{"id":"https://openalex.org/W2036746255","doi":"https://doi.org/10.1108/09685229810225047","title":"Database gateway processor risk analysis using fuzzy logic","display_name":"Database gateway processor risk analysis using fuzzy logic","publication_year":1998,"publication_date":"1998-08-01","ids":{"openalex":"https://openalex.org/W2036746255","doi":"https://doi.org/10.1108/09685229810225047","mag":"2036746255"},"language":"en","primary_location":{"id":"doi:10.1108/09685229810225047","is_oa":false,"landing_page_url":"https://doi.org/10.1108/09685229810225047","pdf_url":null,"source":{"id":"https://openalex.org/S204075876","display_name":"Information Management & Computer Security","issn_l":"0968-5227","issn":["0968-5227","1758-5805"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Information Management &amp; Computer Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5011800239","display_name":"Donald R. Moscato","orcid":null},"institutions":[{"id":"https://openalex.org/I173466955","display_name":"Iona College","ror":"https://ror.org/00m79dm66","country_code":"US","type":"education","lineage":["https://openalex.org/I173466955"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Donald R. Moscato","raw_affiliation_strings":["Chair, Information and Decision Technology Management and Accounting, Hagan School of Business, Iona College, New Rochelle, New York, USA","(Chair, Information and Decision Technology Management and Accounting, Hagan School of Business, Iona College, New Rochelle, New York, USA)"],"affiliations":[{"raw_affiliation_string":"Chair, Information and Decision Technology Management and Accounting, Hagan School of Business, Iona College, New Rochelle, New York, USA","institution_ids":["https://openalex.org/I173466955"]},{"raw_affiliation_string":"(Chair, Information and Decision Technology Management and Accounting, Hagan School of Business, Iona College, New Rochelle, New York, USA)","institution_ids":["https://openalex.org/I173466955"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5011800239"],"corresponding_institution_ids":["https://openalex.org/I173466955"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.19631348,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"6","issue":"3","first_page":"138","last_page":"144"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.9695000052452087,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.9695000052452087,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.963699996471405,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9545999765396118,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7181007862091064},{"id":"https://openalex.org/keywords/gateway","display_name":"Gateway (web page)","score":0.6808147430419922},{"id":"https://openalex.org/keywords/fuzzy-logic","display_name":"Fuzzy logic","score":0.6143883466720581},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.6001656651496887},{"id":"https://openalex.org/keywords/risk-analysis","display_name":"Risk analysis (engineering)","score":0.5642741322517395},{"id":"https://openalex.org/keywords/asset","display_name":"Asset (computer security)","score":0.4739263653755188},{"id":"https://openalex.org/keywords/domain","display_name":"Domain (mathematical analysis)","score":0.4265534579753876},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.38185665011405945},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.20705434679985046},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.1775139570236206}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7181007862091064},{"id":"https://openalex.org/C2777710495","wikidata":"https://www.wikidata.org/wiki/Q5527195","display_name":"Gateway (web page)","level":2,"score":0.6808147430419922},{"id":"https://openalex.org/C58166","wikidata":"https://www.wikidata.org/wiki/Q224821","display_name":"Fuzzy logic","level":2,"score":0.6143883466720581},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.6001656651496887},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.5642741322517395},{"id":"https://openalex.org/C76178495","wikidata":"https://www.wikidata.org/wiki/Q4808784","display_name":"Asset (computer security)","level":2,"score":0.4739263653755188},{"id":"https://openalex.org/C36503486","wikidata":"https://www.wikidata.org/wiki/Q11235244","display_name":"Domain (mathematical analysis)","level":2,"score":0.4265534579753876},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.38185665011405945},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.20705434679985046},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.1775139570236206},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1108/09685229810225047","is_oa":false,"landing_page_url":"https://doi.org/10.1108/09685229810225047","pdf_url":null,"source":{"id":"https://openalex.org/S204075876","display_name":"Information Management & Computer Security","issn_l":"0968-5227","issn":["0968-5227","1758-5805"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Information Management &amp; Computer Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.7599999904632568,"id":"https://metadata.un.org/sdg/13","display_name":"Climate action"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":3,"referenced_works":["https://openalex.org/W1491073066","https://openalex.org/W1599790193","https://openalex.org/W4250216568"],"related_works":["https://openalex.org/W3123141149","https://openalex.org/W2369391311","https://openalex.org/W2910762661","https://openalex.org/W2373935109","https://openalex.org/W2751414885","https://openalex.org/W1606494531","https://openalex.org/W3025777772","https://openalex.org/W2144575440","https://openalex.org/W1517740925","https://openalex.org/W2384111838"],"abstract_inverted_index":{"Many":[0],"large":[1],"organizations":[2,32],"maintain":[3],"a":[4,42,59,85,128],"significant":[5],"amount":[6],"of":[7,58,67,108,124,135,145,148],"their":[8],"data":[9],"in":[10,55,76,139],"what":[11,37],"are":[12],"currently":[13],"referred":[14,39],"to":[15,21,26,35,40,51,73,83,89,97,131,152],"as":[16,41],"legacy":[17,29],"systems.":[18],"In":[19],"order":[20],"provide":[22,36],"end":[23],"users":[24],"access":[25],"the":[27,56,68,77,90,93,98,101,106,109,113,122,133,142,146],"firm\u2019s":[28],"applications":[30],"many":[31],"have":[33,72],"opted":[34],"is":[38],"database":[43,69],"gateway":[44,70],"system.":[45],"An":[46],"organization":[47],"must":[48],"be":[49,74],"able":[50],"calculate":[52],"its":[53],"exposure":[54],"event":[57],"disaster":[60],"occurring.":[61],"Performance,":[62],"recovery":[63],"and":[64,119],"monitoring":[65],"considerations":[66],"system":[71],"included":[75],"risk":[78,86,136,153],"analysis.":[79,154],"The":[80],"traditional":[81],"approach":[82],"performing":[84],"analysis":[87,130],"adheres":[88],"procedure:":[91],"identify":[92,100],"exposures":[94,110],"or":[95],"threats":[96],"system;":[99],"assets":[102],"at":[103],"risk;":[104],"determine":[105,132],"probability":[107],"happening;":[111],"compute":[112],"expected":[114],"loss":[115],"for":[116],"each":[117],"asset":[118],"threat;":[120],"consider":[121],"impact":[123],"existing":[125],"controls;":[126],"run":[127],"high/low":[129],"domain":[134],"exposure.":[137],"Explains,":[138],"non\u2010technical":[140],"terms,":[141],"basic":[143],"concepts":[144],"application":[147],"fuzzy":[149],"logic":[150],"modelling":[151]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
