The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In the course of performing their duties, system security engineers must develop a detailed understanding of cyber systems, the missions those systems support, the associated cyber threat, and the risk the threat poses to mission. They use this information to specify and track cyber requirements, security controls, and the architectural aspects that allow the controls to be coordinated and implemented...
Risk management is a critical part of every industrial activity. In recent years, due to the complexity, importance and potential impacts of industrial processes, risk analysis has taken advantage of increasing computational availability to deliver tools at every level of the risk management spectrum. Bow-tie models, so called because of their generalized shape, are used at various levels in the risk...
Mathematic and simulation modeling is for an analysis, modeling and prediction of stochastic phenomena in the operation, maintenance, logistics, risk assessment very favorable, first of all for a possibility of monitoring through graphic outputs, which give more visual perception about stochastic processes.
A risk is the possibility that an undesirable event could happen. Several risk management software tools have been developed in the past to address pressing industrial concerns such as risk identification and estimation, risk exposure, mitigation and keep track of risk positions and respective management plans. Several methods have been developed and used in risk assessments. Two specific methods...
It is growing rapidly that Chinese enterprises invest resource abroad in recent years, but there is a higher percentage of failure. So, this paper presents CFaR (Cash Flow at Risk) evaluation model of risk warning for international resource investments. This evaluation model dynamically reflects the degree of project risk and cash flow status, with using the cash flow as the considering indexes and...
In this paper, an overall analysis was carried out of the factors influencing the safety system of the subway running tunnel, taking the case of Wuhan subway project, and a hierarchy structure model is established. On the basis of the comprehensive evaluating risk of fuzzy synthetic judging model, maximum degree of membership principle and R=P×C, this paper has determined the risk rank of the tunnel...
This paper presents a method to analysis a disaster's subsequent risk in a comprehensive manner by using both GIS and disaster theory. Secondary disaster should always be considered because it can often cause worse problems if people are left unconscious and unprepared. Here GIS was used as an essential tool to seek risk source of secondary disasters which can be induced by original disaster at certain...
The planning and effective usage of resources is a major challenge for organizations. More than ever through the global interconnections and the current economic situation the domain of resource allocation gains importance. Thus, within this paper we contribute to this research field by introducing a novel approach for dynamic activity and resource allocation using risk-aware business process simulations...
A quantitative risk evaluation method for network security is proposed based on analyzing the process that attackers intrude network. The analysis depends on modeling attack activities and attack processes by tracking the transferring of safety states. Three key factors of risk evaluation about assets, threats and vulnerabilities are identified and quantified. Especially the attack probability indexes...
As P2P system has dynamic open and anonymous characteristics, and these seriously restrict P2P system of cooperation between the users and system reliability and availability. To solve the above problems, a trust model of P2P network based on reputation and risk is presented. Taking into account the influence on the calculation of confidence at different periods of trading, time decay function which...
The purpose of this paper is to develop a conceptual model for e-government acceptance in public sector which is one of the least studied aspects of e-government. The proposed model uses theories from technology acceptance and success and the diffusion of ICT-related innovations. It integrates constructs from the technology acceptance model (TAM), the theoretical extension of the TAM (TAM2), the diffusion...
Understanding and effectively communicating the spectrum of risk and reliability analysis classes is critical for an analyst to contribute to a team working on developmental space exploration architecture, mission, vehicle, or technology design. The proper characterization of class prior to the risk and reliability analysis can help calibrate stakeholder expectations with regard to required data inputs...
This paper analyzes all possible kinds of risks in the executive process of BOT projects bidding program and studies the problems of risk assessment of BOT projects bidding program. First of all, this paper constructs the indicator system of risk evaluation from the point of main sources of risk. Then, it makes the appraisal for the risk evaluation model of BOT project bidding program with the method...
The proper application of incentive mechanism in construction project can decrease project cost. However, current incentive methods donpsilat consider the change of human needs in construction and are inadequate to analyze the impacts of incentive factors allocation on project risk and cost due to the complexity and dynamics of the project in a real world. And therefore, there is a need for a model...
Nowadays organisations are subjects to frequent changes requiring continuous alignment of business processes. In the adaptive digital business ecosystems (DBEs), agile value chains and the cluster-based bundling of business partners are an essential characteristic. While the resulting flexibility holds opportunities, it increases initially uncertainty. In order to support such organisations to increase...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.