메뉴 건너뛰기




Volumn 34, Issue 6, 2014, Pages 733-740

A multidimensional approach to information security risk management using FMEA and fuzzy theory

Author keywords

FMEA; Fuzzy theory; Information security; Risk management

Indexed keywords

INFORMATION USE; RISK ASSESSMENT; RISK MANAGEMENT; SECURITY OF DATA;

EID: 84905870552     PISSN: 02684012     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.ijinfomgt.2014.07.005     Document Type: Article
Times cited : (118)

References (33)
  • 1
    • 84871903815 scopus 로고    scopus 로고
    • Ranking of fuzzy numbers, some recent and new formulas
    • S. Abbasbandy Ranking of fuzzy numbers, some recent and new formulas Proceedings of IFSA-EUSFLAT 2009 2009 642 646
    • (2009) Proceedings of IFSA-EUSFLAT 2009 , pp. 642-646
    • Abbasbandy, S.1
  • 2
    • 84941511918 scopus 로고
    • Fuzzy decision trees
    • J.M. Adamo Fuzzy decision trees Fuzzy Sets and Systems 4 3 1980 207 219
    • (1980) Fuzzy Sets and Systems , vol.4 , Issue.3 , pp. 207-219
    • Adamo, J.M.1
  • 3
    • 84867459885 scopus 로고    scopus 로고
    • Improving information security management: An analysis of ID-password usage and a new login vulnerability measure
    • Y. Bang, D.-Y. Lee, Y.-S. Bae, and J.-H. Ahnc Improving information security management: An analysis of ID-password usage and a new login vulnerability measure International Journal of Information Management 32 2012 409 418
    • (2012) International Journal of Information Management , vol.32 , pp. 409-418
    • Bang, Y.1    Lee, D.-Y.2    Bae, Y.-S.3    Ahnc, J.-H.4
  • 4
  • 9
    • 84875755699 scopus 로고    scopus 로고
    • How different are ranking methods for fuzzy numbers? A numerical study
    • M. Brunelli, and J. Mezei How different are ranking methods for fuzzy numbers? A numerical study International Journal of Approximate Reasoning 54 2013 627 639
    • (2013) International Journal of Approximate Reasoning , vol.54 , pp. 627-639
    • Brunelli, M.1    Mezei, J.2
  • 10
    • 84883862168 scopus 로고    scopus 로고
    • Model of information security risk assessment based on improved wavelet neural network
    • G. Chen, and D. Zhao Model of information security risk assessment based on improved wavelet neural network Journal of Networks 2013 8
    • (2013) Journal of Networks , pp. 8
    • Chen, G.1    Zhao, D.2
  • 11
    • 84877963990 scopus 로고    scopus 로고
    • Monitoring information security risks within health care
    • N.V. Deursen, W.J. Buchanan, and A. Duff Monitoring information security risks within health care Computers & Security 37 2013 31 45
    • (2013) Computers & Security , vol.37 , pp. 31-45
    • Deursen, N.V.1    Buchanan, W.J.2    Duff, A.3
  • 12
    • 0032498339 scopus 로고    scopus 로고
    • An introduction to fuzzy sets
    • D. Dubois, and H. Prade An introduction to fuzzy sets Clinica Chimica Acta 70 1 1998 3 29
    • (1998) Clinica Chimica Acta , vol.70 , Issue.1 , pp. 3-29
    • Dubois, D.1    Prade, H.2
  • 13
    • 80052636381 scopus 로고    scopus 로고
    • A systematic approach for diagnosing service failure: Service-specific FMEA and grey relational analysis approach
    • Y. Geum, Y. Cho, and Y. Park A systematic approach for diagnosing service failure: Service-specific FMEA and grey relational analysis approach Mathematical and Computer Modelling 54 2011 3126 3142
    • (2011) Mathematical and Computer Modelling , vol.54 , pp. 3126-3142
    • Geum, Y.1    Cho, Y.2    Park, Y.3
  • 15
    • 32644456297 scopus 로고    scopus 로고
    • (Working Paper) Consortium for Research on Information Security and Policy (CRISP), Stanford University Palo Alto, CA
    • K.S. Hoo How much is enough? A risk-management approach to computer security (Working Paper) 2000 Consortium for Research on Information Security and Policy (CRISP), Stanford University Palo Alto, CA
    • (2000) How Much Is Enough? A Risk-management Approach to Computer Security
    • Hoo, K.S.1
  • 17
    • 84902255078 scopus 로고    scopus 로고
    • Information security engineering: A framework for research and practices
    • M. Li, and M. Tang Information security engineering: A framework for research and practices International Journal of Computers Communications 8 2013 578 587
    • (2013) International Journal of Computers Communications , vol.8 , pp. 578-587
    • Li, M.1    Tang, M.2
  • 18
    • 84884359507 scopus 로고    scopus 로고
    • Human reliability assessment for medical devices based on failure mode and effects analysis and fuzzy linguistic theory
    • Q.-L. Lin, D.-J. Wand, W.-G. Lin, and H.-C. Liu Human reliability assessment for medical devices based on failure mode and effects analysis and fuzzy linguistic theory Safety Science 62 2014 248 256
    • (2014) Safety Science , vol.62 , pp. 248-256
    • Lin, Q.-L.1    Wand, D.-J.2    Lin, W.-G.3    Liu, H.-C.4
  • 19
    • 84865045723 scopus 로고    scopus 로고
    • Risk evaluation in failure mode and effects analysis with extended VIKOR method under fuzzy environment
    • H.C. Liu, L. Liu, N. Liu, and L.X. Mao Risk evaluation in failure mode and effects analysis with extended VIKOR method under fuzzy environment Expert Systems with Applications 39 2012 12926 12934
    • (2012) Expert Systems with Applications , vol.39 , pp. 12926-12934
    • Liu, H.C.1    Liu, L.2    Liu, N.3    Mao, L.X.4
  • 20
    • 77957881878 scopus 로고    scopus 로고
    • Collaborative risk method for information security management practices: A case context within Turkey
    • S. Ozkan, and B. Karabacak Collaborative risk method for information security management practices: A case context within Turkey International Journal of Information Management 30 2010 567 572
    • (2010) International Journal of Information Management , vol.30 , pp. 567-572
    • Ozkan, S.1    Karabacak, B.2
  • 21
    • 84873297270 scopus 로고    scopus 로고
    • A subjective approach for ballast water risk estimation
    • E.D. Pam, K.X. Li, A. Wall, Z. Yang, and J. Wang A subjective approach for ballast water risk estimation Ocean Engineering 61 2013 66 76
    • (2013) Ocean Engineering , vol.61 , pp. 66-76
    • Pam, E.D.1    Li, K.X.2    Wall, A.3    Yang, Z.4    Wang, J.5
  • 22
    • 54949112031 scopus 로고    scopus 로고
    • Quantitatively assessing the vulnerability of critical information systems: A new method for evaluating security enhancements
    • S.C. Patel, J.H. Graham, and P.A.S. Ralston Quantitatively assessing the vulnerability of critical information systems: A new method for evaluating security enhancements International Journal of Information Management 28 2008 483 491
    • (2008) International Journal of Information Management , vol.28 , pp. 483-491
    • Patel, S.C.1    Graham, J.H.2    Ralston, P.A.S.3
  • 25
    • 84905837894 scopus 로고    scopus 로고
    • Fuzzy decision theory intelligent ways for solving real-world decision problems and for solving information costs
    • G. Della Riccia, R. Kruse, D. Dubois, H.-J. Lenz, CISM International Centre for Mechanical Sciences
    • H.J. Rommelfanger Fuzzy decision theory intelligent ways for solving real-world decision problems and for solving information costs G. Della Riccia, R. Kruse, D. Dubois, H.-J. Lenz, Planning based on decision theory Vol. 472 2003 CISM International Centre for Mechanical Sciences
    • (2003) Planning Based on Decision Theory , vol.472
    • Rommelfanger, H.J.1
  • 26
    • 0002699431 scopus 로고
    • Discovering and disciplining computer abuse in organizations: A field study
    • D.W. Straub, and W.D. Nance Discovering and disciplining computer abuse in organizations: A field study MIS Quarterly 14 1 1990 45 60
    • (1990) MIS Quarterly , vol.14 , Issue.1 , pp. 45-60
    • Straub, D.W.1    Nance, W.D.2
  • 29
    • 0001160660 scopus 로고    scopus 로고
    • Reasonable properties for the ordering of fuzzy quantities (I)
    • DOI 10.1016/S0165-0114(99)00062-7, PII S0165011499000627
    • Z. Wang, and E.E. Kerre Reasonable properties for the ordering of fuzzy quantities (I) Fuzzy Sets and Systems 118 3 2001 375 385 (Pubitemid 33592816)
    • (2001) Fuzzy Sets and Systems , vol.118 , Issue.3 , pp. 375-385
    • Wang, X.1    Kerre, E.E.2
  • 30
    • 79958839771 scopus 로고    scopus 로고
    • Factors influencing information security management in small and medium-sized enterprises: A case study from Turkey
    • E.Y. Yildirim, G. Akalp, S. Aytac, and N. Bayram Factors influencing information security management in small and medium-sized enterprises: A case study from Turkey International Journal of Information Management 31 2011 360 365
    • (2011) International Journal of Information Management , vol.31 , pp. 360-365
    • Yildirim, E.Y.1    Akalp, G.2    Aytac, S.3    Bayram, N.4
  • 32
    • 0016459349 scopus 로고
    • The concept of a linguistic variable and its application to approximate reasoning - I
    • L.A. Zadeh The concept of a linguistic variable and its application to approximate reasoning - I Information Sciences 8 3 1975 199 249
    • (1975) Information Sciences , vol.8 , Issue.3 , pp. 199-249
    • Zadeh, L.A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.