Research Article
Information Security Management of Sharing Economy Based on Blockchain Technology
Table 1
Information technology vulnerability classification.
| Category | Vulnerability () | Severity level | Risk level |
| Behavioral complexity | Sensitivity Predictability | 5 | High | Adaptation and manipulation | Rigidity Malleability Gullibility | 3 | Middle | Indirect/nonphysical exposure | Electronic accessibility Transparency | 4 | High | Direct/physical exposure | Physical accessibility Electromagnetic Susceptibility | 3 | Middle | Supporting facilities/infrastructures | Dependency | 3 | Middle |
|
|