Skip to main content

Understanding Risk and Its Importance in Business Activities

  • Chapter
Risk Assessment and Management in the Networked Economy

Part of the book series: Studies in Computational Intelligence ((SCI,volume 412))

Motivation

Nearly all of us have used the word risk in our conversations or have heard it in our daily life experience. To mention a few such situations: (i) you risk losing your driving license if you are caught drink driving; (ii) you risk your enrolment being cancelled if you are caught cheating; (iii) you risk losing your job if you don’t improve your performance; (iv) your business is at risk if the current financial and economic situation does not improve; (v) you risk not reaching your job interview in Sydney on time on Monday if you leave from Perth by car on Friday. In all the above mentioned situations, risk is associated with an outcome that highlights losing a certain thing; for example losing a license, losing an enrolment, losing a job, losing a business, not reaching an interview on time. In all these examples, the thing which may be lost is considered an important one, hence the word ‘losing’ is associated with them.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Hussain, O.K., Dillon, T., Hussain, F., Chang, E.: Probabilistic Assessment of Loss in Revenue Generation in Demand-Driven Production. Journal of Intelligent Manufacturing (2011), doi:10.1007/s10845-011-0518-4

    Google Scholar 

  2. Mateus, J.C., Cuervo, P., Jannuzzi, D.P.: Hydrothermal bilateral contract negotiation with energy and financial risks analysis. In: IEEE Power and Energy Society General Meeting - Conversion and Delivery of Electrical Energy in the 21st Century, pp. 1–8. IEEE, Pittsburgh (2008)

    Chapter  Google Scholar 

  3. http://www.scidev.net/en/features/fossil-fuels-the-evolution-of-human-culture.html

  4. Perdomo, A., Hussain, O.: A multisystem climate change adaptation approach for water sustainability in regional Australia. International Journal of Global Warming 3, 39–54 (2011)

    Article  Google Scholar 

  5. Smith, D.B., Fletcher, H.D.: The Balance Scorecard: A Useful Framework for Achieving Curriculum Integration. Journal of Executive Education, 41–55 (2004)

    Google Scholar 

  6. Spink, M.J.P., Menegon, V.M., de Souza Bernardes, J., Coêlho, A.E.L.: The Language of Risk in Psychology: A Social Constructionist Analysis of a Psychological Database. Interamerican Journal of Psychology 41, 151–160 (2007)

    Google Scholar 

  7. International Marine Contractors Association: Identifying and Assessing Risk in Construction Contracts (2006)

    Google Scholar 

  8. Oh, W.: C2C Versus B2C: A Comparison of the Winner’s Curse in Two Types of Electronic Auctions. International Journal of Electronic Commerce 6, 115–138 (2002)

    Google Scholar 

  9. Australian Bureau of Statistics: Online Shopping Blooms. Use of the Internet by Householders, Australia (November 2000)

    Google Scholar 

  10. Thuiswinkel Organisatie: Internet shopping gaining popularity in the Netherlands (2007), http://lifestyle.monstersandcritics.com/life/news/article_1334910.php/Internet_shopping_gaining_popularity_in_the_Netherlands

  11. Reitsma, R.: European Online Shopping Landscape 2007. Forrester Research (2007)

    Google Scholar 

  12. Enos, L.: E-tail Invades the Real World. E-Commerce Times (2001), http://www.ecommercetimes.com/story/7406.html

  13. Chang, E., Dillon, T., Hussain, F.K.: Trust and Reputation for Service-Oriented Environments. John Wiley & Sons, Ltd., West Sussex (2006)

    Book  Google Scholar 

  14. Su, B.-C.: Risk behavior of Internet shopping: Comparison of College Students’ versus Non-Student Adults’. In: Proceedings of the 5th International Conference on Electronic Commerce (ICEC 2003), pp. 181–185. ACM, Pittsburgh (2003)

    Chapter  Google Scholar 

  15. Tian, B., Han, S., Hu, J., Dillon, T.: A mutual-healing key distribution scheme in wireless sensor networks. Journal of Network and Computer Applications 34, 80–88 (2011)

    Article  Google Scholar 

  16. Gao, L., Chang, E., Parvin, S., Han, S., Dillon, T.: A Secure Key Management Model for Wireless Mesh Networks. In: 24th IEEE International Conference on Advanced Information Networking and Applications, pp. 655–660. IEEE, Perth (2010)

    Chapter  Google Scholar 

  17. Needham, R., Schroeder, M.: Using Encryption for Authentication in Large Networks of Computers. Communications of the ACM 21, 993–999 (1978)

    Article  MATH  Google Scholar 

  18. Cvrček, D., Moody, K.: Combining Trust and Risk to Reduce the Cost of Attacks. In: Herrmann, P., Issarny, V., Shiu, S.C.K. (eds.) iTrust 2005. LNCS, vol. 3477, pp. 372–383. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  19. Dimmock, N., Belokosztolszki, A., Eyers, D., Bacon, J., Moody, K.: Using trust and risk in role-based access control policies. In: Ninth ACM Symposium on Access Control Models and Technologies, New York, pp. 156–162 (2004)

    Google Scholar 

  20. Schoen, S.: Trusted Computing: Promise and Risk (2003)

    Google Scholar 

  21. Anderson, R.: ‘Trusted Computing’ Frequently Asked Questions (2003)

    Google Scholar 

  22. Aberer, K., Despotovic, Z.: Managing trust in a Peer-2-Peer Information System. In: Proceedings of the Tenth International Conference on Information and Knowledge Management, CIKM 2001, pp. 310–317, Atlanta, Georgia, USA. ACM (2001)

    Google Scholar 

  23. Datta, A., Hauswirth, M., Aberer, K.: Beyond “web of trust”: Enabling P2P E-commerce. In: IEEE International Conference on E-Commerce, CEC 2003, pp. 303–312. IEEE Computer Society Press, Newport Beach (2003)

    Chapter  Google Scholar 

  24. Rao, H.R.: Study Shows Perceived Risk of Online Credit Purchases Linked to Trust, Familiarity with Intermediaries. University of Buffalo. News Centre (2007)

    Google Scholar 

  25. Grazioli, S., Jarvenpaa, S.L.: Perils of Internet Fraud: An Empirical Investigation of Deception and Trust with Experienced Internet Consumers. IEEE Transactions on Systems, Man and Cybernetics 30, 395–410 (2000)

    Article  Google Scholar 

  26. Hoffman, A.M.: A Conceptualization of Trust in International Relations. European Journal of International Relations 8, 375–401 (2002)

    Article  Google Scholar 

  27. Mayer, R.C., Davis, J.H., Schoorman, D.F.: An Integrative Model of Organizational Trust. The Academy of Management Review 20, 709–734 (1995)

    Google Scholar 

  28. Gefen, D., Srinivasan Rao, V., Tractinsky, N.: The Conceptualization of Trust, Risk and Their Relationship in Electronic Commerce: The Need for Clarifications. In: Proceedings of the 36th Hawaii International Conference on System Sciences, HICCS 2003, pp. 192–201. IEEE, Big Island (2003)

    Google Scholar 

  29. Jarvenpaa, S.L., Tractinsky, N., Saarinen, L.: Consumer trust in an Internet store: A Cross-Cultural Validation. Journal of Computer-Mediated Communication 5, 45–71 (1999)

    Google Scholar 

  30. Kim, K., Prabhakar, B.: Initial Trust, Perceived Risk, And The Adoption of Internet Banking. In: Proceedings of the Twenty First International Conference on Information Systems, Brisbane, Australia, pp. 537–543 (2000)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Omar K. Hussain .

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Hussain, O.K., Dillon, T.S., Hussain, F.K., Chang, E.J. (2013). Understanding Risk and Its Importance in Business Activities. In: Risk Assessment and Management in the Networked Economy. Studies in Computational Intelligence, vol 412. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-28690-2_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-28690-2_1

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-28689-6

  • Online ISBN: 978-3-642-28690-2

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics