The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Much of the debate surrounding risk management in information security (InfoSec) has been at the academic level, where the question of how practitioners view predominant issues is an essential element often left unexplored. Thus, this article represents an initial insight into how the InfoSec risk professionals see the InfoSec risk assessment (ISRA) field. We present the results of a 46-participant...
The paper considers the risk management improvement issues of the SIEM-system relevant nodes based on calculations of objective evaluations to improve the reliability of subjective assessments, and improving the protection of information resources in information systems. This technique is intended for the organization of information operational protection in the company information systems in real...
More and more companies are introducing Bring Your Own Device (BYOD), in which employees utilize their own smart phones and tablets for business. However, using private terminals for business presents risks, such as leakage of business information or an employee's personal information. This paper discusses a risk assessment of BYOD in an enterprise. Specifically, it analyzes and evaluates with the...
The most recent international reports of security issues documented a growing number of cybernetic attacks to Industrial Control Systems. Therefore, an increase of information technology implementations in manufacturing processes arose offering solutions in Information Security of the involved manufacturers and professionals. In this respect, a notable tendency emerges in which information security...
The article is devoted to the actual problem of regional development — the development of a process model of risk management in the system of management of strategic sustainability of cargo motor transport enterprises. The article discusses the concept of ‘strategic stability of freight transport companies’. Application of the process approach reasoned in this study. To build a process model of risk...
The performance of a business rests on the capability to co-ordinate complex decision making and this requires information sharing across space and time between the business entities. Thus, it is important to have an information system which aligns well with the needs of the firm, and is able to handle disruption risks. This paper integrates the risk factors with other factors when selecting an information...
Business process compliance means to ensure that business practice and processes are aligned at relevant laws and industry standards. This means for companies to comply with an increasing number of rules of different origin and complexity. Especially purchasing activities are affected by various regulations that affect the whole supply chain. Companies then need to assure that compliance regulations...
Risk management plays an important role in automobile insurance. Risk classification is the first step in risk management. In order to classify the risk levels of the insured, we provide Analytic hierarchy process(AHP) to identify the risks. Firstly risk factors of automobile accidents are identified according to the theories of accident causation. Then AHP is used to calculate the weighs of risk...
Bonus-malus system (BMS) in motor vehicle insurance is an incentive system to encourage people to drive more carefully. At present, the transfer rule of BMS is related to claim numbers only and it is unfair for the insureds with small claim amounts. In order to establish a scientific Bonus-malus system, we provide hazard identification method to optimize it. By analyzing risk factors of motor vehicle...
To ensure success and quality of a software, early identification and prioritization of the risk is necessary. Risk impacts the cost and duration for of a software. As agile practices of software development prevail over traditional software development, so they are used in present scenario. This paper proposes an Agile based Risk Rank (AR-Rank) method for the prioritization of risk factors in agile...
The big question of how to successfully complete the project with its constraints always exist with every project. Some set of rules and patterns are needed for project management. Project management strategies provide us set of standards and rules to successfully complete the project and project management viewpoints are one of them. In this paper we have considered most effecting views on information...
More and more companies go abroad to response to China's policy “the Belt and Road”. However, many companies suffer from great loss when they go out so that estimate risks factors in overseas project is very important. The interactions between the complex factors can be structured in a model that can help one to make a rational judgment. The EPC Contract risk model developed in this study is based...
With the deep development and implementation of the Chinese “the Belt and Road” strategy, more and more Chinese project contracting enterprises are rapidly stepping towards the international project contracting market and join the market competition. Meanwhile, these enterprises are faced with more complex and harsh risks overseas. Under a series of new situations, such as complicated and changing...
Mature companies have good standards, specifications and maybe even an electrical safety program, but do they know how well these actually work? Verifying how sites perform against the company internal, external standards and processes, usually will involve an element of self-assessment, self-verification and then an external assurance view. The paper will take the reader along the journey the company...
The operation of insurance companies accumulates several risks that should be managed. One of the risk management and containment types is reinsurance. Risks related to reinsurance are the following: fluctuation risk, risk of errors, risk of change, risk of prediction and assessment, subjective risk, and premium delay risk. Reinsurance as the limiting type of fluctuation risk is a transaction, under...
As the union of information technology and financial reporting, the corporate information disclosure based internet brings the revolutionary transformation to the accounting reporting mode. In China, the construction of internet corporate information disclosure is one of the eight core patterns of China's accounting reform. Which risk is Corporate information disclosure facing? What kind of regulatory...
An exporter is invariably exposed to currency risk due to unpredictable fluctuations in the exchange rates, and it is of paramount importance to minimize risk emanating from these forex exposures. The currency risk problem is further compounded if the future foreign currency receivables are uncertain in quantity. In this paper, we address the currency risk hedging problem for an uncertain foreign...
To be competitive, a new product should present an innovative advantage while being achievable. To ensure the success of a New Product Development (NPD) project, specific skills and resources are required. Most often, if a product is complex, a unique company doesn't have all the competences to provide the complete product. In this case alliances must be formed to create a collaborative network that...
In an ever changing business environment, in order to bring value, security risk management must keep engaged at pace with the company, by following the enterprise goals and using the same methodologies as core business units. This paper analyses how information security risk management can be automated and interlinked with the processes in a software development company, using an Agile approach with...
Protecting intellectual property and confidential customer details from network based attacks is becoming increasingly difficult in modern times due to a dramatic increase in online based attacks. For companies such as The NPD Group, protecting this confidential information is key in keeping a positive perceived image while also doing its utmost to protect vital I. P. This paper proposes an architecture...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.