• Title/Summary/Keyword: Information Risks

Search Result 1,344, Processing Time 0.032 seconds

An Intelligent Game Theoretic Model With Machine Learning For Online Cybersecurity Risk Management

  • Alharbi, Talal
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.6
    • /
    • pp.390-399
    • /
    • 2022
  • Cyber security and resilience are phrases that describe safeguards of ICTs (information and communication technologies) from cyber-attacks or mitigations of cyber event impacts. The sole purpose of Risk models are detections, analyses, and handling by considering all relevant perceptions of risks. The current research effort has resulted in the development of a new paradigm for safeguarding services offered online which can be utilized by both service providers and users. customers. However, rather of relying on detailed studies, this approach emphasizes task selection and execution that leads to successful risk treatment outcomes. Modelling intelligent CSGs (Cyber Security Games) using MLTs (machine learning techniques) was the focus of this research. By limiting mission risk, CSGs maximize ability of systems to operate unhindered in cyber environments. The suggested framework's main components are the Threat and Risk models. These models are tailored to meet the special characteristics of online services as well as the cyberspace environment. A risk management procedure is included in the framework. Risk scores are computed by combining probabilities of successful attacks with findings of impact models that predict cyber catastrophe consequences. To assess successful attacks, models emulating defense against threats can be used in topologies. CSGs consider widespread interconnectivity of cyber systems which forces defending all multi-step attack paths. In contrast, attackers just need one of the paths to succeed. CSGs are game-theoretic methods for identifying defense measures and reducing risks for systems and probe for maximum cyber risks using game formulations (MiniMax). To detect the impacts, the attacker player creates an attack tree for each state of the game using a modified Extreme Gradient Boosting Decision Tree (that sees numerous compromises ahead). Based on the findings, the proposed model has a high level of security for the web sources used in the experiment.

Empirical Analysis on the Disparity between Willingness to Pay and Willingness to Accept for Drinking Water Risks : Using Experimental Market Method (비시장재에 대한 WTP와 WTA 격차에 대한 실증분석 : 실험시장접근법을 이용한 음용수 건강위험을 사례로)

  • Eom, Young Sook
    • Environmental and Resource Economics Review
    • /
    • v.17 no.3
    • /
    • pp.135-166
    • /
    • 2008
  • This paper reports the empirical results of comparing the willingness to pay(WTP) for health risk reductions and the willingness to accept(WTA) for risk increases using experimental market methods in the first time in Korea. Health risks were defined as probabilities of premature death from exposure to one of As, Pb, and THM in tap water. A total of six experimental markets with 15 participants in each experiments were held using 20 repetitive Vickrey second-price sealed-bid auctions. To compare the effects of market experiences, trading a marketed good, candy bar, was introduced before the trading the non-marketed good, drinking water risks. Moreover, an objective risk information was provided after the first 10 trials to incorporate learning processes. Regardless of marketed or non-marketed goods, the mean of WTA exceeded the mean of WTP at the first auction trial. As experimental trials proceeded, the disparity between WTA and WTP for marketed goods disappeared. However results for non-marketed goods were rather mixed to the extent that WTA for health risks from As (relatively high risk leves) were significantly larger than WTP, while there were no significant difference between WTA and WTP for health risks fro Pb and THM (relatively low risk levels). On the other hand, participants seemed to respond in a 'rational' manner to the objective risk information provided, with positive learning effects of market-like experience(especially in the WTA experiments).

  • PDF

Personal Information Overload and User Resistance in the Big Data Age (빅데이터 시대의 개인정보 과잉이 사용자 저항에 미치는 영향)

  • Lee, Hwansoo;Lim, Dongwon;Zo, Hangjung
    • Journal of Intelligence and Information Systems
    • /
    • v.19 no.1
    • /
    • pp.125-139
    • /
    • 2013
  • Big data refers to the data that cannot be processes with conventional contemporary data technologies. As smart devices and social network services produces vast amount of data, big data attracts much attention from researchers. There are strong demands form governments and industries for bib data as it can create new values by drawing business insights from data. Since various new technologies to process big data introduced, academic communities also show much interest to the big data domain. A notable advance related to the big data technology has been in various fields. Big data technology makes it possible to access, collect, and save individual's personal data. These technologies enable the analysis of huge amounts of data with lower cost and less time, which is impossible to achieve with traditional methods. It even detects personal information that people do not want to open. Therefore, people using information technology such as the Internet or online services have some level of privacy concerns, and such feelings can hinder continued use of information systems. For example, SNS offers various benefits, but users are sometimes highly exposed to privacy intrusions because they write too much personal information on it. Even though users post their personal information on the Internet by themselves, the data sometimes is not under control of the users. Once the private data is posed on the Internet, it can be transferred to anywhere by a few clicks, and can be abused to create fake identity. In this way, privacy intrusion happens. This study aims to investigate how perceived personal information overload in SNS affects user's risk perception and information privacy concerns. Also, it examines the relationship between the concerns and user resistance behavior. A survey approach and structural equation modeling method are employed for data collection and analysis. This study contributes meaningful insights for academic researchers and policy makers who are planning to develop guidelines for privacy protection. The study shows that information overload on the social network services can bring the significant increase of users' perceived level of privacy risks. In turn, the perceived privacy risks leads to the increased level of privacy concerns. IF privacy concerns increase, it can affect users to from a negative or resistant attitude toward system use. The resistance attitude may lead users to discontinue the use of social network services. Furthermore, information overload is mediated by perceived risks to affect privacy concerns rather than has direct influence on perceived risk. It implies that resistance to the system use can be diminished by reducing perceived risks of users. Given that users' resistant behavior become salient when they have high privacy concerns, the measures to alleviate users' privacy concerns should be conceived. This study makes academic contribution of integrating traditional information overload theory and user resistance theory to investigate perceived privacy concerns in current IS contexts. There is little big data research which examined the technology with empirical and behavioral approach, as the research topic has just emerged. It also makes practical contributions. Information overload connects to the increased level of perceived privacy risks, and discontinued use of the information system. To keep users from departing the system, organizations should develop a system in which private data is controlled and managed with ease. This study suggests that actions to lower the level of perceived risks and privacy concerns should be taken for information systems continuance.

Importance of Convenience and Consumer Rights to Information in Internet of Things Shopping: Amazon Dash Button Case Study (사물인터넷 쇼핑의 편리성과 소비자 알 권리 중요도: 아마존 대시 버튼 사례 연구)

  • Lee, Minsun;Lee, Hyun-Hwa
    • Journal of Fashion Business
    • /
    • v.24 no.4
    • /
    • pp.85-98
    • /
    • 2020
  • The Internet of Things (IoT) shopping environment can provide benefits and risks to consumers, including shopping convenience and invasion of consumer rights, respectively. We experimentally tested whether exposure to information regarding the benefits and risks of IoT shopping would elicit changes to consumer perceptions of the importance of shopping convenience and rights to information, as well as shopping intention among young online shopping consumers. The participants (N=218) were randomly assigned into one of two experimental conditions. The control group was exposed to a news article and a video emphasizing the shopping convenience of the Amazon Dash Button service, while the experimental group was exposed to the same news article and video provided to the control group, along with a news article about the judgment of the Munich court that the Dash Button violates German consumer law. We found an interaction effect of experimental condition and time on changes to the perceived importance of shopping convenience and shopping intention. The changes to the perceived relative importance of shopping convenience to consumer rights to information from pre- to post-manipulation differed significantly between the two experimental groups. The results of this study emphasize the importance of providing information on both the benefits and risks of IoT shopping. This was the first experimental study to examine the possibility of the invasion of consumer rights to information in the IoT shopping environment. This study urges researchers, marketers, and policy makers to focus more on consumer rights to information in the newly coming IoT shopping environment.

Issues and Tasks of Personal Information Protection Liability Insurance (개인정보 손해배상책임 보장제도의 쟁점과 과제)

  • Lee, Suyeon;Kwon, Hun-Yeong
    • Journal of Information Technology Services
    • /
    • v.19 no.1
    • /
    • pp.37-53
    • /
    • 2020
  • Today, our society is exposed to cyber threats, such as the leakage of personal information, as various systems are connected and operated organically with the development of information and communication technology. With the impact of these cyber risks, we are experiencing damage from the virtual world to the physical world. As the number of cases of damage caused by cyber attacks has continued to rise, social voices have risen that the government needs to manage cyber risks. Thus, information and telecommunication service providers are now mandatory to have insurance against personal information protection due to amendment of "the Act on Promotion of Information and Communication Network Utilization and Information Protection". However, the insurance management system has not been properly prepared, with information and communication service providers selecting the service operators based on sales volume rather than selecting them based on the type and amount of personal information they store and manage. In order for the personal information protection liability insurance system to be used more effectively in line with the legislative purpose, effective countermeasures such as cooperation with the government and related organizations and provision of benefits for insured companies should be prepared. Thus, the author of this study discuss the current status of personal information protection liability insurance system and the issues raised in the operation of the system. Based on the results of this analysis, the authors propsoe tasks and plans to establish an effective personal information protection liability insurance system.

The Application Method of System Safety Analysis Technique (시스템 안전 분석기법 활용방안에 대한 연구)

  • 김병석;임재동
    • Journal of the Korea Safety Management & Science
    • /
    • v.2 no.3
    • /
    • pp.1-11
    • /
    • 2000
  • Avoiding the industrial accidents is one of the goals in manufacturing industries from the top manager to the foremen. Therefore all the companies try to prevent occupational accidents using system safety programs in order to increase the productivity. Korean industries have been tended to depend upon historical information to control risks. The other hand, foreign industries have identified risk factors using system safety techniques to predict future risks. This study presents the method to apply the foreign industries risk control technique to the Korean industries.

  • PDF

An Empirical Study on the Factors Influencing Perceived Risks and Intention to Use Online Bookstores (인터넷 서점에서 소비자의 지각된 위험 및 이용의도에 영향을 미치는 요인에 관한 실증 연구)

  • Yang, Sung-Byung
    • Journal of Information Technology Services
    • /
    • v.12 no.4
    • /
    • pp.267-287
    • /
    • 2013
  • As the online bookstore market has been saturated and the level of competition has become more intense, maintaining competitive advantage by mitigating consumers' perceived risks can be considered as one of good alternative strategies a company should use. Although studies that identify the types of consumers' perceived risks in the context of online bookstores as well as validate the relationships between perceived risk and its antecedent/consequent factors in an integrated manner are strongly required, there has been less attention paid to these matters. Therefore, based on previous literature, we identify five types of perceived risks (financial, performance, online payment, delivery, and seller's response risk) and validate the impacts of online bookstore specific characteristics and user specific characteristics on perceived risk. In addition, we also verify causal relationship between perceived risk and intention to use online bookstores. The results of PLS test using 108 samples collected from undergraduate and graduate students confirm that perceived risk has a negative impact on intention to use and four antecedents (reputation, service quality, self-efficacy, and user experience) are significantly related to perceived risk.

The Effect of Benefits and Online Shopping Risks on Channel Selection for Luxury Fashion Items (패션 명품의 추구혜택과 온라인 구매위험지각에 따른 쇼핑채널 선택)

  • Park, Hye-Sun;Kim, Hyun-Sook
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.35 no.1
    • /
    • pp.13-25
    • /
    • 2011
  • This study investigates the factors influencing consumer's channel selection for luxury fashion items, specifically the effect of (i) perceived luxury benefits, (ii) perceived online shopping risks, (iii) demographics, and (iv) purchasing behavior. A survey questionnaire was developed and implemented to measure the perceived luxury benefits, perceived online shopping risks, purchasing behaviors, and consumer demographics. A total of 396 responses were analyzed by one-way ANOVA, cross-tab, and multinomial logit analysis with SPSS18.0. The results are as follows. First, those who shop in offline shopping channels tend to be heavy buyers that look for product quality and conspicuousness. They perceive low risks from online shopping and purchase few bag items offline. Second, those who shop online tend to be men and perceive the high benefits of economic value. Third, those who shop in multi channels tend to be men, search for information via the Internet, and purchase few accessory items. Implications for multichannel strategies are suggested.

Data Analytics for Social Risk Forecasting and Assessment of New Technology (데이터 분석 기반 미래 신기술의 사회적 위험 예측과 위험성 평가)

  • Suh, Yongyoon
    • Journal of the Korean Society of Safety
    • /
    • v.32 no.3
    • /
    • pp.83-89
    • /
    • 2017
  • A new technology has provided the nation, industry, society, and people with innovative and useful functions. National economy and society has been improved through this technology innovation. Despite the benefit of technology innovation, however, since technology society was sufficiently mature, the unintended side effect and negative impact of new technology on society and human beings has been highlighted. Thus, it is important to investigate a risk of new technology for the future society. Recently, the risks of the new technology are being suggested through a large amount of social data such as news articles and report contents. These data can be used as effective sources for quantitatively and systematically forecasting social risks of new technology. In this respect, this paper aims to propose a data-driven process for forecasting and assessing social risks of future new technology using the text mining, 4M(Man, Machine, Media, and Management) framework, and analytic hierarchy process (AHP). First, social risk factors are forecasted based on social risk keywords extracted by the text mining of documents containing social risk information of new technology. Second, the social risk keywords are classified into the 4M causes to identify the degree of risk causes. Finally, the AHP is applied to assess impact of social risk factors and 4M causes based on social risk keywords. The proposed approach is helpful for technology engineers, safety managers, and policy makers to consider social risks of new technology and their impact.