Research Article

Information Security Management of Sharing Economy Based on Blockchain Technology

Table 1

Information technology vulnerability classification.

CategoryVulnerability ()Severity levelRisk level

Behavioral complexitySensitivity
Predictability
5High
Adaptation and manipulationRigidity
Malleability
Gullibility
3Middle
Indirect/nonphysical exposureElectronic accessibility
Transparency
4High
Direct/physical exposurePhysical accessibility
Electromagnetic
Susceptibility
3Middle
Supporting facilities/infrastructuresDependency3Middle