35
Views
106
CrossRef citations to date
0
Altmetric

Keep up to date with the latest research on this topic with citation updates for this article.

Read on this site (8)

S. Motevali Haghighi & S. Ali Torabi. (2020) Business continuity-inspired fuzzy risk assessment framework for hospital information systems. Enterprise Information Systems 14:7, pages 1027-1060.
Read now
Shirley Ou Yang, Carol Hsu, Suprateek Sarker & Allen S. Lee. (2017) Enabling Effective Operational Risk Management in a Financial Institution: An Action Research Study. Journal of Management Information Systems 34:3, pages 727-753.
Read now
Hamzah Abdul-Rahman, Faizul Azli Mohd-Rahim & Wang Chen. (2012) Reducing failures in software development projects: effectiveness of risk mitigation strategies. Journal of Risk Research 15:4, pages 417-433.
Read now
İhsan Kaya & Cengiz Kahraman. (2009) Air Pollution Control Using Fuzzy Process Capability Indices in the Six-Sigma Approach. Human and Ecological Risk Assessment: An International Journal 15:4, pages 689-713.
Read now
Jackie Rees & Jonathan Allen. (2008) The State of Risk Assessment Practices in Information Security: An Exploratory Investigation. Journal of Organizational Computing and Electronic Commerce 18:4, pages 255-277.
Read now
WeiT. Yue & Metin Cakanyildirim. (2007) Intrusion Prevention in Information Systems: Reactive and Proactive Responses. Journal of Management Information Systems 24:1, pages 329-353.
Read now
LILI SUN, RAJENDRA P. SRIVASTAVA & THEODORE J. MOCK. (2006) An Information Systems Security Risk Assessment Model Under the Dempster-Shafer Theory of Belief Functions. Journal of Management Information Systems 22:4, pages 109-142.
Read now
Henri Barki, Suzanne Rivard & Jean Talbot. (1993) Toward an Assessment of Software Development Risk. Journal of Management Information Systems 10:2, pages 203-225.
Read now

Articles from other publishers (98)

Meiyi Song. (2023) Ownership property, it investment and firm performance. The Journal of High Technology Management Research 34:2, pages 100481.
Crossref
Tom Butler, Daniel Gozman & Kalle Lyytinen. (2023) The regulation of and through information technology: Towards a conceptual ontology for IS research. Journal of Information Technology 38:2, pages 86-107.
Crossref
Tadele Shimels & Lemma Lessa. (2023) Maturity of information systems' security in Ethiopian banks: case of selected private banks. International Journal of Industrial Engineering and Operations Management.
Crossref
Wafa Bouaynaya, Nicholas Mavengere & Oliver Kayas. (2022) Exploring Trust in Mobile Commerce during Pandemic Crisis. Exploring Trust in Mobile Commerce during Pandemic Crisis.
Haya Mesfer Alshahrani, Saud S. Alotaibi, Md Tarique Jamal Ansari, Mashael M. Asiri, Alka Agrawal, Raees Ahmad Khan, Heba Mohsen & Anwer Mustafa Hilal. (2022) Analysis and Ranking of IT Risk Factors Using Fuzzy TOPSIS-Based Approach. Applied Sciences 12:12, pages 5911.
Crossref
Baris Cimen, Meltem Mutluturk, Esra Kocak & Bilgin Metin. 2022. Research Anthology on Business Aspects of Cybersecurity. Research Anthology on Business Aspects of Cybersecurity 56 76 .
Namdeo HedaooAmey Pawar. (2021) Risk Assessment Model Based on Fuzzy Logic for Residential Buildings. Slovak Journal of Civil Engineering 29:4, pages 37-48.
Crossref
Sokratis Nifakos, Krishna Chandramouli, Charoula Konstantina Nikolaou, Panagiotis Papachristou, Sabine Koch, Emmanouil Panaousis & Stefano Bonacina. (2021) Influence of Human Factors on Cyber Security within Healthcare Organisations: A Systematic Review. Sensors 21:15, pages 5119.
Crossref
Rohit Gupta, Baidyanath Biswas, Indranil Biswas & Shib Sankar Sana. (2020) Firm investment decisions for information security under a fuzzy environment: a game-theoretic approach. Information & Computer Security 29:1, pages 73-104.
Crossref
Martin Eling, Michael McShane & Trung Nguyen. (2021) Cyber risk management: History and future research directions. Risk Management and Insurance Review 24:1, pages 93-125.
Crossref
Benjamin Shreeve, Joseph Hallett, Matthew Edwards, Pauline Anthonysamy, Sylvain Frey & Awais Rashid. (2020) “So if Mr Blue Head here clicks the link...” Risk Thinking in Cyber Security Decision Making. ACM Transactions on Privacy and Security 24:1, pages 1-29.
Crossref
Baris Cimen, Meltem Mutluturk, Esra Kocak & Bilgin Metin. 2021. Advanced Models and Tools for Effective Decision Making Under Uncertainty and Risk Contexts. Advanced Models and Tools for Effective Decision Making Under Uncertainty and Risk Contexts 236 253 .
Jiwon Kang & GyeongAe Seomun. (2021) Information Security in Nursing. Advances in Nursing Science 44:1, pages 16-30.
Crossref
Emmanouil G. Spanakis, Silvia Bonomi, Stelios Sfakianakis, Giuseppe Santucci, Simone Lenti, Mara Sorella, Florin D. Tanasache, Alessia Palleschi, Claudio Ciccotelli, Vangelis Sakkalis & Sabina Magalini. (2020) Cyber-attacks and threats for healthcare – a multi-layer thread analysis. Cyber-attacks and threats for healthcare – a multi-layer thread analysis.
Ali Shirazi & Mozaffar Kazemi. 2020. ICT for an Inclusive World. ICT for an Inclusive World 551 566 .
Björn Häckel, Florian Hänsch, Michael Hertel & Jochen Übelhör. (2018) Assessing IT availability risks in smart factory networks. Business Research 12:2, pages 523-558.
Crossref
Andrew Rimsha & Konstantin Rimsha. (2019) Development of Threat Modeling and Risk Management Tool in Automated Process Control System for Gas Producing Enterprise. Development of Threat Modeling and Risk Management Tool in Automated Process Control System for Gas Producing Enterprise.
Jason K. Deane, David M. Goldberg, Terry R. Rakes & Loren P. Rees. (2019) The effect of information security certification announcements on the market value of the firm. Information Technology and Management 20:3, pages 107-121.
Crossref
Sylvain Frey, Awais Rashid, Pauline Anthonysamy, Maria Pinto-Albuquerque & Syed Asad Naqvi. (2019) The Good, the Bad and the Ugly: A Study of Security Decisions in a Cyber-Physical Systems Game. IEEE Transactions on Software Engineering 45:5, pages 521-536.
Crossref
Ram L. Kumar & Sungjune Park. (2018) A Portfolio Approach to Supply Chain Risk Management. Decision Sciences 50:2, pages 210-244.
Crossref
R Taranov & T Lebskaia. (2019) Methods and principles of forecasting risks of accidents on hazardous hydrotechnical objects. IOP Conference Series: Materials Science and Engineering 492, pages 012010.
Crossref
Yasuyuki Kawanishi, Hideaki Nishihara, Daisuke Souma, Hirotaka Yoshida & Yoichi Hata. (2019) A Comparative Study of JASO TP15002-Based Security Risk Assessment Methods for Connected Vehicle System Design. Security and Communication Networks 2019, pages 1-35.
Crossref
Ines Meriah & Latifa Ben Arfa Rabai. (2018) A Survey of Quantitative Security Risk Analysis Models for Computer Systems. A Survey of Quantitative Security Risk Analysis Models for Computer Systems.
Sisi Wu, Yelin Fu, Hai Shen & Fan Liu. (2018) Using ranked weights and Shannon entropy to modify regional sustainable society index. Sustainable Cities and Society 41, pages 443-448.
Crossref
Susana Patino, Edgar Fernando Solis, Sang Guun Yoo & Ruben Arroyo. (2018) ICT Risk Management Methodology Proposal for Governmental Entities Based on ISO/IEC 27005. ICT Risk Management Methodology Proposal for Governmental Entities Based on ISO/IEC 27005.
Baidyanath Biswas & Arunabha Mukhopadhyay. (2018) G-RAM framework for software risk assessment and mitigation strategies in organisations. Journal of Enterprise Information Management 31:2, pages 276-299.
Crossref
Simon Elias BibriSimon Elias Bibri. 2018. Smart Sustainable Cities of the Future. Smart Sustainable Cities of the Future 419 480 .
Jerry M. Friedhoff & Mo Mansouri. (2017) A Framework for Assessing Technology Risks in Transaction-Based Extended Enterprises: U.S. Capital Market Case. IEEE Systems Journal 11:3, pages 1505-1515.
Crossref
Zhenyu Yu, Kun Yang, Yi Luo & Qiongfei Deng. (2017) Research on software project risk assessment model based on fuzzy theory and improved. Research on software project risk assessment model based on fuzzy theory and improved.
Martina Zeleňáková & Lenka ZvijákováMartina Zeleňáková & Lenka Zvijáková. 2017. Using Risk Analysis for Flood Protection Assessment. Using Risk Analysis for Flood Protection Assessment 1 72 .
Gizem Öğütçü, Özlem Müge Testik & Oumout Chouseinoglou. (2016) Analysis of personal information security behavior and awareness. Computers & Security 56, pages 83-93.
Crossref
Oscar González-Rojas & Sebastian Lesmes. 2016. Business Process Management. Business Process Management 365 380 .
Carol Hsu, James Backhouse & Leiser Silva. 2016. Enacting Research Methods in Information Systems: Volume 2. Enacting Research Methods in Information Systems: Volume 2 134 166 .
Palaniappan Shamala & Rabiah Ahmad. (2014) A proposed taxonomy of assets for information security risk assessment (ISRA). A proposed taxonomy of assets for information security risk assessment (ISRA).
Stefan Fenz, Johannes Heurix, Thomas Neubauer & Fabian Pechstein. (2014) Current challenges in information security risk management. Information Management & Computer Security 22:5, pages 410-430.
Crossref
Carol Hsu, James Backhouse & Leiser Silva. (2014) Institutionalizing Operational Risk Management: An Empirical Study. Journal of Information Technology 29:1, pages 59-72.
Crossref
Michael Schermann, Manuel Wiesche, Stefan Hoermann & Helmut Krcmar. 2014. Risk - A Multidisciplinary Introduction. Risk - A Multidisciplinary Introduction 387 405 .
Steffen Bartsch. (2014) Policy override in practice: model, evaluation, and decision support. Security and Communication Networks 7:1, pages 139-156.
Crossref
Arunabha Mukhopadhyay, Samir Chatterjee, Debashis Saha, Ambuj Mahanti & Samir K. Sadhukhan. (2013) Cyber-risk decision models: To insure IT or not?. Decision Support Systems 56, pages 11-26.
Crossref
Christoph Markmann, Inga-Lena Darkow & Heiko von der Gracht. (2013) A Delphi-based risk analysis — Identifying and assessing future challenges for supply chain security in a multi-stakeholder environment. Technological Forecasting and Social Change 80:9, pages 1815-1833.
Crossref
James L. Worrell, Paul M. Di Gangi & Ashley A. Bush. (2013) Exploring the use of the Delphi method in accounting information systems research. International Journal of Accounting Information Systems 14:3, pages 193-208.
Crossref
Moses Moyo, Hanifa. Abdullah & Rita C. Nienaber. (2013) Information security risk management in small-scale organisations: A case study of secondary schools computerised information systems. Information security risk management in small-scale organisations: A case study of secondary schools computerised information systems.
Stefan Taubenberger, Jan Jürjens, Yijun Yu & Bashar Nuseibeh. (2013) Resolving vulnerability identification errors using security requirements on business process models. Information Management & Computer Security 21:3, pages 202-223.
Crossref
Nolan J. Taylor, Alan R. Dennis & Jeff W. Cummings. (2013) Situation normality and the shape of search: The effects of time delays and information presentation on search behavior. Journal of the American Society for Information Science and Technology 64:5, pages 909-928.
Crossref
Rakhi P. Tripathi, M. P. Gupta & Jaijit Bhattacharya. 2013. E-Government Services Design, Adoption, and Evaluation. E-Government Services Design, Adoption, and Evaluation 67 92 .
Manuel Wiesche, Michael Schermann & Helmut Krcmar. (2013) When IT Risk Management Produces More Harm than Good: The Phenomenon of 'Mock Bureaucracy'. When IT Risk Management Produces More Harm than Good: The Phenomenon of 'Mock Bureaucracy'.
Manuel Wiesche, Hristo Keskinov, Michael Schermann & Helmut Krcmar. (2013) Classifying Information Systems Risks: What Have We Learned So Far?. Classifying Information Systems Risks: What Have We Learned So Far?.
Hing Kai Chan & Xiaojun WangHing Kai Chan & Xiaojun Wang. 2013. Fuzzy Hierarchical Model for Risk Assessment. Fuzzy Hierarchical Model for Risk Assessment 7 23 .
Pejman Rezakhani. (2012) A review of fuzzy risk assessment models for construction projects. Slovak Journal of Civil Engineering 20:3, pages 35-40.
Crossref
Olatunde Amoo Durowoju, Hing Kai Chan & Xiaojun Wang. (2012) Entropy assessment of supply chain disruption. Journal of Manufacturing Technology Management 23:8, pages 998-1014.
Crossref
Yan Fang Diao, Qing Hua Zhang, Jia Yuan Chen & Gang Wang. (2012) Flood Risk Analysis Based on IOSM. Applied Mechanics and Materials 212-213, pages 710-714.
Crossref
Heiko A. von der Gracht. (2012) Consensus measurement in Delphi studies. Technological Forecasting and Social Change 79:8, pages 1525-1536.
Crossref
Qiang Zou, Jianzhong Zhou, Chao Zhou, Jun Guo, Weiping Deng, Mengqi Yang & Li Liao. (2012) Fuzzy risk analysis of flood disasters based on diffused-interior-outer-set model. Expert Systems with Applications 39:6, pages 6213-6220.
Crossref
Myung-Hee Chang & Da-Yeon Kang. (2012) Factors Affecting the Information Security Awareness and Perceived Information Security Risk of Employees of Port Companies. Journal of Korean navigation and port research 36:3, pages 261-271.
Crossref
Rakhi Tripathi, M.P. Gupta & Jaijit Bhattacharya. (2012) Interoperability adoption among government and corporate portals in India: a study. Journal of Enterprise Information Management 25:2, pages 98-122.
Crossref
Kimberley Dunkerley & Gurvirender Tejay. 2012. Measuring Organizational Information Systems Success. Measuring Organizational Information Systems Success 341 366 .
Imed El Fray. 2012. Computer Information Systems and Industrial Management. Computer Information Systems and Industrial Management 428 442 .
Yuyu Chou, Olga Levina & Jan Oetting. (2011) Enforcing confidentiality in a SaaS cloud environment. Enforcing confidentiality in a SaaS cloud environment.
Nan Feng & Minqiang Li. (2011) An information systems security risk assessment model under uncertain environment. Applied Soft Computing 11:7, pages 4332-4340.
Crossref
Stefan Strecker, David Heise & Ulrich Frank. (2010) RiskM: A multi-perspective modeling method for IT risk assessment. Information Systems Frontiers 13:4, pages 595-611.
Crossref
Rakhi P. Tripathi, M. P. Gupta & Jaijit Bhattacharya. (2011) Identifying Factors of Integration for an Interoperable Government Portal. International Journal of Electronic Government Research 7:1, pages 64-88.
Crossref
Stefan Fenz. 2011. Electronic Business Interoperability. Electronic Business Interoperability 596 614 .
Kimberley D Dunkerley & Gurvirender Tejay. (2011) A Confirmatory Analysis of Information Systems Security Success Factors. A Confirmatory Analysis of Information Systems Security Success Factors.
Stefan Taubenberger, Jan Jürjens, Yijun Yu & Bashar Nuseibeh. 2011. Future Challenges in Security and Privacy for Academia and Industry. Future Challenges in Security and Privacy for Academia and Industry 259 270 .
Constantinos Patsakis, Dimitrios Mermigas, Sotirios Pirounias, Nikolaos Alexandris & Evangelos Fountas. (2010) Notice of Retraction: Towards a formalistic measuring of security using stochastic calculus. Notice of Retraction: Towards a formalistic measuring of security using stochastic calculus.
Daniel Oost. (2010) A potential loss of trust as a result of the conflicting messages within information security research. A potential loss of trust as a result of the conflicting messages within information security research.
Arthur Jung-Ting Chang. (2010) Roles of perceived risk and usefulness in information system security adoption. Roles of perceived risk and usefulness in information system security adoption.
Liu Tibin. (2010) Analyzes IPTV Security Threats under the Triple Play. Analyzes IPTV Security Threats under the Triple Play.
Dong-Mei Zhao, Jin-Xing Liu & Ze-Hong Zhang. (2009) Method of risk evaluation of information security based on neural networks. Method of risk evaluation of information security based on neural networks.
Chang MyungHee. (2009) The Analysis of Probability and Impact and Evaluation of Relative Information Systems Risk Factor in Maritime and Port Corporations. Journal of Shipping and Logistics 25:1, pages 57-82.
Crossref
Andreas Ekelhart, Stefan Fenz & Thomas Neubauer. (2009) Ontology-Based Decision Support for Information Security Risk Management. Ontology-Based Decision Support for Information Security Risk Management.
Frank Innerhofer-Oberperfler & Ruth Breu. (2009) An Empirically Derived Loss Taxonomy Based on Publicly Known Security Incidents. An Empirically Derived Loss Taxonomy Based on Publicly Known Security Incidents.
Sangjae Lee & Hyunchul Ahn. (2009) Structural equation model for EDI controls: Controls design perspective. Expert Systems with Applications 36:2, pages 1731-1749.
Crossref
Chen-Ling Fang & Wen-Chung Liu. (2008) Analysis of relationship between operational risk and financial efficiency among different location types in farmers’ association. Analysis of relationship between operational risk and financial efficiency among different location types in farmers’ association.
Jong-Ki Kim, Da-Yeon Kang & Jin-Hwan Jeon. (2008) A Study on Factors Influencing User's Security Behavioral Intention for Choosing Password. The Journal of Information Systems 17:1, pages 23-43.
Crossref
Jean-Noël Ezingeard & Monica Bowen-Schrire. (2017) Triggers of Change in Information Security Management Practices. Journal of General Management 32:4, pages 53-72.
Crossref
Prasanta Kumar Dey, Jason Kinch & Stephen O. Ogunlana. (2007) Managing risk in software development projects: a case study. Industrial Management & Data Systems 107:2, pages 284-303.
Crossref
Stephen Du, Mark Keil, Lars Mathiassen, Yide Shen & Amrit Tiwana. (2007) Attention-shaping tools, expertise, and perceived control in IT project risk assessment. Decision Support Systems 43:1, pages 269-283.
Crossref
Sangkyun Kim. 2007. Computational Intelligence in Information Assurance and Security. Computational Intelligence in Information Assurance and Security 235 254 .
Arthur Chang & Quey-jen Yeh. (2006) Coping With Systems Threats: A Study of the Adequacy of Security in Taiwan. Coping With Systems Threats: A Study of the Adequacy of Security in Taiwan.
Bartel Van de Walle & Anne-Francoise Rutkowski. (2006) A fuzzy decision support system for IT Service Continuity threat assessment. Decision Support Systems 42:3, pages 1931-1943.
Crossref
S. Du, M. Keil, L. Mathiassen, Yide Shen & A. Tiwana. (2006) The Role of Perceived Control, Attention-Shaping, and Expertise in IT Project Risk Assessment. The Role of Perceived Control, Attention-Shaping, and Expertise in IT Project Risk Assessment.
Heejun Park, Sangkyun Kim & Hong Joo Lee. 2006. Knowledge-Based Intelligent Information and Engineering Systems. Knowledge-Based Intelligent Information and Engineering Systems 1234 1241 .
Sangkyun Kim & Hong Joo Lee. 2006. Computational Science and Its Applications - ICCSA 2006. Computational Science and Its Applications - ICCSA 2006 639 648 .
Sangkyun Kim & Choon Seong Leem. (2005) Enterprise security architecture in business convergence environments. Industrial Management & Data Systems 105:7, pages 919-936.
Crossref
E.W.T. Ngai & F.K.T. Wat. (2005) Fuzzy decision support system for risk analysis in e-commerce development. Decision Support Systems 40:2, pages 235-255.
Crossref
Lin Wang & Yurong Zeng. 2005. Fuzzy Systems and Knowledge Discovery. Fuzzy Systems and Knowledge Discovery 1142 1149 .
Terry Kendrick. (2004) Strategic risk: am I doing ok?. Corporate Governance: The international journal of business in society 4:4, pages 69-77.
Crossref
Shi‐Ming Huang, I‐Chu Chang, Shing‐Han Li & Ming‐Tong Lin. (2004) Assessing risk in ERP projects: identify and prioritize the factors. Industrial Management & Data Systems 104:8, pages 681-688.
Crossref
Sangkyun Kim & Choon Seong Leem. 2004. Computational Science and Its Applications – ICCSA 2004. Computational Science and Its Applications – ICCSA 2004 597 607 .
Bomil Suh & Ingoo Han. (2003) The IS risk analysis based on a business model. Information & Management 41:2, pages 149-158.
Crossref
Bumsuk Jung, Ingoo Han & Sangjae Lee. (2001) Security threats to Internet: a Korean multi-industry investigation. Information & Management 38:8, pages 487-498.
Crossref
Sungbaek Cho & Zbigniew Ciechanowicz. 2001. Trusted Information. Trusted Information 277 292 .
Joe Peppard, Rob Lambert & Chris Edwards. (2003) Whose job is it anyway?: organizational information competencies for value creation. Information Systems Journal 10:4, pages 291-322.
Crossref
Kakoli Bandyopadhyay, Peter P. Mykytyn & Kathleen Mykytyn. (1999) A framework for integrated risk management in information technology. Management Decision 37:5, pages 437-445.
Crossref
Changduk Jung, Ingoo Han & Bomil Suh. (1999) Risk analysis for electronic commerce using case-based reasoning. International Journal of Intelligent Systems in Accounting, Finance & Management 8:1, pages 61-73.
Crossref
B. Zhou. (1999) Risk analysis and assessment using object-oriented techniques. Risk analysis and assessment using object-oriented techniques.
Ronald E. McGaugheyJr.Jr., Charles A. Snyder & Houston H. Carr. (1994) Implementing information technology for competitive advantage: Risk management issues. Information & Management 26:5, pages 273-280.
Crossref

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.