The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper addresses the potential of mathematical modelling in support of the classical security risk assessment and treatment approach. Classical security risk assessment and control selection is strongly based on expert judgment. Within the context of large scale system implementation in air traffic management, there is only a limited availability of resources during the system engineering phase...
Power system operation risk assessment can comprehensively take into account the occurrence possibility and severity of disturbances, and it is an effective complement to traditional deterministic security analysis. Calculating transient state probability of components in future short time duration is one of the key issues in power system operation risk assessment. In this paper, a novel probability...
With the increasingly security problems in networks and systems, the evolution of development models that underlie current tools and techniques is all that is required to produce a model of self-defense where all the components are self-protected. The great extension of current models recommends a reasonable transition fundamentally based on the family of standards ISO/IEC 31000, where the selection...
On the basis of determining the space scale of the regional risk assessment recognized and analyzed the risk source with the systematic engineering principles and methods, and set up a fuzzy comprehensive evaluation system. And then set up the evaluation system of Petrochemical Area in Huang Dao by using fuzzy comprehensive evaluation and MATLAB and GUI technology, and it will supply technical support...
Several reports indicate that one of the most important business priorities is the improvement of business and IT management. Nowadays, business processes and in general service-based ones use other external services which are not under their jurisdiction. Organizations do not usually consider their exposition to security risks when business processes cross organizational boundaries. In this paper,...
The indices system of risk review and a multi-level fuzzy synthetic evaluation model of virtual enterprise based on entropy-weighted were established. Not only make full use of the indices information. But also avoided subjective sense of weight-coefficient,and it mends the shortage of traditional synthetic evaluation methods. The practicality and reliability of the method is demonstrated in a example.
The current ubiquity of information coupled with the reliance on such data by businesses has led to a great deal of resources being deployed to ensure the security of this information. Threats can come from a number of sources and the dangers from those insiders closest to the source have increased significantly recently. This paper focuses on techniques used to identify and manage threats as well...
Because agents are not properly described by current measurement of risk, After analyzing and summarizing the definition and measurement of risk, according to prospect theory, this paper find out reasons are description of risk's two traits doesn't accord with human cognitive psychology and same measurement is used in the different frame of winning state and lost state because reference point is chose...
A large number of non performing assets in financial institutions is an important reason for causation and deterioration of financial crisis. Asset securitization is considered the effective way to deal with NPA. The key issue of restricting securitization is the selection of NPA. Firstly this paper introduced definition and market players of asset securitization. Secondly, it put forward the principles...
This paper discusses the problem of portfolio selection in fuzzy environment. We propose an active portfolio management approach which has practicable steps in fuzzy environment. Since Economic Value Added reflects the true value of enterprises from shareholders' perceptive, we innovatively use the management idea of Economic Value Added to select perspective securities. Then considering the intuitive...
This paper presents a causal assessment model based on Bayesian Belief Networks to analyze and quantify information security risks caused by various threat sources. The proposed model can be applied to a variety of information security evaluation tasks, risk assessment, software development projects, IT products, and other decision making systems. This unique concept can also be used for the determination...
Any significant decision making process involves dealing with many complexities including spatial interactions, temporal changes, interdependencies between system components and risk and uncertainties associated with decision choices. In this paper, we attempt to capture part of these complexities using an evolutionary game theoretic framework. At the heart of this framework is a game called InterDependent...
Security and economy are long standing underpinnings for power system operation. The evolution from regulated utility operation to competitive markets operation led to more formalized treatment of economy and security concerns through the deployment of market clearing applications that are based mathematical programming methods. Among the most common market clearing applications are security-constrained...
Risk control is an eternal topic in security investment a research focus in financial economics. Under the base of traditional Markowitz portfolio model, erect portfolio model with uncertainty of expire time by using of CVaR. Then solve the relevant empirical model by genetic algorithm, obtain the optimal allocation of the securities portfolio.
SOA and cloud computing have brought new opportunities for the long expected agility, reuse and the adaptive capability of IT to the ever changing business requirements and environments. But due to the immature nature of the rapidly evolving technologies, especially in the areas of security, service or information integrity, privacy, quality of service and their possible detrimental consequences,...
With the rapid development of industrialization and urbanization, crime prevention issues become serious in China each day. Although various security facilities have played a positive role in the field of crime prevention, defects exist in poorly designed systems targeting personnel protection, physical protection, and electronic protection. Therefore, it is a major strategic task to improve risk...
Information security managers with fixed budgets must invest in security measures to mitigate increasingly severe threats whilst maintaining the alignment of their systems with their organization's business objectives. The state of the art lacks a systematic methodology to support security investment decision-making. We describe a methodology that integrates methods from multi-attribute utility evaluation...
With the development of economic and continuous improvement of people's living standard, many people have paid more attention to the issue of community security so that a lot of crime prevention systems are installed around the community in recent five years. How to measure the community risk scientifically and make full play to the protection effectiveness on crime prevention system is the complex...
The planning and effective usage of resources is a major challenge for organizations. More than ever through the global interconnections and the current economic situation the domain of resource allocation gains importance. Thus, within this paper we contribute to this research field by introducing a novel approach for dynamic activity and resource allocation using risk-aware business process simulations...
As the most valuable resource, information has become a key factor in deciding the levels of national productivity and economic growth. But there are lots of risks in the implementation. Risk assessment is an effective approach to evaluate security state of information system. In this paper a model of information system risk assessment based on its characters of incompleteness and ambiguity is presented...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.