• Title/Summary/Keyword: Software risk

Search Result 850, Processing Time 0.027 seconds

Development of Stand-Alone Risk Assessment Software for Optimized Maintenance Planning of Power Plant Facilities (발전설비 최적 정비를 위한 독립형 위험도 평가 소프트웨어 개발)

  • Choi, Woo Sung;Song, Gee Wook;Kim, Bum Shin;Chang, Sung Ho;Lee, Sang Min
    • Transactions of the Korean Society of Mechanical Engineers A
    • /
    • v.39 no.11
    • /
    • pp.1169-1174
    • /
    • 2015
  • Risk-Risk-based inspection (RBI) has been developed in order to identify risky equipments that can cause major accidents or damages in large-scale plants. This assessment evaluates the equipment's risk, categorizes their priorities based on risk level, and then determines the urgency of their maintenance or allocates maintenance resources. An earlier version of the risk-based assessment software is already installed within the equipment management system; however, the assessment is based on examination by an inspector, and the results can be influenced by his subjective judgment, rather than assessment being based on failure probability. Moreover, the system is housed within a server, which limits the inspector's work space and time, and such a system can be used only on site. In this paper, the development of independent risk-based assessment software is introduced; this software calculates the failure probability by an analytical method, and analyzes the field inspection results, as well as inspection effectiveness. It can also operate on site, since it can be installed on an independent platform, and has the ability to generate an I/O function for the field inspection results regarding the period for an optimum maintenance cycle. This program will provide useful information not only to the field users who are participating in maintenance, but also to the engineers who need to decide whether to extend the lifecycle of the power machinery or replace only specific components.

Moral Judgment and Intention to Make Illegal Copies of Smart Phone Applications (스마트폰 애플리케이션 불법복제에 대한 소비자의 도덕적 판단과 불법복제의도 -전북지역 대학생을 중심으로 한 사례분석)

  • You, So-Ye;Sun, Ying-Hua
    • The Korean Journal of Community Living Science
    • /
    • v.22 no.4
    • /
    • pp.655-668
    • /
    • 2011
  • Although consumer ethical behavior related with illegal copies of digital software has been considered to be an important issue, not many studies have attempted to examine the issue. Firstly, this study attemped to explain the moral judgment and intention to make illegal copies of smart phone applications for college students. Secondly, psychological factors such as moral intensity and perceived risk related to making illegal copies were tested to be significantly different in individual characteristics such as experience of ethical education and past experience of making illegal copies of software, sex, age and household income. Thirdly, the effect of related factors such as psychological factors and individual characteristics was estimated to significantly influence moral judgment and intention to make illegal copies. Two step method(using LIMDEP program) was applied to estimate the model as a structural equation model. According to the results of this study, magnitude of consequences, financial risk and performance risk were found to be significantly different in income groups(less than middle class vs more than middle class). Prosecution risk was found to be significantly different in gender groups(female vs male). In addition, social consensus, financial risk, performance risk and prosecution risk were found to be significantly different in ethical education groups(experience vs no experience). Furthermore, moral judgment for making illegal copies of smart phone applications was found to be significantly influenced by income, ethical education, magnitude of consequences, temporal immediacy and social consensus. And intention to make illegal copies of smart phone applications was found to be significantly influenced by moral judgment, age, financial risk, performance risk and prosecution risk.

A Design of Risk-Based Security Threat Assessment Process for Fighter-Aircraft Airworthiness Security Certification (전투기 감항 보안 인증을 위한 위험기반 보안위협 평가 프로세스 설계)

  • Kim, Hyunju;Kang, Dongsu
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.8 no.6
    • /
    • pp.223-234
    • /
    • 2019
  • Cyber attacks are an important factor that determines the victory and defeat of Network-centric wars in which advanced weapon systems are highly interlinked. In addition the increasing dependability on software as its develop as the latest fighter is demanding enhanced security measures for fighter software to Cyber attacks. In this paper, we apply the DO-326A, which is an airworthiness security certification standard, to design a risk-based security threat assessment process by reflecting characteristics and operational environment of fighter aircraft. To do this, we add the following steps in security threat assessment stage of DO-326A's airworthiness security certification process. First, we derive security threats of fighter. And then, we scored the security threat in terms of possibility and impact on the fighter. Finally, we determine the security risk severity.

Improvement of the Automobile Control Software Testing Process Using a Test Maturity Model

  • Jang, Jin-Wook
    • Journal of Information Processing Systems
    • /
    • v.14 no.3
    • /
    • pp.607-620
    • /
    • 2018
  • The problem surrounding methods of implementing the software testing process has come under the spotlight in recent times. However, as compliance with the software testing process does not necessarily bring with it immediate economic benefits, IT companies need to pursue more aggressive efforts to improve the process, and the software industry needs to makes every effort to improve the software testing process by evaluating the Test Maturity Model integration (TMMi). Furthermore, as the software test process is only at the initial level, high-quality software cannot be guaranteed. This paper applies TMMi model to Automobile control software testing process, including test policy and strategy, test planning, test monitoring and control, test design and execution, and test environment goal. The results suggest improvement of the automobile control software testing process based on Test maturity model. As a result, this study suggest IT organization's test process improve method.

A Dynamic Management Technique for Weighted Testcases in Software Testing (가중치를 이용한 소프트웨어 테스트케이스 동적 관리 기법)

  • Han, Sang-Hyuck;Jung, Jung-Su;Jin, Seung-Il;Kim, Young-Kuk
    • The KIPS Transactions:PartD
    • /
    • v.17D no.6
    • /
    • pp.423-430
    • /
    • 2010
  • As software becomes large-scale and complicated, the need for Quality Assurance and management is increased and software testing is becoming more important. The main aims of software testing are not only detecting and handling the defects in the system but also investigating and managing the present system. But automatic testing tools require lots of time and efforts to detect and manage the risk in the system because test-cases used in the general automatic testing tools have the simply static information. In this thesis, the dynamic management technique for weighted testcases is designed to test the high-risk testcases preferentially by giving the testcases dynamic weight.

Computer modelling of fire consequences on road critical infrastructure - tunnels

  • Pribyl, Pavel;Pribyl, Ondrej;Michek, Jan
    • Structural Monitoring and Maintenance
    • /
    • v.5 no.3
    • /
    • pp.363-377
    • /
    • 2018
  • The proper functioning of critical points on transport infrastructure is decisive for the entire network. Tunnels and bridges certainly belong to the critical points of the surface transport network, both road and rail. Risk management should be a holistic and dynamic process throughout the entire life cycle. However, the level of risk is usually determined only during the design stage mainly due to the fact that it is a time-consuming and costly process. This paper presents a simplified quantitative risk analysis method that can be used any time during the decades of a tunnel's lifetime and can estimate the changing risks on a continuous basis and thus uncover hidden safety threats. The presented method is a decision support system for tunnel managers designed to preserve or even increase tunnel safety. The CAPITA method is a deterministic scenario-oriented risk analysis approach for assessment of mortality risks in road tunnels in case of the most dangerous situation - a fire. It is implemented through an advanced risk analysis CAPITA SW. Both, the method as well as the resulting software were developed by the authors' team. Unlike existing analyzes requiring specialized microsimulation tools for traffic flow, smoke propagation and evacuation modeling, the CAPITA contains comprehensive database with the results of thousands of simulations performed in advance for various combinations of variables. This approach significantly simplifies the overall complexity and thus enhances the usability of the resulting risk analysis. Additionally, it provides the decision makers with holistic view by providing not only on the expected risk but also on the risk's sensitivity to different variables. This allows the tunnel manager or another decision maker to estimate the primary change of risk whenever traffic conditions in the tunnel change and to see the dependencies to particular input variables.

A Study on Estimation and Management of Loss Due to Catastrophic Accident (화학공장의 중대사고에 따른 예상손실액 산정 및 대책연구)

  • 구남주;엄성인;고재욱
    • Journal of the Korean Society of Safety
    • /
    • v.14 no.4
    • /
    • pp.120-125
    • /
    • 1999
  • This study evaluated the effect of the accidents caused by fire, explosion, and toxic gas release by using SuperChems, quantitative hazardous material release modeling software, which estimates the potential area of damage. According to the loss severity, the appropriate risk management principles can be applied. Risk management is divided into the two methods which are risk control and risk financing. Risk control includes risk avoidance, risk spreading and diversification, and risk reduction. Risk financing includes risk retention and risk transfer. The results of this study can help the related company determine the appropriate reserve fund and the amount to be insured against the third party losses according to the estimated loss severity.

  • PDF

Assessing Web Browser Security Vulnerabilities with respect to CVSS

  • Joh, HyunChul
    • Journal of Korea Multimedia Society
    • /
    • v.18 no.2
    • /
    • pp.199-206
    • /
    • 2015
  • Since security vulnerabilities newly discovered in a popular Web browser immediately put a number of users at risk, urgent attention from developers is required to address those vulnerabilities. Analysis of characteristics in the Web browser vulnerabilities can be used to assess security risks and to determine the resources needed to develop patches quickly to handle vulnerabilities discovered. So far, being a new research area, the quantitative aspects of the Web browser vulnerabilities and risk assessments have not been fully investigated. However, due to the importance of Web browser software systems, further detailed studies are required related to the Web browser risk assessment, using rigorous analysis of actual data which can assist decision makers to maximize the returns on their security related efforts. In this paper, quantitative software vulnerability analysis has been presented for major Web browsers with respect to the Common Vulnerability Scoring System. Further, vulnerability discovery trends in the Web browsers are also investigated. The results show that, almost all the time, vulnerabilities are compromised from remote networks with no authentication required systems. It is also found that a vulnerability discovery model which was originally introduced for operating systems is also applicable to the Web browsers.

Development of RBI Procedures and Implementation of a Software Based on API Code (II) - Semi-Quantitative Approach (API 기준에 근거한 RBI 절차 개발 및 소프트웨어의 구현 (II) -준정량적 접근법-)

  • Song, Jung-Soo;Shim, Sang-Hoon;Kwon, Jung-Rock;Yoon, Kee-Bong
    • Journal of the Korean Society of Safety
    • /
    • v.17 no.4
    • /
    • pp.110-118
    • /
    • 2002
  • During the last ten years, the need has been increase for reducing maintenance cost for aged equipments are ensuring safety, efficiency and profitability of petrochemical and refinery plants. American Petroleum institute(API) developed a code, API 581 for proposing standard procedures of risk based inspection. Even though the API 581 code covers general RBI procedures, there must be some limitations. In this study, a semi-quantitative assessment algorithm for RBI based on the API 581 code was reconstructed for developing an RBI software. The user-friendly realRBI software is developed with a module for evaluation semi-quantitative risk category using the potential consequence factor and the likelihood factor. Also, inspection planning module for inspection time and inspection method for equipments are included.

A Study on the Evaluation of Commercial Softwares for Bank Risk Management by AHP (AHP 기법에 의한 금융위험관리 소프트웨어 평가에 관한 연구)

  • 최희성;황규승
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.16 no.2
    • /
    • pp.51-51
    • /
    • 1991
  • Recently financial institutions in Korea are experiencing an unfamiliar challenge in terms of their operational risk management due to the volatility of global financial market and the incessant development of new financial products. In this paper, we present an AHP(Analytic Hierarchy Process) model to evaluate the effectiveness of commercial softwares for risk management in banking. The AHP model considers software's performance. utility, serviceability and durability as major evaluation criteria. The weight of each criterion is generated by the questionnaire survey given to practitioners in risk management in domestic commercial banks.