Advertisement

Understanding Risk and Its Importance in Business Activities

  • Omar K. HussainEmail author
  • Tharam S. Dillon
  • Farookh K. Hussain
  • Elizabeth J. Chang
Chapter
Part of the Studies in Computational Intelligence book series (SCI, volume 412)

Motivation

Nearly all of us have used the word risk in our conversations or have heard it in our daily life experience. To mention a few such situations: (i) you risk losing your driving license if you are caught drink driving; (ii) you risk your enrolment being cancelled if you are caught cheating; (iii) you risk losing your job if you don’t improve your performance; (iv) your business is at risk if the current financial and economic situation does not improve; (v) you risk not reaching your job interview in Sydney on time on Monday if you leave from Perth by car on Friday. In all the above mentioned situations, risk is associated with an outcome that highlights losing a certain thing; for example losing a license, losing an enrolment, losing a job, losing a business, not reaching an interview on time. In all these examples, the thing which may be lost is considered an important one, hence the word ‘losing’ is associated with them.

Keywords

Business Activity Interact User Online Shopping Security Mechanism Access Control Policy 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Hussain, O.K., Dillon, T., Hussain, F., Chang, E.: Probabilistic Assessment of Loss in Revenue Generation in Demand-Driven Production. Journal of Intelligent Manufacturing (2011), doi:10.1007/s10845-011-0518-4Google Scholar
  2. 2.
    Mateus, J.C., Cuervo, P., Jannuzzi, D.P.: Hydrothermal bilateral contract negotiation with energy and financial risks analysis. In: IEEE Power and Energy Society General Meeting - Conversion and Delivery of Electrical Energy in the 21st Century, pp. 1–8. IEEE, Pittsburgh (2008)CrossRefGoogle Scholar
  3. 3.
  4. 4.
    Perdomo, A., Hussain, O.: A multisystem climate change adaptation approach for water sustainability in regional Australia. International Journal of Global Warming 3, 39–54 (2011)CrossRefGoogle Scholar
  5. 5.
    Smith, D.B., Fletcher, H.D.: The Balance Scorecard: A Useful Framework for Achieving Curriculum Integration. Journal of Executive Education, 41–55 (2004)Google Scholar
  6. 6.
    Spink, M.J.P., Menegon, V.M., de Souza Bernardes, J., Coêlho, A.E.L.: The Language of Risk in Psychology: A Social Constructionist Analysis of a Psychological Database. Interamerican Journal of Psychology 41, 151–160 (2007)Google Scholar
  7. 7.
    International Marine Contractors Association: Identifying and Assessing Risk in Construction Contracts (2006)Google Scholar
  8. 8.
    Oh, W.: C2C Versus B2C: A Comparison of the Winner’s Curse in Two Types of Electronic Auctions. International Journal of Electronic Commerce 6, 115–138 (2002)Google Scholar
  9. 9.
    Australian Bureau of Statistics: Online Shopping Blooms. Use of the Internet by Householders, Australia (November 2000)Google Scholar
  10. 10.
    Thuiswinkel Organisatie: Internet shopping gaining popularity in the Netherlands (2007), http://lifestyle.monstersandcritics.com/life/news/article_1334910.php/Internet_shopping_gaining_popularity_in_the_Netherlands
  11. 11.
    Reitsma, R.: European Online Shopping Landscape 2007. Forrester Research (2007)Google Scholar
  12. 12.
    Enos, L.: E-tail Invades the Real World. E-Commerce Times (2001), http://www.ecommercetimes.com/story/7406.html
  13. 13.
    Chang, E., Dillon, T., Hussain, F.K.: Trust and Reputation for Service-Oriented Environments. John Wiley & Sons, Ltd., West Sussex (2006)CrossRefGoogle Scholar
  14. 14.
    Su, B.-C.: Risk behavior of Internet shopping: Comparison of College Students’ versus Non-Student Adults’. In: Proceedings of the 5th International Conference on Electronic Commerce (ICEC 2003), pp. 181–185. ACM, Pittsburgh (2003)CrossRefGoogle Scholar
  15. 15.
    Tian, B., Han, S., Hu, J., Dillon, T.: A mutual-healing key distribution scheme in wireless sensor networks. Journal of Network and Computer Applications 34, 80–88 (2011)CrossRefGoogle Scholar
  16. 16.
    Gao, L., Chang, E., Parvin, S., Han, S., Dillon, T.: A Secure Key Management Model for Wireless Mesh Networks. In: 24th IEEE International Conference on Advanced Information Networking and Applications, pp. 655–660. IEEE, Perth (2010)CrossRefGoogle Scholar
  17. 17.
    Needham, R., Schroeder, M.: Using Encryption for Authentication in Large Networks of Computers. Communications of the ACM 21, 993–999 (1978)zbMATHCrossRefGoogle Scholar
  18. 18.
    Cvrček, D., Moody, K.: Combining Trust and Risk to Reduce the Cost of Attacks. In: Herrmann, P., Issarny, V., Shiu, S.C.K. (eds.) iTrust 2005. LNCS, vol. 3477, pp. 372–383. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  19. 19.
    Dimmock, N., Belokosztolszki, A., Eyers, D., Bacon, J., Moody, K.: Using trust and risk in role-based access control policies. In: Ninth ACM Symposium on Access Control Models and Technologies, New York, pp. 156–162 (2004)Google Scholar
  20. 20.
    Schoen, S.: Trusted Computing: Promise and Risk (2003)Google Scholar
  21. 21.
    Anderson, R.: ‘Trusted Computing’ Frequently Asked Questions (2003)Google Scholar
  22. 22.
    Aberer, K., Despotovic, Z.: Managing trust in a Peer-2-Peer Information System. In: Proceedings of the Tenth International Conference on Information and Knowledge Management, CIKM 2001, pp. 310–317, Atlanta, Georgia, USA. ACM (2001)Google Scholar
  23. 23.
    Datta, A., Hauswirth, M., Aberer, K.: Beyond “web of trust”: Enabling P2P E-commerce. In: IEEE International Conference on E-Commerce, CEC 2003, pp. 303–312. IEEE Computer Society Press, Newport Beach (2003)CrossRefGoogle Scholar
  24. 24.
    Rao, H.R.: Study Shows Perceived Risk of Online Credit Purchases Linked to Trust, Familiarity with Intermediaries. University of Buffalo. News Centre (2007)Google Scholar
  25. 25.
    Grazioli, S., Jarvenpaa, S.L.: Perils of Internet Fraud: An Empirical Investigation of Deception and Trust with Experienced Internet Consumers. IEEE Transactions on Systems, Man and Cybernetics 30, 395–410 (2000)CrossRefGoogle Scholar
  26. 26.
    Hoffman, A.M.: A Conceptualization of Trust in International Relations. European Journal of International Relations 8, 375–401 (2002)CrossRefGoogle Scholar
  27. 27.
    Mayer, R.C., Davis, J.H., Schoorman, D.F.: An Integrative Model of Organizational Trust. The Academy of Management Review 20, 709–734 (1995)Google Scholar
  28. 28.
    Gefen, D., Srinivasan Rao, V., Tractinsky, N.: The Conceptualization of Trust, Risk and Their Relationship in Electronic Commerce: The Need for Clarifications. In: Proceedings of the 36th Hawaii International Conference on System Sciences, HICCS 2003, pp. 192–201. IEEE, Big Island (2003)Google Scholar
  29. 29.
    Jarvenpaa, S.L., Tractinsky, N., Saarinen, L.: Consumer trust in an Internet store: A Cross-Cultural Validation. Journal of Computer-Mediated Communication 5, 45–71 (1999)Google Scholar
  30. 30.
    Kim, K., Prabhakar, B.: Initial Trust, Perceived Risk, And The Adoption of Internet Banking. In: Proceedings of the Twenty First International Conference on Information Systems, Brisbane, Australia, pp. 537–543 (2000)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2013

Authors and Affiliations

  • Omar K. Hussain
    • 1
    Email author
  • Tharam S. Dillon
    • 2
  • Farookh K. Hussain
    • 3
  • Elizabeth J. Chang
    • 1
  1. 1.Digital Ecosystems and Business Intelligence InstituteCurtin UniversityPerthAustralia
  2. 2.Department of Computer Science and Computer EngineeringLa Trobe UniversityMelbourneAustralia
  3. 3.School of SoftwareUniversity of TechnologySydneyAustralia

Personalised recommendations