期刊文献+
共找到27篇文章
< 1 2 >
每页显示 20 50 100
Fuzzy Risk Assessment Method for Airborne Network Security Based on AHP-TOPSIS
1
作者 Kenian Wang YuanHong Chunxiao Li 《Computers, Materials & Continua》 SCIE EI 2024年第7期1123-1142,共20页
With the exponential increase in information security risks,ensuring the safety of aircraft heavily relies on the accurate performance of risk assessment.However,experts possess a limited understanding of fundamental ... With the exponential increase in information security risks,ensuring the safety of aircraft heavily relies on the accurate performance of risk assessment.However,experts possess a limited understanding of fundamental security elements,such as assets,threats,and vulnerabilities,due to the confidentiality of airborne networks,resulting in cognitive uncertainty.Therefore,the Pythagorean fuzzy Analytic Hierarchy Process(AHP)Technique for Order Preference by Similarity to an Ideal Solution(TOPSIS)is proposed to address the expert cognitive uncertainty during information security risk assessment for airborne networks.First,Pythagorean fuzzy AHP is employed to construct an index system and quantify the pairwise comparison matrix for determining the index weights,which is used to solve the expert cognitive uncertainty in the process of evaluating the index system weight of airborne networks.Second,Pythagorean fuzzy the TOPSIS to an Ideal Solution is utilized to assess the risk prioritization of airborne networks using the Pythagorean fuzzy weighted distance measure,which is used to address the cognitive uncertainty in the evaluation process of various indicators in airborne network threat scenarios.Finally,a comparative analysis was conducted.The proposed method demonstrated the highest Kendall coordination coefficient of 0.952.This finding indicates superior consistency and confirms the efficacy of the method in addressing expert cognition during information security risk assessment for airborne networks. 展开更多
关键词 Airborne networks information security risk assessment cognitive uncertainty Pythagorean fuzzy sets
下载PDF
Analysis and Evaluation of Non-systematic Risks in Enterprise Informationization
2
作者 Linsheng Si 《Chinese Business Review》 2004年第6期26-30,共5页
Enterprise Informationization (El) is encountering a large variety of non-systematic risks in demanding and planning, designing and selecting, implementing and controlling, managerial and cultural aspects,due to whi... Enterprise Informationization (El) is encountering a large variety of non-systematic risks in demanding and planning, designing and selecting, implementing and controlling, managerial and cultural aspects,due to which the investment in IT normally cannot simultaneously create the expected commercial values. Through analyzing the factors influencing non-systematic risks of EI, the paper established a risk evaluating index system and accordingly proposed a set of appropriate risk evaluating methodology, with which enterprise can well control informationization risks. 展开更多
关键词 Enterprise informationization non-systematic risks index system evaluating model
下载PDF
Investigation of Enterprise Informationization Project Risk
3
作者 Ning Ma Guangshi Wang 《Chinese Business Review》 2004年第10期53-55,71,共4页
The enterprise informationization (El) project has already become modernization level and synthesis power of the enterprise. However, information project risk. In order to reduce the El project risk, it is necessary... The enterprise informationization (El) project has already become modernization level and synthesis power of the enterprise. However, information project risk. In order to reduce the El project risk, it is necessary to adopt reasonable incentive and constraint effectively and to structure perfect market environment. an urgent work to raise the asymmetry increases the EI investment mode, to carry on incentive and constraint effectively and to structure perfect market environment. 展开更多
关键词 enterprise informationization project risk information asymmetry adverse selectionmoral hazard
下载PDF
How Does the Internet Impact the Public's Perception of Information Security Risk?
4
作者 Yi Chengzhi 《Social Sciences in China》 2024年第2期184-206,共23页
Clarifying the relationship between internet use and public information security risk perception helps us gain a better understanding of the factors influencing public risk perception.However,the relationship is still... Clarifying the relationship between internet use and public information security risk perception helps us gain a better understanding of the factors influencing public risk perception.However,the relationship is still under-explored.This paper empirically examines the relationship between internet use and information security risk perception based on data from the 2021 Chinese Social Survey.It was found that whether to use the internet and the frequency of use are both significantly positively correlated with the perception of information security risk.On this basis,the mechanism by which internet use affects public information security risk perceptions is verified from the perspective of interpersonal trust.The mechanism analysis found that interpersonal trust exerts an indirect effect between internet use and perceived information security risk.The findings of this study provide new insights for our further understanding of how internet use affects residents'perceptions of securityrisk. 展开更多
关键词 internet use PUBLIC perceived information security risk
原文传递
高职院校廉政风险防控体系构建路径的探析 被引量:2
5
作者 李建民 张辛 黄阳 《江苏建筑职业技术学院学报》 2023年第3期71-75,共5页
廉政风险防控工作是高校推进反腐败惩防体系建设的重要手段。高职院校廉政风险防控工作,大多从聚焦学校重点领域、重点部位和关键环节切入,找出风险点、制订防控措施、明确责任单位,进而组织开展常规监督,鲜有从岗位职责切入、以规范权... 廉政风险防控工作是高校推进反腐败惩防体系建设的重要手段。高职院校廉政风险防控工作,大多从聚焦学校重点领域、重点部位和关键环节切入,找出风险点、制订防控措施、明确责任单位,进而组织开展常规监督,鲜有从岗位职责切入、以规范权力运行为核心构建防控体系以及运用信息化手段创新防控监督机制方面的探索和实践。以江苏建筑职业技术学院为例,从清权确权、规范权力运行为起点,通过分类分级、开展精准化风险排查防控,借助信息技术、推动信息化防控监督的视角维度,探索构建具有校本特色的廉政风险防控体系,助力学校不断提升治理能力和治理水平,推动学校事业健康高质量发展。 展开更多
关键词 高职院校 权力运行 廉政风险防控 体系构建 信息化
下载PDF
虑及技术系统复杂性的基层核化安全策略
6
作者 沈志刚 《工业安全与环保》 2023年第1期72-75,共4页
针对工业生产体系的基层班组安全压力难以缓解,梳理安全管理现状提出主要问题,结合安全复杂学理论,以简化的发电厂汽轮机EH油压保护工艺单元为例,剖析维修作业过程的多种风险涌现机制,阐明了基层班组技术系统的安全复杂性,明确了传统安... 针对工业生产体系的基层班组安全压力难以缓解,梳理安全管理现状提出主要问题,结合安全复杂学理论,以简化的发电厂汽轮机EH油压保护工艺单元为例,剖析维修作业过程的多种风险涌现机制,阐明了基层班组技术系统的安全复杂性,明确了传统安全管理模式应对安全风险涌现的不足。提出基于技术系统时空风险公式的核化安全策略,罗列了4种风险成分的主要应对策略,阐述了在班组层面的关联化、信息化手段,分析了企业整合班组策略的作用点与总体步骤,并为安全信息化技术指出新的开发方向。 展开更多
关键词 基层班组 技术系统 风险涌现 安全复杂性 核化安全策略 信息化
下载PDF
Optimization of sensor deployment sequences for hazardous gas leakage monitoring and source term estimation
7
作者 Jikai Dong Bing Wang +3 位作者 Xinjie Wang Chenxi Cao Shikuan Chen Wenli Du 《Chinese Journal of Chemical Engineering》 SCIE EI CAS CSCD 2023年第4期169-179,共11页
Nowadays, chemical safety has attracted considerable attention, and chemical gas leakage monitoring and source term estimation(STE) have become hot spots. However, few studies have focused on sensor layouts in scenari... Nowadays, chemical safety has attracted considerable attention, and chemical gas leakage monitoring and source term estimation(STE) have become hot spots. However, few studies have focused on sensor layouts in scenarios with multiple potential leakage sources and wind conditions, and studies on the risk information(RI) detection and prioritization order of sensors have not been performed. In this work, the monitoring area of a chemical factory is divided into multiple rectangles with a uniform mesh. The RI value of each grid node is calculated on the basis of the occurrence probability and normalized concentrations of each leakage scenario. A high RI value indicates that a sensor at a grid node has a high chance of detecting gas concentrations in different leakage scenarios. This situation is beneficial for leakage monitoring and STE. The methods of similarity redundancy detection and the maximization of sensor RI detection are applied to determine the sequence of sensor locations. This study reveals that the RI detection of the optimal sensor layout with eight sensors exceeds that of the typical layout with 12 sensors. In addition, STE with the optimized placement sequence of the sensor layout is numerically simulated. The statistical results of each scenario with various numbers of sensors reveal that STE is affected by sensor number and scenarios(leakage locations and winds). In most scenarios, appropriate STE results can be retained under the optimal sensor layout even with four sensors. Eight or more sensors are advised to improve the performance of STE in all scenarios. Moreover, the reliability of the STE results in each scenario can be known in advance with a specific number of sensors. Such information thus provides a reference for emergency rescue. 展开更多
关键词 Gas leakage Source term estimation Sensor layout risk information Numerical simulation OPTIMIZATION
下载PDF
Risk Analysis of Information System Security Based on Distance of Information-State Transition 被引量:2
8
作者 ZHOU Chao PAN Ping +1 位作者 MAO Xinyue HUANG Liang 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2018年第3期210-218,共9页
The configuration of information system security policy is directly related to the information asset risk, and the configuration required by the classified security protection is able to ensure the optimal and minimum... The configuration of information system security policy is directly related to the information asset risk, and the configuration required by the classified security protection is able to ensure the optimal and minimum policy in the corresponding security level. Through the random survey on the information assets of multiple departments, this paper proposes the relative deviation distance of security policy configuration as risk measure parameter based on the distance of information-state transition(DIT) theory. By quantitatively analyzing the information asset weight, deviation degree and DIT, we establish the evaluation model for information system. With example analysis, the results prove that this method conducts effective risk evaluation on the information system intuitively and reliably, avoids the threat caused by subjective measurement, and shows performance benefits compared with existing solutions. It is not only theoretically but also practically feasible to realize the scientific analysis of security risk for the information system. 展开更多
关键词 distance of information-state transition(DIT) deviation distance information asset risk analysis
原文传递
基于ERP系统的建筑企业信息化建设风险评价研究 被引量:7
9
作者 陈一君 刘益 《工程管理学报》 2011年第2期225-229,共5页
从建筑企业管理者的角度出发,针对建筑企业实施ERP的盲目性,在问卷结果分析和建筑企业内部风险因素分析的基础上,建立了实施ERP阶段的内部风险评价指标体系。引入了技术创新项目风险评价的典型模型,考虑ERP项目实施的失败概率及其预期损... 从建筑企业管理者的角度出发,针对建筑企业实施ERP的盲目性,在问卷结果分析和建筑企业内部风险因素分析的基础上,建立了实施ERP阶段的内部风险评价指标体系。引入了技术创新项目风险评价的典型模型,考虑ERP项目实施的失败概率及其预期损失,结合专家调查法,提出集值统计—专家调查法的多因素风险评价模型,并给出了风险标准参考值,为实现企业不同需求的风险自评价提供了简便易行的操作方法和可靠科学的后期决策依据,以期促进建筑企业信息化建设。 展开更多
关键词 建筑企业 ERP系统 信息化建设 风险评价
下载PDF
基于系统动力学的教育信息化项目风险演化与仿真研究 被引量:4
10
作者 钱冬明 王幸娟 罗安妮 《现代教育技术》 CSSCI 北大核心 2019年第8期49-56,共8页
教育信息化项目是个极其复杂的系统,文章使用Vensim■PLE软件,借助在风险管控研究中常用的系统动力学方法,开展教育信息化风险管理研究。在文献调研的基础上,文章筛选关键风险影响因素,利用教育信息化项目实证数据,从主体风险、客体风... 教育信息化项目是个极其复杂的系统,文章使用Vensim■PLE软件,借助在风险管控研究中常用的系统动力学方法,开展教育信息化风险管理研究。在文献调研的基础上,文章筛选关键风险影响因素,利用教育信息化项目实证数据,从主体风险、客体风险、技术风险、政策风险、财务风险五个方面构建基于系统动力学视角的教育信息化项目风险模型,并选取某一电子书包研发与应用项目进行模拟仿真研究。结果表明,教育信息化项目在主体方面极易出现风险;技术创新、项目后期运维、人力资源与组织结构、对政策的了解程度等变量对教育信息化项目风险产生较大影响,应在相关风险管控中引起注意。 展开更多
关键词 系统动力学 教育信息化项目 风险管理 电子书包
下载PDF
完善我国银行信息化风险防范体系的构想 被引量:1
11
作者 邵勉也 《上海金融》 CSSCI 北大核心 2009年第10期93-95,共3页
我国银行信息化的发展战略,需要适应经济和金融全球化的发展,应选择安全稳定可靠、可持续发展的道路,制定完善的银行信息化风险防范的法律法规制度。为应对银行系统信息化面临的风险,本文提出了完善我国银行信息化危机风险防范体系的构想。
关键词 科学发展观 银行信息化风险 法律法规制度 风险防范体系
下载PDF
信息系统审计在商业银行审计中的应用研究 被引量:4
12
作者 陈景 《山东工商学院学报》 2009年第1期87-91,共5页
信息系统审计通过采用灵活、可配置的审计模型及数据分析探测工具,构筑起科学、有效的风险分析、监测、评价体系,加强了商业银行信息系统审计的非现场审计,推动了商业银行的审计信息化建设。
关键词 审计 信息化 信息系统审计 商业银行 风险控制
下载PDF
医院信息化建设与系统风险分析 被引量:3
13
作者 孔轶 《信息安全与技术》 2011年第12期72-74,共3页
随着信息技术的普及和推进,医院信息化建设为医院的整体运行提供了全面、自动化的服务,提升了医院的整体管理水平。但是,与此同时,医院信息系统的安全性也凸显重要。本文针对当前医院信息化的建设,分析了系统面临的各种风险,并且提出了... 随着信息技术的普及和推进,医院信息化建设为医院的整体运行提供了全面、自动化的服务,提升了医院的整体管理水平。但是,与此同时,医院信息系统的安全性也凸显重要。本文针对当前医院信息化的建设,分析了系统面临的各种风险,并且提出了相应的措施。 展开更多
关键词 医院信息化 医院信息系统 系统风险
下载PDF
基于内控机制的高校财务信息化管理安全风险规避研究 被引量:10
14
作者 田建中 汪洋 李帅 《沈阳建筑大学学报(社会科学版)》 2020年第2期179-183,共5页
基于高校财务信息化管理安全风险问题日显突出的背景,分析了高校财务信息化管理工作存在的安全风险,从建立健全科学完善的内部控制监督体系、发挥信息化建设的积极作用、构建数字化校园网络平台、创新财务与会计核算管理方式方法、加强... 基于高校财务信息化管理安全风险问题日显突出的背景,分析了高校财务信息化管理工作存在的安全风险,从建立健全科学完善的内部控制监督体系、发挥信息化建设的积极作用、构建数字化校园网络平台、创新财务与会计核算管理方式方法、加强内部控制5方面提出了规避高校财务信息化管理安全风险、提高高校财务管理水平的具体思路。 展开更多
关键词 高校 财务信息化 内部控制体系 体制机制创新 安全风险规避
下载PDF
信息化风险监管机制下的IT系统研究
15
作者 田靖 《信息与电脑》 2019年第6期189-190,共2页
IT系统的建设和发展具有投资力度大、业务范围广、安全标准高等特征,其系统的搭建具备很多不确定因子,并存在较高的风险。IT部门管理者应利用信息化风险监管理念完善部门和项目建设。基于此,首先给出IT系统的信息化风险监管机制,进而分... IT系统的建设和发展具有投资力度大、业务范围广、安全标准高等特征,其系统的搭建具备很多不确定因子,并存在较高的风险。IT部门管理者应利用信息化风险监管理念完善部门和项目建设。基于此,首先给出IT系统的信息化风险监管机制,进而分析了信息化风险监管机制下的IT系统建设和IT系统的项目信息化风险监管计划,最后给出IT系统的项目信息化风险识别进程和风险控制方法。 展开更多
关键词 IT系统 信息化 风险控制
下载PDF
中小企业信息化的风险及其规避 被引量:4
16
作者 聂兴国 蒋毅一 《价值工程》 2005年第6期73-75,共3页
根据中小企业的特点,提出目前中小企业在企业信息化过程中存在的各种风险;并且分别从内部和外部对产生这些风险的因素进行的分析;最后,提出中小企业在信息化实施过程中如何规避这些可能的风险。
关键词 企业信息化 风险 规避 中小企业 内部
下载PDF
企业集团组织级风险信息化管控系统的角色设计与应用 被引量:1
17
作者 路世忠 《神华科技》 2014年第2期10-14,共5页
近年来,大型企业集团越来越注重生产经营活动中风险的有效管控,建立组织级的风险信息化管控系统已成为推动、落实风险管控各项措施,提升企业管理水平的重要手段。阐释了组织级风险信息化管控系统的基于角色的访问控制模型,提出具有多管... 近年来,大型企业集团越来越注重生产经营活动中风险的有效管控,建立组织级的风险信息化管控系统已成为推动、落实风险管控各项措施,提升企业管理水平的重要手段。阐释了组织级风险信息化管控系统的基于角色的访问控制模型,提出具有多管理层级的大型企业集团的角色权限应用方案,并对方案的具体实现做了深入的探讨。 展开更多
关键词 企业集团 风险信息化管控系统 基于角色的访问控制模型 角色权限应用方案
下载PDF
构建基于风险管理的区域医疗质量信息化监管体系探讨 被引量:3
18
作者 付强 张誉铮 《中国医疗管理科学》 2016年第1期5-9,共5页
论述了区域性医疗质量信息化监管体系是政府或负有监管职责的社会组织实施科学、有效监管的必要基础。该体系的构建既与医院信息化建设密切相关,又在构建原则、理念和运行方面存在显著差别。在当前深化医药卫生体制改革、"互联网+&... 论述了区域性医疗质量信息化监管体系是政府或负有监管职责的社会组织实施科学、有效监管的必要基础。该体系的构建既与医院信息化建设密切相关,又在构建原则、理念和运行方面存在显著差别。在当前深化医药卫生体制改革、"互联网+"国家战略全面推进和社会发展步入大数据时代的背景下,构建以坚持改革导向、聚焦风险、预防为主、数据切入、分级管理为遵循原则的科学体系尤其重要。 展开更多
关键词 医药卫生体制改革 医疗质量 医疗风险 信息化 监管体系
下载PDF
Risk Information Sources for Snow Disaster Risk Preparedness in Scotland
19
作者 Josephine Adekola Fabrice Renaud Carol Hill 《International Journal of Disaster Risk Science》 SCIE CSCD 2021年第6期854-866,共13页
Heavy snow disruptions are common and costly occurrences in the UK,including Scotland.Yet,heavy snow remains an underresearched aspect of disaster risks in Scotland.This study critically examined the 2018 heavy snow e... Heavy snow disruptions are common and costly occurrences in the UK,including Scotland.Yet,heavy snow remains an underresearched aspect of disaster risks in Scotland.This study critically examined the 2018 heavy snow event in Scotland referred to as the“Beast from the East”(BfE)in order to explore the different sources of information used by the public in preparation for and response to heavy snow emergencies.Our study also examined the effectiveness of BfE risk communication between authorities and the public and sought to determine if there is a relationship between risk information received and the intention to mitigate risk.Data were collected through a semistructured survey from(n=180)residents of the Annandale and Eskdale region of Dumfries and Galloway,Scotland.Our analysis shows that public authority information sources were the most sought-after information sources,followed by online and web sources.We found statistically significant differences between groups(such as age,gender,and mobility/disability)in terms of using risk information sources.Further analysis shows that the relationship between information received and the intention to mitigate risks is not linear but influenced by intervening variables such as work pressures,financial commitment,and stakeholders’expectations.We argue that where full adherence to official risk advice is required,policymakers should carefully consider issues around these three factors. 展开更多
关键词 Disaster preparedness Heavy snow risk information sources risk perception Scotland
原文传递
Appetite for Natech Risk Information in Japan:Understanding Citizens'Communicative Behavior Towards Risk Information Disclosure Around Osaka Bay
20
作者 Dimitrios Tzioutzios Jeong-Nam Kim Ana Maria Cruz 《International Journal of Disaster Risk Science》 SCIE CSCD 2022年第3期372-390,共19页
Effective risk communication is essential for disaster risk management.Apart from empowering communities to make informed risk choices,risk information disclosure can also drastically enhance their disaster preparedne... Effective risk communication is essential for disaster risk management.Apart from empowering communities to make informed risk choices,risk information disclosure can also drastically enhance their disaster preparedness,especially concerning conjoint scenarios of technological and natural hazards(Natech).A fundamental precondition is the actual demand for such information.This study ventures to assess whether residents around Osaka Bay have this demand,or"appetite,"for risk information disclosure,as well as to understand their communicative behavior and perceived challenges in the Japanese context through the prism of the Situational Theory of Problem Solving.To test this framework under realistic conditions,data were collected through a household questionnaire survey from two urban areas near industrial complexes in Osaka Bay.The results show that identifying Natech risk information deficiency as a problem was not a statistically significant predictor for individuals'motivation to communicate.However,their motivation increased as their perceived personal involvement with the situation rose,while the perceived obstacles in doing something about it exerted a negative influence on their motivation.Individuals'motivation intensified their communicative actions to solve this problem.Public segmentation underscored the elevated public perceptions concerning the issue of risk information deficiency in nearly nine out of ten respondents.These findings indicate a strong community appetite for chemical and Natech risk information,which subsequently led to high situational motivation to engage in communicative action,particularly information acquisition.Risk management policy is suggested to focus on introducing chemical risk information disclosure regulatory initiatives to encourage citizen engagement. 展开更多
关键词 JAPAN Natech risk information Participatory risk management risk communication Situational Theory of Problem Solving(STOPS)
原文传递
上一页 1 2 下一页 到第
使用帮助 返回顶部