Motivation
Nearly all of us have used the word risk in our conversations or have heard it in our daily life experience. To mention a few such situations: (i) you risk losing your driving license if you are caught drink driving; (ii) you risk your enrolment being cancelled if you are caught cheating; (iii) you risk losing your job if you don’t improve your performance; (iv) your business is at risk if the current financial and economic situation does not improve; (v) you risk not reaching your job interview in Sydney on time on Monday if you leave from Perth by car on Friday. In all the above mentioned situations, risk is associated with an outcome that highlights losing a certain thing; for example losing a license, losing an enrolment, losing a job, losing a business, not reaching an interview on time. In all these examples, the thing which may be lost is considered an important one, hence the word ‘losing’ is associated with them.
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Hussain, O.K., Dillon, T., Hussain, F., Chang, E.: Probabilistic Assessment of Loss in Revenue Generation in Demand-Driven Production. Journal of Intelligent Manufacturing (2011), doi:10.1007/s10845-011-0518-4
Mateus, J.C., Cuervo, P., Jannuzzi, D.P.: Hydrothermal bilateral contract negotiation with energy and financial risks analysis. In: IEEE Power and Energy Society General Meeting - Conversion and Delivery of Electrical Energy in the 21st Century, pp. 1–8. IEEE, Pittsburgh (2008)
http://www.scidev.net/en/features/fossil-fuels-the-evolution-of-human-culture.html
Perdomo, A., Hussain, O.: A multisystem climate change adaptation approach for water sustainability in regional Australia. International Journal of Global Warming 3, 39–54 (2011)
Smith, D.B., Fletcher, H.D.: The Balance Scorecard: A Useful Framework for Achieving Curriculum Integration. Journal of Executive Education, 41–55 (2004)
Spink, M.J.P., Menegon, V.M., de Souza Bernardes, J., Coêlho, A.E.L.: The Language of Risk in Psychology: A Social Constructionist Analysis of a Psychological Database. Interamerican Journal of Psychology 41, 151–160 (2007)
International Marine Contractors Association: Identifying and Assessing Risk in Construction Contracts (2006)
Oh, W.: C2C Versus B2C: A Comparison of the Winner’s Curse in Two Types of Electronic Auctions. International Journal of Electronic Commerce 6, 115–138 (2002)
Australian Bureau of Statistics: Online Shopping Blooms. Use of the Internet by Householders, Australia (November 2000)
Thuiswinkel Organisatie: Internet shopping gaining popularity in the Netherlands (2007), http://lifestyle.monstersandcritics.com/life/news/article_1334910.php/Internet_shopping_gaining_popularity_in_the_Netherlands
Reitsma, R.: European Online Shopping Landscape 2007. Forrester Research (2007)
Enos, L.: E-tail Invades the Real World. E-Commerce Times (2001), http://www.ecommercetimes.com/story/7406.html
Chang, E., Dillon, T., Hussain, F.K.: Trust and Reputation for Service-Oriented Environments. John Wiley & Sons, Ltd., West Sussex (2006)
Su, B.-C.: Risk behavior of Internet shopping: Comparison of College Students’ versus Non-Student Adults’. In: Proceedings of the 5th International Conference on Electronic Commerce (ICEC 2003), pp. 181–185. ACM, Pittsburgh (2003)
Tian, B., Han, S., Hu, J., Dillon, T.: A mutual-healing key distribution scheme in wireless sensor networks. Journal of Network and Computer Applications 34, 80–88 (2011)
Gao, L., Chang, E., Parvin, S., Han, S., Dillon, T.: A Secure Key Management Model for Wireless Mesh Networks. In: 24th IEEE International Conference on Advanced Information Networking and Applications, pp. 655–660. IEEE, Perth (2010)
Needham, R., Schroeder, M.: Using Encryption for Authentication in Large Networks of Computers. Communications of the ACM 21, 993–999 (1978)
Cvrček, D., Moody, K.: Combining Trust and Risk to Reduce the Cost of Attacks. In: Herrmann, P., Issarny, V., Shiu, S.C.K. (eds.) iTrust 2005. LNCS, vol. 3477, pp. 372–383. Springer, Heidelberg (2005)
Dimmock, N., Belokosztolszki, A., Eyers, D., Bacon, J., Moody, K.: Using trust and risk in role-based access control policies. In: Ninth ACM Symposium on Access Control Models and Technologies, New York, pp. 156–162 (2004)
Schoen, S.: Trusted Computing: Promise and Risk (2003)
Anderson, R.: ‘Trusted Computing’ Frequently Asked Questions (2003)
Aberer, K., Despotovic, Z.: Managing trust in a Peer-2-Peer Information System. In: Proceedings of the Tenth International Conference on Information and Knowledge Management, CIKM 2001, pp. 310–317, Atlanta, Georgia, USA. ACM (2001)
Datta, A., Hauswirth, M., Aberer, K.: Beyond “web of trust”: Enabling P2P E-commerce. In: IEEE International Conference on E-Commerce, CEC 2003, pp. 303–312. IEEE Computer Society Press, Newport Beach (2003)
Rao, H.R.: Study Shows Perceived Risk of Online Credit Purchases Linked to Trust, Familiarity with Intermediaries. University of Buffalo. News Centre (2007)
Grazioli, S., Jarvenpaa, S.L.: Perils of Internet Fraud: An Empirical Investigation of Deception and Trust with Experienced Internet Consumers. IEEE Transactions on Systems, Man and Cybernetics 30, 395–410 (2000)
Hoffman, A.M.: A Conceptualization of Trust in International Relations. European Journal of International Relations 8, 375–401 (2002)
Mayer, R.C., Davis, J.H., Schoorman, D.F.: An Integrative Model of Organizational Trust. The Academy of Management Review 20, 709–734 (1995)
Gefen, D., Srinivasan Rao, V., Tractinsky, N.: The Conceptualization of Trust, Risk and Their Relationship in Electronic Commerce: The Need for Clarifications. In: Proceedings of the 36th Hawaii International Conference on System Sciences, HICCS 2003, pp. 192–201. IEEE, Big Island (2003)
Jarvenpaa, S.L., Tractinsky, N., Saarinen, L.: Consumer trust in an Internet store: A Cross-Cultural Validation. Journal of Computer-Mediated Communication 5, 45–71 (1999)
Kim, K., Prabhakar, B.: Initial Trust, Perceived Risk, And The Adoption of Internet Banking. In: Proceedings of the Twenty First International Conference on Information Systems, Brisbane, Australia, pp. 537–543 (2000)
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Hussain, O.K., Dillon, T.S., Hussain, F.K., Chang, E.J. (2013). Understanding Risk and Its Importance in Business Activities. In: Risk Assessment and Management in the Networked Economy. Studies in Computational Intelligence, vol 412. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-28690-2_1
Download citation
DOI: https://doi.org/10.1007/978-3-642-28690-2_1
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-28689-6
Online ISBN: 978-3-642-28690-2
eBook Packages: EngineeringEngineering (R0)