{"id":"https://openalex.org/W2101802418","doi":"https://doi.org/10.1108/k-10-2013-0235","title":"A new information security risk analysis method based on membership degree","display_name":"A new information security risk analysis method based on membership degree","publication_year":2014,"publication_date":"2014-04-29","ids":{"openalex":"https://openalex.org/W2101802418","doi":"https://doi.org/10.1108/k-10-2013-0235","mag":"2101802418"},"language":"en","primary_location":{"id":"doi:10.1108/k-10-2013-0235","is_oa":false,"landing_page_url":"https://doi.org/10.1108/k-10-2013-0235","pdf_url":null,"source":{"id":"https://openalex.org/S168682784","display_name":"Kybernetes","issn_l":"0368-492X","issn":["0368-492X","1758-7883"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Kybernetes","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5039805473","display_name":"Jiqiang Chen","orcid":"https://orcid.org/0000-0001-9729-2713"},"institutions":[{"id":"https://openalex.org/I106079672","display_name":"Hebei University of Engineering","ror":"https://ror.org/036h65h05","country_code":"CN","type":"education","lineage":["https://openalex.org/I106079672"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jiqiang Chen","raw_affiliation_strings":["School of Science, Hebei University of Engineering, Handan, PR China","(School of Science, Hebei University of Engineering, Handan, PR China)"],"affiliations":[{"raw_affiliation_string":"School of Science, Hebei University of Engineering, Handan, PR China","institution_ids":["https://openalex.org/I106079672"]},{"raw_affiliation_string":"(School of Science, Hebei University of Engineering, Handan, PR China)","institution_ids":["https://openalex.org/I106079672"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5003799782","display_name":"Witold Pedrycz","orcid":"https://orcid.org/0000-0002-9335-9930"},"institutions":[{"id":"https://openalex.org/I185163786","display_name":"King Abdulaziz University","ror":"https://ror.org/02ma4wv74","country_code":"SA","type":"education","lineage":["https://openalex.org/I185163786"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Witold Pedrycz","raw_affiliation_strings":["Department of Electrical and Computer Engineering, University of Alberta, Edmonton, Canada; Department of Electrical and Computer Engineering, Faculty of Engineering, King Abdulaziz University, Jeddah, Saudi Arabia; and Systems Research Institute, Polish Academy of Sciences, Warsaw, Poland","King Abdulaziz University, Jeddah, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, University of Alberta, Edmonton, Canada; Department of Electrical and Computer Engineering, Faculty of Engineering, King Abdulaziz University, Jeddah, Saudi Arabia; and Systems Research Institute, Polish Academy of Sciences, Warsaw, Poland","institution_ids":["https://openalex.org/I185163786"]},{"raw_affiliation_string":"King Abdulaziz University, Jeddah, Saudi Arabia","institution_ids":["https://openalex.org/I185163786"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101767226","display_name":"Litao Ma","orcid":"https://orcid.org/0000-0002-1327-5228"},"institutions":[{"id":"https://openalex.org/I106079672","display_name":"Hebei University of Engineering","ror":"https://ror.org/036h65h05","country_code":"CN","type":"education","lineage":["https://openalex.org/I106079672"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Litao Ma","raw_affiliation_strings":["School of Science, Hebei University of Engineering, Handan, PR China","(School of Science, Hebei University of Engineering, Handan, PR China)"],"affiliations":[{"raw_affiliation_string":"School of Science, Hebei University of Engineering, Handan, PR China","institution_ids":["https://openalex.org/I106079672"]},{"raw_affiliation_string":"(School of Science, Hebei University of Engineering, Handan, PR China)","institution_ids":["https://openalex.org/I106079672"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100882220","display_name":"Chao Wang","orcid":null},"institutions":[{"id":"https://openalex.org/I106079672","display_name":"Hebei University of Engineering","ror":"https://ror.org/036h65h05","country_code":"CN","type":"education","lineage":["https://openalex.org/I106079672"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chao Wang","raw_affiliation_strings":["School of Economics and Management, Hebei University of Engineering, Handan, PR China","(School of Economics and Management, Hebei University of Engineering, Handan, PR China)"],"affiliations":[{"raw_affiliation_string":"School of Economics and Management, Hebei University of Engineering, Handan, PR China","institution_ids":["https://openalex.org/I106079672"]},{"raw_affiliation_string":"(School of Economics and Management, Hebei University of Engineering, Handan, PR China)","institution_ids":["https://openalex.org/I106079672"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5039805473"],"corresponding_institution_ids":["https://openalex.org/I106079672"],"apc_list":null,"apc_paid":null,"fwci":0.6896,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.75840947,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":"43","issue":"5","first_page":"686","last_page":"698"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9959999918937683,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9959999918937683,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9929999709129333,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13832","display_name":"Advanced Decision-Making Techniques","score":0.9840999841690063,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5667455196380615},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.5358622670173645},{"id":"https://openalex.org/keywords/fuzzy-logic","display_name":"Fuzzy logic","score":0.4726126492023468},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.44443479180336},{"id":"https://openalex.org/keywords/fuzzy-set","display_name":"Fuzzy set","score":0.4441494047641754},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.4236827492713928},{"id":"https://openalex.org/keywords/membership-function","display_name":"Membership function","score":0.41645383834838867},{"id":"https://openalex.org/keywords/transformation","display_name":"Transformation (genetics)","score":0.4109642803668976},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.23441433906555176},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.1189626157283783}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5667455196380615},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.5358622670173645},{"id":"https://openalex.org/C58166","wikidata":"https://www.wikidata.org/wiki/Q224821","display_name":"Fuzzy logic","level":2,"score":0.4726126492023468},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.44443479180336},{"id":"https://openalex.org/C42011625","wikidata":"https://www.wikidata.org/wiki/Q1055058","display_name":"Fuzzy set","level":3,"score":0.4441494047641754},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.4236827492713928},{"id":"https://openalex.org/C5263885","wikidata":"https://www.wikidata.org/wiki/Q1967302","display_name":"Membership function","level":4,"score":0.41645383834838867},{"id":"https://openalex.org/C204241405","wikidata":"https://www.wikidata.org/wiki/Q461499","display_name":"Transformation (genetics)","level":3,"score":0.4109642803668976},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.23441433906555176},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.1189626157283783},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1108/k-10-2013-0235","is_oa":false,"landing_page_url":"https://doi.org/10.1108/k-10-2013-0235","pdf_url":null,"source":{"id":"https://openalex.org/S168682784","display_name":"Kybernetes","issn_l":"0368-492X","issn":["0368-492X","1758-7883"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Kybernetes","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/10","score":0.7099999785423279,"display_name":"Reduced inequalities"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":23,"referenced_works":["https://openalex.org/W199602529","https://openalex.org/W416981147","https://openalex.org/W1986943942","https://openalex.org/W2002647750","https://openalex.org/W2005115103","https://openalex.org/W2012387497","https://openalex.org/W2016454755","https://openalex.org/W2029154761","https://openalex.org/W2045581128","https://openalex.org/W2048377286","https://openalex.org/W2050806697","https://openalex.org/W2053667650","https://openalex.org/W2054938238","https://openalex.org/W2055352223","https://openalex.org/W2063802480","https://openalex.org/W2070649170","https://openalex.org/W2075093277","https://openalex.org/W2111394600","https://openalex.org/W2166327763","https://openalex.org/W2322986547","https://openalex.org/W2359852126","https://openalex.org/W2364323875","https://openalex.org/W2383355466"],"related_works":["https://openalex.org/W87675884","https://openalex.org/W154406135","https://openalex.org/W2132859092","https://openalex.org/W2166637398","https://openalex.org/W2384503959","https://openalex.org/W2181335288","https://openalex.org/W2153785281","https://openalex.org/W2012019755","https://openalex.org/W2374152511","https://openalex.org/W2013143463"],"abstract_inverted_index":{"Purpose":[0],"\u2013":[1,66,145,188],"In":[2],"a":[3,24,27,44,68,96,108,185,192,257],"risk":[4,17,50,82,98,133,181,198,253],"analysis":[5,51,99,134,155,182,199,220,254],"system,":[6,25],"different":[7,12],"underlying":[8,116],"indices":[9,117],"often":[10],"play":[11],"roles":[13],"in":[14,23,86,237],"identifying":[15],"the":[16,20,36,62,77,111,115,119,123,136,141,150,165,173,201,207,216,230,245],"scale":[18],"of":[19,29,38,56,70,79,88,114,122,130,140,203,209],"total":[21,124],"target":[22],"so":[26],"concept":[28,69,208],"discriminatory":[30,39,71,102,210],"weight":[31,40,72],"is":[32,52,59,73,104,243],"introduced":[33],"first.":[34],"With":[35],"help":[37,78,202],"and":[41,138,206],"membership":[42,93,112,120,204],"functions,":[43],"new":[45,97,142,147,193,213],"method":[46,100,148,167,175,194,214,232,247],"for":[47,195],"information":[48,131,196,239],"security":[49,132,197,240],"proposed.":[53],"The":[54,146,153,212],"purpose":[55],"this":[57],"paper":[58,190],"to":[60,106,118,159,179,224,251],"discuss":[61],"above":[63],"issues.":[64],"Design/methodology/approach":[65],"First,":[67],"introduced.":[74],"Second,":[75],"with":[76,157,184,200,222,256],"fuzzy":[80,89],"sets,":[81],"scales":[83],"are":[84],"captured":[85],"terms":[87],"sets":[90],"(namely":[91],"their":[92],"functions).":[94],"Third,":[95],"involving":[101],"weights":[103],"proposed":[105,166,174,231,246],"realize":[107],"transformation":[109],"from":[110],"degrees":[113,121],"target.":[125],"At":[126],"last,":[127],"an":[128],"example":[129],"shows":[135],"effectiveness":[137],"feasibleness":[139],"method.":[143,152,218],"Findings":[144],"generalizes":[149,215],"weighted-average":[151,217],"comparative":[154],"done":[156,221],"respect":[158,223],"other":[160,180,225,252],"two":[161,226],"methods":[162,227],"show":[163,228],"that":[164,229],"exhibits":[168,233],"higher":[169,234],"classification":[170,235],"accuracy.":[171],"Therefore,":[172],"can":[176,248],"be":[177,249],"applied":[178,250],"system":[183,255],"hierarchial.":[186,258],"Originality/value":[187],"This":[189],"proposes":[191],"functions":[205],"weight.":[211],"Comparative":[219],"accuracy":[236],"E-government":[238],"system.":[241],"What":[242],"more,":[244]},"counts_by_year":[{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2018,"cited_by_count":2},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
