Because of the complex and massive risk factors of a large-scale activity, it is difficult to assess the risk level for such activities with an accurate numerical value. Therefore, a fuzzy linguistic based approach was proposed to evaluate the risk level of large-scale activities. Taking Jay Chou’s concert in 2016 as a case study, a hierarchy structure for risk assessment index system was built from the interviews with experts and literatures, which contain 14 risk factors in 4 groups. A five-point scale linguistic term was designed for the experts to evaluate the risk level of risk factors, and a fuzzy synthetic assessment model was adopted to present the procedures of risk assessment. The results reveal that the top risk factor is “safety education” and the top risk group is “management”, and the overall risk criticality (RC) is considered as middle. Based on the rank of RC both for risk factors and risk groups, some risk management strategies were suggested.
목차
Abstract 1. Introduction 2. Fuzzy Risk Assessment Procedure 2.1. Preliminary Stage 2.2. Fuzzy Synthetic Assessment Model 3. Case Study 3.1. Data Collection 3.2. Procedure of Fuzzy Synthetic Assessment 4. Results and Discussions 5. Conclusions Acknowledgements References
Zheng Jianhu [ School of Economics and Management, Minjiang University, Fuzhou Fujian 350108, PR China, Institute of Internet Innovation of Minjiang University, Fuzhou Fujian 350108, PR China ]
Huang Mingfang [ School of Economics and Management, Minjiang University, Fuzhou Fujian 350108, PR China ]
보안공학연구지원센터(IJSIA) [Science & Engineering Research Support Center, Republic of Korea(IJSIA)]
설립연도
2006
분야
공학>컴퓨터학
소개
1. 보안공학에 대한 각종 조사 및 연구
2. 보안공학에 대한 응용기술 연구 및 발표
3. 보안공학에 관한 각종 학술 발표회 및 전시회 개최
4. 보안공학 기술의 상호 협조 및 정보교환
5. 보안공학에 관한 표준화 사업 및 규격의 제정
6. 보안공학에 관한 산학연 협동의 증진
7. 국제적 학술 교류 및 기술 협력
8. 보안공학에 관한 논문지 발간
9. 기타 본 회 목적 달성에 필요한 사업
간행물
간행물명
International Journal of Security and Its Applications
간기
격월간
pISSN
1738-9976
수록기간
2008~2016
등재여부
SCOPUS
십진분류
KDC 505DDC 605
이 권호 내 다른 논문 / International Journal of Security and Its Applications Vol.10 No.8