Academic literature on the topic 'Perception of security risks'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Perception of security risks.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Perception of security risks"

1

Taylor, Richard G., Jeff Brice, Jr., and Sammie L. Robinson. "Perception deception: security risks created by optimistic perceptions." Journal of Systems and Information Technology 18, no. 1 (March 14, 2016): 2–17. http://dx.doi.org/10.1108/jsit-07-2015-0062.

Full text
Abstract:
Purpose – The purpose of the paper is to determine whether management’s optimistic perceptions of their organization’s level of information security preparedness can ultimately result in increased information security risks. Design/methodology/approach – A case study was conducted in a financial institution. In all, 24 employees were interviewed. These employees came from all functional areas and various positions, from tellers to executives. Interviews were conducted, internal policies and examiners’ reports were made available and access was given to observe the employees during working hours and to observe the facilities after hours. Findings – Executives were overly optimistic about the level of information security at their organization. These optimistic perceptions guided security priorities; however, the findings show that their perceptions were misguided leaving their organization open to increased security threats. More specifically, the results show that optimist perceptions by management can put an organization’s information at risk. Originality/value – The paper uses existing theory and evaluates it in a “real-world” setting. For security research, it can be difficult to get honest responses from questionnaires; however, the hands-on approach provided a deeper insight to the problem of optimistic perceptions in an organizational setting. For practitioners, the case can raise managements’ awareness of perceptional inaccuracies, resulting in more informed information security decisions and ultimately improved security for their organization.
APA, Harvard, Vancouver, ISO, and other styles
2

Veebel, Viljar, and Illimar Ploom. "Estonian Perceptions of Security: Not Only About Russia and the Refugees." Journal on Baltic Security 2, no. 2 (December 1, 2016): 35–70. http://dx.doi.org/10.1515/jobs-2016-0046.

Full text
Abstract:
Abstract The current study focuses on the Estonian perceptions of security and on the defence situation both globally and locally. The dynamic results of the public opinion surveys on security risks conducted in Estonia over the last 10 years (2006-2016) will be presented. In addition, to understand whether some of the security risks could be over- or underestimated in Estonia, these results will be compared with the views expressed recently by the World Economic Forum, particularly the Global Risks Report 2016. Also, the arguments why some topics have played or are currently playing key role in the Estonian security perception will be presented and discussed.
APA, Harvard, Vancouver, ISO, and other styles
3

Krajňák, Tomáš, and Jiří Vágner. "Political security risks for tourism: The spatial perception of the Middle East by potential Czech tourists." Geografie 123, no. 3 (2018): 379–405. http://dx.doi.org/10.37040/geografie2018123030379.

Full text
Abstract:
Safety and security aspects represent crucial factors that influence tourist behavior. This process is not always rational but rather based on perception. Tourism in the examined area of the Middle East operates in an environment of political security risks, but the region also represents some geographic and geopolitical ideas that are still absent in the Czech scientific milieu. Our research analyzes the perception of political security risks for incoming tourism in the Middle East from the perspective of potential Czech tourists. The main research tool, a questionnaire, collected data (2016) that were analyzed with the help of descriptive statistics and statistical inference. Findings indicate that potential Czech tourists spatially do not generalize risks in the Middle East. Nevertheless, an inner circle with spill-over effect can be identified. Surprisingly, results show a relatively optimistic perception of risks. Sociodemographic features, such as gender, age, and travel characteristics (especially psychographic type of tourist) play an important role in the perception.
APA, Harvard, Vancouver, ISO, and other styles
4

Urciuoli, Luca, and Juha Hintsa. "Differences in security risk perceptions between logistics companies and cargo owners." International Journal of Logistics Management 27, no. 2 (August 8, 2016): 418–37. http://dx.doi.org/10.1108/ijlm-02-2014-0034.

Full text
Abstract:
Purpose – Supply chain stakeholders may perceive security risks differently and thereby misalign mitigation strategies. Hence, causing weak spots in supply chains and thereby disruptions. The purpose of this paper is to determine whether supply chain companies actually perceive security risks and effectiveness of mitigation strategies differently. Design/methodology/approach – Two survey studies measuring perception of security risks and effectiveness of measures have been developed and used to collect data from European and Latin American companies, grouped as cargo owners and logistics companies. Findings – The findings of the surveys unveil that only two (out of six) security risks, namely, violation of customs non-fiscal regulations and illegal immigration, show significant differences between the two groups of companies. In addition, the surveys show that companies perceive equally the effectiveness of security measures. This study concludes that supply chains seem to have good visibility over the security risks of their partners. Hence, in terms of security, supply chain companies seem to have achieved a common understanding of risks and furthermore are able to act jointly to secure assets and operations. Originality/value – Previous research claim supply chain stakeholders may perceive risks differently and thereby may fail to correctly align mitigation strategies. Yet, to the authors knowledge, previous research has not empirically demonstrated these differences in perceptions of risks and mitigation strategies.
APA, Harvard, Vancouver, ISO, and other styles
5

Blasek, Roman. "Perception of security risks by the population of the Czech Republic." Journal of Slavic Military Studies 11, no. 3 (September 1998): 89–96. http://dx.doi.org/10.1080/13518049808430351.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Omelchenko, Daria A., Svetlana G. Maximova, and Oksana E. Noyanzina. "PERCEPTION OF SOCIAL SECURITY IN REGIONS OF THE RUSSIAN-ASIAN BORDERLAND (ON THE EXAMPLE OF THE ALTAI REGION)." Society and Security Insights 3, no. 1 (April 8, 2020): 13–36. http://dx.doi.org/10.14258/ssi(2020)1-01.

Full text
Abstract:
Social security is an important priority of the State policy, embracing other kinds of security as essential prerequisites for its provision. Sociological surveys based on psychosemantic methodology, fulfilled in one of the regions of Russian-Asian borderland (the Altai region, 2019, n = 75) have found that social security in the region is primarily defined by its population through probability of realization of economic risks — loss of income, livelihoods and creditworthiness, and depends on expression of nutritional and transport risks, risks of fatal diseases, negligence or incompetence of specialists in different fields of social practice. Social-economic instability and distrust towards basic social institutions, responsible for the security and safeguarding the life and health, form negative attitudes of population about social security.
APA, Harvard, Vancouver, ISO, and other styles
7

Almeida, Fernando, José Pinheiro, and Vítor Oliveira. "Social Network Security Risks and Vulnerabilities in Corporate Environments." International Journal of Applied Management Sciences and Engineering 6, no. 1 (January 2019): 14–28. http://dx.doi.org/10.4018/ijamse.2019010102.

Full text
Abstract:
Increasingly social networks are used both in the personal and professional levels, being companies and employees also exposed to the risks posed by them. In this sense, it is relevant to analyze employees' perception of the risks and vulnerabilities posed by the use of social networks in corporate environments. For this purpose, a questionnaire was developed and distributed to 372 employees of small and medium-sized companies that allowed the characterization and analysis of those risks. The results indicate that the security risks are perceived moderately by employees, emphasizing the risk of defamation and cyberbullying as being the most pertinent. On the other hand, the findings indicate that older employees, the existence of lower academic qualifications, and those working in medium-sized companies are more aware of these risks.
APA, Harvard, Vancouver, ISO, and other styles
8

Porfiriev, Boris. "The Perception and Management of Security and Safety Risks: Implications for International Negotiations." Risk Management 6, no. 4 (October 2004): 9–25. http://dx.doi.org/10.1057/palgrave.rm.8240195.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Groen, Brenda, and Hester van Sprang. "Perceptions of Hospitality and Safety Are Two Sides of the Same Coin." Buildings 11, no. 3 (March 12, 2021): 113. http://dx.doi.org/10.3390/buildings11030113.

Full text
Abstract:
Entering a building is a ‘moment of truth’ and may invoke feelings of hospitableness. Physical environments and staff behaviour deliver ‘clues’ that may result in the experience of hospitality. The focus in a reception area may be on mitigation of risks, or on a hospitable atmosphere, with either a host or a security officer at the entrance. However, the division of tasks to either the pleasing host or the controlling security officer to a certain extent disavows the overlap between perceptions of hospitality and safety. This exploratory qualitative study combines a group interview with three managers responsible for hospitality and security in reception areas and Critical Incidents by staff and visitors (N = 51). Thematic coding was based on The Egg Aggregated Model and the Experience of Hospitality Scale. Results show that hospitality and safety are indeed two sides of the same coin. Usually people do accept security measures, provided that staff act in a hospitable way. A lack of security measures may seem ‘inviting’, but also decreases the perception of care for your visitor, and may cause uncertainty and therefore decrease comfort. A correct risk perception, flexible appliance of security measures, and a friendly approach connect aspects of ‘safe’ and ‘hospitable’ sentiments.
APA, Harvard, Vancouver, ISO, and other styles
10

Julaihah, Umi. "PEMBAYARAN NON TUNAI: PERSEPSI CIVITAS AKADEMIKA FITK UIN MAULANA MALIK IBRAHIM MALANG." J-PIPS (Jurnal Pendidikan Ilmu Pengetahuan Sosial) 2, no. 1 (December 30, 2015): 63. http://dx.doi.org/10.18860/jpips.v2i1.6840.

Full text
Abstract:
<p>Non-cash payment has been promoted by Bank Indonesia since 2006 but, until now many people are still reluctant to use such facilities. This research uses descriptive quantitative research which aims to know the perception of the academic community of the Fakultas Tarbiyah dan Keguruan (FITK) UIN Maulana Malik Ibrahim Malang on usability, convenience, security and risks of non-cash transaction. The results showed that the respondents had a good perception on usability, convenience, security and risks of non-cash transactions. This research also finds that the student group is still using a single type of instrument ie. ATM transaction, while the lecturer-employees group is already using the ATM, SMS banking and Internet banking. Bank Indonesia is expected to educate the public continuously, so people have well financial literacy that would boost the success of non-cash transactions movement in Indonesia.</p><p><strong>Keywords</strong>: perception, payment, non cash</p>
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Perception of security risks"

1

De, Villiers R. R. (Raoul Reenen). "The role of risk perception in Internet purchasing behaviour and intention." Thesis, Stellenbosch : Stellenbosch University, 2001. http://hdl.handle.net/10019.1/52570.

Full text
Abstract:
Thesis (MComm.)--Stellenbosch University, 2001.
ENGLISH ABSTRACT: In recent years the importance and number of users of electronic commerce and its medium, the Internet, have grown substantially. Despite this, the Business-to- Consumer sector has shown slow expansion and limited growth, with the majority of consumers slow to adopt the Internet as a medium for purchase. A probable factor affecting the purchasing behaviour of individuals is the perception of risk of a breach in (credit card) security and/or a violation of privacy. The research discussed here indicates that two closely related constructs, namely perceived privacy risk and perceived security risk exerts an influence on the Internet purchasing behaviour of Internet users, and more importantly, the intention to purchase. In addition, the role of social pressures regarding the provision of personal and credit card information is indicated to be of considerable importance.
AFRIKAANSE OPSOMMING: Die afgelope aantal jare het die belangrikheid en gebruik van eletroniese handel en die Internet aansienlik toegeneem. Ongeag hierdie groei het die sektor gemoeid met die handel tussen besighede en verbruikers egter beperkte groei getoon. 'n Waarskynlike rede vir die tendens in Internet aankoop gedrag is die persepsie dat daar 'n risiko is van misbruik van 'n krediet kaart sowel as misbruik en skending van privaatheid. Die studie wat hier bespreek word toon aan dat twee nou verwante kostrukte, naamlik persepsie van sekuriteits- en persepsie van privaatheidsrisiko 'n rol speel in die bepaling van Internet aankoop gedrag, sowel as die intensie om te koop. Verder is die rol van sosiale druk rakende die verskaffing van persoonlike en krediet kaart inligting uitgelig as 'n faktor van uiterste belang.
APA, Harvard, Vancouver, ISO, and other styles
2

Mabanga, Silingile Portia. "South Africa's official external threat perceptions : 1994-2012." Diss., University of Pretoria, 2013. http://hdl.handle.net/2263/43680.

Full text
Abstract:
The aim of this study is to analyse and critically assess the nature, scope and basis of South Africa‟s official external threat perception as it developed during the period from 1994 to 2012. Accordingly, the assessment allows for the identification of shortcomings in the current national security policy on external security threats, based on the alignment of external threat perceptions with the Government Programme of Action. Essentially what had to be determined is whether perceived official threats correspond with the actual situation. Accordingly, the main research question of the study is: What is the nature, scope and basis of the post-1994 official external threat perception of South Africa? The research problem generated four subsidiary questions: When does a security issue become a national threat? What types of threat are there? How does the South African government perceive these threats? And whose security is threatened? In responding to the main research questions, the study‟s findings note a change in perceptions during the post-Cold War era as to what constituted threats to security. The focus shifted from traditional to non-traditional threats to national security, because most current threats are non-military and transnational in nature. The analysis of South Africa‟s official external threat perception is informed by the changed views of Government towards what are considered the main threats to national security. The study concludes with key findings in response to the stated problem and with specific recommendations. The study confirmed that the nature of threats and security debates post-1994 have changed constantly with the expansion of the security agenda beyond state and military security. The official viewpoint is that South Africa at present is not faced with any military threats. Emphasis is currently placed on human beings as the main object of security. Most identified threats are transnational in nature and these relate to the illegal flow of immigrants, terrorism, organised crime, climate change (linked to food and water security), regional instability and other socio-economic threats. These threats are being perceived and articulated by Government through policy announcements and public speeches, also validated in the critical analysis of various scholars. The concept of non-traditional threats still lacks a commonly accepted definition; hence the study proposes the need for South Africa to define and outline non-military security threats in a comprehensive manner, preferably through the development of a South African External Threat Perception Framework. Developing such a framework will assist security agencies (such as analysts) and other stakeholders in providing advice and guidance to Government in identifying external security threats. This initiative could eliminate the abuse of power by various stakeholders in securitising any issue as a threat to national security, and instead divert those resources to other Government services. Provision should also be made in the form of policy initiatives on the role of military force and other agencies in addressing non-military security threats. Thus, the development of key elements of an integrated national security strategy in order to address external security issues and threats is essential.
Dissertation (MSecurity Studies)--University of Pretoria, 2013.
gm2015
Political Sciences
MSecurity Studies
Unrestricted
APA, Harvard, Vancouver, ISO, and other styles
3

BROOKS, David, and d. brooks@ecu edu au. "Public street surveillance: a psychometric study on the perceived social risk." Edith Cowan University. Computing, Health And Science: School Of Engineering, 2003. http://adt.ecu.edu.au/adt-public/adt-ECU2006.0007.html.

Full text
Abstract:
Public street surveillance, a domain of Closed Circuit Television (CCTV), has grown enormously and is becoming common place with increasing utilization in society as an all-purpose security tool. Previous authors (Ditton, 1999; Davies, 1998; Horne, 1998; Tomkins, 1998) have raised concern over social, civil and privacy issues, but there has been limited research to quantify these concerns. There are a number of core aspects that could relocate the risk perception and therefore, social support of public street surveillance. This study utilized the psychometric paradigm to quantitatively measure the social risk perception of public street surveillance. The psychometric paradigm is a method that presents risk perception in a two factor representation, being dread risk and familiarity to risk. Four additional control activities and technologies were tested, being radioactive waste, drinking water chlorination, coal mining disease and home swimming pools. Analysis included spatial representation, and multidimensional scaling (MDS) Euclidean and INDSCAL methods. The study utilized a seven point Likert scale, pre and post methodology, and had a target population of N=2106, with a sample of N=135 (alpha=0.7).
APA, Harvard, Vancouver, ISO, and other styles
4

Heeb, Alexis. "Violent crime, public perceptions and citizen security strategies in Colombia during the 1990s." Thesis, University of Oxford, 2002. http://ora.ox.ac.uk/objects/uuid:9aa285b1-15e6-402f-a4e8-2f7322c9adc3.

Full text
Abstract:
This research deals with the topic of violent crime in urban Colombia. Although many references are made to the conflict between the State, guerrilla groups and paramilitary organisations in rural areas, and to the problem of drug-cartels and illegal-drug production, the main aim of the thesis is to show recent trends in violent crime and discuss citizen security strategies followed during the decade of the 1990s. Chapter 1 focuses on urban homicides. In Colombia, 40 percent of the 25,000 annual homicides are committed in the ten largest cities. The cities of Medellin, Bogota and Cali account for almost 30 percent of this total. Although the victims are mainly young men from the poorest socio-economic levels, homicides are not necessarily correlated to the areas where the poor live. The probability of getting involved in a homicide, either as a victim or as victimiser, is significantly higher in places where access to economic resources is greater. Chapter 2 analyses the problem of kidnappings. The chapter looks at recent progresses in Colombian anti-kidnapping legislation and focuses on the authors, the victims and the riskzones where most cases take place. Although these crimes affect mainly the rich and the middle class, kidnappers have recently started to target victims from all social backgrounds. This strategy creates fear among citizens and permits kidnappers to extort more fees from people who could be at risk of being kidnapped. Chapter 3 looks at the issue of perception and fear of crime. This question provides a better understanding of the concept of risk and the subjectivity of decision-making when facing insecurity. If citizen security strategies have had little impact during the last decade, it has been partly because of poor levels of co-operation and communication with the population. The consequence of this has been an increasing perception of insecurity and distrust among citizens. Chapter 4 assesses citizen security strategies followed during the administrations of Presidents Gaviria (1990-1994), Samper (1994-1998) and Pastrana (1998-2002). The reforms implemented since the adoption of a new Constitution in 1991 have had important impacts on security strategies as they have given more discretionary powers to civilian authorities, especially at the municipal level. Larger cities like Bogotá, Cali and Medellin, implemented a series of successful programmes that have reduced the levels of violent crime, notably homicides. Other crimes, like kidnappings, have not decreased since the government has lacked a coherent strategy to combine its peace negotiations with insurgent organisations with its legitimate right to fight violent crime.
APA, Harvard, Vancouver, ISO, and other styles
5

Johnson, Kim. "Better Safe than Sorry: The Relationship Between Locus of Control, Perception of Risk, and Cyber Misbehaviors." Scholar Commons, 2018. https://scholarcommons.usf.edu/etd/7630.

Full text
Abstract:
Information security is of vital importance to organizations. Breaches in security very often stem from behaviors of the system operator. Cyber misbehaviors on the part of employees can have devastating repercussions on the well-being of an organization. Up to now, research has mainly focused on how to protect information systems from outside attack, and only recently have researchers turned to the part the operator plays in keeping the systems safe. The present study investigated some individual differences that may play a role in people’s cyber behavior. The purpose of the study was to determine if locus of control was related to an individual’s perception of cyber risk and likelihood of engaging in cyber misbehaviors. Internal locus of control was found to be associated with higher perception of cyber risk, and higher cyber risk perception was found to lead to fewer cyber misbehaviors. The trait sensation seeking was also explored but no firm conclusions could be drawn from those results. Gaining an understanding of some of the differences between individuals that make some more likely to commit cyber misbehaviors-- as well as the dynamics behind these relationships—should be greatly beneficial in helping develop deterrents to cyber misbehavior and keeping information systems safer.
APA, Harvard, Vancouver, ISO, and other styles
6

Nuth, Michael John. "Ontological Security and the Global Risk Environment: A Case Study of Risk and Risk Perception in the Tourist-Dependent Township of Akaroa." Thesis, University of Canterbury. Sociology and Anthropology, 2007. http://hdl.handle.net/10092/988.

Full text
Abstract:
This thesis is about global catastrophic risks and the conscious effect of such risks at the level of everyday life. Utilising R. D. Laing's concept of "ontological security", this thesis questions the extent to which risks that loom in the global environment cause a sense of ontological insecurity amongst individuals at the local-level. In addressing this question, this thesis responds to the theories of Ulrich Beck and Anthony Giddens who maintain that the contemporary age is marked both by the emergence of global risks that exist as the unintended consequences of modernisation and a greater sense of risk owing to how information about such risks is disseminated by the media. While no objection is made to the argument that the global environment has become more objectively threatening, this thesis questions whether individuals in fact perceive such threat in their daily lives. This argument rests on the view that global risks, in the main, lack a tangible dimension needed to elicit a sense of urgency. Seeking to ground the risk literature from the level of theoretical abstraction to that of lived experience, this thesis presents a case study of how risk is perceived in the tourist-dependent township of Akaroa. Despite the fact that New Zealand is generally seen as "safe" and "secure" and removed from the vicissitudes of global events, its economic reliance on international tourism ensures a susceptibility to external forces that disrupt global tourism flows. Given the recent publicity as to how such risks as climate change and peak oil may undermine international tourism in New Zealand, it is clear that areas that are particularly reliant on the international visitor market, like Akaroa, are significantly exposed to global events. This not only makes Akaroa an ideal case study in which to establish the extent to which global risks undermine ontological security in daily life, it also helps measure how seriously individuals in tourist-dependent areas consider the possibility of a substantial tourist decline.
APA, Harvard, Vancouver, ISO, and other styles
7

Hou, Wenliang. "How Accurate are Retirees' Assessments of Their Retirement Risk?:." Thesis, Boston College, 2020. http://hdl.handle.net/2345/bc-ir:108826.

Full text
Abstract:
Thesis advisor: Peter Ireland
Retirees with limited financial resources face numerous risks, including out-living their money (longevity risk), investment losses (market risk), unexpected health expenses (health risk), the unforeseen needs of family members (family risk), and even retirement benefit cuts (policy risk). This study systematically values and ranks the financial impacts of these risks from both the objective and subjective perspectives and then compares them to show the gaps between retirees’ actual risks and their perceptions of the risks in a unified framework. It finds that 1) under the empirical analysis, the greatest risk is longevity risk, followed by health risk; 2) under the subjective analysis, retirees perceive market risk as the highest-ranking risk due to their exaggeration of market volatility; and 3) the longevity risk and health risk are valued less in the subjective ranking than in the objective ranking, because retirees underestimate their life spans and their health costs in late life
Thesis (PhD) — Boston College, 2020
Submitted to: Boston College. Graduate School of Arts and Sciences
Discipline: Economics
APA, Harvard, Vancouver, ISO, and other styles
8

Realista, Andreia cristina Saraiva. "A perceção do risco na atividade dos bombeiros." Master's thesis, Instituto Politécnico de Setúbal. Escola Superior de Ciências Empresariais. Escola Superior de Tecnologia de Setúbal, 2014. http://hdl.handle.net/10400.26/7157.

Full text
Abstract:
Dissertação apresentada para cumprimento dos requisitos necessários à obtenção do grau de Mestre em Segurança e Higiene no Trabalho
O presente trabalho tem como objetivo, analisar e caracterizar a Perceção do Risco de elementos de corporações de Bombeiros. Na abordagem desta problemática, realizou-se uma análise dos determinantes da Perceção de Riscos, bem como a caraterização da Perceção de Riscos específicos nesta atividade. A primeira parte do trabalho efetua uma referência à realidade dos Bombeiros em Portugal, nomeadamente dos riscos a que estão sujeitos e ainda à perceção do risco, dando especial atenção aos fatores que a podem influenciar. A segunda parte apresenta a caracterização do instrumento de diagnóstico, o procedimento, a amostra e a análise e discussão dos resultados obtidos. Relativamente aos dados obtidos, verifica-se que a média das várias subescalas avaliadas nos Determinantes da Perceção do Risco está compreendida entre 1,49 (Irrelevância de Evitar o Risco) e 5,56 (Ansiedade), o desvio padrão entre 0,71 (Recompensas e Influência Social) e 0,97 (Severidade/Efeito Imediato ou Remoto). Nos dados obtidos nas subescalas da Perceção do Risco, os valores da média variam entre 5,29 (Risco Cognitivo) e 5,51 (Risco Emocional) e o desvio padrão entre 3,35 (Risco Cognitivo) e 5,55 (Risco Emocional). Os dados revelam que variáveis como Sexo, Vínculo com os Bombeiros, Chefia/Supervisão, Acidentes, Agregado familiar, Antiguidade, Estado civil, Graduação, Habilitações académicas e idade influenciam de forma significativa as perceções relativamente às subescalas dos Determinantes da Perceção do Risco.
Abstract: The current work settles has its objective to analyze and characterize, the risk perception of the fireman corporations. Within this problem approach, a determinants Risk Perception analyze was made, as well as the characterization of the Perception of specific risks in this activity. The first part in this work regards the Portugal Fireman reality, mainly the risks that they came across every day and also the Risk Perception they have, giving a special attention to the main factors that can actually influence this perception. The second part presents the characterizations of this diagnose instrument, the procedure, the sample and the analysis and discussion of the obtained results. Regarding the obtain data, it’s verified that the several dimensions, appraised average in the Risk Perception Determination is comprehended between 1.49 (Avoiding Risk Irrelevance) and 5.56 (Anxiety) and the standard deviation 0.71 (Rewards and Social Influence) as well as 0.97 (Severity/ Immediate Effect or Remote One). In the obtained data from the Risk Perception dimension, the average values vary between 5.29 (Cognitive Risk) and 5.51 (Emotional Risk) and the standard deviation settles between 3.35 (Cognitive Risk) and 5.55 (Emotional Risk). This data shows that different variables like Sex, Fireman bond, Leadership/Supervision, Accidents, Family, Seniority, Marital Status, Graduation, Academic Qualifications and Age, are a significant influence within the perceptions regarding the dimensions of the Risk Perception determinants.
APA, Harvard, Vancouver, ISO, and other styles
9

Fantino, Benoît. "Quels élements d'influence pour l'adoption symbolique de la sécurité des systèmes d'information?" Thesis, Aix-Marseille, 2018. http://www.theses.fr/2018AIXM0586.

Full text
Abstract:
La sécurité des systèmes d’information s’inscrit dans la dépendance croissante des entreprises envers leur SI en perspective du nombre grandissant d’incidents de sécurité. Dans cette recherche, nous nous intéressons à la gestion des risques SI, pour laquelle la littérature souligne le manque d’implication des top-managers. Nous abordons cette problématique sous l’angle de la décision des dirigeants, au travers de quatre approches théoriques : modèles des perceptions managériales des risques SI, perception des risques en psychologie, théorie néo-institutionnelle et théorie sur l’adoption symbolique des innovations. L’objectif est de rendre intelligible les influences sur l’adoption symbolique de la SSI. Nous employons une méthode qualitative organisée autour de 17 études de cas dans des entreprises d’activités variées. La SSI y est observée comme un processus de décision de gestion des risques SI. Nos résultats montrent la pertinence d’étudier la SSI selon une perspective individuelle de gestion des risques. D’une part, les caractéristiques de l’évaluation psychologique des risques éclairent les biais pour la gestion du risque SI. D’autre part, l’étude de ces biais apporte une perspective nouvelle sur la compréhension de l’investissement des top-managers pour la SSI. Nous montrons l’insensibilité des top-managers à l’exposition du risque, une préférence à aborder les risques sous l’angle des menaces. Aussi, nous exposons les influences qui contribuent à adopter une SSI technique et non managériale pourtant suggérée dans la littérature. Enfin, notre analyse fait émerger des perspectives pour prolonger la compréhension d’une SSI réactive, décriée par les auteurs en SSI
The information system security for which the interest joins in the increasing dependence of companies to them information system and in prospect of increasing number of security incidents. We are interested in the information system risk management, for whom the literature underlines the lack of involvement of top-managers.We approach the concern under the view of the decision of top executives for ISS, through four theoretical streams: the models of the managerial perceptions of IS risks, the risks perception in psychology, the institutional theory and the theory about symbolic adoption of the innovations. The aim is to make intelligible the influences on the symbolic adoption of such ISS approach. We use a qualitative method organized around 17 case studies in companies with varied activities. Our results highlight the relevance to study the ISS according to an individual perspective of risk management. On one hand, the characteristics of the psychological evaluation of the risks enlighten the biases for the management of the information system risk. On the other hand, the study of these biases brings a new perspective on the understanding of the investment of the top executives for the ISS. In particular, we underline the insensitivity of the top managers in the exposure of the risk, a preference to approach the risks under a threats point of view. We expose the influences which contribute to adopt a technical and not managerial ISS such as suggests by the Research. Finally, our analysis brings to the foreground perspectives to extend the comprehension of a reactive ISS, defame by ISS’ academics
APA, Harvard, Vancouver, ISO, and other styles
10

Afshar, Faranak. "Investigating the Determinants of Disaster Recovery Technology Investment Choice in Small and Medium-sized Enterprises." NSUWorks, 2014. http://nsuworks.nova.edu/gscis_etd/7.

Full text
Abstract:
Due to the importance of small and medium-sized enterprises (SMEs) as drivers of economic growth, it is essential to explore the security issues impacting SMEs' success and failure. One of the main security risks that could significantly impair the operability of the organizations is the permanent loss of data due to man-made and/or natural disasters and interruptions. Research has shown that SMEs are not taking disaster preparedness for their computer and networking systems as seriously as they should. This dissertation is an attempt to explain the process of a risky choice, specifically the decision maker's choice of not investing in disaster recovery technologies (DRT) to protect the firm. This study applied a revised model of determinants of risky decision-making behavior suggested by Sitkin and Weingart (1995) to a context of DRT investment in the real world. The model was empirically tested using survey data collected from a list of technology investment decision makers of SMEs located in the northeastern United States. Analysis and results of the collected survey data suggest the revised model can be applied to the real world context. The executive's characteristics, experience, and traits such as positive outcome history, risk propensity, risk perception, and decision framing influence the decision to invest in data protective technologies in SMEs. Specifically, the results of the analysis indicated that risk propensity is affected by outcome history and risk perception is affected by decision framing. In addition, risk propensity affected risk perception and risk perception affected the choice of DRT investment. Furthermore, decision framing had moderate effect on DRT investment
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Perception of security risks"

1

Sentire sicurezza nel tempo delle paure. Milano, Italy: FrancoAngeli, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Roché, Sebastian. La société d'hospitalité. Paris: Seuil, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Soziologie, Deutsche Gesellschaft für, ed. Wege der Sicherheitsgesellschaft: Gesellschaftliche Transformationen der Konstruktion und Regulierung innerer Unsicherheiten. Wiesbaden: VS Verlag für Sozialwissenschaften, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Antonilli, Andrea. Insicurezza e paura oggi. Milano, Italy: FrancoAngeli, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Ramamurthy, V. S. Perception and acceptance of public risks. Bangalore: National Institute of Advanced Studies, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Gots, Ronald E. Cely Film #Srdce na dlani {CZ-SK} Dabing 2022: Science, regulation, and perception. Boca Raton: Lewis Publishers, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Ashbaugh, Douglas A. Security software development: Assessing and managing security risks. Boca Raton: Auerbach Publications, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Pedroni, Gabriella. Chances and risks: Measurement, perception, and acceptance. Basle: Pharma Information, 1990.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Emilien, Gerard, Rolf Weitkunat, and Frank Lüdicke, eds. Consumer Perception of Product Risks and Benefits. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-50530-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Gifford, Nick. Information security: Managing the legal risks. Sydney: CCH Australia Limited, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Perception of security risks"

1

Nyre, Åsmund Ahlmann, and Martin Gilje Jaatun. "Seeking Risks: Towards a Quantitative Risk Perception Measure." In Availability, Reliability, and Security in Information Systems and HCI, 256–71. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-40511-2_18.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Svedin, Lina M., Adam Luedtke, and Thad E. Hall. "Immigration, Security, and Social Risk Perception." In Risk Regulation in the United States and European Union, 69–88. New York: Palgrave Macmillan US, 2010. http://dx.doi.org/10.1057/9780230109476_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Frewer, Lynn J. "Risk Perception, Communication and Food Safety." In Strategies for Achieving Food Security in Central Asia, 123–31. Dordrecht: Springer Netherlands, 2011. http://dx.doi.org/10.1007/978-94-007-2502-7_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Katzke, Stuart W. "A Framework for Computer Security Risk Management." In The Analysis, Communication, and Perception of Risk, 361–74. Boston, MA: Springer US, 1991. http://dx.doi.org/10.1007/978-1-4899-2370-7_36.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Ashwin, Peter. "Influence of Risk Perception on Event Risk Management and Decision-Making." In Encyclopedia of Security and Emergency Management, 1–7. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-319-69891-5_29-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Ashwin, Peter. "Influence of Risk Perception on Event Risk Management and Decision-Making." In Encyclopedia of Security and Emergency Management, 443–50. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-319-70488-3_29.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Sergunin, Alexander. "Changes in the Perception of Military Threats, Challenges, Vulnerabilities and Risks in Russia (1991-2009)." In Hexagon Series on Human and Environmental Security and Peace, 275–89. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-17776-7_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Wang, Junxiu. "Risk Perception and Sense of Security and Their Measurements." In Research Series on the Chinese Dream and China’s Development Path, 63–78. Singapore: Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-13-7812-6_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Bencko, Vladimir. "Psychosomatic and Psychosocial Aspects of Risk Perception." In Environmental Security Assessment and Management of Obsolete Pesticides in Southeast Europe, 85–90. Dordrecht: Springer Netherlands, 2013. http://dx.doi.org/10.1007/978-94-007-6461-3_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Novossiolova, Tatyana, Todd Kuiken, Jared DeCoste, Luc Henry, Ineke Malsch, Myriam Merad, Carl Newman, Wallace Patterson, and Alexandra Waskow. "Addressing Emerging Synthetic Biology Threats: The Role of Education and Outreach in Fostering Effective Bottom-Up Grassroots Governance." In NATO Science for Peace and Security Series C: Environmental Security, 81–102. Dordrecht: Springer Netherlands, 2021. http://dx.doi.org/10.1007/978-94-024-2086-9_6.

Full text
Abstract:
AbstractThis chapter seeks to examine the role of the synthetic biology community in strengthening biosafety and biosecurity and safeguarding synthetic biology against accidental and deliberate misuse. It argues that biosafety and biosecurity education, awareness-raising, and outreach are essential for fostering effective bottom-up (self-governance) approaches for biosafety and biosecurity risk management. The chapter provides an overview of the structure of the synthetic biology community underscoring its complexity in terms of professional interdisciplinarity, stakeholder diversity, and fluidity, i.e. professional and non-professional actors moving from one context to another over time. It then examines the prevalent perceptions and framing of biosafety and biosecurity risks within the synthetic biology community, in order to identify options for enhancing stakeholder engagement and leveraging the diversity of expertise within the synthetic biology community for promoting responsible research and innovation practices. The conclusion outlines a summary of the key findings in this chapter.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Perception of security risks"

1

Koç, Murat, and Hakkı Çiftçi. "World Investments, Global Terrorism and the New Perception of Politic Risk." In International Conference on Eurasian Economies. Eurasian Economists Association, 2014. http://dx.doi.org/10.36880/c05.01108.

Full text
Abstract:
Based on economic power struggle, the economic strength began to take the place of military power and economic security has been considered as important as military security in this new world order. Multinational companies and their feasibility studies constitute the agenda of politic risks before entering these markets. Political risk faced by firms can be defined as “the risk of a strategic, financial, or personnel loss for a firm because of such nonmarket factors as macroeconomic and social policies, or events related to political instability”. However, terrorism should be considered as a multiplier effect on some of the components mentioned above. Terrorism itself and these strict measures directly affect investments. In 2012, FDI (Foreign Direct Investment) flows into the Middle East and North Africa have been adversely affected by political risk over the past couple of years. Investor perceptions of political risks in the region remain elevated across a range of risks. The Arab Spring countries have fared worse than other developing countries in the region. The risk perception of civil disturbance and political violence, but also breach of contract, is especially prominent in Arab Spring countries. In other words, global terrorism has created a negative multiplier effect in the region. In this context, Multiplier effect can be summarized as an effect on a target, situation or event which exceed its creating strength than expected. Considering this impact, MNC’s SWOT analysis and investment analysis must signify a redefinition in a wide range by the means of political risk perceptions.
APA, Harvard, Vancouver, ISO, and other styles
2

Aksu, Muharrem, Ali Rıza Aktaş, Onur Oku, and Faruk Kerem Şentürk. "Analysis of Security Perceptions of Foreign Tourists: The Case of Alanya." In International Conference on Eurasian Economies. Eurasian Economists Association, 2013. http://dx.doi.org/10.36880/c04.00759.

Full text
Abstract:
High risk perception of the tourists affects tourism demand and causes serious declines in the number of tourists to destinations. With this respect, data collected from 500 randomly chosen foreign tourists were analyzed in order to identify their safety perception levels of Alanya town center and in which circumstances and places they have risk perceptions. Factors such as country of origin (nationality), gender, age, travel companion, education level, and duration of stay were tested in order to find out if they have an effect on safety/risk perceptions. Analysis included frequency tables and chi-squared tests. According to the main findings, majority of foreign tourists visiting Alanya find the destination safe (90,6%). There were significant differences in tourists’ perception of risk and safety among issues like traffic and criminal cases such as theft, purse-snatching, sexual harassment, crimes. Additionally, correlation was detected between one of the factors affecting risk perception, -gender and risk types such as -going out at nights, theft and sexual harassment; and foreign tourists’ showed different risk perceptions according to their gender.
APA, Harvard, Vancouver, ISO, and other styles
3

Dashti, Salimeh, Anderson Santana de Oliveria, Caelin Kaplan, Manuel Dalcastagnè, and Silvio Ranise. "Can Data Subject Perception of Privacy Risks Be Useful in a Data Protection Impact Assessment?" In 18th International Conference on Security and Cryptography. SCITEPRESS - Science and Technology Publications, 2021. http://dx.doi.org/10.5220/0010602608270832.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Aksu, Muharrem, Ali Rıza Aktaş, Mehmet Özer Demir, and Faruk Kerem Şentürk. "Security Perceptions of the Tourists Visiting Alanya According to Their Home Country." In International Conference on Eurasian Economies. Eurasian Economists Association, 2015. http://dx.doi.org/10.36880/c06.01437.

Full text
Abstract:
In today’s world there exists severe competition in all sectors, in tourism sector as well. That’s why countries with successful destinations consider tourism security concept as part of the tourism concept in order to maximize tourist demand. On the other hand, tourism security and risk perception of a destination is one of the principal components of destination image. Tourism security seems to be the most important appealing factor of the demand. The aim of the study is to research the risk perception differences between the tourists’ home countries when grouped (North European, East European, Middle European, West European and the others). According to Data set from 500 respondents different countries visiting Alanya is analyzed, findings suggest that there exits differences among the places (beach, recreation center, public transportation etc.) and factors (traffic, terror, day and night treks, mugging, theft etc.) effecting respondents’ risk perceptions.
APA, Harvard, Vancouver, ISO, and other styles
5

Hibshi, Hanan, Travis D. Breaux, and Stephen B. Broomell. "Assessment of risk perception in security requirements composition." In 2015 IEEE 23rd International Requirements Engineering Conference (RE). IEEE, 2015. http://dx.doi.org/10.1109/re.2015.7320417.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Dhukaram, Anandhi Vivek, Chris Baber, Lamia Elloumi, Bert-Jan van Beijnum, and Paolo De Stefanis. "End-User Perception Towards Pervasive Cardiac Healthcare Services: Benefits, Acceptance, Adoption, Risks, Security, Privacy and Trust." In 5th International ICST Conference on Pervasive Computing Technologies for Healthcare. IEEE, 2011. http://dx.doi.org/10.4108/icst.pervasivehealth.2011.246116.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

LeBlanc, Daniel, and Robert Biddle. "Risk perception of internet-related activities." In 2012 Tenth Annual International Conference on Privacy, Security and Trust (PST). IEEE, 2012. http://dx.doi.org/10.1109/pst.2012.6297924.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Mehrnezhad, Maryam, Ehsan Toreini, Siamak Shahandashti, and Feng Hao. "Stealing PINs via Mobile Sensors: Actual Risk versus User Perception." In European Workshop on Usable Security. Reston, VA: Internet Society, 2016. http://dx.doi.org/10.14722/eurousec.2016.23008.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Javed, Yousra, Mohamed Shehab, and Emmanuel Bello-Ogunu. "Investigating User Comprehension and Risk Perception of Apple's Touch ID Technology." In ARES '17: International Conference on Availability, Reliability and Security. New York, NY, USA: ACM, 2017. http://dx.doi.org/10.1145/3098954.3098974.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Breitsprecher, Kathryn, Kenneth A. Lang, and Timothy Stephen McGrath. "Use of a computer simulation to assess Hazard and Risk perception." In SPE Asia Pacific Health, Safety, and Security Environment Conference and Exhibition. Society of Petroleum Engineers, 2007. http://dx.doi.org/10.2118/108904-ms.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Perception of security risks"

1

Dadvar, Puyan, and Kevin Skadron. Potential Thermal Security Risks. Fort Belvoir, VA: Defense Technical Information Center, January 2005. http://dx.doi.org/10.21236/ada466191.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Birman, Ken, and Fred Schneider. Security Risks from a Software Monoculture. Fort Belvoir, VA: Defense Technical Information Center, November 2008. http://dx.doi.org/10.21236/ada492371.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

von Braun, Joachim. Food-security risks must be comprehensively addressed. Washington, DC: International Food Policy Research Institute, 2009. http://dx.doi.org/10.2499/0896299236ar0809e.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Cebula, James J., Mary E. Popeck, and Lisa R. Young. A Taxonomy of Operational Cyber Security Risks Version 2. Fort Belvoir, VA: Defense Technical Information Center, May 2014. http://dx.doi.org/10.21236/ada609863.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Eisenkot, Gadi. Israel Security In The 21st Century: Risks And Opportunities. Fort Belvoir, VA: Defense Technical Information Center, March 1997. http://dx.doi.org/10.21236/ada326679.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Goodwin, Bruce T. Additive Manufacturing and Nuclear Security: Calibrating Rewards and Risks. Office of Scientific and Technical Information (OSTI), August 2019. http://dx.doi.org/10.2172/1635763.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Viscusi, W. Kip, and Richard Zeckhauser. The Perception and Valuation of the Risks of Climate Change: A Rational and Behavioral Blend. Cambridge, MA: National Bureau of Economic Research, December 2005. http://dx.doi.org/10.3386/w11863.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Minchev, Zlatogor, and Ivan Gaydarski. Cyber risks, threats & security measures associated with COVID-19. Procon, 2020. http://dx.doi.org/10.11610/views.0037.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Barbir, A., O. Batuner, B. Srinivas, M. Hofmann, and H. Orman. Security Threats and Risks for Open Pluggable Edge Services (OPES). RFC Editor, August 2004. http://dx.doi.org/10.17487/rfc3837.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Shechter, Olga G., and Eric L. Lang. Identifying Personality Disorders that are Security Risks: Field Test Results. Fort Belvoir, VA: Defense Technical Information Center, September 2011. http://dx.doi.org/10.21236/ada564011.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography