• Title/Summary/Keyword: Risk Information

Search Result 6,152, Processing Time 0.025 seconds

Information Risk and Cost of Equity: The Role of Stock Price Crash Risk

  • SALEEM, Sana;USMAN, Muhammad
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.8 no.1
    • /
    • pp.623-635
    • /
    • 2021
  • The purpose of this research is to examine the impact of information risk on the Cost of Equity (COE) and whether the risk of a stock price crash mediates the relation between information risk and COE. To test the dynamic nature of the proposed model, the two-step system GMM dynamic panel estimators are applied to all the non-financial firms listed on the Pakistan Stock Exchange (PSX) from 2007- 2018. The results of this study show that all three types of information risk, as well as the risk of the share price crash, increases the COE. The crash risk strengthens the impact of information risk on the COE. Moreover, these three information risks are correlated with each other and an increase in information quality reduces the effect of asymmetric information and improves the investor interpreting ability, while an increase in private information decreases the transparency. The finding is crucial for asset pricing, portfolio management, and information disclosure. This study contributes to the literature by providing novel findings on the impact of three different types of information risk, i.e. private information, quality of information, and transparency of information on the COE as well as whether crash risk mediates the relationship.

A Practical Security Risk Analysis Process and Tool for Information System

  • Chung, Yoon-Jung;Kim, In-Jung;Lee, Do-Hoon
    • Journal of Information Processing Systems
    • /
    • v.2 no.2
    • /
    • pp.95-100
    • /
    • 2006
  • While conventional business administration-based information technology management methods are applied to the risk analysis of information systems, no security risk analysis techniques have been used in relation to information protection. In particular, given the rapid diffusion of information systems and the demand for information protection, it is vital to develop security risk analysis techniques. Therefore, this paper will suggest an ideal risk analysis process for information systems. To prove the usefulness of this security risk analysis process, this paper will show the results of managed, physical and technical security risk analysis that are derived from investigating and analyzing the conventional information protection items of an information system.

The Relationships among Gender, Information Seeking Style and High Risk Behavior in Korean Adults (개인의 성별, 정보추구성향 및 불건강 행위 간 관계 연구)

  • Lee, Dong Suk
    • Korean Journal of Adult Nursing
    • /
    • v.19 no.2
    • /
    • pp.217-224
    • /
    • 2007
  • Purpose: The aim of this study was to investigate the relationships among gender, information-seeking styles, and high risk behavior in Korean adults. Methods: A survey utilizing a structured questionnaire was used to examine the relationships of the study variables. Eight hundred fifty six adults were recruited and this group consisted of 403 females and 453 males. Information seeking style and high risk behavior were measured by Miller Behavioral Style Scale revised by Zurren and Wolfs, and High Risk Behaviors checklist developed by Lee, respectively. Results: Differences between gender were significant in information-seeking styles and high risk behavior. Monitoring and blunting scores were both higher in female than male, and high risk behavior was higher in males than females. The blunting style was positively related to high-risk behavior and the monitoring style was negatively related to high risk behavior. Conclusion: To intervene with high risk behavior effectively, individual differences such as gender and information seeking style should be considered. In addition, the research about well-designed health information support is needed in the future.

  • PDF

A Research on Information Security Risk-based Antecedents Influencing Electronic Commerce User's Trust (전자상거래 사용자의 신뢰에 영향을 미치는 정보보안위험 기반의 선행요인 연구)

  • Kim, Jong-Ki;Lee, Dong-Ho
    • Asia pacific journal of information systems
    • /
    • v.15 no.2
    • /
    • pp.65-96
    • /
    • 2005
  • It is generally believed that, compared to traditional commerce, Electronic Commerce(EC) is more difficult to gain and sustain customers. One of the major reasons that customers do not use EC is lack of trust. Previous researches on the EC user's trust suggested that risk is an antecedent of trust and the concept of trust is highly related to risk. This study proposed a combined model in which includes the factors based on generic information security risk analysis methodology and trust factors in EC. The objectives of this study are follows; first, investigating the relationship between trust and risk that are antecedent factors of purchase intention, and second, examining the validity of information security risk analysis approach in EC environment. Based on the survey results of 143 MBA students statistical analysis showed that factors like threats and controls were significantly related to risk, but assets did not have statistically significant relationship with risk. Controls and knowledge of EC had meaningful effect on user's trust. This study found that risk analysis methodology which is generally used at organizational level is practically useful at user level on EC environment. In conclusion, the results of this study would be applied to generic situation of information security for analyzing and managing the risk. Besides, this study emphasized that EC vendors need to pay more attention to the information security risk to gain customer's trust.

Leveraged BMIS Model for Cloud Risk Control

  • Song, YouJin;Pang, Yasheng
    • Journal of Information Processing Systems
    • /
    • v.10 no.2
    • /
    • pp.240-255
    • /
    • 2014
  • Cloud computing has increasingly been drawing attention these days. Each big company in IT hurries to get a chunk of meat that promises to be a whopping market in the future. At the same time, information is always associated with security and risk problems. Nowadays, the handling of these risks is no longer just a technology problem, with a good deal of literature focusing on risk or security management and framework in the information system. In this paper, we find the specific business meaning of the BMIS model and try to apply and leverage this model to cloud risk. Through a previous study, we select and determine the causal risk factors in cloud service, which are also known as CSFs (Critical Success Factors) in information management. Subsequently, we distribute all selected CSFs into the BMIS model by mapping with ten principles in cloud risk. Finally, by using the leverage points, we try to leverage the model factors and aim to make a resource-optimized, dynamic, general risk control business model for cloud service providers.

Psychological Impact of Health Risk Appraisal of Korean Women at Different Levels of Breast Cancer Risk: Neglected Aspect of the Web-based Cancer Risk Assessment Tool

  • Kye, Su-Yeon;Park, Kee-Ho;Park, Hyeong-Geun;Kim, Myung-Hyun
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.13 no.2
    • /
    • pp.437-441
    • /
    • 2012
  • Objective: Health risk appraisal is often utilized to modify individual's health behavior, especially concerning disease prevention, and web-based health risk appraisal services are being provided to the general public in Korea. However, little is known about the psychological effect of the health risk appraisal even though poorly communicated information by the web-based service may result in unintended adverse health outcomes. This study was conducted to explore the psychological effect of health risk appraisal using epidemiological risk factor profile. Methods: We conducted a randomized trial comparing risk factor list type health risk appraisal and risk score type health risk appraisal. We studied 60 women aged 30 years and older who had no cancer. Anxiety level was assessed using the Spielberger State-Trait Anxiety Inventory YZ. Results: The results of multivariate analysis showed that risk status was the independent predictors of increase of state anxiety after health risk appraisal intervention when age, education, health risk appraisal type, numeracy, state anxiety, trait anxiety, and health risk appraisal type by risk status interaction was adjusted. Women who had higher risk status had an odd of having increased anxiety that was about 5 times greater than women who had lower risk status. Conclusions: Our findings indicate that communicating the risk status by individual health risk appraisal service can induce psychological sequelae, especially in women having higher risk status. Hospitals, institutes, or medical schools that are operating or planning to operate the online health risk appraisal service should take side effects such as psychological sequelae into consideration.

A Study on the Effect of Risk Communication on Consumers' Psychological Response and Attitude in the Foodservice Industry (외식산업의 위험 커뮤니케이션이 소비자의 심리적 반응과 태도에 미치는 영향)

  • Song, Kyong-Suk
    • Culinary science and hospitality research
    • /
    • v.15 no.3
    • /
    • pp.324-343
    • /
    • 2009
  • The purpose of this study is to identify the effect of the risk communication of the food service industry on consumers' psychological response and attitude. The result is as follows. First, as for the relation between risk communication and information reliance, when the recognition of risk communication stability gets higher, information reliance rose; when the recognition of risk gets higher, information reliance rose with higher recognition of morality. Second, as for the relation between risk communication and risk recognition, when the recognition of risk communication stability gets higher, risk recognition rose; when the recognition of risk gets higher, risk recognition rose with higher recognition of environment and the information reliance rose with higher recognition of morality. Third, as for the relation between the information reliance of risk communication and risk recognition, when the information reliance of risk communication gets higher, risk recognition rose.

  • PDF

The comparison of provision of risk information between employees with labour union and non labour union (노동조합 유무에 따른 위험정보 제공수준 차이 분석)

  • Cho, Hm Hak;Rhee, Kyung Yong;Kim, Young Sun
    • Journal of the Korea Safety Management & Science
    • /
    • v.16 no.4
    • /
    • pp.257-262
    • /
    • 2014
  • Risk information may be one of the most important factor for worker's safe behavior because that safe behavior can be oriented by attitude based on risk information. Traditionally KAP(knowledge, attitude and practice) model was useful frame for the change of human behavior. Knowledge is formed by information through experience and education. Worker's health may be prevented by his or her own active safe behavior based on risk information. This paper is to investigate the effect of labor union on the provirion of risk information by labor union. Data for analysis is the third Korean Working Conditions Survey done by Occupational Safety and Health Research Institute in 2011. The sample size is 50,032 economic active person surveyed by household interview survey with structure questionnaire by trained interviewer. The difference of risk information provision among employees was tested by mean difference test. The level of risk information of employees of companies with labor union is higher than that with non labour union. This paper has some implication for the promotion of safe behavior of employees through risk information provision mediated by labor union. Some limitation of this study may be considered because of using the cross sectional survey data.

Risk Analysis for Protecting Personal Information in IoT Environments (사물인터넷(IoT) 환경에서의 개인정보 위험 분석 프레임워크)

  • Lee, Ae Ri;Kim, Beomsoo;Jang, Jaeyoung
    • Journal of Information Technology Services
    • /
    • v.15 no.4
    • /
    • pp.41-62
    • /
    • 2016
  • In Internet of Things (IoT) era, more diverse types of information are collected and the environment of information usage, distribution, and processing is changing. Recently, there have been a growing number of cases involving breach and infringement of personal information in IoT services, for examples, including data breach incidents of Web cam service or drone and hacking cases of smart connected car or individual monitoring service. With the evolution of IoT, concerns on personal information protection has become a crucial issue and thus the risk analysis and management method of personal information should be systematically prepared. This study shows risk factors in IoT regarding possible breach of personal information and infringement of privacy. We propose "a risk analysis framework of protecting personal information in IoT environments" consisting of asset (personal information-type and sensitivity) subject to risk, threats of infringement (device, network, and server points), and social impact caused from the privacy incident. To verify this proposed framework, we conducted risk analysis of IoT services (smart communication device, connected car, smart healthcare, smart home, and smart infra) using this framework. Based on the analysis results, we identified the level of risk to personal information in IoT services and suggested measures to protect personal information and appropriately use it.

A Study on the Factors Affecting the Information Systems Security Effectiveness of Password (패스워드의 정보시스템 보안효과에 영향을 미치는 요인에 관한 연구)

  • Kim, Jong-Ki;Kang, Da-Yeon
    • Asia pacific journal of information systems
    • /
    • v.18 no.4
    • /
    • pp.1-26
    • /
    • 2008
  • Rapid progress of information technology and widespread use of the personal computers have brought various conveniences in our life. But this also provoked a series of problems such as hacking, malicious programs, illegal exposure of personal information etc. Information security threats are becoming more and more serious due to enhanced connectivity of information systems. Nevertheless, users are not much aware of the severity of the problems. Using appropriate password is supposed to bring out security effects such as preventing misuses and banning illegal users. The purpose of this research is to empirically analyze a research model which includes a series of factors influencing the effectiveness of passwords. The research model incorporates the concept of risk based on information systems risk analysis framework as the core element affecting the selection of passwords by users. The perceived risk is a main factor that influences user's attitude on password security, security awareness, and intention of security behavior. To validate the research model this study relied on questionnaire survey targeted on evening class MBA students. The data was analyzed by AMOS 7.0 which is one of popular tools based on covariance-based structural equation modeling. According to the results of this study, while threat is not related to the risk, information assets and vulnerability are related to the user's awareness of risk. The relationships between the risk, users security awareness, password selection and security effectiveness are all significant. Password exposure may lead to intrusion by hackers, data exposure and destruction. The insignificant relationship between security threat and perceived risk can be explained by user's indetermination of risk exposed due to weak passwords. In other words, information systems users do not consider password exposure as a severe security threat as well as indirect loss caused by inappropriate password. Another plausible explanation is that severity of threat perceived by users may be influenced by individual difference of risk propensity. This study confirms that security vulnerability is positively related to security risk which in turn increases risk of information loss. As the security risk increases so does user's security awareness. Security policies also have positive impact on security awareness. Higher security awareness leads to selection of safer passwords. If users are aware of responsibility of security problems and how to respond to password exposure and to solve security problems of computers, users choose better passwords. All these antecedents influence the effectiveness of passwords. Several implications can be derived from this study. First, this study empirically investigated the effect of user's security awareness on security effectiveness from a point of view based on good password selection practice. Second, information security risk analysis framework is used as a core element of the research model in this study. Risk analysis framework has been used very widely in practice, but very few studies incorporated the framework in the research model and empirically investigated. Third, the research model proposed in this study also focuses on impact of security awareness of information systems users on effectiveness of password from cognitive aspect of information systems users.