632
Views
121
CrossRef citations to date
0
Altmetric
Original Article

An Information Systems Security Risk Assessment Model Under the Dempster-Shafer Theory of Belief Functions

, &
Pages 109-142 | Published online: 08 Dec 2014

Keep up to date with the latest research on this topic with citation updates for this article.

Read on this site (8)

DeJarvis Oliver & Adriane. B. Randolph. (2022) Hacker Definitions in Information Systems Research. Journal of Computer Information Systems 62:2, pages 397-409.
Read now
S. Motevali Haghighi & S. Ali Torabi. (2020) Business continuity-inspired fuzzy risk assessment framework for hospital information systems. Enterprise Information Systems 14:7, pages 1027-1060.
Read now
Gregory D. Moody, Dennis F. Galletta & Brian Kimball Dunn. (2017) Which phish get caught? An exploratory study of individuals′ susceptibility to phishing. European Journal of Information Systems 26:6, pages 564-584.
Read now
Nan Feng, Harris Wu, Minqiang Li, Desheng Wu, Fuzan Chen & Jin Tian. (2016) Managing security risks for inter-organisational information systems: a multiagent collaborative model. Enterprise Information Systems 10:7, pages 751-770.
Read now
Konstantinia Charitoudi & Andrew J. C. Blyth. (2014) An Agent-Based Socio-Technical Approach to Impact Assessment for Cyber Defense. Information Security Journal: A Global Perspective 23:4-6, pages 125-136.
Read now
Debabrata Dey, Atanu Lahiri & Guoying Zhang. (2012) Hacker Behavior, Network Effects, and the Security Software Market. Journal of Management Information Systems 29:2, pages 77-108.
Read now
Guangquan Xu, Zhiyong Feng, Huabei Wu & Dexin Zhao. (2007) Swift Trust in a Virtual Temporary System: A Model Based on the Dempster-Shafer Theory of Belief Functions. International Journal of Electronic Commerce 12:1, pages 93-126.
Read now
WeiT. Yue & Metin Cakanyildirim. (2007) Intrusion Prevention in Information Systems: Reactive and Proactive Responses. Journal of Management Information Systems 24:1, pages 329-353.
Read now

Articles from other publishers (113)

Alexeis Garcia-Perez, Mark Paul Sallos & Pattanapong Tiwasing. (2021) Dimensions of cybersecurity performance and crisis response in critical infrastructure organisations: an intellectual capital perspective. Journal of Intellectual Capital 24:2, pages 465-486.
Crossref
Faheem Ahmed Shaikh & Mikko Siponen. (2023) Information security risk assessments following cybersecurity breaches: The mediating role of top management attention to cybersecurity. Computers & Security 124, pages 102974.
Crossref
Vladislav Podtopelny & Alina Babaeva. 2023. Ecosystems Without Borders 2023. Ecosystems Without Borders 2023 189 196 .
Jedidiah Aqui & Michael Hosein. (2022) Mobile Ad-hoc Networks Topic Modelling and Dataset Querying. Mobile Ad-hoc Networks Topic Modelling and Dataset Querying.
Hosein Michael & Aqui Jedidiah. (2022) Mobile Adhoc Networks - An Overview of Risk Identification, Intrusion Detection and Machine Learning Techniques used. Mobile Adhoc Networks - An Overview of Risk Identification, Intrusion Detection and Machine Learning Techniques used.
Aqui Jedidiah & Hosein Michael. (2022) Mobile Adhoc Networks - Establishing Initial Risk Profiles utilizing ML Techniques. Mobile Adhoc Networks - Establishing Initial Risk Profiles utilizing ML Techniques.
Diane J. Janvrin & Tawei Wang. (2022) Linking Cybersecurity and Accounting: An Event, Impact, Response Framework. Accounting Horizons 36:4, pages 67-112.
Crossref
Jie Jian, Siqi Chen, Xin Luo, Tien Lee & Xiaoming Yu. (2022) Organized Cyber-Racketeering: Exploring the Role of Internet Technology in Organized Cybercrime Syndicates Using a Grounded Theory Approach. IEEE Transactions on Engineering Management 69:6, pages 3726-3738.
Crossref
Richard L. Baskerville, Jongwoo Kim & Carl Stucke. (2022) The cybersecurity risk estimation engine: A tool for possibility based risk analysis. Computers & Security 120, pages 102752.
Crossref
Ningkui Wang & Daijun Wei. (2022) An Adaptive Dempster-Shafer Theory of Evidence Based Trust Model in Multiagent Systems. Applied Sciences 12:15, pages 7633.
Crossref
Cansu Tayaksi, Erhan Ada, Yigit Kazancoglu & Muhittin Sagnak. (2021) The financial impacts of information systems security breaches on publicly traded companies: reactions of different sectors. Journal of Enterprise Information Management 35:2, pages 650-668.
Crossref
Baris Cimen, Meltem Mutluturk, Esra Kocak & Bilgin Metin. 2022. Research Anthology on Business Aspects of Cybersecurity. Research Anthology on Business Aspects of Cybersecurity 56 76 .
Reem Al Sharif & Shaligram Pokharel. (2021) Risk Analysis with the Dempster–Shafer Theory for Smart City Planning: The Case of Qatar. Electronics 10:24, pages 3080.
Crossref
Shi Qiu, Yuansheng Luo & Hongwei Guo. (2021) Multisource evidence theory‐based fraud risk assessment of China's listed companies. Journal of Forecasting 40:8, pages 1524-1539.
Crossref
Baris Cimen, Meltem Mutluturk, Esra Kocak & Bilgin Metin. 2021. Advanced Models and Tools for Effective Decision Making Under Uncertainty and Risk Contexts. Advanced Models and Tools for Effective Decision Making Under Uncertainty and Risk Contexts 236 253 .
Kamalanathan Kandasamy, Sethuraman Srinivas, Krishnashree Achuthan & Venkat P. Rangan. (2020) IoT cyber risk: a holistic analysis of cyber risk assessment frameworks, risk vectors, and risk ranking process. EURASIP Journal on Information Security 2020:1.
Crossref
Sovan Mitra & Andreas Karathanasopoulos. (2020) FinTech revolution: the impact of management information systems upon relative firm value and risk. Journal of Banking and Financial Technology 4:2, pages 175-187.
Crossref
Prithvi Bhattacharya. (2020) Safeguarding Intelligent Decision-Making for Business : Towards A Model. Safeguarding Intelligent Decision-Making for Business : Towards A Model.
Haley Wing Chi Tsang, Wing Bun Lee & Eric Tsui. 2020. Start-Ups and SMEs. Start-Ups and SMEs 218 237 .
Rajan Gupta, Saibal K. Pal & Sunil K. Muttoo. 2020. Innovations in Cybersecurity Education. Innovations in Cybersecurity Education 181 212 .
Tongjuan Wang. (2019) The Information Security Risk Assessment Model Based on Improved Electre Method. The Information Security Risk Assessment Model Based on Improved Electre Method.
Tong juan Wang. (2019) The Information System Security Assessment Model Based on TOPSIS Method and Linguisitc Viarable. The Information System Security Assessment Model Based on TOPSIS Method and Linguisitc Viarable.
Björn Häckel, Florian Hänsch, Michael Hertel & Jochen Übelhör. (2018) Assessing IT availability risks in smart factory networks. Business Research 12:2, pages 523-558.
Crossref
Margareta Heidt, Jin P. Gerlach & Peter Buxmann. (2019) Investigating the Security Divide between SME and Large Companies: How SME Characteristics Influence Organizational IT Security Investments. Information Systems Frontiers 21:6, pages 1285-1305.
Crossref
Basma Moharram. 2019. Rutgers Studies in Accounting Analytics: Audit Analytics in the Financial Industry. Rutgers Studies in Accounting Analytics: Audit Analytics in the Financial Industry 111 144 .
Anhtuan Le, Yue Chen, Kok Keong Chai, Alexandr Vasenev & Lorena Montoya. (2018) Incorporating FAIR into Bayesian Network for Numerical Assessment of Loss Event Frequencies of Smart Grid Cyber Threats. Mobile Networks and Applications 24:5, pages 1713-1721.
Crossref
Huiyong Guo, Rong Zhou & Feng Zhang. (2019) Structural nonlinear damage detection using improved Dempster-Shafer theory and time domain model. Journal of Vibroengineering 21:6, pages 1679-1693.
Crossref
Jibiao Zhou, Xinhua Mao, Yiting Wang, Minjie Zhang & Sheng Dong. (2019) Risk Assessment in Urban Large-Scale Public Spaces Using Dempster-Shafer Theory: An Empirical Study in Ningbo, China. International Journal of Environmental Research and Public Health 16:16, pages 2942.
Crossref
Lu Xu, Yanhui Li & Jing Fu. (2019) Cybersecurity Investment Allocation for a Multi-Branch Firm: Modeling and Optimization. Mathematics 7:7, pages 587.
Crossref
Dinesh Verma, Elisa Bertino, Geeth de Mel & John Melrose. (2019) On the Impact of Generative Policies on Security Metrics. On the Impact of Generative Policies on Security Metrics.
Ali Sedaghatbaf & Mohammad Abdollahi Azgomi. (2018) Reliability evaluation of UML/DAM software architectures under parameter uncertainty. IET Software 12:3, pages 236-244.
Crossref
Lars Öbrand, Jonny Holmström & Mike Newman. (2018) Navigating Rumsfeld's quadrants: A performative perspective on IT risk management. Technology in Society 53, pages 1-8.
Crossref
Xiaotong Li, Hua Li, Bingzhen Sun & Fang Wang. (2018) Assessing information security risk for an evolving smart city based on fuzzy and grey FMEA. Journal of Intelligent & Fuzzy Systems 34:4, pages 2491-2501.
Crossref
Casey Inez Canfield & Baruch Fischhoff. (2017) Setting Priorities in Behavioral Interventions: An Application to Reducing Phishing Risk. Risk Analysis 38:4, pages 826-838.
Crossref
Richard Baskerville, Frantz Rowe & François-Charles Wolff. (2018) Integration of Information Systems and Cybersecurity Countermeasures. ACM SIGMIS Database: the DATABASE for Advances in Information Systems 49:1, pages 33-52.
Crossref
Jaya Bhattacharjee, Anirban Sengupta, Mridul Sankar Barik & Chandan Mazumdar. 2018. Global Business Expansion. Global Business Expansion 964 979 .
Jaya Bhattacharjee, Anirban Sengupta, Mridul Sankar Barik & Chandan Mazumdar. 2018. Information Technology Risk Management and Compliance in Modern Organizations. Information Technology Risk Management and Compliance in Modern Organizations 1 20 .
Serhii Yevseiev, Khazail Rzayev, Tamilla Mammadova, Firuz Samedov & Nataliia Romashchenko. (2018) CLASSIFICATION OF CYBER CRUISE OF INFORMATIONAL RESOURCES OF AUTOMATED BANKING SYSTEMS. Cybersecurity: Education, Science, Technique:2, pages 47-67.
Crossref
Bing Huang, Huaxiong Li, Guofu Feng & Yuliang Zhuang. (2017) Inclusion measure-based multi-granulation intuitionistic fuzzy decision-theoretic rough sets and their application to ISSA. Knowledge-Based Systems 138, pages 220-231.
Crossref
Deniz Appelbaum, Alexander Kogan & Miklos A. Vasarhelyi. (2017) Big Data and Analytics in the Modern Audit Engagement: Research Needs. AUDITING: A Journal of Practice & Theory 36:4, pages 1-27.
Crossref
Hou Qing, Xie Qingsheng & Li Shaobo. (2016) The model of information security risk assessment based on advanced evidence theory. International Journal of System Assurance Engineering and Management 8:S3, pages 2030-2035.
Crossref
Rajan Gupta, Sunil K. Muttoo & Saibal K. Pal. (2017) Proposed Framework for Information Systems Security for e-Governance in Developing Nations. Proposed Framework for Information Systems Security for e-Governance in Developing Nations.
Marcin Szpyrka & Bartosz Jasiul. (2017) Evaluation of Cyber Security and Modelling of Risk Propagation with Petri Nets. Symmetry 9:3, pages 32.
Crossref
Anhtuan Le, Yue Chen, Kok Keong Chai, Alexandr Vasenev & Lorena Montoya. 2017. Smart Grid Inspired Future Technologies. Smart Grid Inspired Future Technologies 43 51 .
Simon Miller, Christian Wagner, Uwe Aickelin & Jonathan M. Garibaldi. (2016) Modelling cyber-security experts' decision making processes using aggregation operators. Computers & Security 62, pages 229-245.
Crossref
Piotr Szwed, Pawel Skrzynski & Wojciech Chmiel. (2014) Risk assessment for a video surveillance system based on Fuzzy Cognitive Maps. Multimedia Tools and Applications 75:17, pages 10667-10690.
Crossref
Jonathan Ross. (2016) The Information Content of Accounting Reports: An Information Theory Perspective. Information 7:3, pages 48.
Crossref
Kevin A. Barton, Gurvirender Tejay, Michael Lane & Steve Terrell. (2016) Information system security commitment: A study of external influences on senior management. Computers & Security 59, pages 9-25.
Crossref
Alireza Shameli-Sendi, Rouzbeh Aghababaei-Barzegar & Mohamed Cheriet. (2016) Taxonomy of information security risk assessment (ISRA). Computers & Security 57, pages 14-30.
Crossref
Ana Paula Henriques de Gusmão, Lúcio Camara e Silva, Maisa Mendonça Silva, Thiago Poleto & Ana Paula Cabral Seixas Costa. (2016) Information security risk analysis model using fuzzy decision theory. International Journal of Information Management 36:1, pages 25-34.
Crossref
Liguo Fei, Yong Hu, Fuyuan Xiao, Luyuan Chen & Yong Deng. (2016) A Modified TOPSIS Method Based on Numbers and Its Applications in Human Resources Selection . Mathematical Problems in Engineering 2016, pages 1-14.
Crossref
Mario Silic & Andrea Back. (2016) The Influence of Risk Factors in Decision-Making Process for Open Source Software Adoption. International Journal of Information Technology & Decision Making 15:01, pages 151-185.
Crossref
Andrew Blyth. 2016. Human Aspects of Information Security, Privacy, and Trust. Human Aspects of Information Security, Privacy, and Trust 114 127 .
Catrinel Turcanu, Lusine Mkrtchyan, Ahmed Nagy & Pierre Faure. (2015) Can belief structures improve our understanding of safety climate survey data?. International Journal of Approximate Reasoning 66, pages 103-118.
Crossref
Rakesh Kumar & Hardeep Singh. (2015) A Proactive Procedure to Mitigate the BYOD Risks on the Security of an Information System. ACM SIGSOFT Software Engineering Notes 40:1, pages 1-4.
Crossref
Cross Gombiro, Mmaki Jantjies & Nehemiah Mavetera. (2015) A conceptual framework for detecting financial crime in mobile money transactions. Journal of Governance and Regulation 4:4, pages 727-734.
Crossref
Waldo Rocha Flores, Egil Antonsen & Mathias Ekstedt. (2014) Information security knowledge sharing in organizations: Investigating the effect of behavioral information security governance and national culture. Computers & Security 43, pages 90-110.
Crossref
K.V.D. Kiran, L.S.S. Reddy, Velagapudi Pavan Kumar & Kalluri Krishna Sai Dheeraj. (2014) Information security Risk Management in Critical informative Systems. Information security Risk Management in Critical informative Systems.
Nan Feng & Chundong Zheng. (2014) A Cooperative Model for IS Security Risk Management in Distributed Environment. The Scientific World Journal 2014, pages 1-6.
Crossref
Nan Feng, Harry Jiannan Wang & Minqiang Li. (2014) A security risk analysis model for information systems: Causal relationships of risk factors and vulnerability propagation analysis. Information Sciences 256, pages 57-73.
Crossref
Włodzimierz Filipowicz. 2014. Belief Functions: Theory and Applications. Belief Functions: Theory and Applications 199 208 .
Sung Jin Park, Oladele A Ogunseitan & Raul P Lejano. (2014) Dempster-Shafer theory applied to regulatory decision process for selecting safer alternatives to toxic chemicals in consumer products. Integrated Environmental Assessment and Management 10:1, pages 12-21.
Crossref
Sojung Kim, Chulmo Koo & Chang E. Koh. (2013) IS Audit Framework Development through e-Gov's RFID/USN Project in South Korea. Journal of the Korea society of IT services 12:4, pages 219-234.
Crossref
Rajendra P. Srivastava, Sunita S. Rao & Theodore J. Mock. (2013) Planning and Evaluation of Assurance Services for Sustainability Reporting: An Evidential Reasoning Approach. Journal of Information Systems 27:2, pages 107-126.
Crossref
Rakesh Kumar & Hardeep Singh. (2013) A qualitative analysis of effects of security risks on architecture of an information system. ACM SIGSOFT Software Engineering Notes 38:6, pages 1-3.
Crossref
Chang Lun Zhang & Chao Li. (2013) Information Security Risk Assessment on Complex Information System. Advanced Materials Research 765-767, pages 1481-1485.
Crossref
Konstantinia Charitoudi & Andrew Blyth. (2013) An Agent-Based Socio-technical Approach to Impact Assessment for Cyber Defense. An Agent-Based Socio-technical Approach to Impact Assessment for Cyber Defense.
Konstantinia Charitoudi & Andrew Blyth. (2013) A Socio-Technical Approach to Cyber Risk Management and Impact Assessment. Journal of Information Security 04:01, pages 33-41.
Crossref
Piotr Szwed, Pawel Skrzynski & Pawel Grodniewicz. 2013. Multimedia Communications, Services and Security. Multimedia Communications, Services and Security 233 247 .
Nan Feng & Xue Yu. (2012) A Data-driven Assessment Model for Information Systems Security Risk Management. Journal of Computers 7:12.
Crossref
Nan Feng, Jing Xie & Peng Chang. (2012) An Intelligent System to Assessing Information Systems Security Risks in Electronic Business. An Intelligent System to Assessing Information Systems Security Risks in Electronic Business.
Ladislav Beránek. (2012) Using the evidential reasoning approach in auditing of an information security management system. Acta Universitatis Bohemiae Meridionalis 13:3, pages 89-95.
Crossref
Marco Spruit & Wouter de Bruijn. (2012) CITS. International Journal of Information Security and Privacy 6:4, pages 94-116.
Crossref
Benedikt Martens & Frank Teuteberg. (2011) Decision-making in cloud computing environments: A cost and risk based approach. Information Systems Frontiers 14:4, pages 871-893.
Crossref
Christopher W. Zobel & Lara Khansa. (2012) Quantifying Cyberinfrastructure Resilience against Multi‐Event Attacks. Decision Sciences 43:4, pages 687-710.
Crossref
Ziming Zhao, Hongxin Hu, Gail-Joon Ahn & Ruoyu Wu. (2012) Risk-Aware Mitigation for MANET Routing Attacks. IEEE Transactions on Dependable and Secure Computing 9:2, pages 250-260.
Crossref
Nan Feng & Jing Xie. (2012) A Hybrid Approach of Evidence Theory and Rough Sets for ISS Risk Assessment. Journal of Networks 7:2.
Crossref
Hironori Fukukawa & Theodore J. Mock. (2012) Auditors’ evidence evaluation and aggregation using beliefs and probabilities. International Journal of Approximate Reasoning 53:2, pages 190-199.
Crossref
Ruba Aljafari & Surendra Sarnikar. 2012. Knowledge Management and Drivers of Innovation in Services Industries. Knowledge Management and Drivers of Innovation in Services Industries 149 164 .
Kimberley Dunkerley & Gurvirender Tejay. 2012. Measuring Organizational Information Systems Success. Measuring Organizational Information Systems Success 341 366 .
Yong Qi, Yan Wang & Qianmu Li. 2012. Instrumentation, Measurement, Circuits and Systems. Instrumentation, Measurement, Circuits and Systems 191 204 .
Yong Deng, Rehan Sadiq, Wen Jiang & Solomon Tesfamariam. (2011) Risk analysis in a linguistic environment: A fuzzy evidential reasoning-based approach. Expert Systems with Applications 38:12, pages 15438-15446.
Crossref
Rajendra P. Srivastava, Theodore J. Mock & Lei Gao. (2011) The Dempster-Shafer Theory: An Introduction and Fraud Risk Assessment Illustration. Australian Accounting Review 21:3, pages 282-291.
Crossref
Yong Deng, Felix T.S. Chan, Ying Wu & Dong Wang. (2011) A new linguistic MCDM method based on multiple-criterion data fusion. Expert Systems with Applications 38:6, pages 6985-6993.
Crossref
Rajendra P. Srivastava. (2011) An introduction to evidential reasoning for decision making under uncertainty: Bayesian and belief function perspectives. International Journal of Accounting Information Systems 12:2, pages 126-135.
Crossref
Stefan Fenz & Andreas Ekelhart. (2011) Verification, Validation, and Evaluation in Information Security Risk Management. IEEE Security & Privacy Magazine 9:2, pages 58-65.
Crossref
Lei Gao, T J Mock & R P Srivastava. (2011) An Evidential Reasoning Approach to Fraud Risk Assessment under Dempster-Shafer Theory: A General Framework. An Evidential Reasoning Approach to Fraud Risk Assessment under Dempster-Shafer Theory: A General Framework.
Kimberley D Dunkerley & Gurvirender Tejay. (2011) A Confirmatory Analysis of Information Systems Security Success Factors. A Confirmatory Analysis of Information Systems Security Success Factors.
Ziming Zhao, Hongxin Hu, Gail-Joon Ahn & Ruoyu Wu. (2010) Risk-Aware Response for Mitigating MANET Routing Attacks. Risk-Aware Response for Mitigating MANET Routing Attacks.
Omar F. El-Gayar & Brian D. Fritz. (2010) A web-based multi-perspective decision support system for information security planning. Decision Support Systems 50:1, pages 43-54.
Crossref
Jin Shi, Guangwei Hu, Mingxin Lu & Li Xie. (2010) Intrusion Alerts Correlation Based Assessment of Network Security. Intrusion Alerts Correlation Based Assessment of Network Security.
VIKRAM DESAI, ROBIN W. ROBERTS & RAJENDRA SRIVASTAVA. (2010) An Analytical Model for External Auditor Evaluation of the Internal Audit Function Using Belief Functions*. Contemporary Accounting Research 27:2, pages 537-575.
Crossref
Philipp Limbourg & Etienne de Rocquigny. (2010) Uncertainty analysis using evidence theory – confronting level-1 and level-2 approaches with data availability and computational constraints. Reliability Engineering & System Safety 95:5, pages 550-564.
Crossref
C. Ryu, R. Sharman, H.R. Rao & S. Upadhyaya. (2010) Security protection design for deception and real system regimes: A model and analysis. European Journal of Operational Research 201:2, pages 545-556.
Crossref
Rajendra P. Srivastava, Theodore J. Mock & Jerry L. Turner. (2009) Bayesian and Belief-Functions Formulas for Auditor Independence Risk Assessment. International Journal of Auditing 13:3, pages 163-183.
Crossref
Nan Feng, Jing Xie & Deying Fang. (2009) A Probabilistic Estimation Model for Information Systems Security Risk Analysis. A Probabilistic Estimation Model for Information Systems Security Risk Analysis.
Yi Zhuang, Xiaorong Li, Bin Xu & Bo Zhou. (2009) Information Security Risk Assessment Based on Artificial Immune Danger Theory. Information Security Risk Assessment Based on Artificial Immune Danger Theory.
Cheng-Yuan Ku, Yi-Wen Chang & David C. Yen. (2009) National information security policy and its implementation: A case study in Taiwan. Telecommunications Policy 33:7, pages 371-384.
Crossref
Theodore J. Mock, Lili Sun, Rajendra P. Srivastava & Miklos Vasarhelyi. (2009) An evidential reasoning approach to Sarbanes-Oxley mandated internal control risk assessment. International Journal of Accounting Information Systems 10:2, pages 65-78.
Crossref
Nan Feng, Minqiang Li & Hong Gao. (2009) A Software Project Risk Analysis Model Based on Evidential Reasoning Approach. A Software Project Risk Analysis Model Based on Evidential Reasoning Approach.
Rajendra P. Srivastava, Lei Gao & Peter R. Gillett. (2009) Representation of interrelationships among binary variables under dempster-shafer theory of belief functions. International Journal of Intelligent Systems 24:4, pages 459-475.
Crossref
RAJENDRA P. SRIVASTAVA, THEODORE J. MOCK & JERRY L. TURNER. (2009) Bayesian Fraud Risk Formula for Financial Statement Audits. Abacus 45:1, pages 66-87.
Crossref
Cokky Hilhorst, Piet Ribbers, Eric van Heck & Martin Smits. (2008) Using Dempster–Shafer theory and real options theory to assess competing strategies for implementing IT infrastructures: A case study. Decision Support Systems 46:1, pages 344-355.
Crossref
Rajendra P. Srivastava & Stewart Jones. 2010. Advances in Credit Risk Modelling and Corporate Bankruptcy Prediction. Advances in Credit Risk Modelling and Corporate Bankruptcy Prediction 269 294 .
Amitava Dutta & Rahul Roy. (2008) Dynamics of organizational information security. System Dynamics Review 24:3, pages 349-375.
Crossref
Carol E. Brown, Jeffrey A. Wong & Amelia A. Baldwin. (2007) A Review and Analysis of the Existing Research Streams in Continuous Auditing. Journal of Emerging Technologies in Accounting 4:1, pages 1-28.
Crossref
Stanley Chow, Christophe Gustave, Brad McFarlane, Douglas Wiemer & Jean-marc Robert. (2006) Situation Monitoring and Analysis of Security Risk for Networked Services. Situation Monitoring and Analysis of Security Risk for Networked Services.
Wilson LI, Alvin Leung & Wei Thoo Yue. (2020) Where is IT in Information Security? The Interrelationship between IT Investment, Security Awareness, and Data Breaches. SSRN Electronic Journal.
Crossref
Simon Miller, Christian Wagner & Uwe Aickelin. (2016) Modelling Cyber-Security Expertss Decision Making Processes Using Aggregation Operators. SSRN Electronic Journal.
Crossref
Jan G Devos, Adrian Munteanu & Doina Fotache. (2015) How Much Matter Probabilities in Information Security Quantitative Risk Assessment?. SSRN Electronic Journal.
Crossref
Clay Posey, Tom Roberts, Paul Benjamin Lowry & Ross Hightower. (2014) Bridging the Divide: A Qualitative Comparison of Information Security Thought Patterns between Information Security Professionals and Ordinary Organizational Insiders. SSRN Electronic Journal.
Crossref
Vikram Desai, Rajendra Prasad Srivastava & Robin W. Roberts. (2022) A Conceptual Model for External Auditor Evaluation of the Internal Audit Fuction Using Belief Fuctions. SSRN Electronic Journal.
Crossref
Laura-Diana Genete. (2008) Modelling Accounting Risk in Audit with Belief Function. SSRN Electronic Journal.
Crossref

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.