Search
Search Results
-
Yet another cybersecurity risk assessment framework
IT systems pervade our society more and more, and we become heavily dependent on them. At the same time, these systems are increasingly targeted in...
-
A global scale comparison of risk aggregation in AI assessment frameworks
AI applications bear inherent risks in various risk dimensions, such as insufficient reliability, robustness, fairness or data protection. It is...
-
Enterprise Cyber Risk Management as a Value Creator
Over the last 40 years, I’ve enjoyed hel** organizations comply with various privacy, security, and breach notification regulations and standards... -
Based on the Improved AHP Algorithm in the Corrosion Risk Assessment of Gas Pipelines
Risk assessment plays a very important role in the safety management of gas pipelines, but there is a problem that the pipeline corrosion risk... -
Dynamic Data-Driven Downscaling to Quantify Extreme Rainfall and Flood Loss Risk
The adverse socio-economic effects of natural hazards will likely worsen under climate change. Modeling their risk is essential to develo**... -
Understand, Manage, and Measure Cyber Risk Practical Solutions for Creating a Sustainable Cyber Program
When it comes to managing cybersecurity in an organization, most organizations tussle with basic foundational components. This practitioner’s guide... -
Cross-Border Data Security from the Perspective of Risk Assessment
In the cross-border process of data, major issues such as national security and personal information security caused by complex processes and... -
Study on Credit Risk Control by Variational Inference
This paper presents the development of an intelligent, machine learning-based Markov chain model to investigate loan risk and strategies for... -
Mining Risk Rules in Insurance Business Data Based on SPRINT Classification Algorithm
SPRINT classification algorithm is based on SPRINT classification algorithm to mine risk rules in insurance business data. Mining risk rules in... -
Automatic Bleeding Risk Rating System of Gastric Varices
An automated bleeding risk rating system of gastric varices (GV) aims to predict the bleeding risk and severity of GV, in order to assist... -
Trustworthy Academic Risk Prediction with Explainable Boosting Machines
The use of predictive models in education promises individual support and personalization for students. To develop trustworthy models, we need to... -
Prediction of At-Risk Students Using Learning Analytics: A Literature Review
Early identification of at-risk students has been recognised as being of the utmost importance for the provision of timely support. Despite the... -
Machine Learning for Forest Fire Risk and Resilience
Machine learning (ML) is currently the most promising and widely adopted technology in the geospatial industry. With the explosion of spatial data... -
AI risk assessment using ethical dimensions
In the design, development, and use of artificial intelligence systems, it is important to ensure that they are safe and trustworthy. This requires a...
-
Information Technology in Disaster Risk Reduction 6th IFIP WG 5.15 International Conference, ITDRR 2021, Morioka, Japan, October 25–27, 2021, Revised Selected Papers
This volume constitutes the refereed and revised post-conference proceedings of the 6th IFIP WG 5.15 International Conference on Information...
-
Understanding Researcher Risk and Safety in Qualitative Research Online
In this reflective essay, we seek to advance our understanding about the risk and safety of the researcher within the changing landscape of academia...
-
Safety, Security, and Risk
The main properties of trustworthy cyber-physical systems are safety and security. Both safety and security are the results of careful, responsible,... -
Cyber Incidents Risk Assessments Using Feature Analysis
There are a variety of approaches, methods and techniques that organisations use to manage and contain the risk underlying Cybersecurity incidents...
-
Configuring and Validating Multi-aspect Risk Knowledge for Industry 4.0 Information Systems
Industry 4.0 information systems support production stakeholders in configuring and debugging increasingly flexible Cyber-Physical Production Systems... -
On the Usage of NLP on CVE Descriptions for Calculating Risk
In order to conduct a risk analysis on an ecosystem the potential threats to its assets must first be identified. The Risk Modelling Tool (RMT) of...