Korean Ministry of Environment’s web-based visual consumer product exposure and risk assessment system (COPER)

2017 ◽  
Vol 24 (14) ◽  
pp. 13142-13148 ◽  
Author(s):  
Hunjoo Lee ◽  
Kiyoung Lee ◽  
Ji Young Park ◽  
Sung-Gi Min
Agronomie ◽  
2003 ◽  
Vol 23 (1) ◽  
pp. 75-84 ◽  
Author(s):  
Andy Hart ◽  
Colin D. Brown ◽  
Kathy A. Lewis ◽  
John Tzilivakis

2018 ◽  
Vol 3 (1) ◽  
Author(s):  
Mehmet EMIN KORTAK

This research aimed at designing and improving the web-based integrated peer and self- assessment. WesPASS (web-based peer-assessment system), developed in this research, allows students to assess their own or their peers’ performance and project assignments and to report about the result of these assessments so that they correct their assignments. This study employed design-based research. The participants included 102 fourth grade primary school students and their 4 teachers from 2 state and 2 private primary schools in Ankara, Kecioren (Turkey) who employed the system and were engaged in a questionnaire survey to assess its quality. The findings were analyzed through quantitative data analysis. The findings revealed that the system can be used by elementary school students for peer and self-assessment system. The participants stated that WesPASS is simple and user-friendly, and it accelerates the assessment process by employing information technology and allows to share opinions 


Author(s):  
Bogdan Korniyenko ◽  
Lilia Galata

In this article, the research of information system protection by ana­ ly­ zing the risks for identifying threats for information security is considered. Information risk analysis is periodically conducted to identify information security threats and test the information security system. Currently, various information risk analysis techni­ ques exist and are being used, the main difference being the quantitative or qualitative risk assessment scales. On the basis of the existing methods of testing and evaluation of the vulnerabilities for the automated system, their advantages and disadvantages, for the possibility of further comparison of the spent resources and the security of the information system, the conclusion was made regarding the deter­ mi­ nation of the optimal method of testing the information security system in the context of the simulated polygon for the protection of critical information resources. A simula­ tion ground for the protection of critical information resources based on GNS3 application software has been developed and implemented. Among the considered methods of testing and risk analysis of the automated system, the optimal iRisk methodology was identified for testing the information security system on the basis of the simulated. The quantitative method Risk for security estimation is considered. Generalized iRisk risk assessment is calculated taking into account the following parameters: Vulnerabili­ ty  — vulnerability assessment, Threat — threat assessment, Control — assessment of security measures. The methodology includes a common CVSS vul­ nerability assessment system, which allows you to use constantly relevant coefficients for the calculation of vulnerabilities, as well as have a list of all major vulnerabilities that are associated with all modern software products that can be used in the automated system. The known software and hardware vulnerabilities of the ground are considered and the resistance of the built network to specific threats by the iRisk method is calculated.


Sign in / Sign up

Export Citation Format

Share Document