The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
APT attack has caused chaos in society since 2006. Especially, the vulnerability of the infrastructure is exposed to the outside a lot due to the development of the IT infrastructure in Korea. In addition, APT attacks targeting companies' major confidential information are increasing every year. APT attack causes negative publicity for the company and financial damage. APT is completely different...
Cloud Adoption is associated with a number of risks. Modeling risk management in cloud adoption becomes imperative. Cloud adoption risk analysis model (CARA) is designed to guide companies through the process of cloud adoption. It calculates the potential losses on the basis of various risk scenarios. It also guides through cloud service provider selection.
There are several key differences between ISO/DIS 9001:2015 and its predecessors. One of the differences is the standard incorporates risk-based thinking in requirements for the establishment, implementation, maintenance and continual improvement of the quality management system. The Design Failure Modes and Effects Analysis (Design FMEA) and Process Failure Modes and Effects Analysis (Process FMEA)...
The cost-optimal trend in global competitive environment has led to lean, complex and consequently vulnerable supply chains. This vulnerability is high due to the presence of increasing dependency in lean supply chain networks. Hence, it is essential for companies to regulate the supply chain network structure and information sharing strategies so as to be more resilient to disruptions/risks. In order...
In the view of supply chain finance, the default risk of the enterprise not only exists within the enterprise, but also gets along with between two enterprises, which makes it more essential to evaluate the default risk of the whole supply chain. This paper addresses on the contagion of the risk between two enterprises, selecting the financing enterprises as the research object and taking two enterprises...
Small and medium-sized enterprises play a very important role in China's economic and social development. Their development is inseparable from the financial support, and the development of credit business is also an important aspect of bank's operation. At the time of solving the problem of financing difficulties of small and medium-sized enterprises, how to manage credit risk will become an important...
In response to the international trend, in recent years companieshave officially adopted the International Financial Reporting Standards (IFRSs) and need to perform upgrade or adjustment to their Enterprise Resource Planning (ERP) systemsfor the IFRS conversion. Information technology (IT) governance in an ERP system environment will become akey that cannot be ignored by the management. To investigate...
Researchers have found that approximately 70% of information systems development projects in Japan have failed, thus increasing the demand for solutions that will raise expected project success rates. It is said that to improve success rates, it is essential that risk management should be conducted at an early stage. Although risk management is an important process that a project focuses on, it is...
The transformation of traditional power systems to smart grids brings significant benefits, but also exposes the grids to various cyber threats. The recent effort led by US National Electric Sector Cybersecurity Organization Resource (NESCOR) Technical Working Group 1 to compile failure scenarios is an important initiative to document typical cybersecurity threats to smart grids. While these scenarios...
Focusing on the new power reform, behavioral models of market participants are established in this paper to describe China's power market in the future and risk factors are listed based on the models. For the risk assessment of market participants, "Stress testing" in financial field is applied to China's power market to present how the risk factors impact on the tested factors.
The paper discusses the issues of risk analysis of Business Intelligence on the basis of Cloud platforms. The study gives an account on various aspects of the issue such as benefits and risks, financial appliance, and a factual process of data analysis. The paper attempts to address the issue in terms of empirical knowledge as long as numerous organizations face difficulties concerning appropriate...
Outsourcing services have been one of the strategic measures adopted with regard to directing the focus of a company to its core business. However, companies which try to adopt Information Technology outsourcing have been faced with several threats. Therefore, the purpose of this paper is to show the applicability of an existing risk management model to deal with uncertainties in outsourcing services...
In today's increasingly risky and uncertain business and industrial environments, supply chains need to be more flexible and more robust to improve their performance. During the last decade supply chain risk management has emerged as a challenge on the strategic and operational supply chain issues. A deeply analysis of a case study has revealed that modern retail industry needs decision support tools...
Nowadays, Small and Medium Enterprises (SMEs) that hold a better competitive position have adopted technology as their key element to become competitive in a globalized market. In Mexico, 72% of the employment of the country and 52% of the GDP comes from SMEs. The importance of keeping alive and working such entities is crucial for the country and one key element is related to their first years. The...
The directive 2006/42/EC sets out essential safety requirements that a machine manufacturer has to meet, before its products may be sold on the European market. The core procedure to meet the provisions of the directive is the so called risk assessment. At present, the risk assessment in the industrial environment is often carried out in an unsystematic way and isolated from the entire product development...
This paper presents a prototype for a risk project management game template (PrimaGate). The template was developed in order to offer instructors and learners a flexible tool to build or adapt project risk management games that could be included as part of the curriculum to teach project management. The core focus of the design was to create a learning environment that facilitates the involvement...
Risk handling and evaluation plays an importantrole in optimizing an investment portfolio. This paper's goal isto describe a system that determines, classifies and handles riskassociated to any type of investment based on sentiment analysis, price movement, information related to companies, certain characteristics, the traders confidence level, and by measuring thepotential loss over a certain period...
Given the increasing dependence of our societies on network information systems and the efforts being provided by security communities to secure their networks, a strong sense of insecurity still prevails. Therefore, there is a need for new countermeasures against these cyber-attacks which causes disruption to business processes. The evaluation approaches to detect and assess the security risk level...
With the rising popularity of Web applications and cloud computing technology, a secure cloud computing environment is one of the main concerns. Currently, enterprise cloud platforms often rely on their maintenance and operation, and medium and small companies cannot effectively save manpower information security costs, and thus has affected the willingness of enterprises to use cloud services. In...
It has been noticed that one of the main problems with R&D projects is the high amounts of risk. Standard risk management practices have historically proven to be inadequate in R&D project where not all aspects of the project are known. The problem with the risk management process is not the management of the risks but the lack of identification of risks. Standard risk identification techniques...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.