- 【Updated on May 12, 2025】 Integration of CiNii Dissertations and CiNii Books into CiNii Research
- Trial version of CiNii Research Knowledge Graph Search feature is available on CiNii Labs
- 【Updated on June 30, 2025】Suspension and deletion of data provided by Nikkei BP
- Regarding the recording of “Research Data” and “Evidence Data”
A Visible Threat, an Invisible Threat : The Effective Risk Management Begins with the Recognition of the Threat(<Special Issue>Risk Management)
-
- YAMASAKI Fumiaki
- The University of AIZU
Bibliographic Information
- Other Title
-
- 目に見える脅威、見えない脅威 : 有効なリスクマネジメントは脅威の認識から(<特集>リスクマネジメント)
- 目に見える脅威、見えない脅威 : 有効なリスクマネジメントは脅威の認識から
- メ ニ ミエル キョウイ 、 ミエナイ キョウイ : ユウコウ ナ リスクマネジメント ワ キョウイ ノ ニンシキ カラ
Search this article
Description
Risk management is increasing in scope and complexity. In particular, in recent years the new threat of cyber-attacks has appeared and is in an upward trend. The threat of cyber-attack differs from classic threats such as earthquakes and fires, and because there are few examples to study, risk management techniques have not yet been established. In order to keep the risks brought about by increasingly skillful cyber-attacks down to a tolerable level, sophisticated technical expertise is demanded, and taking generally appropriate measures is considered difficult. In this study, we analyze the large-scale cyber-attack that occurred in South Korea on March 20th 2013, and make it clear that the source of the threat was not a high level technical issue, but rather a management issue.
Journal
-
- Journal of Information and Management
-
Journal of Information and Management 34 (1), 12-17, 2013
Japan Society for Information and Management
- Tweet
Details 詳細情報について
-
- CRID
- 1390282680266703488
-
- NII Article ID
- 110009661235
-
- NII Book ID
- AA12242308
-
- ISSN
- 21899681
- 18822614
-
- NDL BIB ID
- 024942187
-
- Text Lang
- ja
-
- Data Source
-
- JaLC
- NDL Search
- CiNii Articles
-
- Abstract License Flag
- Disallowed