To see the other types of publications on this topic, follow the link: Perception of security risks.

Journal articles on the topic 'Perception of security risks'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Perception of security risks.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Taylor, Richard G., Jeff Brice, Jr., and Sammie L. Robinson. "Perception deception: security risks created by optimistic perceptions." Journal of Systems and Information Technology 18, no. 1 (March 14, 2016): 2–17. http://dx.doi.org/10.1108/jsit-07-2015-0062.

Full text
Abstract:
Purpose – The purpose of the paper is to determine whether management’s optimistic perceptions of their organization’s level of information security preparedness can ultimately result in increased information security risks. Design/methodology/approach – A case study was conducted in a financial institution. In all, 24 employees were interviewed. These employees came from all functional areas and various positions, from tellers to executives. Interviews were conducted, internal policies and examiners’ reports were made available and access was given to observe the employees during working hours and to observe the facilities after hours. Findings – Executives were overly optimistic about the level of information security at their organization. These optimistic perceptions guided security priorities; however, the findings show that their perceptions were misguided leaving their organization open to increased security threats. More specifically, the results show that optimist perceptions by management can put an organization’s information at risk. Originality/value – The paper uses existing theory and evaluates it in a “real-world” setting. For security research, it can be difficult to get honest responses from questionnaires; however, the hands-on approach provided a deeper insight to the problem of optimistic perceptions in an organizational setting. For practitioners, the case can raise managements’ awareness of perceptional inaccuracies, resulting in more informed information security decisions and ultimately improved security for their organization.
APA, Harvard, Vancouver, ISO, and other styles
2

Veebel, Viljar, and Illimar Ploom. "Estonian Perceptions of Security: Not Only About Russia and the Refugees." Journal on Baltic Security 2, no. 2 (December 1, 2016): 35–70. http://dx.doi.org/10.1515/jobs-2016-0046.

Full text
Abstract:
Abstract The current study focuses on the Estonian perceptions of security and on the defence situation both globally and locally. The dynamic results of the public opinion surveys on security risks conducted in Estonia over the last 10 years (2006-2016) will be presented. In addition, to understand whether some of the security risks could be over- or underestimated in Estonia, these results will be compared with the views expressed recently by the World Economic Forum, particularly the Global Risks Report 2016. Also, the arguments why some topics have played or are currently playing key role in the Estonian security perception will be presented and discussed.
APA, Harvard, Vancouver, ISO, and other styles
3

Krajňák, Tomáš, and Jiří Vágner. "Political security risks for tourism: The spatial perception of the Middle East by potential Czech tourists." Geografie 123, no. 3 (2018): 379–405. http://dx.doi.org/10.37040/geografie2018123030379.

Full text
Abstract:
Safety and security aspects represent crucial factors that influence tourist behavior. This process is not always rational but rather based on perception. Tourism in the examined area of the Middle East operates in an environment of political security risks, but the region also represents some geographic and geopolitical ideas that are still absent in the Czech scientific milieu. Our research analyzes the perception of political security risks for incoming tourism in the Middle East from the perspective of potential Czech tourists. The main research tool, a questionnaire, collected data (2016) that were analyzed with the help of descriptive statistics and statistical inference. Findings indicate that potential Czech tourists spatially do not generalize risks in the Middle East. Nevertheless, an inner circle with spill-over effect can be identified. Surprisingly, results show a relatively optimistic perception of risks. Sociodemographic features, such as gender, age, and travel characteristics (especially psychographic type of tourist) play an important role in the perception.
APA, Harvard, Vancouver, ISO, and other styles
4

Urciuoli, Luca, and Juha Hintsa. "Differences in security risk perceptions between logistics companies and cargo owners." International Journal of Logistics Management 27, no. 2 (August 8, 2016): 418–37. http://dx.doi.org/10.1108/ijlm-02-2014-0034.

Full text
Abstract:
Purpose – Supply chain stakeholders may perceive security risks differently and thereby misalign mitigation strategies. Hence, causing weak spots in supply chains and thereby disruptions. The purpose of this paper is to determine whether supply chain companies actually perceive security risks and effectiveness of mitigation strategies differently. Design/methodology/approach – Two survey studies measuring perception of security risks and effectiveness of measures have been developed and used to collect data from European and Latin American companies, grouped as cargo owners and logistics companies. Findings – The findings of the surveys unveil that only two (out of six) security risks, namely, violation of customs non-fiscal regulations and illegal immigration, show significant differences between the two groups of companies. In addition, the surveys show that companies perceive equally the effectiveness of security measures. This study concludes that supply chains seem to have good visibility over the security risks of their partners. Hence, in terms of security, supply chain companies seem to have achieved a common understanding of risks and furthermore are able to act jointly to secure assets and operations. Originality/value – Previous research claim supply chain stakeholders may perceive risks differently and thereby may fail to correctly align mitigation strategies. Yet, to the authors knowledge, previous research has not empirically demonstrated these differences in perceptions of risks and mitigation strategies.
APA, Harvard, Vancouver, ISO, and other styles
5

Blasek, Roman. "Perception of security risks by the population of the Czech Republic." Journal of Slavic Military Studies 11, no. 3 (September 1998): 89–96. http://dx.doi.org/10.1080/13518049808430351.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Omelchenko, Daria A., Svetlana G. Maximova, and Oksana E. Noyanzina. "PERCEPTION OF SOCIAL SECURITY IN REGIONS OF THE RUSSIAN-ASIAN BORDERLAND (ON THE EXAMPLE OF THE ALTAI REGION)." Society and Security Insights 3, no. 1 (April 8, 2020): 13–36. http://dx.doi.org/10.14258/ssi(2020)1-01.

Full text
Abstract:
Social security is an important priority of the State policy, embracing other kinds of security as essential prerequisites for its provision. Sociological surveys based on psychosemantic methodology, fulfilled in one of the regions of Russian-Asian borderland (the Altai region, 2019, n = 75) have found that social security in the region is primarily defined by its population through probability of realization of economic risks — loss of income, livelihoods and creditworthiness, and depends on expression of nutritional and transport risks, risks of fatal diseases, negligence or incompetence of specialists in different fields of social practice. Social-economic instability and distrust towards basic social institutions, responsible for the security and safeguarding the life and health, form negative attitudes of population about social security.
APA, Harvard, Vancouver, ISO, and other styles
7

Almeida, Fernando, José Pinheiro, and Vítor Oliveira. "Social Network Security Risks and Vulnerabilities in Corporate Environments." International Journal of Applied Management Sciences and Engineering 6, no. 1 (January 2019): 14–28. http://dx.doi.org/10.4018/ijamse.2019010102.

Full text
Abstract:
Increasingly social networks are used both in the personal and professional levels, being companies and employees also exposed to the risks posed by them. In this sense, it is relevant to analyze employees' perception of the risks and vulnerabilities posed by the use of social networks in corporate environments. For this purpose, a questionnaire was developed and distributed to 372 employees of small and medium-sized companies that allowed the characterization and analysis of those risks. The results indicate that the security risks are perceived moderately by employees, emphasizing the risk of defamation and cyberbullying as being the most pertinent. On the other hand, the findings indicate that older employees, the existence of lower academic qualifications, and those working in medium-sized companies are more aware of these risks.
APA, Harvard, Vancouver, ISO, and other styles
8

Porfiriev, Boris. "The Perception and Management of Security and Safety Risks: Implications for International Negotiations." Risk Management 6, no. 4 (October 2004): 9–25. http://dx.doi.org/10.1057/palgrave.rm.8240195.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Groen, Brenda, and Hester van Sprang. "Perceptions of Hospitality and Safety Are Two Sides of the Same Coin." Buildings 11, no. 3 (March 12, 2021): 113. http://dx.doi.org/10.3390/buildings11030113.

Full text
Abstract:
Entering a building is a ‘moment of truth’ and may invoke feelings of hospitableness. Physical environments and staff behaviour deliver ‘clues’ that may result in the experience of hospitality. The focus in a reception area may be on mitigation of risks, or on a hospitable atmosphere, with either a host or a security officer at the entrance. However, the division of tasks to either the pleasing host or the controlling security officer to a certain extent disavows the overlap between perceptions of hospitality and safety. This exploratory qualitative study combines a group interview with three managers responsible for hospitality and security in reception areas and Critical Incidents by staff and visitors (N = 51). Thematic coding was based on The Egg Aggregated Model and the Experience of Hospitality Scale. Results show that hospitality and safety are indeed two sides of the same coin. Usually people do accept security measures, provided that staff act in a hospitable way. A lack of security measures may seem ‘inviting’, but also decreases the perception of care for your visitor, and may cause uncertainty and therefore decrease comfort. A correct risk perception, flexible appliance of security measures, and a friendly approach connect aspects of ‘safe’ and ‘hospitable’ sentiments.
APA, Harvard, Vancouver, ISO, and other styles
10

Julaihah, Umi. "PEMBAYARAN NON TUNAI: PERSEPSI CIVITAS AKADEMIKA FITK UIN MAULANA MALIK IBRAHIM MALANG." J-PIPS (Jurnal Pendidikan Ilmu Pengetahuan Sosial) 2, no. 1 (December 30, 2015): 63. http://dx.doi.org/10.18860/jpips.v2i1.6840.

Full text
Abstract:
<p>Non-cash payment has been promoted by Bank Indonesia since 2006 but, until now many people are still reluctant to use such facilities. This research uses descriptive quantitative research which aims to know the perception of the academic community of the Fakultas Tarbiyah dan Keguruan (FITK) UIN Maulana Malik Ibrahim Malang on usability, convenience, security and risks of non-cash transaction. The results showed that the respondents had a good perception on usability, convenience, security and risks of non-cash transactions. This research also finds that the student group is still using a single type of instrument ie. ATM transaction, while the lecturer-employees group is already using the ATM, SMS banking and Internet banking. Bank Indonesia is expected to educate the public continuously, so people have well financial literacy that would boost the success of non-cash transactions movement in Indonesia.</p><p><strong>Keywords</strong>: perception, payment, non cash</p>
APA, Harvard, Vancouver, ISO, and other styles
11

Wiśniewski, Bernard, and Barbara Kaczmarczyk. "Opportunity, Challenge, Risk and Threat — Review of Defi nitions and Relations." Internal Security 9, no. 2 (July 9, 2018): 23–32. http://dx.doi.org/10.5604/01.3001.0012.1699.

Full text
Abstract:
The article presents fundamental issues related to vital problems with a view to research on internal security, namely — opportunities, challenges, risks and threats. The reason for treating these phenomena in such a way is the fact that they most often occur together. It also seems important that today there is a substantial perception and awareness of opportunities, challenges, risks and threats. This can be achieved by making information and knowledge widely available. A significant source of the latter is scientific research which provides systematically improved and highly objective collections of reliable information about reality together with the methods for their skilful and effective use. The considerations presented are based on a review of the Polish and foreign literature used in security research conducted within the framework of security sciences. It has been used to present basic identification problems and mutual relationships among opportunities, challenges, risks and threats. The analysis presented indicates a lack of uniformity in the perception of the concept of risk. Completely different is the situation with regard to identifying opportunities, challenges, risks and threats. There are here many common areas referring mainly to sources and effects. The considerations presented have made it possible to identify mutual cognitive and utilitarian relations between the subject phenomena. The conclusions of the article include a summary of the above-mentioned considerations.
APA, Harvard, Vancouver, ISO, and other styles
12

Mihailović, Andreja, Julija Cerović Smolović, Ivan Radević, Neli Rašović, and Nikola Martinović. "COVID-19 and Beyond: Employee Perceptions of the Efficiency of Teleworking and Its Cybersecurity Implications." Sustainability 13, no. 12 (June 15, 2021): 6750. http://dx.doi.org/10.3390/su13126750.

Full text
Abstract:
The main idea of this research is to examine how teleworking has affected employee perceptions of organizational efficiency and cybersecurity before and during the COVID-19 pandemic. The research is based on an analytical and empirical approach. The starting point of the research is a critical and comprehensive analysis of the relevant literature regarding the efficiency of organizations due to teleworking, digital information security, and cyber risk management. The quantitative approach is based on designing a structural equation model (SEM) on a sample of 1101 respondents from the category of employees in Montenegro. Within the model, we examine simultaneously the impact of their perceptions on the risks of teleworking, changes in cyber-attacks during teleworking, organizations’ capacity to respond to cyber-attacks, key challenges in achieving an adequate response to cyber-attacks, as well as perceptions of key challenges related to cybersecurity. The empirical aspects of our study involve constructing latent variables that correspond to different elements of employee perception; namely, their perception of organizational efficiency and the extent to which the digital information security of their organizations has been threatened during teleworking during the pandemic.
APA, Harvard, Vancouver, ISO, and other styles
13

Hamlet, Leigh C., Mark Mwiti Kamui, and Jessica Kaminsky. "Infrastructure for water security: coping with risks in rural Kenya." Journal of Water, Sanitation and Hygiene for Development 10, no. 3 (July 3, 2020): 481–89. http://dx.doi.org/10.2166/washdev.2020.038.

Full text
Abstract:
Abstract Achieving universal access to sufficient water is becoming more challenging as climate change exacerbates water insecurity. Previous studies of water insecurity and climate-related hazards recommend understanding how people perceive and manage water-related risks. By uniquely combining protection motivation theory and photovoice, we explore water infrastructure's function in rural Kenyan households’ perception and mitigation of water-related risk. We find that infrastructure construction provides a sense of security, regardless of long-term management plans. During the dry season, built infrastructure's viability to mitigate risk is strained due to natural infrastructure's unreliability. In the context of limited built infrastructure, natural infrastructure, though unimproved, is necessary for water security. In the expected absence of large-scale infrastructure projects, for water authorities in rural Kenya, we recommend the construction of small-scale infrastructure to increase reliance upon rainwater harvesting and lessen the strain on other built infrastructure during the dry season. Coupling our method with an itemized scale can help explain discrepancies between actual insecurity and individuals’ responses to help water authorities predict interventions’ effectiveness and inform the division of responsibilities in policies intended to promote sustainable infrastructure management. We also recommend our method for assessing water infrastructure's role among households managing multiple climate-related risks to expand the resilience of the infrastructure.
APA, Harvard, Vancouver, ISO, and other styles
14

Saini, Chand Prakash. "Difficulty in Transition." International Journal of Online Marketing 10, no. 2 (April 2020): 17–29. http://dx.doi.org/10.4018/ijom.2020040102.

Full text
Abstract:
The purpose of this article is to identify and study various risks that stop potential online shoppers to shop online. A total of 268 potential online shoppers were personally surveyed with a structured questionnaire. These respondents were from Gurgaon city. Exploratory factor analysis and regression analysis were used to assess the potential consumers' risk perception towards online retailing. It was found that potential online shoppers considered product risk, privacy risk, time risk, social risk, and security risk to be important while thinking of online shopping. Among all these risks security risks were found to be on potential online buyers' minds followed by product risk, social risk, privacy risk, and time risk. Online shopping behavior was the dependent variable in the study.
APA, Harvard, Vancouver, ISO, and other styles
15

Zhuang, Mei-Er, and Wen-Tsao Pan. "INFORMATION SECURITY ASSESSMENT BASED ON MACHINE LEARNING TECHNOLOGY-FUZZY-GRA-AHP." International Journal of Research -GRANTHAALAYAH 7, no. 6 (June 30, 2019): 230–40. http://dx.doi.org/10.29121/granthaalayah.v7.i6.2019.800.

Full text
Abstract:
With the advent of the information age, information security has become an urgent problem to be solved. Various application and platforms have not only brought convenience to people, but also brought hidden dangers - information security risks. This paper uses some of the machine learning technology - fuzzy computing and gray relation analysis (GRA), to analyze data of the three major video platforms of China, and takes the information security level as a new criterion to conduct the evaluation of their performance. An assessment model is constructed based on machine learning technology, namely the combination of fuzzy computing and GRA and analytic hierarchy process (AHP). Conclusions can be drawn as follows. First, consumers’ perception of video platform information security level is constantly being strengthened. Second, information security risks are affecting consumers' choice decisions about video platforms, and the weights will continue to increase. Third, video platforms are paying more attention to information security construction.
APA, Harvard, Vancouver, ISO, and other styles
16

Bharsakle, Pragati Dnyaneshwar. "Social Networks for Threat Perception and Analysis." International Journal for Research in Applied Science and Engineering Technology 9, no. VI (June 30, 2021): 5073–77. http://dx.doi.org/10.22214/ijraset.2021.35911.

Full text
Abstract:
In the current era of massive knowledge, high volumes of valuable knowledge is simply collected and generated. Social networks square measure samples of generating sources of those huge knowledge. Users in these social networks square measure usually coupled by some interdependency like friendly relationship. As these huge social networks continue to grow, there square measure things during which Associate in Nursing individual user needs to seek out common teams of friends so he will suggest a similar teams to alternative users. Many users of social Network are not aware about the number of security risks in networks such as identity theft, privacy violations, sexual harassment etc,. Recent studies says that most of the social network users expose their personal information like their date of birth, email address, phone number, relationship status. If this type of data reached to the wrong person, then person used that information to harm the users. If the children are users of social network, then these risks become serious. In this paper we present an alternative data analytic solution by using pattern matching solution.
APA, Harvard, Vancouver, ISO, and other styles
17

Steenkamp, Jorinda, Elizelle Juanee Cilliers, Sarel Stephanus Cilliers, and Louis Lategan. "Food for Thought: Addressing Urban Food Security Risks through Urban Agriculture." Sustainability 13, no. 3 (January 26, 2021): 1267. http://dx.doi.org/10.3390/su13031267.

Full text
Abstract:
Food and nutrition security has been neglected in the planning field for reasons of a lack of connection between food and planning and the perception that agricultural activities have no place in the modernizing world. However, considering increasing climate change impacts and implications on industrialized agriculture, there is a clear need to establish shorter, more sustainable agricultural production practices and food supply chains. Urban agriculture is proposed as a potential method of intervention for planners to support sustainable food production and supply chains. The paper utilized a multiple-case study design to analyze four best practice examples of urban agriculture in the Global South to uncover its potential to address food security associated risks and contribute to sustainable development objectives. The results delivered evidence of the potential to harness the multifunctionality of urban agriculture to not only improve the food security of the most at-risk populations, but to also address other urban risks such as unemployment, community decline and food deserts. The recommendations for this paper relate to establishing a food security department, mapping and encouraging more sustainable food supply chains, creating land uses and zonings specific to urban agriculture and to utilize its multifunctionality to address other urban risks.
APA, Harvard, Vancouver, ISO, and other styles
18

Graham, Margaret E., Michael G. Tunik, Brenna M. Farmer, Carly Bendzans, Aileen M. McCrillis, Lewis S. Nelson, Ian Portelli, et al. "Agent of Opportunity Risk Mitigation: People, Engineering, and Security Efficacy." Disaster Medicine and Public Health Preparedness 4, no. 4 (December 2010): 291–99. http://dx.doi.org/10.1001/dmp.2010.38.

Full text
Abstract:
ABSTRACTBackground: Agents of opportunity (AO) are potentially harmful biological, chemical, radiological, and pharmaceutical substances commonly used for health care delivery and research. AOs are present in all academic medical centers (AMC), creating vulnerability in the health care sector; AO attributes and dissemination methods likely predict risk; and AMCs are inadequately secured against a purposeful AO dissemination, with limited budgets and competing priorities. We explored health care workers' perceptions of AMC security and the impact of those perceptions on AO risk.Methods: Qualitative methods (survey, interviews, and workshops) were used to collect opinions from staff working in a medical school and 4 AMC-affiliated hospitals concerning AOs and the risk to hospital infrastructure associated with their uncontrolled presence. Secondary to this goal, staff perception concerning security, or opinions about security behaviors of others, were extracted, analyzed, and grouped into themes.Results: We provide a framework for depicting the interaction of staff behavior and access control engineering, including the tendency of staff to “defeat” inconvenient access controls. In addition, 8 security themes emerged: staff security behavior is a significant source of AO risk; the wide range of opinions about “open” front-door policies among AMC staff illustrates a disparity of perceptions about the need for security; interviewees expressed profound skepticism concerning the effectiveness of front-door access controls; an AO risk assessment requires reconsideration of the security levels historically assigned to areas such as the loading dock and central distribution sites, where many AOs are delivered and may remain unattended for substantial periods of time; researchers' view of AMC security is influenced by the ongoing debate within the scientific community about the wisdom of engaging in bioterrorism research; there was no agreement about which areas of the AMC should be subject to stronger access controls; security personnel play dual roles of security and customer service, creating the negative perception that neither role is done well; and budget was described as an important factor in explaining the state of security controls.Conclusions: We determined that AMCs seeking to reduce AO risk should assess their institutionally unique AO risks, understand staff security perceptions, and install access controls that are responsive to the staff's tendency to defeat them. The development of AO attribute fact sheets is desirable for AO risk assessment; new funding and administrative or legislative tools to improve AMC security are required; and security practices and methods that are convenient and effective should be engineered.(Disaster Med Public Health Preparedness. 2010;4:291-299)
APA, Harvard, Vancouver, ISO, and other styles
19

Iqbal, Muhammad Amjed, Azhar Abbas, Syed Asif Ali Naqvi, Muhammad Rizwan, Abdus Samie, and Umar Ijaz Ahmed. "Drivers of Farm Households’ Perceived Risk Sources and Factors Affecting Uptake of Mitigation Strategies in Punjab Pakistan: Implications for Sustainable Agriculture." Sustainability 12, no. 23 (November 26, 2020): 9895. http://dx.doi.org/10.3390/su12239895.

Full text
Abstract:
Climate change is a serious threat to agriculture in many developing countries including Pakistan. Changing pattern of climate and its extreme conditions have already led to a decline in crop productivity. However, farmers in developing countries experience risks beyond just climate change, many of which are related to policy, strategy, and factor endowments. The impact of these risks have serious implications for food security, rural livelihood, farm households’ wellbeing, and, above all, their motive to adapt to these changes in the long-term. To have an in-depth knowledge of farmers’ perceptions about the changing climate, this study investigates various aspects such as the determinants of perception about various risk sources and the relevant mitigation and adaptation options. To do so, 480 farmers from agriculture-dominated Punjab province were randomly selected in order for us to evaluate their awareness levels, socioeconomic dynamics that influence their perceptions, and various factors that influence their perceptions to achieve the desired findings. We applied the principle factor analysis approach to ascertain major sources and strategies based on farmers’ perception and planned/practiced options. Further, regression analysis was done to evaluate the factors influencing the perception levels of farmers about risk sources. The results showed that majority of the farmers faced various risks, and were trying to adapt crop husbandry practices towards these perceived risks. Change in agricultural policies (3.96) was placed as the highest risk source, while the need for small dams/turbine schemes was the top priority for risk management strategy (mean value of 4.39). By observing the effect of farm and farmer’s characteristics on risk sources and risk management strategies, it was revealed that these characteristics ominously provoked farmers’ perspectives about risk sources and management strategies. The findings imply the need for coherent environmental policy that encompasses price stability, community-led adaptation campaigns, and easy/uninterrupted flows of information that enables the farming community to facilitate sustainable decision processes.
APA, Harvard, Vancouver, ISO, and other styles
20

Cong, Li, Qiqi Wang, Geoffrey Wall, and Yijing Su. "Decision-Making Behavior and Risk Perception of Chinese Female Wildlife Tourists." Sustainability 13, no. 18 (September 15, 2021): 10301. http://dx.doi.org/10.3390/su131810301.

Full text
Abstract:
Prior to the global pandemic, wildlife tourism was increasing rapidly globally but was in the early stages of development in China, where it faces great challenges and opportunities. Women comprise a substantial proportion of the market but their decision-making behavior and their perceptions of risk in wildlife tourism have not yet been explored. This paper explores relationships between risk perception and decision-making in tourism. A survey of female tourists was undertaken at non-captive and semi-captive wildlife sites in western China, as well as through internet website posting, resulting in 415 completed questionnaires. Quantitative methods were used to examine four sequential stages of decision-making in wildlife tourism: destination selection, trip itinerary, travel mode and security assurance, and entertainment consumption. Three dimensions of risk perception in wildlife tourism were identified: physical safety, personal comfort, and quality of experience. Decision-making behavior and risk perceptions are related. Perceived risks greatly impact tourists’ travel mode and security assurance decisions. The higher the perceived risk, the greater the likelihood of female tourists participating in decisions on destination selection, travel methods and other entertainment activities undertaken on their wildlife tourism trips. Concerns regarding personal comfort positively influence destination selection, the trip itinerary, and recreation and consumption decisions. Assurance of acquiring a quality experience influences entertainment consumption decisions. The study contributes to the understanding of risk, decision-making behavior and gender research, and confirms the practical importance of safety considerations at wildlife destinations.
APA, Harvard, Vancouver, ISO, and other styles
21

MIYAZAKI, ANTHONY D., and ANA FERNANDEZ. "Consumer Perceptions of Privacy and Security Risks for Online Shopping." Journal of Consumer Affairs 35, no. 1 (June 2001): 27–44. http://dx.doi.org/10.1111/j.1745-6606.2001.tb00101.x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Demski, Christina, Wouter Poortinga, and Nick Pidgeon. "Exploring public perceptions of energy security risks in the UK." Energy Policy 66 (March 2014): 369–78. http://dx.doi.org/10.1016/j.enpol.2013.10.079.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Jabbar, Awais, Qun Wu, Jianchao Peng, Ali Sher, Asma Imran, and Kunpeng Wang. "Mitigating Catastrophic Risks and Food Security Threats: Effects of Land Ownership in Southern Punjab, Pakistan." International Journal of Environmental Research and Public Health 17, no. 24 (December 11, 2020): 9258. http://dx.doi.org/10.3390/ijerph17249258.

Full text
Abstract:
In the wake of environmental challenges, the adoption of risk management strategies is imperative to achieve sustainable agricultural production and food security among the Pakistani farmers of Punjab. For a deeper insight into farmers’ adaptive behavior towards climate change, this study explored the role of land tenancy in the adoption of risk management instruments, such as off-farm diversification, improved varieties, and crop insurance. Off-farm diversification was found to be a preferred instrument among landless tenants. The study also employed a multivariate probit model that further signified the role of land tenure in risk-related decisions. Apart from land tenancy, the results identified the prominence of risk perception, information access, and extension access in adoption decisions. This study also investigated the association between risk management approaches and food security indicators (household hunger scale, food consumption score). Analysis revealed a significant association between risk management tools and food security indicators.
APA, Harvard, Vancouver, ISO, and other styles
24

Shin, Eunjung, and Eric W. Welch. "Socio-Technical Determinants of Information Security Perceptions in US Local Governments." International Journal of Electronic Government Research 12, no. 3 (July 2016): 1–20. http://dx.doi.org/10.4018/ijegr.2016070101.

Full text
Abstract:
Concerns about electronic information security in government have increased alongside increased use of online media. However, to date, few studies have examined the social mechanisms influencing electronic information security. This article applies a socio-technical framework to model how technical, organizational and environmental complexities limit electronic information security perceived by local government managers. Furthermore, it examines to what extent organizational design buffers security risks. Using data from a 2010 national survey of local government managers, this article empirically tests the proposed model in the context of U.S. local government's online media use. Findings show that, in addition to technical complexity, organizational and environmental complexities are negatively associated with local managers' awareness of and confidence in electronic information security. On the other hand, internal security policy and decentralized decision-making appear to buffer security risks and enhance perceived information security.
APA, Harvard, Vancouver, ISO, and other styles
25

Tøndel, Inger Anne, Martin Gilje Jaatun, Daniela Soares Cruzes, and Nils Brede Moe. "Risk Centric Activities in Secure Software Development in Public Organisations." International Journal of Secure Software Engineering 8, no. 4 (October 2017): 1–30. http://dx.doi.org/10.4018/ijsse.2017100101.

Full text
Abstract:
When working with software security in a risk-centric way, development projects become equipped to make decisions on how much security to include and what type of security pays off. This article presents the results of a study made among 23 public organisations, mapping their risk-centric activities and practices, and challenges for implementing them. The authors found that their software security practices were not based on an assessment of software security risks, but rather driven by compliance. Additionally, their practices could in many cases be characterised as arbitrary, late and error driven, with limited follow up on any security issues throughout their software development projects. Based on the results of the study, the authors identified the need for improvements in three main areas: responsibilities and stakeholder cooperation; risk perception and competence; and, practical ways of doing risk analysis in agile projects.
APA, Harvard, Vancouver, ISO, and other styles
26

Elsantil, Yasmeen. "User Perceptions of the Security of Mobile Applications." International Journal of E-Services and Mobile Applications 12, no. 4 (October 2020): 24–41. http://dx.doi.org/10.4018/ijesma.2020100102.

Full text
Abstract:
With the exponential increase in the use of mobile devices across the globe, there is a concomitant need to understand how mobile users perceive the security of mobile application, and the potential risks involved in accessing and downloading them. Such an understanding will enable users to ensure the apps they download are secure and create greater awareness in the marketplace of the presence of hackers and malware used to invade the privacy and personal details of smartphones users. Research on the perception of users' mobile security is very limited and needs further investigation. This study aims to identify how mobile users perceive the security of different mobile apps and the extent to which different apps affect such perceptions. This study also investigates mobile user preferences for the places where they can access apps and their perceptions of risk at marketplaces vs. websites. This study is based on a qualitative research in which interviews were conducted with 32 university students. The study found that mobile users do not feel secure when installing mobile apps, and that concerns about hacking personal and private information are pervasive. Users expressed more security concerns regarding entertainment apps such as games and communication rather than financial apps, such as banking. The study also found that users prefer installing apps from app stores. The findings of this research contribute a greater understanding of how mobile users perceive mobile app security and offers insights that will help developers adjust their security policies to ensure users' security. The study also presents theoretical and empirical contributions, along with limitations and suggestions for further work.
APA, Harvard, Vancouver, ISO, and other styles
27

Zieliński, Tadeusz. "The perception of security threats in EU and NATO strategic documents: implications for the countries of the Eastern flank." Rocznik Instytutu Europy Środkowo-Wschodniej 18, no. 1 (December 2020): 25–42. http://dx.doi.org/10.36874/riesw.2020.1.2.

Full text
Abstract:
The anticipation of security threats is one of the key elements in the determination of objectives and the main direction for the functioning of states or organizations. It constitutes a fundamental basis for building capacity, aimed at counteracting the identified threats or limiting the emergence of new ones. This is also applicable to the European Union (EU) and North Atlantic Treaty Organization (NATO), which in their security documents identify threats that may have an impact on their existence and future development. The purpose of this article is to identify common threats to EU and NATO security, as well as to demonstrate their impact on the security of the countries of the Eastern flank. The analyses, comparisons and generalizations are based on strategic documents concerning the sphere of EU and NATO security (the EU security strategies and the NATO strategic concepts). The analyzed timeline covered the period from the end of the Cold War until the publication of the strategic documents in question. The perception of threats to the external security of the EU and NATO was contrasted with the results of public opinion polls from the member states of both organizations. The general result leads to the conclusion that the perception of security threats, contained in the strategic documents of the above-mentioned entities, is essentially identical; however, the priorities in the scope of reducing the risks associated with the occurrence of specific threats are perceived differently, including the Eastern flank countries.
APA, Harvard, Vancouver, ISO, and other styles
28

Lee, Jin, Stacy A. Stoffregen, and Frank B. Giordano. "Risks that are “Worthy” to take: Temporary Workers’ Risk-Benefit Perceptions." Proceedings of the Human Factors and Ergonomics Society Annual Meeting 61, no. 1 (September 2017): 1334–38. http://dx.doi.org/10.1177/1541931213601816.

Full text
Abstract:
In order to deepen and broaden understanding on the occupational safety and health disparities between temporary and non-temporary workers, psychological and perceptual gaps between the two groups need to be carefully investigated, particularly in relation to risk taking behaviors. To this end, the present study showed the precarious nature of temporary employment in terms of perceived job security and perceived job control. Although the present study showed that risk perception is not significantly different across the temporary and non-temporary worker groups, temporary workers tended to perceive higher monetary benefits from potentially hazardous working opportunities and reported greater willingness to undertake the working opportunities than non-temporary workers. Temporary workers may be more likely to view the working opportunities in hazardous occupational settings as risks that are worthy to take. These findings need to be incorporated in the safety management of temporary workers to promote self-regulatory engagement in safer and healthier behaviors.
APA, Harvard, Vancouver, ISO, and other styles
29

Fugate, Sunny, and Kimberly Ferguson-Walter. "Artificial Intelligence and Game Theory Models for Defending Critical Networks with Cyber Deception." AI Magazine 40, no. 1 (March 28, 2019): 49–62. http://dx.doi.org/10.1609/aimag.v40i1.2849.

Full text
Abstract:
Traditional cyber security techniques have led to an asymmetric disadvantage for defenders. The defender must detect all possible threats at all times from all attackers and defend all systems against all possible exploitation. In contrast, an attacker needs only to find a single path to the defender’s critical information. In this article, we discuss how this asymmetry can be rebalanced using cyber deception to change the attacker’s perception of the network environment, and lead attackers to false beliefs about which systems contain critical information or are critical to a defender’s computing infrastructure. We introduce game theory concepts and models to represent and reason over the use of cyber deception by the defender and the effect it has on attacker perception. Finally, we discuss techniques for combining artificial intelligence algorithms with game theory models to estimate hidden states of the attacker using feedback through payoffs to learn how best to defend the system using cyber deception. It is our opinion that adaptive cyber deception is a necessary component of future information systems and networks. The techniques we present can simultaneously decrease the risks and impacts suffered by defenders and dramatically increase the costs and risks of detection for attackers. Such techniques are likely to play a pivotal role in defending national and international security concerns.
APA, Harvard, Vancouver, ISO, and other styles
30

Tumkevič, Agnija. "CYBERSECURITY IN CENTRAL EASTERN EUROPE: FROM IDENTIFYING RISKS TO COUNTERING THREATS." Baltic Journal of Political Science 5, no. 5 (January 17, 2017): 73. http://dx.doi.org/10.15388/bjps.2016.5.10337.

Full text
Abstract:
Today, ensuring security in cyberspace is a top priority of national security policy for most states. States’ approaches to cybersecurity can be divided into two categories: those that regard cybersecurity as a civilian task; and those that involve their militaries in creating or implementing cybersecurity policies. Those states that have incorporated cyberwarfare into their military planning and organization perceive cyberattacks as a threat to their national security, while states that charge their civilian agencies with domestic cybersecurity missions classify cyber intrusions as security risks for only particular sectors. Adopting the framework of securitization theory, this article theorizes both civil and military approaches to cybersecurity and threat perceptions and their sources. The theoretical framework is then applied to a study of the cybersecurity policies of Central European countries and the Baltic States.
APA, Harvard, Vancouver, ISO, and other styles
31

Rapan, Florian, and Ioana Raluca Gologach. "Romania’s Role in the Management of Security Organizations." International conference KNOWLEDGE-BASED ORGANIZATION 24, no. 1 (June 1, 2018): 192–97. http://dx.doi.org/10.1515/kbo-2018-0028.

Full text
Abstract:
Abstract The disappearance of bipolarity causes essential mutations in the international security environment, which highlights the need to rethink the defence concept. The analysis of new risks and threats to international security has led to a new perception of it and has imposed a new orientation in the field of defence. The formation of new partnerships and alliances greatly reduces the likelihood of a conflict between members, which contributes to supporting the common interest of countries to maintain and strengthen international peace and security. All countries of the world are, in principle, members of at least one regional or intergovernmental organization. Although traditionally regional organizations have been set up on the basis of political, economical or environmental objectives, they have also entered security in recent decades and have started to develop their own capabilities to prevent conflicts and support peacekeeping operations or post-conflict construction of states
APA, Harvard, Vancouver, ISO, and other styles
32

Sorgho, Raissa, Maximilian Jungmann, Aurélia Souares, Ina Danquah, and Rainer Sauerborn. "Climate Change, Health Risks, and Vulnerabilities in Burkina Faso: A Qualitative Study on the Perceptions of National Policymakers." International Journal of Environmental Research and Public Health 18, no. 9 (May 7, 2021): 4972. http://dx.doi.org/10.3390/ijerph18094972.

Full text
Abstract:
Climate change (CC) constitutes one of the greatest threats to human health, and requires political awareness for effective and efficient adaptation planning. This study identified the perceptions of climate change and health adaptation (CC&H) among relevant stakeholders, decision-makers, and policymakers (SDPs) in Burkina Faso (BF) by determining their perceptions of CC, of related health risks and vulnerabilities, and of CC impacts on agriculture and food security. We carried out 35 semi-structured, qualitative in-depth interviews with SDPs, representing national governmental institutions, international organizations, and civil society organizations. The interviews were analyzed using content analysis. SDPs shared similar perceptions of CC and concurred with three ideas (1) CC is a real and lived experience in BF; (2) the population is aware of climatic changes in their environment; (3) CC is intertwined with the agricultural and economic development of the country. SDPs identified biodiversity loss, floods, droughts, and extreme heat as posing the highest risk to health. They elaborated five exposure pathways that are and will be affected by CC: water quality and quantity, heat stress, food supply and safety, vector borne diseases, and air quality. In conclusion, SDPs in Burkina Faso are highly aware of CC hazards, relevant health exposure pathways, and their corresponding health outcomes. Mental health and the interplay between social factors and complex health risks constitute perception gaps. SDPs perceived CC&H risks and vulnerabilities align with current evidence.
APA, Harvard, Vancouver, ISO, and other styles
33

Gandit, Marc, Dungo Rémi Kouabenan, and Sandrine Caroly. "Comparative Optimism, Perceived Control, Knowledge of Security Devices and the Behavior in Case of Road Tunnel Fire." Psihologia Resurselor Umane 5, no. 2 (January 21, 2020): 58–71. http://dx.doi.org/10.24837/pru.v5i2.328.

Full text
Abstract:
This article presents a study aiming at investigating the effect of comparative optimism, anxiety, safety devices awareness on behavioural intention in case of a fire in a road tunnel. One hundred and fifty-one road users (firemen, truck drivers, regular drivers, and driving-school students) filled out a questionnaire measuring their perceptions of risks, their awareness of safety devices, and their behavioural intentions in case of a fire. Results show differences in perceptions between each category of participants and an interaction between anxiety and perceived control on comparative optimism. High professional practice with risk management lead to a better perception. For people with a low level of anxiety, comparative optimism is as high as perceived control is high. While for people with high level of anxiety, no variation was observed in comparative optimism according to the perceived control. We also found an effect of safety devices awareness on behavioural intentions. People with more rescue devices awareness tended to take less risk. Bearing on such results, suggestions are made for the improvement of communication in case of a fire and to develop users training in accordance with tunnel security specificities.
APA, Harvard, Vancouver, ISO, and other styles
34

Mehrnezhad, Maryam, and Ehsan Toreini. "What Is This Sensor and Does This App Need Access to It?" Informatics 6, no. 1 (January 24, 2019): 7. http://dx.doi.org/10.3390/informatics6010007.

Full text
Abstract:
Mobile sensors have already proven to be helpful in different aspects of people’s everyday lives such as fitness, gaming, navigation, etc. However, illegitimate access to these sensors results in a malicious program running with an exploit path. While the users are benefiting from richer and more personalized apps, the growing number of sensors introduces new security and privacy risks to end users and makes the task of sensor management more complex. In this paper, first, we discuss the issues around the security and privacy of mobile sensors. We investigate the available sensors on mainstream mobile devices and study the permission policies that Android, iOS and mobile web browsers offer for them. Second, we reflect the results of two workshops that we organized on mobile sensor security. In these workshops, the participants were introduced to mobile sensors by working with sensor-enabled apps. We evaluated the risk levels perceived by the participants for these sensors after they understood the functionalities of these sensors. The results showed that knowing sensors by working with sensor-enabled apps would not immediately improve the users’ security inference of the actual risks of these sensors. However, other factors such as the prior general knowledge about these sensors and their risks had a strong impact on the users’ perception. We also taught the participants about the ways that they could audit their apps and their permissions. Our findings showed that when mobile users were provided with reasonable choices and intuitive teaching, they could easily self-direct themselves to improve their security and privacy. Finally, we provide recommendations for educators, app developers, and mobile users to contribute toward awareness and education on this topic.
APA, Harvard, Vancouver, ISO, and other styles
35

Lengyel, Henrietta, Viktor Remeli, and Zsolt Szalay. "A collection of easily deployable adversarial traffic sign stickers." at - Automatisierungstechnik 69, no. 6 (May 27, 2021): 511–23. http://dx.doi.org/10.1515/auto-2020-0115.

Full text
Abstract:
Abstract The emergence of new autonomous driving systems and functions – in particular, systems that base their decisions on the output of machine learning subsystems responsible for environment perception – brings a significant change in the risks to the safety and security of transportation. These kinds of Advanced Driver Assistance Systems are vulnerable to new types of malicious attacks, and their properties are often not well understood. This paper demonstrates the theoretical and practical possibility of deliberate physical adversarial attacks against deep learning perception systems in general, with a focus on safety-critical driver assistance applications such as traffic sign classification in particular. Our newly developed traffic sign stickers are different from other similar methods insofar that they require no special knowledge or precision in their creation and deployment, thus they present a realistic and severe threat to traffic safety and security. In this paper we preemptively point out the dangers and easily exploitable weaknesses that current and future systems are bound to face.
APA, Harvard, Vancouver, ISO, and other styles
36

Zaki, Waqas, Areej Tayyab, and Aeman Hassan. "Factors Affecting Customer Experience of E-Commerce in Pakistan." Journal of Educational Paradigms 1, no. 2 (December 15, 2019): 76–79. http://dx.doi.org/10.47609/0102052019.

Full text
Abstract:
The study is regarding analyzing the factors affecting customer experience of e-commerce in Pakistan through the quality of the product, safety of application, delivery guarantee, and offers. Using the purposive sampling technique total of 180 questionnaires were collected from the people having the experience of online shopping in Lahore, Pakistan. The study shows the factors and their roles towards raising the customer experience of e-commerce. This study's results reveal that the perception of customers is that the quality of the product, application safety, offers, and the delivery guarantee affects the customer comfort level and satisfaction level. The study results also reveal that the lower delivery charges, guaranteed delivery, and no safety risks motivate the customers to go for online shopping. It concluded that if the marketers concentrate on the factors like product quality, security issues, delivery risks, and the financial risks, it increases the customers. Limited literature has been documented in Pakistan, particularly regarding customer perception for online shopping because there are too many factors that affect the purchase intention. The results of the study might be beneficial for the online marketers/ companies with online stores/ e-commerce stores.
APA, Harvard, Vancouver, ISO, and other styles
37

Kovaříková, Miroslava. "Prevention of Armed Attacks at Schools as a Part of Emergency Situations Didactics." Lifelong Learning 5, no. 3 (2015): 95–112. http://dx.doi.org/10.11118/lifele2015050395.

Full text
Abstract:
This article deals with the issue of security management and its following application in education. The article focuses on the topic of armed attacks at schools. Based on a research probe aimed at teachers which focused on perception of security risks, there are chosen areas to which Central emergency system services should react. Further, knowledge of technical and organizational measures of emergency plans in the organization and the level of attention paid to this issue by the school management were investigated. In the text there are also international models of solutions of this issue introduced. The contribution also brings outline of how is the issue solved in the European Union countries, in particular in the Kingdom of Spain. Experience with the solution of security issues of schools in Latin America are also mentioned. In the conclusion the summary of measures for improvement of security at schools is presented.
APA, Harvard, Vancouver, ISO, and other styles
38

Hassan, Wajid, Te-Shun Chou, Xiaoming Li, Patrick Appiah-Kubi, and Omar Tamer. "Latest trends, challenges and Solutions in Security in the era of Cloud Computing and Software Defined Networks." International Journal of Informatics and Communication Technology (IJ-ICT) 8, no. 3 (November 13, 2019): 162. http://dx.doi.org/10.11591/ijict.v8i3.pp162-183.

Full text
Abstract:
The emergence of cloud computing has changed perception of all regarding software delivery, development models and infrastructure. Cloud computing has a potential of providing elastic, easily manageable, powerful and cost effective solutions. The rapid transition to cloud computing has fueled concerns on the security issues. The migration of the user’s data and applications in a shared environment of a cloud, where there is a collocation of several users increases security related concerns. Several research efforts have been made in evaluating challenges related to security faced by the cloud computing environments, a number of solutions of such problems have also been proposed. Integrated security solutions should be devised to deal with the increasing security risks. In this paper, a detailed cloud computing survey, key services and concepts are being presented. This paper attempts to evaluate various security threats to cloud computing and a number of security solutions have also been discussed. Furthermore, a brief view of the cloud security regulatory bodies and compliance have also been presented. Despite the research efforts in cloud security field, there are still some open research problems and challenges which are discussed in this paper.
APA, Harvard, Vancouver, ISO, and other styles
39

Sylejmani, Rrahman, and Elda Maloku. "Illegal migration as a factor of security threat in Kosovo." Technium Social Sciences Journal 16 (February 10, 2021): 147–57. http://dx.doi.org/10.47577/tssj.v16i1.2418.

Full text
Abstract:
In this paper it is analyzed the illegal migration which in the modern societies in recent decades is characterized with a great expansion, dynamic, organization and transnational connection. The research objects of this scientific paper are security challenges, risks and threats from illegal migration as well as the perception of the citizens of Pristina regarding the phenomenon and presence of illegal migration in Kosovo. In order to understand the opinion and perception of the citizens in the Republic of Kosovo regarding the presence of the illegal migration in Kosovo, a survey was conducted of 160 citizens of Pristina who answered 6 questions submitted through random method. Through this research it is intended to be understood first how much ordinary citizens have knowledge about the purpose of exploitation of victims by smugglers, what they may face during their journey, the factors that affect the occurrence of this phenomenon. Furthermore, raising the awareness of the citizens to cooperate with law enforcement agencies in cases of occurrence and investigation of migrants smuggling and also their awareness of the risk of possible terrorist attacks and the increasing crime rate that may carry the presence of these illegal migrants. The paper uses the survey method, the method of processing, analysis and interpretation of the obtained data as well as the comparative method.
APA, Harvard, Vancouver, ISO, and other styles
40

Hossain, Md Alamgir. "Security perception in the adoption of mobile payment and the moderating effect of gender." PSU Research Review 3, no. 3 (December 9, 2019): 179–90. http://dx.doi.org/10.1108/prr-03-2019-0006.

Full text
Abstract:
Purpose The mobile payment system has changed payment patterns and has the potential to improve people’s quality of life and increase the bank’s efficiency. In return, the risks and trust factors inevitably led to increased challenges and become a major concern in the adoption of mobile payment service. Yet, little is known about how risk and trust factors can affect the adoption of mobile payment. Hence, this paper aims to come into contact to solve these issues in the context. Design/methodology/approach A comprehensive research model that reflects the customer satisfaction and loyalty to the adoption of mobile payment services is developed and empirically tested using exploratory and confirmatory factor analysis and structural equation modeling. Findings Findings reveal that the perceived risk has a significant negative impact on perceived trust and customer satisfaction. Perceived trust is the most important variable in building customer satisfaction, and customer satisfaction is the reasonable predictor of customer loyalty. In addition, gender differences moderate the adoption of the mobile payment service. Originality/value The results of the study hold several implications for scholars in the field of technology adoption on financial transactions and offer valuable managerial insights to design their mobile payment adoption strategies to pursue greater acceptance and diffusion of this new payment system.
APA, Harvard, Vancouver, ISO, and other styles
41

Bharathi, S. Vijayakumar. "Forewarned is forearmed." Benchmarking: An International Journal 26, no. 8 (October 7, 2019): 2443–67. http://dx.doi.org/10.1108/bij-08-2018-0264.

Full text
Abstract:
Purpose Internet of Things (IoT) interconnects many heterogeneous devices to each other, collecting and processing large volumes of data for decision making without human intervention. However, the information security concern it brings has attracted quite a lot of attention, and, at this stage, the smart step would be to analyze the security issues of IoT platform and get to the state of readiness before embarking upon this attractive technology. The purpose of this paper is to address these issues. Design/methodology/approach IoT risk assessment through the application of the analytical hierarchy process (AHP), a favorite multi-criteria decision making technique, is proposed. The IoT risks are prioritized and ranked at different layers, before which a well-defined IoT risk taxonomy is defined comprising of 25 risks across six layers of the IoT model for developing control and mitigation plans for information security of IoT. Findings People and processes layer, network layer and applications layer are the top three critical layers with risks like the lack of awareness, malware injection, malicious code injection, denial of service and inefficient policies for IoT practice get the highest priority and rank. Pareto analysis of the overall risk factors revealed that the top ten factors contribute to 80 percent of the risks perceived by information security experts. Research limitations/implications The study focuses only on certain predefined constructs or layers of the IoT model traced from legacy studies. It is essential to re-look these constructs on a timely basis to prolong the results’ validity. The study’s empirical scope is confined only to the risk perception of select IoT experts and does not encompass a broader segment of the IoT ecosystem. Therefore, the risks assessment may not be sweeping to a bigger audience. Practical implications The study implications are two-fold: one it consolidates the earlier siloed works to intensify the need for risk assessment in the IoT domain, and second the study brings yet another contextual avenue of extending the application AHP and Pareto principle combination. The paper also draws specific critical organizational interventions about IoT risks. A comprehensive approach to prioritizing and ranking IoT risks are present in this research paper. Originality/value The contribution of this study to the benchmarking of IoT risk assessment is two-fold. One, a comprehensive risk assessment taxonomy is proposed, and two, the risks are prioritized and ranked to give a convincing reference for the organizations while making information security plans for IoT technology.
APA, Harvard, Vancouver, ISO, and other styles
42

Franklin A, Benjamin, and Sasilatha T. "Changing the Electrical Safety Culture." Indonesian Journal of Electrical Engineering and Computer Science 9, no. 1 (January 1, 2018): 93. http://dx.doi.org/10.11591/ijeecs.v9.i1.pp93-96.

Full text
Abstract:
<p>Electrical wellbeing - Where were we yesterday? Where are we today? Where will we be later on? The wellbeing society is proceeding to advance to give a more secure workplace to individuals working around electrical hardware. To enhance electrical security, it takes sense of duty regarding consistent change of the electrical wellbeing society. New musings and thoughts to enhance electrical wellbeing are basic. This paper addresses how function hones have changed after some time and prescribes thoughts to overhaul the current electrical culture. To change the current security culture new thoughts should be produced to cause higher execution in electrical wellbeing for all individuals presented to electrical risks. New circuit testers take in great and unfortunate propensities from more experienced circuit testers. Human execution depends on a mix of information, abilities, and educated practices. Convictions can be affected through perceptions and collaborations with different experts. The estimation of value mentorship conveys a high level of obligation to guarantee legitimate wellbeing rehearses is taken after. Almost no exertion has been given to preparing the nonelectrical labourers that are presented to electrical risks. Preparing for non-electrical labourers is a missing component in the present electrical security culture. A principal contention in this paper is that culture speaks to the entirety of what is regularly adequate without examination. The way of life is likewise determined by regular perception and experience. With a specific end goal to change the way of life there must be a redefinition of what is satisfactory, trailed by noticeable changes that everybody can understanding and watch. Administration possesses culture since it sets what is passable and satisfactory. Accordingly, the fate of electrical wellbeing will rely upon how well administration comprehends the hazard and results of electrical work and their duty in moulding and owning electrical security strategies. Enter components tended to in this paper incorporate human execution, innovation changes, adjusting to change, actualizing new thoughts to enhance security and how staff changes inside an enterprise can influence wellbeing execution. </p>
APA, Harvard, Vancouver, ISO, and other styles
43

Pramod, Dhanya, and S. Vijayakumar Bharathi. "Developing an Information Security Risk Taxonomy and an Assessment Model using Fuzzy Petri Nets." Journal of Cases on Information Technology 20, no. 3 (July 2018): 48–69. http://dx.doi.org/10.4018/jcit.2018070104.

Full text
Abstract:
In the digital era, organization-wide information security risk assessment has gained importance because it can impact businesses in many ways. In this article, the authors propose a model to assess the information security risk using Fuzzy Petri Nets (FPN). Deeply rooted in the OCTAVE framework, this research presents a taxonomy of risk practice areas and risk factors. The authors apply the constituents of the taxonomy to risk assessment through a well-defined FPN model. The primary motive of the article is to extend the usability of FPNs to newer and less explored domains like audit and evaluation of information security risks. The unique contribution of this article is the definition and development of a comprehensive and measurable model of risk assessment and quantification. The model can also serve as a tool to capture the risk perception of the respondents for validating the criticality of risk and facilitate the top management to invest in information security control eco-system judiciously.
APA, Harvard, Vancouver, ISO, and other styles
44

TRAORE, Kalifa, Daouda SIDIBE, and Harouna COULIBALY. "Climate Smart Agriculture as Final Goal: Use of Improved Cereals Varieties in Cinzana, Mali." Journal of Agricultural Studies 5, no. 1 (January 10, 2017): 50. http://dx.doi.org/10.5296/jas.v5i1.10582.

Full text
Abstract:
Climate variability and change are recognized as the greatest challenge to crop production and food security in sub-Saharan Africa. This work assesses farmers’ perception on the contribution of improved varieties of sorghum and millet in the search for food security in Cinzana rural commune of Mali in the current context of climate change.The methodology was based on focus group surveys with both, the decentralized technical services, administrative and municipal authorities, NGOs, farmer organizations and producers but also farmer exchanges visits on improved varieties tested in farmer’s field.The result shows that climate change is described by the majority of farmers (87%) as decrease in rainfall amount and length of rainy seasons, high increases in temperature and high deforestation and water scarcity. Unpredictability of climate, (80%), drought (70%) and heavy rain (65%) occurrence were identified as major perception of farmers on risks in climate for crop production and soil degradation. After farmers’ study tour, 80% of the participants mentioned a better growth of plants and increase of soil moisture with the use of contour ridges tillage as a water conservation technology. Adapted cycle (55%) and higher yield (37%) of improved varieties were farmer’s main drivers for adoption of improved millet and sorghum varieties.The study revealed that local farmers have substantial knowledge on climate variabilities and risks and also are aware of some adaptation strategies. However, for wide scale adoption of effective strategies, capacity strengthening appeared a prerequisite.
APA, Harvard, Vancouver, ISO, and other styles
45

HANDRIKOVÁ, Jana, and Darina STACHOVÁ. "PERCEPTION OF THE INCREASED RISK OF PHISHING ATTACKS DURING THE COVID-19 CRISIS." Acta Electrotechnica et Informatica 21, no. 1 (June 9, 2021): 19–24. http://dx.doi.org/10.15546/aeei-2021-0003.

Full text
Abstract:
Measures in connection with the COVID-19 crisis have forced a change in the processes taking place in individual organizations - whether in education, state administration or the commercial sphere. CEOs and full-time employees have been forced to ensure that the organization's goals are met in an ever-changing legislative environment, outside the standard work environment, with increased time pressure, in times of financial security concerns, and in times of heightened health or even life concerns. These factors have weakened concerns about one's own security - including the protection of one's own identity or the protection of the employer's assets in cyberspace. The presented research was attended by students, some of them, especially external students, are employees of the public or commercial sphere. The aim of the research was to find out whether students noticed an increased incidence of phishing attacks during the COVID-19 crisis, how they responded to this fact as individuals and how the organizations in which they are employed reacted. Based on the results of this survey, it can be estimated whether users with the development of Internet services are aware that they are an integral part of the cybersecurity system and, based on this fact, adjust their behavior in cyberspace.
APA, Harvard, Vancouver, ISO, and other styles
46

Silic, Mario, and Andrea Back. "The Influence of Risk Factors in Decision-Making Process for Open Source Software Adoption." International Journal of Information Technology & Decision Making 15, no. 01 (January 2016): 151–85. http://dx.doi.org/10.1142/s0219622015500364.

Full text
Abstract:
“Nobody ever got fired for buying IBM,” was a widely used cliché in the 1970s in the corporate IT (information technology) world. Since then, the traditional process of purchasing software has dramatically changed, challenged by the advent of open source software (OSS). Since its inception in the 1980s, OSS has matured, grown, and become one of the important driving forces of the enterprise ecosystem. However, it has also brought important IT security risks that are impacting the OSS IT adoption decision-making process. The recent Heartbleed bug demonstrated the grandeur of the issue. While much of the noise relates to the amplification of perceived risks by the popular mass media coverage, the effect is that many enterprises, mainly for risk reasons, have still chosen not to adopt OSS. We investigated “how do information security related characteristics of OSS affect the risk perception and adoption decision of OSS” by conducting an online survey of 188 IT decision-makers. The proposed Open Source Risk Adoption Model offers novel insights on the importance of the perceived risk antecedents. Our research brings new theoretical contributions, such as understanding the perceived IT security risk (PISR) relationship with adoption intention (AI) in the OSS context, for researchers and important insights for IT information professionals. We have found that IT security risk has a significant role in OSS adoption intention. Our results offer possible future research directions and extend existing theoretical understanding of OSS adoption.
APA, Harvard, Vancouver, ISO, and other styles
47

Miao, Ji. "Expectations and Realities: Managing the Risks of the "Belt and Road" Initiative." China Quarterly of International Strategic Studies 01, no. 03 (October 2015): 497–522. http://dx.doi.org/10.1142/s2377740015500244.

Full text
Abstract:
This article aims to explore China's motivations for its "Belt and Road Initiative" which has emerged as China's major policy framework for domestic development and foreign diplomacy. This author argues that China has four basic expectations from the initiative: addressing the perception of the "China threat"; achieving long-term economic benefits; assuaging the grave concern over the threat of American maritime primacy on China's trade and energy lifelines; and rebuilding a world order in favor of China's interests and "predominance." After evaluating the four assumed benefits against the realities, the study argues that both the Chinese leadership and academia have overestimated the potential gains while underestimating the political, economic and security risks of the initiative. Therefore, it is proposed that China should carefully manage its own national image, run projects based on economic rationale, be prudent in its military and strategic involvement, and refrain from eager challenges of the U.S.-led world order.
APA, Harvard, Vancouver, ISO, and other styles
48

Glowka, Gundula, and Anita Zehrer. "Tourism Family-Business Owners’ Risk Perception: Its Impact on Destination Development." Sustainability 11, no. 24 (December 7, 2019): 6992. http://dx.doi.org/10.3390/su11246992.

Full text
Abstract:
In developing and sustaining tourism, destination management involves the coordination of various stakeholders, and theory suggests that securing sustainability, including stakeholder interests in decision-making and strategic planning is crucial. Therefore, understanding stakeholders’ interests and relationships is also essential. In the Austrian Alpine region, small- and medium-sized family businesses offering tourism products dominate the rural tourism landscape. However, little research has been done on how these family firms contribute to shaping the destination’s future. Therefore, through guided interviews, this qualitative study examined family-business owners’ perceptions of risks for Austrian tourism destination development. Family firms externalized such risks as labor shortage as a structural issue and neglected their responsibility to attract employees by improving working conditions. Thus, the externalization of risks to other stakeholder groups prevented family firms’ proactive approach to sustainable destination development.
APA, Harvard, Vancouver, ISO, and other styles
49

Chen, Aiguo, Guoming Lu, Hanwen Xing, Yuan Xie, and Shunwei Yuan. "Dynamic and semantic-aware access-control model for privacy preservation in multiple data center environments." International Journal of Distributed Sensor Networks 16, no. 5 (May 2020): 155014772092177. http://dx.doi.org/10.1177/1550147720921778.

Full text
Abstract:
With the rapid development of intelligent perception and other data acquisition technologies in the Internet of things, large-scale scientific workflows have been widely used in geographically distributed multiple data centers to realize high performance in business model construction and computational processing. However, insider threats pose very significant privacy and security risks to systems. Traditional access-control models can no longer satisfy the reasonable authorization of resources in these new cross-domain environments. Therefore, a dynamic and semantic-aware access-control model is proposed for privacy preservation in multiple data center environments, which implements a semantic dynamic authorization strategy based on an anomaly assessment of users’ behavior sequences. The experimental results demonstrate that this dynamic and semantic-aware access-control model is highly dynamic and flexible and can improve the security of the application system.
APA, Harvard, Vancouver, ISO, and other styles
50

Mouli, K. Chandra, and U. Seshadri. "Singleto Multi Clouds for Security in Cloud Computing by using Secret Key Sharing." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 10, no. 4 (August 15, 2013): 1539–45. http://dx.doi.org/10.24297/ijct.v10i4.3254.

Full text
Abstract:
Now a day Cloud Computing is rapidly using computing technology. For low cost and high-end benefits this cloud computing is utilized. The major issue in this cloud computing is Ensuring the security, because the often store sensitive data with third party cloudproviders but these providers may beuntrusted.Working with single cloud is prevented, because in customer’s perception the failure in service availability and thepossibility of viciousgang in single cloud. To overcome these types of failures, a recent and popular technology is emerged called cloud of clouds or multi clouds or inters clouds. In this paper we illustrated the recent research towards multi clouds from single cloud and addressed possible solutions in security concern.Here we used the SSS (Secret Key Sharing) technique to share the key between servers. From this we can found that there is less attention in the field of multi cloud security compare with single cloud providers. The main intention of this work is to reduce the security risks related to cloud users and to encourage theuse of cloud- of -clouds due to its ability.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography