allow users to receive various services based on Global Positioning Systems (GPS). Although, spatial information based services are very useful, it has lots of possibility to damage privacy protection. But the contents of the legislation by government have problems conflicted between protection of a person's location information and invigoration LBS. Therefore, in this study suggest a causal model to deal with user satisfaction and factors affecting spatial information based services to customer perspective. The proposed research model is tested empirically with one hundred and forty one usable questionnaires and partial least square (PLS) method. Experimental results showed that the usefulness, playfulness, and service quality play a prominent role in influencing the spatial information services satisfaction compared to other factors. But, easy of use and perceived risk are not significant.

A Study on the Causal Relationship of Perceived Risks, Service Quality and Customer Satisfaction in Ubiquitous Environment by Using Spatial Information (유비쿼터스 환경에서 공간정보 활용에 따른 고객의 지각된 위험, 서비스 품질과 고객만족의 구조적 관계 연구)

  • Chung, Nam-Ho;Kim, Yong-Bum
    • Proceedings of the Safety Management and Science Conference
    • /
    • 2007.04a
    • /
    • pp.373-385
    • /
    • 2007
  • The Location Based Services (LBS) comprise spatial information and mobile technology allow users to receive various services based on Global Positioning Systems (GPS). Although, spatial information based services are very useful, it has lots of possibility to damage privacy protection. But the contents of the legislation by government have problems conflicted between protection of a person's location information and invigoration LBS. Therefore, in this study suggest a causal model to deal with user satisfaction and factors affecting spatial information based services to customer perspective. The proposed research model is tested empirically with one hundred and forty one usable questionnaires and partial least square (PLS) method. Experimental results showed that the usefulness, playfulness, and service quality play a prominent role in influencing the spatial information services satisfaction compared to other factors. But, easy of use and perceived risk are not significant.

  • PDF

Bivariate reliability models with multiple dynamic competing risks (다중 동적 Competing Risks 모형을 갖는 이변량 신뢰성 모형에 관한 연구)

  • Kim, Juyoung;Cha, Ji Hwan
    • Journal of the Korean Data and Information Science Society
    • /
    • v.27 no.3
    • /
    • pp.711-724
    • /
    • 2016
  • Under variable complex operating environment, various factors can affect the lifetimes of systems. In this research, we study bivariate reliability models having multiple dynamic competing risks. As competing risks, in addition to the natural failure, we consider the increased stress caused by the failure of one component, external shocks, and the level of stress of the working environment at the same time. Considering two reliability models which take into account all of these competing risks, we derive bivariate life distributions. Furthermore, we compare these two models and also compare the distributions of maximum and minimum statistics in the two models.

An Empirical Study on the Determinants of Information Systems Sourcing: Focus on Korean Financial Institutions (정보시스템의 소싱 결정에 영향을 미치는 주요 요인에 대한 실증 연구 - 국내 금융기관을 중심으로 -)

  • Won, Young-Nam;Lee, Moon-Bong;Suh, Kil-Soo
    • Asia pacific journal of information systems
    • /
    • v.10 no.3
    • /
    • pp.1-16
    • /
    • 2000
  • The purpose of this research is to validate the determinants of information systems(IS) sourcing strategy focusing on Korean financial institutions. Based on the factor analyses and discriminant analyses using data from 34 major Korean financial institutions, we observed that determinants of IS souring strategy are perceived risks, strategic expectations and organizational IS maturity. If the clients have clear objectives, can control the risks from IS sourcing, and have information systems in the less-matured stage, they frequently outsource their IS. In view of the IS maturity, previous studies suggest that more-matured IS are outsourced. But the results of this study show that more-matured IS are insourced. These phenomena can be explained by classifying IS by their functions. Transaction processing systems, which are mission-critical, are generally insourced, but decision support systems, which are in their mature state, are generally outsourced.

  • PDF

Robust Bayesian inference in finite population sampling with auxiliary information under balanced loss function

  • Kim, Eunyoung;Kim, Dal Ho
    • Journal of the Korean Data and Information Science Society
    • /
    • v.25 no.3
    • /
    • pp.685-696
    • /
    • 2014
  • In this paper, we develop Bayesian inference of the finite population mean with the assumption of posterior linearity rather than normality of the superpopulation in the presence of auxiliary information under the balanced loss function. We compare the performance of the optimal Bayes estimator under the balanced loss function with ones of the classical ratio estimator and the usual Bayes estimator in terms of the posterior expected losses, risks and Bayes risks.

Mobile Devices Technologies: Risks and Security

  • Alsaqour, Raed;Alharthi, Sultan;Aldehaimi, Khalid;Abdelhaq, Maha
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.4
    • /
    • pp.249-254
    • /
    • 2021
  • Our society is depending on mobile devices that play a major role in our lives. Utilizing these devices is possible due to their speed power and efficiency in performing basic as well as sophisticated operations that can be found in traditional computers like desktop workstations. The challenge with using mobile devices is that organizations are concerned with the interference between personal and corporate use due to Bring Your Own Device (BYOD) trend. This paper highlights the importance of mobile devices in our daily tasks and the associated risks involved with using these devices. Several technologies and countermeasures are reviewed in this paper to secure the mobile devices from different attempts of attacks. It is important to mention that this paper focuses on technical measures rather than considering different aspects of security measures as recommended by the cybersecurity community.