• Title/Summary/Keyword: risk information

Search Result 6,166, Processing Time 0.031 seconds

Risk Sharing in a Supply Chain (공급사슬에서의 위험공유)

  • Ahn, Seongje
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.28 no.4
    • /
    • pp.115-129
    • /
    • 2003
  • This paper suggests that the profit sharing contract can be Pareto optimal for both supplier and the purchaser. It is shown that Pareto optimal risk sharing contract can be obtained even though the decisions are made in a decentralized manner. The effect of risk attitude of the members of the supply chain is discussed. We examined various aspects of the risk sharing contract such as risk altitude, bargaining power, and cost of information system. The different risk attitude changes the optimal parameters and decision variables. Especially, we proved that, when both the supplier and the purchaser are risk averse, the purchaser orders less quantity than when the one is risk neutral and the other is risk averse. If the fixed cost for the information system is big enough to satisfy a certain condition, it is Pareto optimal not to share the profit and the purchaser takes all the risk even though he is risk averse.

Development of Semantic Risk Breakdown Structure to Support Risk Identification for Bridge Projects

  • Isah, Muritala Adebayo;Jeon, Byung-Ju;Yang, Liu;Kim, Byung-Soo
    • International conference on construction engineering and project management
    • /
    • 2022.06a
    • /
    • pp.245-252
    • /
    • 2022
  • Risk identification for bridge projects is a knowledge-based and labor-intensive task involving several procedures and stakeholders. Presently, risk information of bridge projects is unstructured and stored in different sources and formats, hindering knowledge sharing, reuse, and automation of the risk identification process. Consequently, there is a need to develop structured and formalized risk information for bridge projects to aid effective risk identification and automation of the risk management processes to ensure project success. This study proposes a semantic risk breakdown structure (SRBS) to support risk identification for bridge projects. SRBS is a searchable hierarchical risk breakdown structure (RBS) developed with python programming language based on a semantic modeling approach. The proposed SRBS for risk identification of bridge projects consists of a 4-level tree structure with 11 categories of risks and 116 potential risks associated with bridge projects. The contributions of this paper are threefold. Firstly, this study fills the gap in knowledge by presenting a formalized risk breakdown structure that could enhance the risk identification of bridge projects. Secondly, the proposed SRBS can assist in the creation of a risk database to support the automation of the risk identification process for bridge projects to reduce manual efforts. Lastly, the proposed SRBS can be used as a risk ontology that could aid the development of an artificial intelligence-based integrated risk management system for construction projects.

  • PDF

A Study on the Effect of Information about Risk on Decision Making (위험에 대한 정보의 제공이 의사결정에 미치는 영향)

  • 장경수;홍근표
    • The Journal of Information Technology
    • /
    • v.2 no.2
    • /
    • pp.51-67
    • /
    • 1999
  • This study investigates the effect of information about risk on investment decision making. The model was constructed with two independent variables and two dependant variables. The first independent variable deals with whether information about risk is provided or not. The meaning of information about risk is the degree of uncertainty for investment decision making. The other independent variable involves attitude toward risk, such as the degree of tolerance for risk. Two dependant variables are concerned with the effect on investment decision making, such as the degree of riskiness of decision making and decision confidence, respectively. This study deals with the investment decision in options on stock indices. The findings of this study are as follows. The more the degree of tolerance for risk, the more the degree of decision confidence. This means that risk-taker has more desire for achievement than risk-avoider has. And the message alerting risk of investment decision making takes little effect on investment decision making.

  • PDF

Development of a Product Risk Assessment System using Injury Information in Korea Consumer Agency (한국소비자원 위해정보를 활용한 제품 리스크 평가시스템 개발)

  • Suh, Jungdae
    • Journal of Digital Convergence
    • /
    • v.15 no.4
    • /
    • pp.181-190
    • /
    • 2017
  • Recently, safety accidents of daily necessities such as humidifier disinfectant, mobile phones, and infant diapers, have occurred frequently. To protect consumers from these accidents, product safety management is required, and a product risk assessment tool is needed to evaluate the degree of safety of the product. In this paper, we have constructed RAS, which is a system that can evaluate product risk based on injury information of product accident in Korea Consumer Agency. RAS consists of an injury information analysis system for analyzing accident-related information and a risk assessment system for assessing risk using information derived from the system. The Bayesian network - based probabilistic method is applied to reflect the causal relationships that affect product risk in the risk assessment process. We used RAS to evaluate 33 children's products and compared them with the results of EU RAPEX RAG. Subsequent tasks include reducing the subjectivity of the input of the accident impact scale, and linking the above two systems.

The Effects of Consumers' Perceived Privacy Control on Perceived Privacy Risk in Location-Based Services

  • Lee, Joohee;Kim, Songmi;Kim, Wonjoon
    • International Journal of Contents
    • /
    • v.13 no.1
    • /
    • pp.22-30
    • /
    • 2017
  • The diffusion of advanced mobile technology has introduced new types of personal information or 'location data'. These new data mean new opportunities for businesses, such as location-based services (LBS), but have resulted in new consumer anxieties regarding disclosure of personal information. This study examines the effects of the consumers' perceived control over "time-andplace" information in location-aware services on their perceived privacy risk. A total of 270 respondents participated in this study. Conditions of perceived privacy control were operationalized over time-and-place information, in a $2{\times}2$ factorial design. Results indicate that the perceived control over time-and-place personal information is a significant predictor of perceived risk, and control assurances over time-and-place information enhances the perception of control, thus alleviating the perceived risk. In addition, the effect is much more significant when time and place were combined.

Security Risk Assessment in Conducting Online Exam

  • Danah AlDossary;Danah AlQuaamiz;Fai AlSadlan;Dana AlSharari;Lujain AlOthman;Raghad AlThukair;Ezaz Aldahasi
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.6
    • /
    • pp.77-83
    • /
    • 2023
  • This research is conducted to minimize the potential security risks of conducting online exams to an acceptable level as vulnerabilities and threats to this type of exam are presented. This paper provides a general structure for the risk management process and some recommendations for increasing the level of security.

The Influences of Restaurant Consumers' Electronic Word-of-Mouth(E-WOM) Information Communication on Product Perception Risk, Benefit and WOM Effect

  • Heo, Yeong-Uk
    • The Journal of Economics, Marketing and Management
    • /
    • v.6 no.4
    • /
    • pp.51-64
    • /
    • 2018
  • Purpose - This study is intended to look into the influences of restaurant consumers' e-WOM information communication on product perception risk, benefit and WOM effect. Research design, data, and Methodology - To achieve this, a survey was empirically carried out to 426 restaurant consumers. Results - The findings are as follows. First, the influence of e-WOM on product perception risk showed that WOM information sender characteristics, WOM information recipient characteristics and online community had a statistically significant positive influence on product perception risk. Second, the influence of e-WOM on product risk benefit showed that WOM information sender characteristics, WOM information recipient characteristics and online communication had a statistically significant positive influence on product risk benefit. Third, WOM risk perception had a statistically significant positive influence on WOM acceptance. Fourth, WOM risk benefit had a statistically significant positive influence on WOM effect. Conclusions - As for the above-mentioned findings, the communication between e-WOM sender and recipient had a positive influence on the product evaluation and attitude change in the restaurant industry, and the WOM effect had an influence on the financial performance and non-financial performance. The communication attaches importance to a direct using and tasting experience due to the nature of restaurant industry when it is simultaneously performed as a positive mechanism between sender and recipient through each channel of these factors. But the e-WOM culture can lead to the WOM effect when both sender and recipient share the persuasive communicability in reality that diversifies communication methods, having a positive influence on the management performance.

A Generalized Partly-Parametric Additive Risk Model

  • Park, Cheol-Yong
    • Journal of the Korean Data and Information Science Society
    • /
    • v.17 no.2
    • /
    • pp.401-409
    • /
    • 2006
  • We consider a generalized partly-parametric additive risk model which generalizes the partly parametric additive risk model suggested by McKeague and Sasieni (1994). As an estimation method of this model, we propose to use the weighted least square estimation, suggested by Huffer and McKeague (1991), for Aalen's additive risk model by a piecewise constant risk. We provide an illustrative example as well as a simulation study that compares the performance of our method with the ordinary least squares method.

  • PDF

Identifying Potential Opportunities of BIM for Construction Risk Management (BIM을 이용한 건설리스크 해결 가능성 도출)

  • Won, Jongsung
    • Proceedings of the Korean Institute of Building Construction Conference
    • /
    • 2019.11a
    • /
    • pp.201-202
    • /
    • 2019
  • This paper aimed to identify potential opportunities of building information modeling (BIM) utilization for construction risk management. Construction risk factors and BIM functions were derived through conducting in-depth literature review. Nineteen construction risk factors could be resolved by various BIM functions. Phase planning, site analysis, design authoring, and 3D design coordination were identified as the most efficient BIM functions for construction risk management.

  • PDF

A Risk Analysis Methodology for Information Systems Security Management (정보시스템 보안관리를 위한 위험분석 방법론)

  • 이문구
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.41 no.6
    • /
    • pp.13-22
    • /
    • 2004
  • This study proposes a risk analysis methodology for information system security management in which the complexity on the procedure that the existing risk analysis methodology is reduced to the least. The proposed risk analysis methodology is composed of 3 phases as follows: beforehand processing phase, counter measure setting phase, post processing phase. The basic risk analysis phase is a basic security management phase in which fixed items are checked when the information security system is not yet established or a means for the minimum security control is necessary for a short period of time. In the detailed risk analysis phase, elements of asset a vulnerability, and threat are analysed, and using a risk degree production table produced from these elements, the risk degree is classified into 13 cases. In regard to the risk, the 13 types of risk degree will execute physical, administrative, and technical measures through ways such as accepting, rejecting, reducing, and transferring. Also, an evaluation on a remaining risk of information system is performed through a penetration test, and security policy set up and post management phase is to be carried out.