-
1
-
-
0037400028
-
An integrative study of information systems security effectiveness
-
A. Kankanhalli, H.H. Teo, B.C.Y. Tan, and K.K. Wei An integrative study of information systems security effectiveness International Journal of Information Management 23 2 2003 139 154
-
(2003)
International Journal of Information Management
, vol.23
, Issue.2
, pp. 139-154
-
-
Kankanhalli, A.1
Teo, H.H.2
Tan, B.C.Y.3
Wei, K.K.4
-
2
-
-
18844431067
-
Information systems security policies: A contextual perspective
-
DOI 10.1016/j.cose.2004.08.011, PII S0167404804002378
-
M. Karyda, E. Kiountouzis, and S. Kokolakis Information systems security policies: a contextual perspective Computers and Security 24 3 2005 246 260 (Pubitemid 40683804)
-
(2005)
Computers and Security
, vol.24
, Issue.3
, pp. 246-260
-
-
Karyda, M.1
Kiountouzis, E.2
Kokolakis, S.3
-
3
-
-
0001133137
-
Coping with systems risk: Security planning models for management decision-making
-
D.W. Straub, and R.J. Welke Coping with systems risk: security planning models for management decision-making MIS Quarterly 22 4 1998 441 469
-
(1998)
MIS Quarterly
, vol.22
, Issue.4
, pp. 441-469
-
-
Straub, D.W.1
Welke, R.J.2
-
4
-
-
0030283575
-
Uncertainty in probabilistic risk assessment
-
DOI 10.1016/S0951-8320(96)00070-1, PII S0951832096000701
-
R.L. Winkler Uncertainty in probabilistic risk assessment Reliability Engineering and System Safety 54 2-3 1996 127 132 (Pubitemid 126365917)
-
(1996)
Reliability Engineering and System Safety
, vol.54
, Issue.2-3
, pp. 127-132
-
-
Winkler, R.L.1
-
6
-
-
42149112876
-
Information security and risk management
-
DOI 10.1145/1330311.1330325
-
L.D. Bodin, L.A. Gordon, and M.P. Loeb Information security and risk management Communications of the ACM 51 4 2008 64 68 (Pubitemid 351530781)
-
(2008)
Communications of the ACM
, vol.51
, Issue.4
, pp. 64-68
-
-
Bodin, L.D.1
Gordon, L.A.2
Loeb, M.P.3
-
7
-
-
55249117122
-
A stochastic dominance approach to risk analysis of computer systems
-
G.V. Post, and J.D. Diltz A stochastic dominance approach to risk analysis of computer systems MIS Quarterly 10 4 2001 363 375
-
(2001)
MIS Quarterly
, vol.10
, Issue.4
, pp. 363-375
-
-
Post, G.V.1
Diltz, J.D.2
-
8
-
-
78651570026
-
Risk evaluation model on enterprises' complex information system: A study based on the BP neural network
-
Y. Huanchun Risk evaluation model on enterprises' complex information system: a study based on the BP neural network Journal of Software 5 1 2010 99 106
-
(2010)
Journal of Software
, vol.5
, Issue.1
, pp. 99-106
-
-
Huanchun, Y.1
-
9
-
-
50049117473
-
Quantitative risk-based security prediction for component-based systems with explicitly modeled attack profiles
-
L. Grunske, and D. Joyce Quantitative risk-based security prediction for component-based systems with explicitly modeled attack profiles Journal of Systems and Software 81 8 2008 1327 1345
-
(2008)
Journal of Systems and Software
, vol.81
, Issue.8
, pp. 1327-1345
-
-
Grunske, L.1
Joyce, D.2
-
10
-
-
0029718539
-
Risk analysis modelling with the use of fuzzy logic
-
DOI 10.1016/0167-4048(96)00008-9
-
W.G. de Ru, and J.H.P. Eloff Risk analysis modeling with the use of fuzzy logic Computers and Security 15 3 1996 239 248 (Pubitemid 126351696)
-
(1996)
Computers and Security
, vol.15
, Issue.3
, pp. 239-248
-
-
De Ru, W.G.1
Eloff, J.H.P.2
-
11
-
-
78650774861
-
Study of switch project construction risk identification evaluation and tacking based on Delphi method
-
D. Xu, J. Sha, P. Zhang, and B. Wan Study of switch project construction risk identification evaluation and tacking based on Delphi method System Engineering Theory and Practice 20 12 2000 113 118
-
(2000)
System Engineering Theory and Practice
, vol.20
, Issue.12
, pp. 113-118
-
-
Xu, D.1
Sha, J.2
Zhang, P.3
Wan, B.4
-
12
-
-
0031078293
-
Arguments for qualitative risk assessment: The StAR risk adviser
-
D.K. Hardman, and P. Ayton Arguments for qualitative risk assessment: the StAR risk adviser Expert Systems 14 1 2000 24 36 (Pubitemid 127647155)
-
(1997)
Expert Systems
, vol.14
, Issue.1
, pp. 24-36
-
-
Hardman, D.K.1
Ayton, P.2
-
13
-
-
33748597348
-
A general, but readily adaptable model of information system risk
-
S. Alter, and S. Sherer A general, but readily adaptable model of information system risk Communications of the AIS 14 1 2004 1 28
-
(2004)
Communications of the AIS
, vol.14
, Issue.1
, pp. 1-28
-
-
Alter, S.1
Sherer, S.2
-
14
-
-
49749086940
-
Analysing business losses caused by information systems risk: A business process analysis approach
-
H Salmela Analysing business losses caused by information systems risk: a business process analysis approach Journal of Information Technology 23 3 2008 185 202
-
(2008)
Journal of Information Technology
, vol.23
, Issue.3
, pp. 185-202
-
-
Salmela, H.1
-
15
-
-
3242704207
-
BBN-based software project risk management
-
C. Fan, and Y. Yu BBN-based software project risk management Journal of Systems and Software 73 2 2004 193 203
-
(2004)
Journal of Systems and Software
, vol.73
, Issue.2
, pp. 193-203
-
-
Fan, C.1
Yu, Y.2
-
16
-
-
46749145778
-
Analyzing software system quality risk using Bayesian belief network
-
Y. Hu, J. Chen, H. Jiaxing, L. Mei, and X. Kang Analyzing software system quality risk using Bayesian belief network Proceedings of the 2007 IEEE International Conference on Granular Computing 2007 93 96
-
(2007)
Proceedings of the 2007 IEEE International Conference on Granular Computing
, pp. 93-96
-
-
Hu, Y.1
Chen, J.2
Jiaxing, H.3
Mei, L.4
Kang, X.5
-
17
-
-
58349115825
-
Large engineering project risk management using a Bayesian belief network
-
E. Lee, Y. Park, and J. Shin Large engineering project risk management using a Bayesian belief network Expert Systems with Applications 36 3 2009 5880 5887
-
(2009)
Expert Systems with Applications
, vol.36
, Issue.3
, pp. 5880-5887
-
-
Lee, E.1
Park, Y.2
Shin, J.3
-
20
-
-
78650785123
-
Analysis of risk evaluation techniques on information system security
-
X. Yang, H. Luo, C. Fan, M. Chen, and S. Zhou Analysis of risk evaluation techniques on information system security Journal of Computer Applications 28 8 2008 1920 1924
-
(2008)
Journal of Computer Applications
, vol.28
, Issue.8
, pp. 1920-1924
-
-
Yang, X.1
Luo, H.2
Fan, C.3
Chen, M.4
Zhou, S.5
-
22
-
-
0344583817
-
Applications of belief functions in business decisions: A review
-
R.P. Srivastava, and L. Liu Applications of belief functions in business decisions: a review Information Systems Frontiers 5 4 2003 359 378
-
(2003)
Information Systems Frontiers
, vol.5
, Issue.4
, pp. 359-378
-
-
Srivastava, R.P.1
Liu, L.2
-
23
-
-
0040055356
-
A belief-function based decision support system
-
D. Heckerman, A. Mamdani, Morgan Kaufmann San Mateo, CA
-
H. Xu, Y.T. Hsia, and P. Smets A belief-function based decision support system D. Heckerman, A. Mamdani, Proceedings of the Ninth Uncertainty in Artificial Intelligence 1993 Morgan Kaufmann San Mateo, CA 535 542
-
(1993)
Proceedings of the Ninth Uncertainty in Artificial Intelligence
, pp. 535-542
-
-
Xu, H.1
Hsia, Y.T.2
Smets, P.3
-
24
-
-
77957964010
-
Data fusion for traffic incident detection using D-S evidence theory with probabilistic SVMs
-
D. Zeng, J. Xu, and G. Xu Data fusion for traffic incident detection using D-S evidence theory with probabilistic SVMs Journal of Computers 3 10 2008 36 43
-
(2008)
Journal of Computers
, vol.3
, Issue.10
, pp. 36-43
-
-
Zeng, D.1
Xu, J.2
Xu, G.3
-
25
-
-
70449569034
-
Intelligent fault diagnosis using rough set method and evidence theory for NC machine tools
-
X. Yao, J. Fu, and Z. Chen Intelligent fault diagnosis using rough set method and evidence theory for NC machine tools International Journal of Computer Integrated Manufacturing 22 5 2009 472 482
-
(2009)
International Journal of Computer Integrated Manufacturing
, vol.22
, Issue.5
, pp. 472-482
-
-
Yao, X.1
Fu, J.2
Chen, Z.3
-
27
-
-
34047249450
-
Ensembling evidential k-nearest neighbor classifiers through multi-modal perturbation
-
DOI 10.1016/j.asoc.2006.10.002, PII S1568494606000652
-
H. Altincay Ensembling evidential k-nearest neighbor classifiers through multi-modal perturbation Applied Soft Computing 7 3 2007 1072 1083 (Pubitemid 46551937)
-
(2007)
Applied Soft Computing Journal
, vol.7
, Issue.3
, pp. 1072-1083
-
-
Altincay, H.1
-
28
-
-
26444542837
-
Image object recognition by SVMs and evidence theory
-
Image and Video Retrieval: 4th International Conference, CIVR 2005. Proceedings
-
Z. Deng, B. Li, and J. Zhuang Image object recognition by SVMs and evidence theory Lecture Notes in Computer Science 3568 2005 560 567 (Pubitemid 41425594)
-
(2005)
Lecture Notes in Computer Science
, vol.3568
, pp. 560-567
-
-
Deng, Z.1
Li, B.2
Zhuang, J.3
-
31
-
-
33748601556
-
The Dempster-Shafer theory
-
S.C. Shapiro, John Wiley and Sons New York
-
G. Shafer The Dempster-Shafer theory S.C. Shapiro, Encyclopedia of Artificial Intelligence 1992 John Wiley and Sons New York 330 331
-
(1992)
Encyclopedia of Artificial Intelligence
, pp. 330-331
-
-
Shafer, G.1
-
32
-
-
0010623928
-
A new distance between two bodies of evidence
-
DOI 10.1016/S1566-2535(01)00026-4, PII S1566253501000264
-
A.L. Jousselme, D. Grenier, and E. Bosse A new distance between two bodies of evidence Information Fusion 2 1 2001 91 101 (Pubitemid 33632552)
-
(2001)
Information Fusion
, vol.2
, Issue.2
, pp. 91-101
-
-
Jousselme, A.-L.1
Grenier, D.2
Bosse, E.3
-
33
-
-
66549103101
-
Understanding the value of countermeasure portfolios in information systems security
-
R.L. Kumar, S. Park, and C. Subramaniam Understanding the value of countermeasure portfolios in information systems security Journal of Management Information Systems 25 2 2008 241 279
-
(2008)
Journal of Management Information Systems
, vol.25
, Issue.2
, pp. 241-279
-
-
Kumar, R.L.1
Park, S.2
Subramaniam, C.3
-
34
-
-
1642599395
-
A method for priorities of triangular fuzzy number complementary judgment matrices
-
Z.S. Xu A method for priorities of triangular fuzzy number complementary judgment matrices Fuzzy Systems and Mathematics 16 1 2002 55 60
-
(2002)
Fuzzy Systems and Mathematics
, vol.16
, Issue.1
, pp. 55-60
-
-
Xu, Z.S.1
-
35
-
-
46249111871
-
Supporting decision making in risk management through an evidence-based information systems project risk checklist
-
L. Zhou, A. Vasconcelos, and M. Nunes Supporting decision making in risk management through an evidence-based information systems project risk checklist Information Management and Computer Security 16 2 2008 166 186
-
(2008)
Information Management and Computer Security
, vol.16
, Issue.2
, pp. 166-186
-
-
Zhou, L.1
Vasconcelos, A.2
Nunes, M.3
-
36
-
-
0031075696
-
Approximate reasoning and evidence theory
-
J.W. Guan, and D.A. Bell Approximate reasoning and evidence theory Information Sciences 96 3-4 1997 207 235
-
(1997)
Information Sciences
, vol.96
, Issue.34
, pp. 207-235
-
-
Guan, J.W.1
Bell, D.A.2
-
37
-
-
0033728781
-
Combining belief functions when evidence conflicts
-
C.K. Murphy Combining belief functions when evidence conflicts Decision Support Systems 29 1 2000 1 9
-
(2000)
Decision Support Systems
, vol.29
, Issue.1
, pp. 1-9
-
-
Murphy, C.K.1
-
38
-
-
0037273268
-
Application of event tree analysis based on fuzzy sets in risk analysis
-
C.G. Jin, Y. Lin, and Z.S. Ji Application of event tree analysis based on fuzzy sets in risk analysis Journal of Dalian University of Technology 43 1 2003 97 100
-
(2003)
Journal of Dalian University of Technology
, vol.43
, Issue.1
, pp. 97-100
-
-
Jin, C.G.1
Lin, Y.2
Ji, Z.S.3
|