• Title/Summary/Keyword: Risk Respond

Search Result 283, Processing Time 0.023 seconds

A Study on the Factors Affecting the Information Systems Security Effectiveness of Password (패스워드의 정보시스템 보안효과에 영향을 미치는 요인에 관한 연구)

  • Kim, Jong-Ki;Kang, Da-Yeon
    • Asia pacific journal of information systems
    • /
    • v.18 no.4
    • /
    • pp.1-26
    • /
    • 2008
  • Rapid progress of information technology and widespread use of the personal computers have brought various conveniences in our life. But this also provoked a series of problems such as hacking, malicious programs, illegal exposure of personal information etc. Information security threats are becoming more and more serious due to enhanced connectivity of information systems. Nevertheless, users are not much aware of the severity of the problems. Using appropriate password is supposed to bring out security effects such as preventing misuses and banning illegal users. The purpose of this research is to empirically analyze a research model which includes a series of factors influencing the effectiveness of passwords. The research model incorporates the concept of risk based on information systems risk analysis framework as the core element affecting the selection of passwords by users. The perceived risk is a main factor that influences user's attitude on password security, security awareness, and intention of security behavior. To validate the research model this study relied on questionnaire survey targeted on evening class MBA students. The data was analyzed by AMOS 7.0 which is one of popular tools based on covariance-based structural equation modeling. According to the results of this study, while threat is not related to the risk, information assets and vulnerability are related to the user's awareness of risk. The relationships between the risk, users security awareness, password selection and security effectiveness are all significant. Password exposure may lead to intrusion by hackers, data exposure and destruction. The insignificant relationship between security threat and perceived risk can be explained by user's indetermination of risk exposed due to weak passwords. In other words, information systems users do not consider password exposure as a severe security threat as well as indirect loss caused by inappropriate password. Another plausible explanation is that severity of threat perceived by users may be influenced by individual difference of risk propensity. This study confirms that security vulnerability is positively related to security risk which in turn increases risk of information loss. As the security risk increases so does user's security awareness. Security policies also have positive impact on security awareness. Higher security awareness leads to selection of safer passwords. If users are aware of responsibility of security problems and how to respond to password exposure and to solve security problems of computers, users choose better passwords. All these antecedents influence the effectiveness of passwords. Several implications can be derived from this study. First, this study empirically investigated the effect of user's security awareness on security effectiveness from a point of view based on good password selection practice. Second, information security risk analysis framework is used as a core element of the research model in this study. Risk analysis framework has been used very widely in practice, but very few studies incorporated the framework in the research model and empirically investigated. Third, the research model proposed in this study also focuses on impact of security awareness of information systems users on effectiveness of password from cognitive aspect of information systems users.

A Study on the Control of Hazard Facilities Management system in Urban area by utilizing GIS (지리정보시스템(GIS)을 이용한 도심지 내의 위해시설 관리시스템 구축에 관한 연구)

  • Ham, Eun-Gu;Roh, Sam-Kew
    • Journal of the Korean Society of Hazard Mitigation
    • /
    • v.5 no.4 s.19
    • /
    • pp.9-15
    • /
    • 2005
  • This research developed the RMIS(Risk Management Information System) which focus on works of risk management fields required of apply of a space information, and focus on the DB to establish and apply the space information efficiently with research scope on the LPG refueling station in city. On the basis of the RMIS, this research provides the baseline to lead on an efficiency of safety inspection of LPG refueling station, advance risk assessment, and efficient making decision of an accident correspondence assessment with interlocking the GIS representing risk through the automation of a quantitative risk assessment standardize requirement to control at real-time. The RMIS development process is as follows. firstly, Relational Database(RDB) was developed by using fundamental data both On-site and Off-site relating data as peforming risk assessment on the LPG refueling station in city. Second, the risk management integral database system was developed to monitor and control the risk efficiently for user with using the Visual Basic Program. Third, through interlocking the risk management integral database system and the GIS(Falcon-map) was suggested the decision making method. Represented results through out the RMIS program development are as follows. Firstly, the RMIS was established the mutual information to advance management the risk efficiently for user and inspector with using the risk management data. Second, as this study managed risk for on-site and off-site separately and considered effect for inside and outside of facility, constructed the basis on safety management which can respond to major accident. Third, it was composed the baseline to making decision that on the basis of user interface.

Analysis of the Impact Relationship for Risk Factors on Big Data Projects Using SNA (SNA를 활용한 빅데이터 프로젝트의 위험요인 영향 관계 분석)

  • Park, Dae-Gwi;Kim, Seung-Hee
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.21 no.1
    • /
    • pp.79-86
    • /
    • 2021
  • In order to increase the probability of success in big data projects, quantified techniques are required to analyze the root cause of risks from complex causes and establish optimal countermeasures. To this end, this study measures risk factors and relationships through SNA analysis and presents a way to respond to risks based on them. In other words, it derives a dependency network matrix by utilizing the results of correlation analysis between risk groups in the big data projects presented in the preliminary study and performs SNA analysis. In order to derive the dependency network matrix, partial correlation is obtained from the correlation between the risk nodes, and activity dependencies are derived by node by calculating the correlation influence and correlation dependency, thereby producing the causal relationship between the risk nodes and the degree of influence between all nodes in correlation. Recognizing the root cause of risks from networks between risk factors derived through SNA between risk factors enables more optimized and efficient risk management. This study is the first to apply SNA analysis techniques in relation to risk management response, and the results of this study are significant in that it not only optimizes the sequence of risk management for major risks in relation to risk management in IT projects but also presents a new risk analysis technique for risk control.

3-Step Security Vulnerability Risk Scoring considering CVE Trends (CVE 동향을 반영한 3-Step 보안 취약점 위험도 스코어링)

  • Jihye, Lim;Jaewoo, Lee
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.27 no.1
    • /
    • pp.87-96
    • /
    • 2023
  • As the number of security vulnerabilities increases yearly, security threats continue to occur, and the vulnerability risk is also important. We devise a security threat score calculation reflecting trends to determine the risk of security vulnerabilities. The three stages considered key elements such as attack type, supplier, vulnerability trend, and current attack methods and techniques. First, it reflects the results of checking the relevance of the attack type, supplier, and CVE. Secondly, it considers the characteristics of the topic group and CVE identified through the LDA algorithm by the Jaccard similarity technique. Third, the latest version of the MITER ATT&CK framework attack method, technology trend, and relevance between CVE are considered. We used the data within overseas sites provide reliable security information to review the usability of the proposed final formula CTRS. The scoring formula makes it possible to fast patch and respond to related information by identifying vulnerabilities with high relevance and risk only with some particular phrase.

Study on Evaluation of Critical Minerals for the Development of Korea's Materials-parts Industry (한국의 소재부품산업 육성을 위한 핵심광물 선정 연구)

  • Yujeong Kim;Sunjin Lee
    • Economic and Environmental Geology
    • /
    • v.56 no.2
    • /
    • pp.155-166
    • /
    • 2023
  • Through COVID-19, the importance of supply chain management of raw material minerals has been maximized. In particular, supply chain management is important for rare metals, which are difficult to manage demand and supply, in order to secure raw materials for the parts and materials industry that Korea is actively promoting. In this study, a system was established and evaluated to select Critical minerals that need to respond to Korea's industrial structure and global risks by quantifying tangible and intangible risk factors. Global Supply Concentration, Supplying country risk, Policy Social Environment Regulation, Domestic Import Instability, Risk responsiveness, Market Scale, Demand Fluctuation and Economic Importance were evaluated as evaluation indicators. The degree of risk and risk impact were quantitatively measured using the criticality matrix-criticality level. After evaluating 40 types of minerals used in domestic new growth businesses, 15 types of Critical minerals(Li, Pt, Co, V, REE, Mg, Mo, Cr, Ti, W, C, Ni, Al, Mn, Si) in Korea were selected. The results are expected to be used to establish policies to strengthen resource security and to make decisions to form a company's raw material portfolio.

Development and Operation Status of Space Object Collision Risk Management System for Korea Aerospace Research Institute (KARI) (한국항공우주연구원 우주물체 충돌위험 관리시스템 개발 및 운영현황 )

  • Jaedong Seong;Okchul Jung;Youeyun Jung;Saehan Song
    • Journal of Space Technology and Applications
    • /
    • v.3 no.3
    • /
    • pp.280-300
    • /
    • 2023
  • This paper includes the development and operational status of the space object collision risk management system operated by the Korea Aerospace Research Institute. Currently, it monitors 6 low-orbit satellites and 3 geostationary satellites for collision risks 24 hours, enabling prompt collision avoidance maneuvers to ensure safe and stable operations. Since Chinese anti-satellite test (ASAT) in 2007, the monitoring of collision risks between space objects and operational satellites has been taken seriously, leading to the development of various collision risk management systems to respond quickly and efficiently to such situations. This paper provides an introduction to the space object collision risk management system developed from 2007 to the present, the current status of artificial space objects around Earth, and the system currently in operation. Additionally, it outlines future prospects and plans for the system.

Study on Concept and Characteristics of Science Communication in Modern Society (현대사회의 과학커뮤니케이션 개념과 특성 연구)

  • MiKyung Chang
    • The Journal of the Convergence on Culture Technology
    • /
    • v.10 no.3
    • /
    • pp.827-832
    • /
    • 2024
  • Science communication based on social reflection and political consensus among social members should be activated rather than focusing on science and trying to find solutions in a short period of time in order to respond to science and technology risk issues in modern society, which are the main characteristics of complexity, uncertainty, and unpredictability. The purpose of this study is to examine science communication suitable for a risk society and to present implications by exploring in detail how the concept and flow of science communication have changed due to changes in the social paradigm and what is needed to revitalize science communication. When scientific knowledge and understanding of science are combined with public participation, and science communication that can demonstrate practical expertise and efficiency can be realized when empirical knowledge to solve problems in a risk society is strengthened away from the authority and power of science alone.

A Case Study of the Risk Identification in Construction Project (건설사업의 리스크 식별에 관한 사례연구)

  • Ahn, Sanghyun
    • Korean Journal of Construction Engineering and Management
    • /
    • v.16 no.1
    • /
    • pp.15-23
    • /
    • 2015
  • In the construction industry, risk management has gained constant attention as the factor not only to evaluate global competitiveness of the country but also to secure competitiveness of public institutions and private companies. For effective construction risk management, the specific work process improvement that can be employed in the field in terms of risk management of the entire corporation such as financial, insurance and safety management is necessary. To manage construction risks, what is important is the step to identifying inherent risks in the construction project. The identification of risks will be followed by the step to seeking ways to establish and manage strategies responding to the risks. This study suggests ways and processes to make a checkslit to identify risks through case studies. To that end, the focus will be placed on working process improvement of risk identification among stages to manage construction risks such as risk identification and analyses, planning to respond to risks, risk monitoring and management. The case study checklists show that setting up the system to classify risks by stage is helpful to figure out causes of risks to reduce or eliminate risk factors. The checklist making process that considers features of the project is expected to contribute to successful completion of the project by enabling effective risk identification and systematic risk management.

Deriving Key Risk Sub-Clauses for EPC/Turnkey Contract Conditions for Overseas Construction Projects - Based on FIDIC Conditions of Contract for EPC/Turnkey Projects, second edition 2017 - (해외건설공사 EPC/Turnkey 계약조건 핵심 리스크 세부조항 도출 - FIDIC Silver Book 2017년 개정판 기준으로 -)

  • Hong, Seong Yeoll;Jei, Jae Yong;Seo, Sung Chul;Park, Hyung Keun
    • Korean Journal of Construction Engineering and Management
    • /
    • v.23 no.6
    • /
    • pp.101-110
    • /
    • 2022
  • Recently, the global construction market is expected to grow at an annual average of 4.8% by 2025 and the risk of overseas construction is also expected to increase accordingly. In particular, domestic construction companies intensively participated in the EPC(Engineering, Procurement, Construction)/Turnkey project, but as a result of failing to respond to contractual risks, they have suffered losses of trillions of won in overseas business since 2013. Nevertheless, there have been not many studies on the derivation of EPC/Turnkey's contractual key risk sub-clauses. Therefore, in this study, the key risk sub-clauses were studied for the conditions of the 2017 Silver Book contract issued by the International Consulting Engineering Federation(FIDIC). To this end, 30 experts with more than 10 years of experience in international construction contracts were formed as a panel to conduct a Delphi survey on 170 sub-clauses of 21 clauses of FIDIC Silver Book to derive 62 main risk sub-clauses. In addition, the RPN(Risk Priority Number) was finally calculated using the FMEA(Failure Mode and Effect Analysis) technique, and 25 key risk sub-clauses within the Critical Risk range were derived. Through the results of this study, the practical point of view is able to refer to the contract provisions to be carefully reviewed at the bidding and contract signing stage in overseas construction projects. From an academic point of view, it provides direction and basic knowledge of how to study the contract fields used in overseas construction EPC/Turnkey projects.

Empirical Analysis on the Effect of Design Pattern of Web Page, Perceived Risk and Media Richness to Customer Satisfaction (콘텐츠 제작방식, 지각된 위험, 미디어 풍부성이 고객만족에 미치는 영향 분석)

  • Park, Bong-Won;Lee, Jung-Mann;Lee, Jong-Won
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.6
    • /
    • pp.385-396
    • /
    • 2011
  • Internet web pages can be classified by three major types such as texts only, images with texts and videos with texts. The purpose of this paper is to analyze how customers recognize and respond perspective of perceived risk and media richness with regard to design patterns of internet web pages. Additionally, we will examine the extent to which aforementioned factors affect customer satisfaction. Analyses with perceived risks revealed that customers feel less personal risks including performance, psychology and time/convenience when used web pages of text-images and text-videos, compared to text only based web pages. However, customers feel that web pages consisting of image-text or video-text have higher points in terms of symbolism and social presence in media richness, compared to text only based web pages. Finally, we showed that personal risk and text-based Web page negatively affect but symbolism and social presence positively impact on customer satisfaction. Therefore, this study suggests a clue that why video-based Web content did not grow different from many people's expectation.