• Title/Summary/Keyword: Risks

Search Result 5,171, Processing Time 0.027 seconds

Perception of Financial Risk and Expenditures for Insurance by Household Characteristics (가계특성에 따른 재무위험 인지와 보험료 지출)

  • 김경자
    • Journal of Families and Better Life
    • /
    • v.21 no.6
    • /
    • pp.43-51
    • /
    • 2003
  • The purpose of this research was to investigate the perception of financial risks and expenditures for insurance by household characteristics. Data were collected from 598 housewives by online survey on Dec., 2001. Results indicated that respondents had perceived the risk of unemployment most among three types of risks. Household characteristics reflecting financial needs in emergency case had positive effects on the perception of risks, and hence the expenditures for insurance, in general. On the other hand, the level of emergency preparation had negative effects on the perception of risks and the expenditures for insurance. However, only credit-related risk had a positive relationship with the expenditures for insurance.

The Examination of Subgroup-Sensitive Risks and Needs among Delinquent Adolescents in the US

  • Lim, Ji-Young
    • International Journal of Human Ecology
    • /
    • v.8 no.2
    • /
    • pp.47-60
    • /
    • 2007
  • While there is growing evidence regarding the subgroup-sensitive nature of risk factors among delinquent adolescents, researchers have paid little attention to the tracking of risks and needs by subgroups (e.g., gender, ethnicity, and the timing of onset for delinquency) among youth who are currently involved in the juvenile court system. Therefore, greater empirical attention directed toward subgroup-sensitive risk factors experienced by delinquent adolescents is thought to be both timely and necessary. A final convenience sample of 2167 court-involved adolescents in the US was used to specify subgroup-sensitive risks and needs. The results demonstrated that there were various levels of risks according to subgroups associated with gender, ethnicity, and onset for delinquency group. The findings of this study add to the extant literature on delinquency by demonstrating the importance of considering subgroups associated with gender, ethnicity, and the timing of onset for delinquency when practicing treatment or intervention programs with delinquent adolescents.

Transfusion practice in neonates

  • Kim, Do-Hyun
    • Clinical and Experimental Pediatrics
    • /
    • v.61 no.9
    • /
    • pp.265-270
    • /
    • 2018
  • Neonates, especially extremely low birth weight infants, are among the groups of patients undergoing transfusion frequently. Since they are exposed to higher specific transfusion risks compared to the patients of other age groups, there are many special aspects that must be considered for transfusion therapy in neonates. The transfusion risks in neonates include adverse outcomes specific for preterm infants as well as increased metabolic, immunologic, and infectious complications. To reduce the risks of transfusion-transmitted cytomegalovirus infection and transfusion-associated graft-versus-host disease, leukoreduced and irradiated cellular blood products should be used for all neonates. This review summarizes the risks of neonatal transfusion therapy, specific methods to reduce risk, and current trends and practices of red blood cell and platelet transfusions in neonates, to facilitate decision-making for neonatal transfusion.

An Analysis of Information Security Management Strategies in the Presence of Interdependent Security Risk

  • Shim, Woo-Hyun
    • Asia pacific journal of information systems
    • /
    • v.22 no.1
    • /
    • pp.79-101
    • /
    • 2012
  • This study expands the current body of research by exploring multiple scenarios of insufficient and excessive IT security investments caused by interdependent risks and the interplay between IT security investments and cyber insurance. A key finding is that organizations experiencing interdependent risks with different types of cyber attacks (i.e., targeted and untargeted attacks) use different strategies in making IT security investment decisions and in purchasing cyber insurance policies for their information security risk management than firms that are facing independent risks. The study further provides an economic rationale for employing insurance mechanisms as a risk management solution for information security.

  • PDF

Vulnerability and Information Security Investment Under Interdependent Risks: A Theoretical Approach

  • Shim, Woo-Hyun
    • Asia pacific journal of information systems
    • /
    • v.21 no.4
    • /
    • pp.27-43
    • /
    • 2011
  • This article explores economic models that show the optimal level of information security investment in the presence of interdependent security risks, Using particular functional forms, the analysis shows that the relationship between the levels of security vulnerability and the levels of optimal security investments is affected by externalities caused by agents' correlated security risks. This article further illustrates that, compared to security investments in the situation of independent security risks, in order to maximize the expected benefits from security investments, an agent should invest a larger fraction of the expected loss from a security breach in the case of negative externalities, while an agent should spend a smaller fraction of the expected loss in the case of negative externalities.

Enhancement of VECTOR Method by Adapting OCTAVE for Risk Analysis in Legacy System Migration

  • Hakemi, Aida;Jeong, Seung Ryul;Ghani, Imran;Sanaei, Mojtaba Ghanaatpisheh
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.6
    • /
    • pp.2118-2138
    • /
    • 2014
  • Risks are involved in all phases of the software life cycle, and due to these risks, software can face various problems that can cause different negative outcomes and sometimes, in extreme cases, the failure of the software. Most of these risks lie in the legacy software migration process. These risks can create many problems, and in the worst case they can lead to the failure of the migration project. This paper explores different types of risk analysis methods such as CRAMM, CORAS, OCTAVE and VECTOR. After comparing these methods, the two suitable methods were chosen, namely, OCTAVE and VECTOR. Based on the use of these two methods, the project suggests an enhanced EOV method for risk analysis in the migration of legacy software.

Effect of Centralization in Decision Making Upon Real Option Utilization : Empirical Approach of Cloud Service Implementation in Korean Small & Medium Sized Firms (의사결정 집중화 수준과 불확실성이 실물옵션 활용에 미치는 영향에 대한 연구 : 국내 중소기업 클라우드 서비스 도입에 대한 연구)

  • Kim, Taeha;Nam, Seunghyeon;Yang, Heedong
    • Journal of Information Technology Applications and Management
    • /
    • v.24 no.4
    • /
    • pp.117-131
    • /
    • 2017
  • We question whether Korean IT managers consider real options to reduce risks of cloud service implementation. This work investigates the impact of technology risk, relationship risk, economy risk, security risk upon the intention of IT managers to utilize abandon & expansion options. We also analyze moderation effect of centralization level of decision making between these risks and the utilization of real options. Using the survey questionnaire, we empirically find that technology risk, relationship risk and security risk have significant effect upon abandon option and technology risk, relationship risk, and economy upon expansion option. We also find the evidence that centralization level moderates some risks and the direction of moderation effect is to offset the effect of risks on intention to utilize real options.

Contemplation of Risk Management for Internet Banking System

  • Seo, Jang-Hoon;Park, Myeong-Kyu
    • Journal of the Korea Safety Management & Science
    • /
    • v.5 no.2
    • /
    • pp.41-51
    • /
    • 2003
  • Next Generation internet banking service for important role of banking business competitive power separates service function of individual banking and should equip various service that coincides in each special qualities these are customer management, portfolio management, global corporation support etc. The past few years have been characterized by rapid changes in technology and the introduction of corporate and retail banking services through the Internet. the integration of e-banking platforms with legacy systems and the increasing dependence of banks on third party information service providers, all dramatically amplify the magnitude of risks to which banks are exposed. Risk management disciplines have not evolved at the same speed and many institutions, especially the smaller ones, have not been able to incorporate Internet banking risk controls within their existing risk management structures. This article provides an overview of the various risks which are heightened with Internet banking, and a holistic approach to managing these risks. In addition, the presentation will explain the different risk areas and the controls to be adopted to mitigate these risks.

Interval-valued Choquet integrals and applications in pricing risks (구간치 쇼케이적분과 위험률 가격 측정에서의 응용)

  • Jang, Lee-Chae
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.17 no.4
    • /
    • pp.451-454
    • /
    • 2007
  • Non-additive measures and their corresponding Choquet integrals are very useful tools which are used in both insurance and financial markets. In both markets, it is important to update prices to account for additional information. The update price is represented by the Choquet integral with respect to the conditioned non-additive measure. In this paper, we consider a price functional H on interval-valued risks defined by interval-valued Choquet integral with respect to a non-additive measure. In particular, we prove that if an interval-valued pricing functional H satisfies the properties of monotonicity, comonotonic additivity, and continuity, then there exists an two non-additive measures ${\mu}1,\;{\mu}2$ such that it is represented by interval-valued choquet integral on interval-valued risks.

How to Manage Cloud Risks Based on the BMIS Model

  • Song, Youjin;Pang, Yasheng
    • Journal of Information Processing Systems
    • /
    • v.10 no.1
    • /
    • pp.132-144
    • /
    • 2014
  • Information always comes with security and risk problems. There is the saying that, "The tall tree catches much wind," and the risks from cloud services will absolutely be more varied and more severe. Nowadays, handling these risks is no longer just a technology problem. So far, a good deal of literature that focuses on risk or security management and frameworks in information systems has already been submitted. This paper analyzes the causal risk factors in cloud environments through critical success factors, from a business perspective. We then integrated these critical success factors into a business model for information security by mapping out 10 principles related to cloud risks. Thus, we were able to figure out which aspects should be given more consideration in the actual transactions of cloud services, and were able to make a business-level and general-risk control model for cloud computing.