{"id":"https://openalex.org/W110993677","doi":"https://doi.org/10.1080/07421222.1991.11517914","title":"Risk Analysis for Information Technology","display_name":"Risk Analysis for Information Technology","publication_year":1991,"publication_date":"1991-06-01","ids":{"openalex":"https://openalex.org/W110993677","doi":"https://doi.org/10.1080/07421222.1991.11517914","mag":"110993677"},"language":"en","primary_location":{"id":"doi:10.1080/07421222.1991.11517914","is_oa":false,"landing_page_url":"https://doi.org/10.1080/07421222.1991.11517914","pdf_url":null,"source":{"id":"https://openalex.org/S9954729","display_name":"Journal of Management Information Systems","issn_l":"0742-1222","issn":["0742-1222","1557-928X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320547","host_organization_name":"Taylor & Francis","host_organization_lineage":["https://openalex.org/P4310320547"],"host_organization_lineage_names":["Taylor & Francis"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Management Information Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5110885212","display_name":"R. Kelly Rainer","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Rex Kelly Rainer","raw_affiliation_strings":["View further author information"],"affiliations":[{"raw_affiliation_string":"View further author information","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5111435459","display_name":"Charles A. Snyder","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Charles A. Snyder","raw_affiliation_strings":["View further author information"],"affiliations":[{"raw_affiliation_string":"View further author information","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5073808356","display_name":"Houston H. Carr","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Houston H. Carr","raw_affiliation_strings":["View further author information"],"affiliations":[{"raw_affiliation_string":"View further author information","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5110885212"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":2.4506,"has_fulltext":false,"cited_by_count":181,"citation_normalized_percentile":{"value":0.88744927,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":100},"biblio":{"volume":"8","issue":"1","first_page":"129","last_page":"147"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9781000018119812,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9781000018119812,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11572","display_name":"Information Technology Governance and Strategy","score":0.9682000279426575,"subfield":{"id":"https://openalex.org/subfields/1404","display_name":"Management Information Systems"},"field":{"id":"https://openalex.org/fields/14","display_name":"Business, Management and Accounting"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11891","display_name":"Big Data and Business Intelligence","score":0.9559000134468079,"subfield":{"id":"https://openalex.org/subfields/1404","display_name":"Management Information Systems"},"field":{"id":"https://openalex.org/fields/14","display_name":"Business, Management and Accounting"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/risk-management-information-systems","display_name":"Risk management information systems","score":0.6324502229690552},{"id":"https://openalex.org/keywords/risk-management","display_name":"Risk management","score":0.6052365899085999},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5968331694602966},{"id":"https://openalex.org/keywords/information-system","display_name":"Information system","score":0.5774490237236023},{"id":"https://openalex.org/keywords/management-information-systems","display_name":"Management information systems","score":0.5621203780174255},{"id":"https://openalex.org/keywords/information-management","display_name":"Information management","score":0.5153855085372925},{"id":"https://openalex.org/keywords/information-technology","display_name":"Information technology","score":0.49735644459724426},{"id":"https://openalex.org/keywords/executive-information-system","display_name":"Executive information system","score":0.48896682262420654},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.48571261763572693},{"id":"https://openalex.org/keywords/publicity","display_name":"Publicity","score":0.4825662672519684},{"id":"https://openalex.org/keywords/it-risk","display_name":"IT risk","score":0.46418991684913635},{"id":"https://openalex.org/keywords/personal-information-management","display_name":"Personal information management","score":0.45764511823654175},{"id":"https://openalex.org/keywords/knowledge-management","display_name":"Knowledge management","score":0.4492347836494446},{"id":"https://openalex.org/keywords/information-technology-management","display_name":"Information technology management","score":0.43198850750923157},{"id":"https://openalex.org/keywords/it-risk-management","display_name":"IT risk management","score":0.39813607931137085},{"id":"https://openalex.org/keywords/risk-analysis","display_name":"Risk analysis (engineering)","score":0.3739714026451111},{"id":"https://openalex.org/keywords/process-management","display_name":"Process management","score":0.36273375153541565},{"id":"https://openalex.org/keywords/risk-assessment","display_name":"Risk assessment","score":0.24360552430152893},{"id":"https://openalex.org/keywords/management","display_name":"Management","score":0.18777036666870117},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.17916545271873474},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.16856804490089417},{"id":"https://openalex.org/keywords/marketing","display_name":"Marketing","score":0.11874502897262573},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.10330930352210999}],"concepts":[{"id":"https://openalex.org/C81146079","wikidata":"https://www.wikidata.org/wiki/Q7336283","display_name":"Risk management information systems","level":4,"score":0.6324502229690552},{"id":"https://openalex.org/C32896092","wikidata":"https://www.wikidata.org/wiki/Q189447","display_name":"Risk management","level":2,"score":0.6052365899085999},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5968331694602966},{"id":"https://openalex.org/C180198813","wikidata":"https://www.wikidata.org/wiki/Q121182","display_name":"Information system","level":2,"score":0.5774490237236023},{"id":"https://openalex.org/C29848774","wikidata":"https://www.wikidata.org/wiki/Q61905","display_name":"Management information systems","level":3,"score":0.5621203780174255},{"id":"https://openalex.org/C128487930","wikidata":"https://www.wikidata.org/wiki/Q579488","display_name":"Information management","level":2,"score":0.5153855085372925},{"id":"https://openalex.org/C121017731","wikidata":"https://www.wikidata.org/wiki/Q11661","display_name":"Information technology","level":2,"score":0.49735644459724426},{"id":"https://openalex.org/C204304583","wikidata":"https://www.wikidata.org/wiki/Q950847","display_name":"Executive information system","level":4,"score":0.48896682262420654},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.48571261763572693},{"id":"https://openalex.org/C2776003135","wikidata":"https://www.wikidata.org/wiki/Q1333727","display_name":"Publicity","level":2,"score":0.4825662672519684},{"id":"https://openalex.org/C186870795","wikidata":"https://www.wikidata.org/wiki/Q1114582","display_name":"IT risk","level":4,"score":0.46418991684913635},{"id":"https://openalex.org/C194695470","wikidata":"https://www.wikidata.org/wiki/Q1081067","display_name":"Personal information management","level":4,"score":0.45764511823654175},{"id":"https://openalex.org/C56739046","wikidata":"https://www.wikidata.org/wiki/Q192060","display_name":"Knowledge management","level":1,"score":0.4492347836494446},{"id":"https://openalex.org/C134503902","wikidata":"https://www.wikidata.org/wiki/Q1473265","display_name":"Information technology management","level":4,"score":0.43198850750923157},{"id":"https://openalex.org/C95609273","wikidata":"https://www.wikidata.org/wiki/Q5975208","display_name":"IT risk management","level":3,"score":0.39813607931137085},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.3739714026451111},{"id":"https://openalex.org/C195094911","wikidata":"https://www.wikidata.org/wiki/Q14167904","display_name":"Process management","level":1,"score":0.36273375153541565},{"id":"https://openalex.org/C12174686","wikidata":"https://www.wikidata.org/wiki/Q1058438","display_name":"Risk assessment","level":2,"score":0.24360552430152893},{"id":"https://openalex.org/C187736073","wikidata":"https://www.wikidata.org/wiki/Q2920921","display_name":"Management","level":1,"score":0.18777036666870117},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.17916545271873474},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.16856804490089417},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.11874502897262573},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.10330930352210999},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1080/07421222.1991.11517914","is_oa":false,"landing_page_url":"https://doi.org/10.1080/07421222.1991.11517914","pdf_url":null,"source":{"id":"https://openalex.org/S9954729","display_name":"Journal of Management Information Systems","issn_l":"0742-1222","issn":["0742-1222","1557-928X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320547","host_organization_name":"Taylor & Francis","host_organization_lineage":["https://openalex.org/P4310320547"],"host_organization_lineage_names":["Taylor & Francis"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Management Information Systems","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.4000000059604645,"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":29,"referenced_works":["https://openalex.org/W220236684","https://openalex.org/W568968952","https://openalex.org/W607764481","https://openalex.org/W608818553","https://openalex.org/W1487557448","https://openalex.org/W1506418277","https://openalex.org/W1529826932","https://openalex.org/W1597988828","https://openalex.org/W1606488878","https://openalex.org/W1607035048","https://openalex.org/W1839016339","https://openalex.org/W1972045639","https://openalex.org/W1976120869","https://openalex.org/W1988608094","https://openalex.org/W2024833124","https://openalex.org/W2038927365","https://openalex.org/W2047244659","https://openalex.org/W2048416997","https://openalex.org/W2050890450","https://openalex.org/W2080214813","https://openalex.org/W2120958963","https://openalex.org/W2295330134","https://openalex.org/W2408313904","https://openalex.org/W2476144352","https://openalex.org/W2983555020","https://openalex.org/W2991828305","https://openalex.org/W3146964863","https://openalex.org/W3194497587","https://openalex.org/W4297081765"],"related_works":["https://openalex.org/W2048700937","https://openalex.org/W585851556","https://openalex.org/W2506726842","https://openalex.org/W2025878111","https://openalex.org/W2383278399","https://openalex.org/W2500382136","https://openalex.org/W2921169574","https://openalex.org/W2010475073","https://openalex.org/W2898377102","https://openalex.org/W1483496421"],"abstract_inverted_index":{"Abstract:As":[0],"Information":[1,198,242,244,290,295],"Technology":[2],"(IT)":[3],"has":[4,41,191,235,284],"become":[5],"increasingly":[6],"important":[7],"to":[8,19,50,56],"the":[9,45,51,168,194,215,238,247,303],"competitive":[10],"position":[11],"of":[12,34,47,89,102,116,170,196,214,217,240,249,264,268,288,305],"firms,":[13],"managers":[14,62,80,111,125],"have":[15],"grown":[16],"more":[17],"sensitive":[18],"their":[20,37,117,142],"organization's":[21,118],"overall":[22,119],"IT":[23],"risk":[24,69,73,95,122,137,144,152],"management.":[25,233,282],"Recent":[26],"pUblicity":[27],"concerning":[28],"losses":[29],"incurred":[30],"by":[31],"companies":[32],"because":[33],"problems":[35],"with":[36,112],"sophisticated":[38],"information":[39,120,180,188,226],"systems":[40,49],"focused":[42],"attention":[43],"on":[44,157],"importance":[46],"these":[48,79],"organization.":[52],"In":[53],"an":[54],"attempt":[55],"minimize":[57],"or":[58],"avoid":[59],"such":[60],"losses,":[61],"are":[63],"employing":[64],"various":[65],"qualitative":[66,103],"and":[67,104,148,184,200,212,231,245,266,280,294,296],"quantitative":[68,105],"analysis":[70,74,96,138,145],"methodologies.":[71,90,106],"The":[72],"literature,":[75],"however,":[76],"suggests":[77],"that":[78,98],"typically":[81],"utilize":[82],"a":[83,87,94,100,113,132],"single":[84],"methodology,":[85],"not":[86],"combination":[88,101],"This":[91,107],"paper":[92],"proposes":[93],"process":[97,108,130],"employs":[99],"should":[109],"provide":[110],"better":[114],"approximation":[115],"technology":[121,186],"posture.":[123],"Practicing":[124],"can":[126],"use":[127],"this":[128],"proposed":[129],"as":[131,252,254],"guideline":[133],"in":[134,167,193,237,286],"formulating":[135],"new":[136],"procedures":[139],"and/or":[140],"evaluating":[141],"current":[143,185],"procedures.Key":[146],"Words":[147],"Phrases:":[149],"computer":[150],"securityMIS":[151],"analysisrisk":[153],"management":[154],"Additional":[155],"informationNotes":[156],"contributorsRex":[158],"Kelly":[159,161],"RainerRex":[160],"Rainer,":[162],"Jr.,":[163],"is":[164,210,261,302],"Assistant":[165],"Professor":[166,211,263],"Department":[169,216],"Management":[171,197,218,241,250,265,289],"at":[172,219,271],"Auburn":[173,220,272],"University.":[174,221,273],"His":[175,222,274],"research":[176,223,275],"interests":[177,224,276],"include":[178,225,277],"executive":[179],"systems,":[181],"end-user":[182,229,278],"computing,":[183,230],"underlying":[187],"systems.":[189],"He":[190,234,283,301],"published":[192,236,285],"Journal":[195,239,287],"Systems,":[199,243,291],"MIS":[201,269,292],"Quarterly,":[202,293],"among":[203,298],"other":[204,255,299],"journals.Charles":[205],"A.":[206,208],"SnyderCharles":[207],"Snyder":[209],"head":[213],"resource":[227],"management,":[228],"telecommunications":[232,281],"Management,":[246,297],"Academy":[248],"Review,":[251],"well":[253],"journals.Houston":[256],"H.":[257,259],"CarrHouston":[258],"Carr":[260],"Associate":[262],"Coordinator":[267],"Programs":[270],"computing":[279],"journals.":[300],"author":[304],"Managing":[306],"End":[307],"User":[308],"Computing.":[309]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":7},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":4},{"year":2020,"cited_by_count":7},{"year":2019,"cited_by_count":6},{"year":2018,"cited_by_count":7},{"year":2017,"cited_by_count":6},{"year":2016,"cited_by_count":8},{"year":2015,"cited_by_count":7},{"year":2014,"cited_by_count":7},{"year":2013,"cited_by_count":16},{"year":2012,"cited_by_count":16}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
