메뉴 건너뛰기




Volumn 11, Issue 7, 2011, Pages 4332-4340

An information systems security risk assessment model under uncertain environment

Author keywords

Evidence theory; Evidential consistency; Fuzzy measure; Information systems security; Risk assessment

Indexed keywords

ASSESSMENT MODELS; BASIC BELIEF ASSIGNMENT; EVIDENCE THEORIES; EVIDENTIAL CONSISTENCY; FUZZY MEASURE; FUZZY MEASURES; INDEX SYSTEMS; INDEX WEIGHT; INFORMATION SYSTEMS SECURITY; UNCERTAIN ENVIRONMENTS; UNCERTAIN EVIDENCE;

EID: 79960556391     PISSN: 15684946     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.asoc.2010.06.005     Document Type: Article
Times cited : (63)

References (41)
  • 2
    • 18844431067 scopus 로고    scopus 로고
    • Information systems security policies: A contextual perspective
    • DOI 10.1016/j.cose.2004.08.011, PII S0167404804002378
    • M. Karyda, E. Kiountouzis, and S. Kokolakis Information systems security policies: a contextual perspective Computers and Security 24 3 2005 246 260 (Pubitemid 40683804)
    • (2005) Computers and Security , vol.24 , Issue.3 , pp. 246-260
    • Karyda, M.1    Kiountouzis, E.2    Kokolakis, S.3
  • 3
    • 0001133137 scopus 로고    scopus 로고
    • Coping with systems risk: Security planning models for management decision-making
    • D.W. Straub, and R.J. Welke Coping with systems risk: security planning models for management decision-making MIS Quarterly 22 4 1998 441 469
    • (1998) MIS Quarterly , vol.22 , Issue.4 , pp. 441-469
    • Straub, D.W.1    Welke, R.J.2
  • 4
    • 0030283575 scopus 로고    scopus 로고
    • Uncertainty in probabilistic risk assessment
    • DOI 10.1016/S0951-8320(96)00070-1, PII S0951832096000701
    • R.L. Winkler Uncertainty in probabilistic risk assessment Reliability Engineering and System Safety 54 2-3 1996 127 132 (Pubitemid 126365917)
    • (1996) Reliability Engineering and System Safety , vol.54 , Issue.2-3 , pp. 127-132
    • Winkler, R.L.1
  • 6
    • 42149112876 scopus 로고    scopus 로고
    • Information security and risk management
    • DOI 10.1145/1330311.1330325
    • L.D. Bodin, L.A. Gordon, and M.P. Loeb Information security and risk management Communications of the ACM 51 4 2008 64 68 (Pubitemid 351530781)
    • (2008) Communications of the ACM , vol.51 , Issue.4 , pp. 64-68
    • Bodin, L.D.1    Gordon, L.A.2    Loeb, M.P.3
  • 7
    • 55249117122 scopus 로고    scopus 로고
    • A stochastic dominance approach to risk analysis of computer systems
    • G.V. Post, and J.D. Diltz A stochastic dominance approach to risk analysis of computer systems MIS Quarterly 10 4 2001 363 375
    • (2001) MIS Quarterly , vol.10 , Issue.4 , pp. 363-375
    • Post, G.V.1    Diltz, J.D.2
  • 8
    • 78651570026 scopus 로고    scopus 로고
    • Risk evaluation model on enterprises' complex information system: A study based on the BP neural network
    • Y. Huanchun Risk evaluation model on enterprises' complex information system: a study based on the BP neural network Journal of Software 5 1 2010 99 106
    • (2010) Journal of Software , vol.5 , Issue.1 , pp. 99-106
    • Huanchun, Y.1
  • 9
    • 50049117473 scopus 로고    scopus 로고
    • Quantitative risk-based security prediction for component-based systems with explicitly modeled attack profiles
    • L. Grunske, and D. Joyce Quantitative risk-based security prediction for component-based systems with explicitly modeled attack profiles Journal of Systems and Software 81 8 2008 1327 1345
    • (2008) Journal of Systems and Software , vol.81 , Issue.8 , pp. 1327-1345
    • Grunske, L.1    Joyce, D.2
  • 10
    • 0029718539 scopus 로고    scopus 로고
    • Risk analysis modelling with the use of fuzzy logic
    • DOI 10.1016/0167-4048(96)00008-9
    • W.G. de Ru, and J.H.P. Eloff Risk analysis modeling with the use of fuzzy logic Computers and Security 15 3 1996 239 248 (Pubitemid 126351696)
    • (1996) Computers and Security , vol.15 , Issue.3 , pp. 239-248
    • De Ru, W.G.1    Eloff, J.H.P.2
  • 11
    • 78650774861 scopus 로고    scopus 로고
    • Study of switch project construction risk identification evaluation and tacking based on Delphi method
    • D. Xu, J. Sha, P. Zhang, and B. Wan Study of switch project construction risk identification evaluation and tacking based on Delphi method System Engineering Theory and Practice 20 12 2000 113 118
    • (2000) System Engineering Theory and Practice , vol.20 , Issue.12 , pp. 113-118
    • Xu, D.1    Sha, J.2    Zhang, P.3    Wan, B.4
  • 12
    • 0031078293 scopus 로고    scopus 로고
    • Arguments for qualitative risk assessment: The StAR risk adviser
    • D.K. Hardman, and P. Ayton Arguments for qualitative risk assessment: the StAR risk adviser Expert Systems 14 1 2000 24 36 (Pubitemid 127647155)
    • (1997) Expert Systems , vol.14 , Issue.1 , pp. 24-36
    • Hardman, D.K.1    Ayton, P.2
  • 13
    • 33748597348 scopus 로고    scopus 로고
    • A general, but readily adaptable model of information system risk
    • S. Alter, and S. Sherer A general, but readily adaptable model of information system risk Communications of the AIS 14 1 2004 1 28
    • (2004) Communications of the AIS , vol.14 , Issue.1 , pp. 1-28
    • Alter, S.1    Sherer, S.2
  • 14
    • 49749086940 scopus 로고    scopus 로고
    • Analysing business losses caused by information systems risk: A business process analysis approach
    • H Salmela Analysing business losses caused by information systems risk: a business process analysis approach Journal of Information Technology 23 3 2008 185 202
    • (2008) Journal of Information Technology , vol.23 , Issue.3 , pp. 185-202
    • Salmela, H.1
  • 15
    • 3242704207 scopus 로고    scopus 로고
    • BBN-based software project risk management
    • C. Fan, and Y. Yu BBN-based software project risk management Journal of Systems and Software 73 2 2004 193 203
    • (2004) Journal of Systems and Software , vol.73 , Issue.2 , pp. 193-203
    • Fan, C.1    Yu, Y.2
  • 17
    • 58349115825 scopus 로고    scopus 로고
    • Large engineering project risk management using a Bayesian belief network
    • E. Lee, Y. Park, and J. Shin Large engineering project risk management using a Bayesian belief network Expert Systems with Applications 36 3 2009 5880 5887
    • (2009) Expert Systems with Applications , vol.36 , Issue.3 , pp. 5880-5887
    • Lee, E.1    Park, Y.2    Shin, J.3
  • 20
    • 78650785123 scopus 로고    scopus 로고
    • Analysis of risk evaluation techniques on information system security
    • X. Yang, H. Luo, C. Fan, M. Chen, and S. Zhou Analysis of risk evaluation techniques on information system security Journal of Computer Applications 28 8 2008 1920 1924
    • (2008) Journal of Computer Applications , vol.28 , Issue.8 , pp. 1920-1924
    • Yang, X.1    Luo, H.2    Fan, C.3    Chen, M.4    Zhou, S.5
  • 22
    • 0344583817 scopus 로고    scopus 로고
    • Applications of belief functions in business decisions: A review
    • R.P. Srivastava, and L. Liu Applications of belief functions in business decisions: a review Information Systems Frontiers 5 4 2003 359 378
    • (2003) Information Systems Frontiers , vol.5 , Issue.4 , pp. 359-378
    • Srivastava, R.P.1    Liu, L.2
  • 24
    • 77957964010 scopus 로고    scopus 로고
    • Data fusion for traffic incident detection using D-S evidence theory with probabilistic SVMs
    • D. Zeng, J. Xu, and G. Xu Data fusion for traffic incident detection using D-S evidence theory with probabilistic SVMs Journal of Computers 3 10 2008 36 43
    • (2008) Journal of Computers , vol.3 , Issue.10 , pp. 36-43
    • Zeng, D.1    Xu, J.2    Xu, G.3
  • 25
    • 70449569034 scopus 로고    scopus 로고
    • Intelligent fault diagnosis using rough set method and evidence theory for NC machine tools
    • X. Yao, J. Fu, and Z. Chen Intelligent fault diagnosis using rough set method and evidence theory for NC machine tools International Journal of Computer Integrated Manufacturing 22 5 2009 472 482
    • (2009) International Journal of Computer Integrated Manufacturing , vol.22 , Issue.5 , pp. 472-482
    • Yao, X.1    Fu, J.2    Chen, Z.3
  • 27
    • 34047249450 scopus 로고    scopus 로고
    • Ensembling evidential k-nearest neighbor classifiers through multi-modal perturbation
    • DOI 10.1016/j.asoc.2006.10.002, PII S1568494606000652
    • H. Altincay Ensembling evidential k-nearest neighbor classifiers through multi-modal perturbation Applied Soft Computing 7 3 2007 1072 1083 (Pubitemid 46551937)
    • (2007) Applied Soft Computing Journal , vol.7 , Issue.3 , pp. 1072-1083
    • Altincay, H.1
  • 28
    • 26444542837 scopus 로고    scopus 로고
    • Image object recognition by SVMs and evidence theory
    • Image and Video Retrieval: 4th International Conference, CIVR 2005. Proceedings
    • Z. Deng, B. Li, and J. Zhuang Image object recognition by SVMs and evidence theory Lecture Notes in Computer Science 3568 2005 560 567 (Pubitemid 41425594)
    • (2005) Lecture Notes in Computer Science , vol.3568 , pp. 560-567
    • Deng, Z.1    Li, B.2    Zhuang, J.3
  • 31
    • 33748601556 scopus 로고
    • The Dempster-Shafer theory
    • S.C. Shapiro, John Wiley and Sons New York
    • G. Shafer The Dempster-Shafer theory S.C. Shapiro, Encyclopedia of Artificial Intelligence 1992 John Wiley and Sons New York 330 331
    • (1992) Encyclopedia of Artificial Intelligence , pp. 330-331
    • Shafer, G.1
  • 32
    • 0010623928 scopus 로고    scopus 로고
    • A new distance between two bodies of evidence
    • DOI 10.1016/S1566-2535(01)00026-4, PII S1566253501000264
    • A.L. Jousselme, D. Grenier, and E. Bosse A new distance between two bodies of evidence Information Fusion 2 1 2001 91 101 (Pubitemid 33632552)
    • (2001) Information Fusion , vol.2 , Issue.2 , pp. 91-101
    • Jousselme, A.-L.1    Grenier, D.2    Bosse, E.3
  • 33
    • 66549103101 scopus 로고    scopus 로고
    • Understanding the value of countermeasure portfolios in information systems security
    • R.L. Kumar, S. Park, and C. Subramaniam Understanding the value of countermeasure portfolios in information systems security Journal of Management Information Systems 25 2 2008 241 279
    • (2008) Journal of Management Information Systems , vol.25 , Issue.2 , pp. 241-279
    • Kumar, R.L.1    Park, S.2    Subramaniam, C.3
  • 34
    • 1642599395 scopus 로고    scopus 로고
    • A method for priorities of triangular fuzzy number complementary judgment matrices
    • Z.S. Xu A method for priorities of triangular fuzzy number complementary judgment matrices Fuzzy Systems and Mathematics 16 1 2002 55 60
    • (2002) Fuzzy Systems and Mathematics , vol.16 , Issue.1 , pp. 55-60
    • Xu, Z.S.1
  • 35
    • 46249111871 scopus 로고    scopus 로고
    • Supporting decision making in risk management through an evidence-based information systems project risk checklist
    • L. Zhou, A. Vasconcelos, and M. Nunes Supporting decision making in risk management through an evidence-based information systems project risk checklist Information Management and Computer Security 16 2 2008 166 186
    • (2008) Information Management and Computer Security , vol.16 , Issue.2 , pp. 166-186
    • Zhou, L.1    Vasconcelos, A.2    Nunes, M.3
  • 36
    • 0031075696 scopus 로고    scopus 로고
    • Approximate reasoning and evidence theory
    • J.W. Guan, and D.A. Bell Approximate reasoning and evidence theory Information Sciences 96 3-4 1997 207 235
    • (1997) Information Sciences , vol.96 , Issue.34 , pp. 207-235
    • Guan, J.W.1    Bell, D.A.2
  • 37
    • 0033728781 scopus 로고    scopus 로고
    • Combining belief functions when evidence conflicts
    • C.K. Murphy Combining belief functions when evidence conflicts Decision Support Systems 29 1 2000 1 9
    • (2000) Decision Support Systems , vol.29 , Issue.1 , pp. 1-9
    • Murphy, C.K.1
  • 38
    • 0037273268 scopus 로고    scopus 로고
    • Application of event tree analysis based on fuzzy sets in risk analysis
    • C.G. Jin, Y. Lin, and Z.S. Ji Application of event tree analysis based on fuzzy sets in risk analysis Journal of Dalian University of Technology 43 1 2003 97 100
    • (2003) Journal of Dalian University of Technology , vol.43 , Issue.1 , pp. 97-100
    • Jin, C.G.1    Lin, Y.2    Ji, Z.S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.