• Title/Summary/Keyword: network risk

Search Result 1,080, Processing Time 0.03 seconds

A Research for the Realness of Game Risks based on ANT (ANT를 통한 게임 위험의 실재성에 대한 연구)

  • Lee, Jangwon;Yoon, Joonsung
    • Journal of Korea Game Society
    • /
    • v.16 no.5
    • /
    • pp.7-22
    • /
    • 2016
  • The risk is subjectively perceived by the subject to judge. In the case of the game, game organizations and watchdog groups also recognized differently occurrence probability and intensity of risk to form a physical relationships of the game with each. Thus, we look only at the risk of their own subjective opinion, the fundamental solution is not possible. In this paper, we conducted a study on the form, occurrence point, and generating processes of risk by analyzing the physical components that make up the network of the game based on ATN in order to confirm definitely the substance and the presence of the game risk. In view of ANT, the game and humans constitute a network through their ability to act as each actor. If the gamer does not clearly recognize the nature of the ability to act of the game, the reverse control and the excess flow occur through remediation properties of the game. Therefore, it requires a more in-depth study in the future with respect to complex structure and relationships of the game-gamer network.

The Network Effects of Smoking and Drinking Behaviors on Subjective Job Risk Assessment and Workplace Injuries (근로자의 흡연과 음주를 통한 네트워크 형성효과 -주관적 업무위험판단과 사업장 산업재해 발생 분석-)

  • Lee, Sunkuk;Jeon, Yongil
    • Journal of Labour Economics
    • /
    • v.39 no.2
    • /
    • pp.83-111
    • /
    • 2016
  • We investigate how smokers and drinkers have influenced on self-reported risk assessment and workplace injuries, using the Korean Working Conditions Survey. Our empirical results indicate that persistent smoking habit raises workers' job risk assessments and work injuries significantly. Also, former smokers notice relatively higher risk assessments in various work activities, but they are less likely to affect work injuries. More frequent drinking behavior leads to a positive effect of job risk perception and workplace injuries. Regular smoking with frequent drinking for high income classes, however, have significantly reduced the chance of work injuries. Furthermore, establishing smoking-designated area at the workplace makes workers reduce workplace accidents positively. Therefore, the network effect of smoking and drinking behaviors in private circle levels is suggested to extend into public and constructive activies at the workplace levels for sharing useful and productive information, which will eventually reduce workplace injuries dramatically.

  • PDF

Which country's end devices are most sharing vulnerabilities in East Asia? (거시적인 관점에서 바라본 취약점 공유 정도를 측정하는 방법에 대한 연구)

  • Kim, Kwangwon;Won, Yoon Ji
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.5
    • /
    • pp.1281-1291
    • /
    • 2015
  • Compared to the past, people can control end devices via open channel. Although this open channel provides convenience to users, it frequently turns into a security hole. In this paper, we propose a new human-centered security risk analysis method that puts weight on the relationship between end devices. The measure derives from the concept of entropy rate, which is known as the uncertainty per a node in a network. As there are some limitations to use entropy rate as a measure in comparing different size of networks, we divide the entropy rate of a network by the maximum entropy rate of the network. Also, we show how to avoid the violation of irreducible, which is a precondition of the entropy rate of a random walk on a graph.

A Fuzzy-based Inference Model for Web of Trust Using User Behavior Information in Social Network (사회네트워크에서 사용자 행위정보를 활용한 퍼지 기반의 신뢰관계망 추론 모형)

  • Song, Hee-Seok
    • Journal of Information Technology Applications and Management
    • /
    • v.17 no.4
    • /
    • pp.39-56
    • /
    • 2010
  • We are sometimes interacting with people who we know nothing and facing with the difficult task of making decisions involving risk in social network. To reduce risk, the topic of building Web of trust is receiving considerable attention in social network. The easiest approach to build Web of trust will be to ask users to represent level of trust explicitly toward another users. However, there exists sparsity issue in Web of trust which is represented explicitly by users as well as it is difficult to urge users to express their level of trustworthiness. We propose a fuzzy-based inference model for Web of trust using user behavior information in social network. According to the experiment result which is applied in Epinions.com, the proposed model show improved connectivity in resulting Web of trust as well as reduced prediction error of trustworthiness compared to existing computational model.

  • PDF

Distributed Prevention Mechanism for Network Partitioning in Wireless Sensor Networks

  • Wang, Lili;Wu, Xiaobei
    • Journal of Communications and Networks
    • /
    • v.16 no.6
    • /
    • pp.667-676
    • /
    • 2014
  • Connectivity is a crucial quality of service measure in wireless sensor networks. However, the network is always at risk of being split into several disconnected components owing to the sensor failures caused by various factors. To handle the connectivity problem, this paper introduces an in-advance mechanism to prevent network partitioning in the initial deployment phase. The approach is implemented in a distributed manner, and every node only needs to know local information of its 1-hop neighbors, which makes the approach scalable to large networks. The goal of the proposed mechanism is twofold. First, critical nodes are locally detected by the critical node detection (CND) algorithm based on the concept of maximal simplicial complex, and backups are arranged to tolerate their failures. Second, under a greedy rule, topological holes within the maximal simplicial complex as another potential risk to the network connectivity are patched step by step. Finally, we demonstrate the effectiveness of the proposed algorithm through simulation experiments.

Computer modelling of fire consequences on road critical infrastructure - tunnels

  • Pribyl, Pavel;Pribyl, Ondrej;Michek, Jan
    • Structural Monitoring and Maintenance
    • /
    • v.5 no.3
    • /
    • pp.363-377
    • /
    • 2018
  • The proper functioning of critical points on transport infrastructure is decisive for the entire network. Tunnels and bridges certainly belong to the critical points of the surface transport network, both road and rail. Risk management should be a holistic and dynamic process throughout the entire life cycle. However, the level of risk is usually determined only during the design stage mainly due to the fact that it is a time-consuming and costly process. This paper presents a simplified quantitative risk analysis method that can be used any time during the decades of a tunnel's lifetime and can estimate the changing risks on a continuous basis and thus uncover hidden safety threats. The presented method is a decision support system for tunnel managers designed to preserve or even increase tunnel safety. The CAPITA method is a deterministic scenario-oriented risk analysis approach for assessment of mortality risks in road tunnels in case of the most dangerous situation - a fire. It is implemented through an advanced risk analysis CAPITA SW. Both, the method as well as the resulting software were developed by the authors' team. Unlike existing analyzes requiring specialized microsimulation tools for traffic flow, smoke propagation and evacuation modeling, the CAPITA contains comprehensive database with the results of thousands of simulations performed in advance for various combinations of variables. This approach significantly simplifies the overall complexity and thus enhances the usability of the resulting risk analysis. Additionally, it provides the decision makers with holistic view by providing not only on the expected risk but also on the risk's sensitivity to different variables. This allows the tunnel manager or another decision maker to estimate the primary change of risk whenever traffic conditions in the tunnel change and to see the dependencies to particular input variables.

Development of a Product Risk Assessment System using Injury Information in Korea Consumer Agency (한국소비자원 위해정보를 활용한 제품 리스크 평가시스템 개발)

  • Suh, Jungdae
    • Journal of Digital Convergence
    • /
    • v.15 no.4
    • /
    • pp.181-190
    • /
    • 2017
  • Recently, safety accidents of daily necessities such as humidifier disinfectant, mobile phones, and infant diapers, have occurred frequently. To protect consumers from these accidents, product safety management is required, and a product risk assessment tool is needed to evaluate the degree of safety of the product. In this paper, we have constructed RAS, which is a system that can evaluate product risk based on injury information of product accident in Korea Consumer Agency. RAS consists of an injury information analysis system for analyzing accident-related information and a risk assessment system for assessing risk using information derived from the system. The Bayesian network - based probabilistic method is applied to reflect the causal relationships that affect product risk in the risk assessment process. We used RAS to evaluate 33 children's products and compared them with the results of EU RAPEX RAG. Subsequent tasks include reducing the subjectivity of the input of the accident impact scale, and linking the above two systems.

Retrofit Prioritization of Highway Network considering Seismic Risk of System (지진 위험도를 고려한 도로 교통망의 내진보강 우선순위 결정)

  • Na, Ung-Jin;Park, Tae-Won;Shinozuka, Masanobu
    • Journal of the Earthquake Engineering Society of Korea
    • /
    • v.12 no.6
    • /
    • pp.47-53
    • /
    • 2008
  • This research focuses on the issue of seismic retrofit prioritization based on the Caltrans' highway network serving Los Angeles and Orange counties. Retrofit prioritization is one of most important problems in earthquake engineering, and it is a problem that most decision makers face in the process of resource allocation. This study demonstrates the methods of prioritized resource allocation in the process of retrofitting a regional highway network. For the criteria of a retrofit ranking, seismic vulnerability and the importance of network link are first introduced. Subsequently, link-based seismic retrofit cases are simulated, investigating the effects of the seismic retrofit in terms of seismic performance, such as driver's delay. In this study, probabilistic scenario earthquakes are used to perform a probabilistic seismic risk analysis. The results show that the retrofit prioritization can be differently defined and ranked depending on the stakeholders. This study provides general guidelines for prioritization strategy for the effective retrofitting of a highway network system.

Agile Risk Mitigation Framework

  • Naz, Anum;Khan, Ahmad Salman;Atif, Muhammad
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12spc
    • /
    • pp.586-596
    • /
    • 2021
  • Software organisations follow different methodologies for the development of software. The software development methodologies are mainly divided into two categories, including plan-driven and agile development. To attain project success, it is very significant to consider risk management during whole project. Agile development is considered risk-driven, but many risks are unreported at the industrial level. The risks can be divided into three categories, including (i) development risks, (ii) organisations risks, and (iii) people-oriented risks. This paper deals with Development risks specifically. Several risks related to development are faced by people working in the industry while dealing with agile development. Their management among the industry is a big issue, so this paper emphasises ARMF based on development-related risks by following agile development. This research work will help software organisations to prevent different project-related risks during agile development. The risks are elicited at two-level, (i) literature-based and (ii) IT industry based. A systematic literature review was performed for eliciting the agile risks from the literature. Detailed case studies and survey research methods were applied for eliciting risks from IT industry. Finally, we merged the agile development risks from literature with standard industrial risks. Hence, we established an agile risk mitigation framework ARMF based on agile development and present a groundwork established in light of empirical examination for extending it in future research.

Effect of endodontic sealer on postoperative pain: a network meta-analysis

  • Cynthia Maria Chaves Monteiro;Ana Cristina Rodrigues Martins;Alessandra Reis;Juliana Larocca de Geus
    • Restorative Dentistry and Endodontics
    • /
    • v.48 no.1
    • /
    • pp.5.1-5.22
    • /
    • 2023
  • This systematic review and network meta-analysis aimed to answer the following focused research question: "Does the type of endodontic sealer affect the postoperative pain in patients who received endodontic treatment?" Different databases and grey literature were surveyed. Only one randomized controlled trial were included. The risk of bias in the studies was evaluated by using the Cochrane Collaboration's tool. A random-effects meta-analysis was conducted to compare the risk and intensity of postoperative pain. The quality of the body of evidence was assessed using the Grading of Recommendations Assessment, Development, and Evaluation approach. Out of 11,601 studies, 15 remained for qualitative analyses and 12 for meta-analysis. Seven studies were classified at high risk of bias, and 8 studies raised some concerns. No significant differences between the endodontic materials were observed in the direct comparisons, both in risk and in intensity of postoperative pain (pairwise comparisons with 2 studies: I2 = 0%; p > 0.05 and 8 studies: I2 = 23%; p > 0.05, respectively). The certainty of the evidence was graded as low or moderate. There was no difference in the risk and intensity of postoperative pain after filling with different endodontic sealers. Further systematic reviews should be conducted.