With the exponential increase in information security risks,ensuring the safety of aircraft heavily relies on the accurate performance of risk assessment.However,experts possess a limited understanding of fundamental ...With the exponential increase in information security risks,ensuring the safety of aircraft heavily relies on the accurate performance of risk assessment.However,experts possess a limited understanding of fundamental security elements,such as assets,threats,and vulnerabilities,due to the confidentiality of airborne networks,resulting in cognitive uncertainty.Therefore,the Pythagorean fuzzy Analytic Hierarchy Process(AHP)Technique for Order Preference by Similarity to an Ideal Solution(TOPSIS)is proposed to address the expert cognitive uncertainty during information security risk assessment for airborne networks.First,Pythagorean fuzzy AHP is employed to construct an index system and quantify the pairwise comparison matrix for determining the index weights,which is used to solve the expert cognitive uncertainty in the process of evaluating the index system weight of airborne networks.Second,Pythagorean fuzzy the TOPSIS to an Ideal Solution is utilized to assess the risk prioritization of airborne networks using the Pythagorean fuzzy weighted distance measure,which is used to address the cognitive uncertainty in the evaluation process of various indicators in airborne network threat scenarios.Finally,a comparative analysis was conducted.The proposed method demonstrated the highest Kendall coordination coefficient of 0.952.This finding indicates superior consistency and confirms the efficacy of the method in addressing expert cognition during information security risk assessment for airborne networks.展开更多
Enterprise Informationization (El) is encountering a large variety of non-systematic risks in demanding and planning, designing and selecting, implementing and controlling, managerial and cultural aspects,due to whi...Enterprise Informationization (El) is encountering a large variety of non-systematic risks in demanding and planning, designing and selecting, implementing and controlling, managerial and cultural aspects,due to which the investment in IT normally cannot simultaneously create the expected commercial values. Through analyzing the factors influencing non-systematic risks of EI, the paper established a risk evaluating index system and accordingly proposed a set of appropriate risk evaluating methodology, with which enterprise can well control informationization risks.展开更多
The enterprise informationization (El) project has already become modernization level and synthesis power of the enterprise. However, information project risk. In order to reduce the El project risk, it is necessary...The enterprise informationization (El) project has already become modernization level and synthesis power of the enterprise. However, information project risk. In order to reduce the El project risk, it is necessary to adopt reasonable incentive and constraint effectively and to structure perfect market environment. an urgent work to raise the asymmetry increases the EI investment mode, to carry on incentive and constraint effectively and to structure perfect market environment.展开更多
Clarifying the relationship between internet use and public information security risk perception helps us gain a better understanding of the factors influencing public risk perception.However,the relationship is still...Clarifying the relationship between internet use and public information security risk perception helps us gain a better understanding of the factors influencing public risk perception.However,the relationship is still under-explored.This paper empirically examines the relationship between internet use and information security risk perception based on data from the 2021 Chinese Social Survey.It was found that whether to use the internet and the frequency of use are both significantly positively correlated with the perception of information security risk.On this basis,the mechanism by which internet use affects public information security risk perceptions is verified from the perspective of interpersonal trust.The mechanism analysis found that interpersonal trust exerts an indirect effect between internet use and perceived information security risk.The findings of this study provide new insights for our further understanding of how internet use affects residents'perceptions of securityrisk.展开更多
Nowadays, chemical safety has attracted considerable attention, and chemical gas leakage monitoring and source term estimation(STE) have become hot spots. However, few studies have focused on sensor layouts in scenari...Nowadays, chemical safety has attracted considerable attention, and chemical gas leakage monitoring and source term estimation(STE) have become hot spots. However, few studies have focused on sensor layouts in scenarios with multiple potential leakage sources and wind conditions, and studies on the risk information(RI) detection and prioritization order of sensors have not been performed. In this work, the monitoring area of a chemical factory is divided into multiple rectangles with a uniform mesh. The RI value of each grid node is calculated on the basis of the occurrence probability and normalized concentrations of each leakage scenario. A high RI value indicates that a sensor at a grid node has a high chance of detecting gas concentrations in different leakage scenarios. This situation is beneficial for leakage monitoring and STE. The methods of similarity redundancy detection and the maximization of sensor RI detection are applied to determine the sequence of sensor locations. This study reveals that the RI detection of the optimal sensor layout with eight sensors exceeds that of the typical layout with 12 sensors. In addition, STE with the optimized placement sequence of the sensor layout is numerically simulated. The statistical results of each scenario with various numbers of sensors reveal that STE is affected by sensor number and scenarios(leakage locations and winds). In most scenarios, appropriate STE results can be retained under the optimal sensor layout even with four sensors. Eight or more sensors are advised to improve the performance of STE in all scenarios. Moreover, the reliability of the STE results in each scenario can be known in advance with a specific number of sensors. Such information thus provides a reference for emergency rescue.展开更多
The configuration of information system security policy is directly related to the information asset risk, and the configuration required by the classified security protection is able to ensure the optimal and minimum...The configuration of information system security policy is directly related to the information asset risk, and the configuration required by the classified security protection is able to ensure the optimal and minimum policy in the corresponding security level. Through the random survey on the information assets of multiple departments, this paper proposes the relative deviation distance of security policy configuration as risk measure parameter based on the distance of information-state transition(DIT) theory. By quantitatively analyzing the information asset weight, deviation degree and DIT, we establish the evaluation model for information system. With example analysis, the results prove that this method conducts effective risk evaluation on the information system intuitively and reliably, avoids the threat caused by subjective measurement, and shows performance benefits compared with existing solutions. It is not only theoretically but also practically feasible to realize the scientific analysis of security risk for the information system.展开更多
Heavy snow disruptions are common and costly occurrences in the UK,including Scotland.Yet,heavy snow remains an underresearched aspect of disaster risks in Scotland.This study critically examined the 2018 heavy snow e...Heavy snow disruptions are common and costly occurrences in the UK,including Scotland.Yet,heavy snow remains an underresearched aspect of disaster risks in Scotland.This study critically examined the 2018 heavy snow event in Scotland referred to as the“Beast from the East”(BfE)in order to explore the different sources of information used by the public in preparation for and response to heavy snow emergencies.Our study also examined the effectiveness of BfE risk communication between authorities and the public and sought to determine if there is a relationship between risk information received and the intention to mitigate risk.Data were collected through a semistructured survey from(n=180)residents of the Annandale and Eskdale region of Dumfries and Galloway,Scotland.Our analysis shows that public authority information sources were the most sought-after information sources,followed by online and web sources.We found statistically significant differences between groups(such as age,gender,and mobility/disability)in terms of using risk information sources.Further analysis shows that the relationship between information received and the intention to mitigate risks is not linear but influenced by intervening variables such as work pressures,financial commitment,and stakeholders’expectations.We argue that where full adherence to official risk advice is required,policymakers should carefully consider issues around these three factors.展开更多
Effective risk communication is essential for disaster risk management.Apart from empowering communities to make informed risk choices,risk information disclosure can also drastically enhance their disaster preparedne...Effective risk communication is essential for disaster risk management.Apart from empowering communities to make informed risk choices,risk information disclosure can also drastically enhance their disaster preparedness,especially concerning conjoint scenarios of technological and natural hazards(Natech).A fundamental precondition is the actual demand for such information.This study ventures to assess whether residents around Osaka Bay have this demand,or"appetite,"for risk information disclosure,as well as to understand their communicative behavior and perceived challenges in the Japanese context through the prism of the Situational Theory of Problem Solving.To test this framework under realistic conditions,data were collected through a household questionnaire survey from two urban areas near industrial complexes in Osaka Bay.The results show that identifying Natech risk information deficiency as a problem was not a statistically significant predictor for individuals'motivation to communicate.However,their motivation increased as their perceived personal involvement with the situation rose,while the perceived obstacles in doing something about it exerted a negative influence on their motivation.Individuals'motivation intensified their communicative actions to solve this problem.Public segmentation underscored the elevated public perceptions concerning the issue of risk information deficiency in nearly nine out of ten respondents.These findings indicate a strong community appetite for chemical and Natech risk information,which subsequently led to high situational motivation to engage in communicative action,particularly information acquisition.Risk management policy is suggested to focus on introducing chemical risk information disclosure regulatory initiatives to encourage citizen engagement.展开更多
基金supported by the Fundamental Research Funds for the Central Universities of CAUC(3122022076)National Natural Science Foundation of China(NSFC)(U2133203).
文摘With the exponential increase in information security risks,ensuring the safety of aircraft heavily relies on the accurate performance of risk assessment.However,experts possess a limited understanding of fundamental security elements,such as assets,threats,and vulnerabilities,due to the confidentiality of airborne networks,resulting in cognitive uncertainty.Therefore,the Pythagorean fuzzy Analytic Hierarchy Process(AHP)Technique for Order Preference by Similarity to an Ideal Solution(TOPSIS)is proposed to address the expert cognitive uncertainty during information security risk assessment for airborne networks.First,Pythagorean fuzzy AHP is employed to construct an index system and quantify the pairwise comparison matrix for determining the index weights,which is used to solve the expert cognitive uncertainty in the process of evaluating the index system weight of airborne networks.Second,Pythagorean fuzzy the TOPSIS to an Ideal Solution is utilized to assess the risk prioritization of airborne networks using the Pythagorean fuzzy weighted distance measure,which is used to address the cognitive uncertainty in the evaluation process of various indicators in airborne network threat scenarios.Finally,a comparative analysis was conducted.The proposed method demonstrated the highest Kendall coordination coefficient of 0.952.This finding indicates superior consistency and confirms the efficacy of the method in addressing expert cognition during information security risk assessment for airborne networks.
基金Supported by National Natural Science Foundation of China (NSFC) (70302006)
文摘Enterprise Informationization (El) is encountering a large variety of non-systematic risks in demanding and planning, designing and selecting, implementing and controlling, managerial and cultural aspects,due to which the investment in IT normally cannot simultaneously create the expected commercial values. Through analyzing the factors influencing non-systematic risks of EI, the paper established a risk evaluating index system and accordingly proposed a set of appropriate risk evaluating methodology, with which enterprise can well control informationization risks.
文摘The enterprise informationization (El) project has already become modernization level and synthesis power of the enterprise. However, information project risk. In order to reduce the El project risk, it is necessary to adopt reasonable incentive and constraint effectively and to structure perfect market environment. an urgent work to raise the asymmetry increases the EI investment mode, to carry on incentive and constraint effectively and to structure perfect market environment.
基金supported by the National Social Science Fund of China"Research on Urban Compound Risk Analysis and Governance Based on Large-Scale Survey Data"(23&ZD144).
文摘Clarifying the relationship between internet use and public information security risk perception helps us gain a better understanding of the factors influencing public risk perception.However,the relationship is still under-explored.This paper empirically examines the relationship between internet use and information security risk perception based on data from the 2021 Chinese Social Survey.It was found that whether to use the internet and the frequency of use are both significantly positively correlated with the perception of information security risk.On this basis,the mechanism by which internet use affects public information security risk perceptions is verified from the perspective of interpersonal trust.The mechanism analysis found that interpersonal trust exerts an indirect effect between internet use and perceived information security risk.The findings of this study provide new insights for our further understanding of how internet use affects residents'perceptions of securityrisk.
基金supported by National Natural Science Foundation of China (61988101)National Natural Science Fund for Distinguished Young Scholars (61725301)Fundamental Research Funds for the Central Universities。
文摘Nowadays, chemical safety has attracted considerable attention, and chemical gas leakage monitoring and source term estimation(STE) have become hot spots. However, few studies have focused on sensor layouts in scenarios with multiple potential leakage sources and wind conditions, and studies on the risk information(RI) detection and prioritization order of sensors have not been performed. In this work, the monitoring area of a chemical factory is divided into multiple rectangles with a uniform mesh. The RI value of each grid node is calculated on the basis of the occurrence probability and normalized concentrations of each leakage scenario. A high RI value indicates that a sensor at a grid node has a high chance of detecting gas concentrations in different leakage scenarios. This situation is beneficial for leakage monitoring and STE. The methods of similarity redundancy detection and the maximization of sensor RI detection are applied to determine the sequence of sensor locations. This study reveals that the RI detection of the optimal sensor layout with eight sensors exceeds that of the typical layout with 12 sensors. In addition, STE with the optimized placement sequence of the sensor layout is numerically simulated. The statistical results of each scenario with various numbers of sensors reveal that STE is affected by sensor number and scenarios(leakage locations and winds). In most scenarios, appropriate STE results can be retained under the optimal sensor layout even with four sensors. Eight or more sensors are advised to improve the performance of STE in all scenarios. Moreover, the reliability of the STE results in each scenario can be known in advance with a specific number of sensors. Such information thus provides a reference for emergency rescue.
基金Supported by the National Natural Science Foundation of China(61662009)the Education Reform Project in Guizhou Province(SJJG201404)the Natural Science Foundation of Guizhou Province Education Department(KY(2015)367)
文摘The configuration of information system security policy is directly related to the information asset risk, and the configuration required by the classified security protection is able to ensure the optimal and minimum policy in the corresponding security level. Through the random survey on the information assets of multiple departments, this paper proposes the relative deviation distance of security policy configuration as risk measure parameter based on the distance of information-state transition(DIT) theory. By quantitatively analyzing the information asset weight, deviation degree and DIT, we establish the evaluation model for information system. With example analysis, the results prove that this method conducts effective risk evaluation on the information system intuitively and reliably, avoids the threat caused by subjective measurement, and shows performance benefits compared with existing solutions. It is not only theoretically but also practically feasible to realize the scientific analysis of security risk for the information system.
基金the Scottish Funding Council,as part of the National Centre for Resilince.This research received no external funding.
文摘Heavy snow disruptions are common and costly occurrences in the UK,including Scotland.Yet,heavy snow remains an underresearched aspect of disaster risks in Scotland.This study critically examined the 2018 heavy snow event in Scotland referred to as the“Beast from the East”(BfE)in order to explore the different sources of information used by the public in preparation for and response to heavy snow emergencies.Our study also examined the effectiveness of BfE risk communication between authorities and the public and sought to determine if there is a relationship between risk information received and the intention to mitigate risk.Data were collected through a semistructured survey from(n=180)residents of the Annandale and Eskdale region of Dumfries and Galloway,Scotland.Our analysis shows that public authority information sources were the most sought-after information sources,followed by online and web sources.We found statistically significant differences between groups(such as age,gender,and mobility/disability)in terms of using risk information sources.Further analysis shows that the relationship between information received and the intention to mitigate risks is not linear but influenced by intervening variables such as work pressures,financial commitment,and stakeholders’expectations.We argue that where full adherence to official risk advice is required,policymakers should carefully consider issues around these three factors.
基金supported by the Ministry of Education,Culture,Sports,Science,and Technology of Japan(Monbukagakusho:MEXT Scholarship,2017-2019)。
文摘Effective risk communication is essential for disaster risk management.Apart from empowering communities to make informed risk choices,risk information disclosure can also drastically enhance their disaster preparedness,especially concerning conjoint scenarios of technological and natural hazards(Natech).A fundamental precondition is the actual demand for such information.This study ventures to assess whether residents around Osaka Bay have this demand,or"appetite,"for risk information disclosure,as well as to understand their communicative behavior and perceived challenges in the Japanese context through the prism of the Situational Theory of Problem Solving.To test this framework under realistic conditions,data were collected through a household questionnaire survey from two urban areas near industrial complexes in Osaka Bay.The results show that identifying Natech risk information deficiency as a problem was not a statistically significant predictor for individuals'motivation to communicate.However,their motivation increased as their perceived personal involvement with the situation rose,while the perceived obstacles in doing something about it exerted a negative influence on their motivation.Individuals'motivation intensified their communicative actions to solve this problem.Public segmentation underscored the elevated public perceptions concerning the issue of risk information deficiency in nearly nine out of ten respondents.These findings indicate a strong community appetite for chemical and Natech risk information,which subsequently led to high situational motivation to engage in communicative action,particularly information acquisition.Risk management policy is suggested to focus on introducing chemical risk information disclosure regulatory initiatives to encourage citizen engagement.