|
|
|
|
LEADER |
01000caa a22002652 4500 |
001 |
JST04975209X |
003 |
DE-627 |
005 |
20240621171211.0 |
007 |
cr uuu---uuuuu |
008 |
150324s2006 xx |||||o 00| ||eng c |
035 |
|
|
|a (DE-627)JST04975209X
|
035 |
|
|
|a (JST)40398815
|
040 |
|
|
|a DE-627
|b ger
|c DE-627
|e rakwb
|
041 |
|
|
|a eng
|
100 |
1 |
|
|a Sun, Lili
|e verfasserin
|4 aut
|
245 |
1 |
3 |
|a An Information Systems Security Risk Assessment Model under the Dempster-Shafer Theory of Belief Functions
|
264 |
|
1 |
|c 2006
|
336 |
|
|
|a Text
|b txt
|2 rdacontent
|
337 |
|
|
|a Computermedien
|b c
|2 rdamedia
|
338 |
|
|
|a Online-Ressource
|b cr
|2 rdacarrier
|
520 |
|
|
|a This study develops an alternative methodology for the risk analysis of information systems security (ISS), an evidential reasoning approach under the Dempster-Shafer theory of belief functions. The approach has the following important dimensions. First, the evidential reasoning approach provides a rigorous, structured manner to incorporate relevant ISS risk factors, related countermeasures, and their interrelationships when estimating ISS risk. Second, the methodology employs the belief function definition of risk— that is, ISS risk is the plausibility of ISS failures. The proposed approach has other appealing features, such as facilitating costbenefit analyses to help promote efficient ISS risk management. The paper elaborates the theoretical concepts and provides operational guidance for implementing the method. The method is illustrated using a hypothetical example from the perspective of management and a real-world example from the perspective of external assurance providers. Sensitivity analyses are performed to evaluate the impact of important parameters on the model's results.
|
540 |
|
|
|a Copyright 2006 M. E. Sharpe, Inc.
|
650 |
|
4 |
|a belief function theory
|
650 |
|
4 |
|a cost-benefit analysis
|
650 |
|
4 |
|a evidential reasoning
|
650 |
|
4 |
|a information systems security
|
650 |
|
4 |
|a risk analysis
|
650 |
|
4 |
|a sensitivity analysis
|
650 |
|
4 |
|a Economics
|x Economic disciplines
|x Financial economics
|x Finance
|x Financial analysis
|x Risk management
|x Risk analysis
|
650 |
|
4 |
|a Applied sciences
|x Computer science
|x Computer engineering
|x Computer software
|x Software applications
|x Information storage and retrieval systems
|
650 |
|
4 |
|a Business
|x Accountancy
|x Auditing
|x Business audits
|x Management audits
|
650 |
|
4 |
|a Mathematics
|x Applied mathematics
|x Mathematical modeling
|x Sensitivity analysis
|
650 |
|
4 |
|a Behavioral sciences
|x Psychology
|x Cognitive psychology
|x Cognitive processes
|x Thought processes
|x Reasoning
|
650 |
|
4 |
|a Applied sciences
|x Technology
|x Safety devices
|x Security systems
|
650 |
|
4 |
|a Information science
|x Information management
|x Data management
|x Data architecture
|x Data security
|
650 |
|
4 |
|a Applied sciences
|x Research methods
|x Modeling
|
650 |
|
4 |
|a Business
|x Accountancy
|x Auditing
|x Financial audits
|
650 |
|
4 |
|a Philosophy
|x Epistemology
|x Ambiguity
|
655 |
|
4 |
|a research-article
|
700 |
1 |
|
|a Srivastava, Rajendra P.
|e verfasserin
|4 aut
|
700 |
1 |
|
|a Mock, Theodore J.
|e verfasserin
|4 aut
|
773 |
0 |
8 |
|i Enthalten in
|t Journal of Management Information Systems
|d Taylor & Francis, Ltd.
|g 22(2006), 4, Seite 109-142
|w (DE-627)32495817X
|w (DE-600)2033010-8
|x 1557928X
|7 nnns
|
773 |
1 |
8 |
|g volume:22
|g year:2006
|g number:4
|g pages:109-142
|
856 |
4 |
0 |
|u https://www.jstor.org/stable/40398815
|3 Volltext
|
912 |
|
|
|a GBV_USEFLAG_A
|
912 |
|
|
|a SYSFLAG_A
|
912 |
|
|
|a GBV_JST
|
912 |
|
|
|a GBV_ILN_11
|
912 |
|
|
|a GBV_ILN_20
|
912 |
|
|
|a GBV_ILN_22
|
912 |
|
|
|a GBV_ILN_23
|
912 |
|
|
|a GBV_ILN_24
|
912 |
|
|
|a GBV_ILN_26
|
912 |
|
|
|a GBV_ILN_31
|
912 |
|
|
|a GBV_ILN_32
|
912 |
|
|
|a GBV_ILN_39
|
912 |
|
|
|a GBV_ILN_40
|
912 |
|
|
|a GBV_ILN_60
|
912 |
|
|
|a GBV_ILN_62
|
912 |
|
|
|a GBV_ILN_63
|
912 |
|
|
|a GBV_ILN_65
|
912 |
|
|
|a GBV_ILN_69
|
912 |
|
|
|a GBV_ILN_70
|
912 |
|
|
|a GBV_ILN_90
|
912 |
|
|
|a GBV_ILN_95
|
912 |
|
|
|a GBV_ILN_100
|
912 |
|
|
|a GBV_ILN_110
|
912 |
|
|
|a GBV_ILN_120
|
912 |
|
|
|a GBV_ILN_151
|
912 |
|
|
|a GBV_ILN_152
|
912 |
|
|
|a GBV_ILN_187
|
912 |
|
|
|a GBV_ILN_224
|
912 |
|
|
|a GBV_ILN_285
|
912 |
|
|
|a GBV_ILN_370
|
912 |
|
|
|a GBV_ILN_374
|
912 |
|
|
|a GBV_ILN_647
|
912 |
|
|
|a GBV_ILN_702
|
912 |
|
|
|a GBV_ILN_2001
|
912 |
|
|
|a GBV_ILN_2003
|
912 |
|
|
|a GBV_ILN_2005
|
912 |
|
|
|a GBV_ILN_2006
|
912 |
|
|
|a GBV_ILN_2007
|
912 |
|
|
|a GBV_ILN_2009
|
912 |
|
|
|a GBV_ILN_2010
|
912 |
|
|
|a GBV_ILN_2011
|
912 |
|
|
|a GBV_ILN_2014
|
912 |
|
|
|a GBV_ILN_2015
|
912 |
|
|
|a GBV_ILN_2018
|
912 |
|
|
|a GBV_ILN_2020
|
912 |
|
|
|a GBV_ILN_2021
|
912 |
|
|
|a GBV_ILN_2025
|
912 |
|
|
|a GBV_ILN_2026
|
912 |
|
|
|a GBV_ILN_2027
|
912 |
|
|
|a GBV_ILN_2034
|
912 |
|
|
|a GBV_ILN_2044
|
912 |
|
|
|a GBV_ILN_2048
|
912 |
|
|
|a GBV_ILN_2050
|
912 |
|
|
|a GBV_ILN_2055
|
912 |
|
|
|a GBV_ILN_2056
|
912 |
|
|
|a GBV_ILN_2057
|
912 |
|
|
|a GBV_ILN_2059
|
912 |
|
|
|a GBV_ILN_2061
|
912 |
|
|
|a GBV_ILN_2065
|
912 |
|
|
|a GBV_ILN_2068
|
912 |
|
|
|a GBV_ILN_2088
|
912 |
|
|
|a GBV_ILN_2093
|
912 |
|
|
|a GBV_ILN_2106
|
912 |
|
|
|a GBV_ILN_2107
|
912 |
|
|
|a GBV_ILN_2108
|
912 |
|
|
|a GBV_ILN_2111
|
912 |
|
|
|a GBV_ILN_2112
|
912 |
|
|
|a GBV_ILN_2113
|
912 |
|
|
|a GBV_ILN_2118
|
912 |
|
|
|a GBV_ILN_2119
|
912 |
|
|
|a GBV_ILN_2122
|
912 |
|
|
|a GBV_ILN_2129
|
912 |
|
|
|a GBV_ILN_2143
|
912 |
|
|
|a GBV_ILN_2147
|
912 |
|
|
|a GBV_ILN_2148
|
912 |
|
|
|a GBV_ILN_2152
|
912 |
|
|
|a GBV_ILN_2153
|
912 |
|
|
|a GBV_ILN_2190
|
912 |
|
|
|a GBV_ILN_2232
|
912 |
|
|
|a GBV_ILN_2336
|
912 |
|
|
|a GBV_ILN_2470
|
912 |
|
|
|a GBV_ILN_2472
|
912 |
|
|
|a GBV_ILN_2507
|
912 |
|
|
|a GBV_ILN_2548
|
912 |
|
|
|a GBV_ILN_2949
|
912 |
|
|
|a GBV_ILN_2950
|
912 |
|
|
|a GBV_ILN_4035
|
912 |
|
|
|a GBV_ILN_4037
|
912 |
|
|
|a GBV_ILN_4046
|
912 |
|
|
|a GBV_ILN_4112
|
912 |
|
|
|a GBV_ILN_4125
|
912 |
|
|
|a GBV_ILN_4126
|
912 |
|
|
|a GBV_ILN_4242
|
912 |
|
|
|a GBV_ILN_4246
|
912 |
|
|
|a GBV_ILN_4249
|
912 |
|
|
|a GBV_ILN_4251
|
912 |
|
|
|a GBV_ILN_4305
|
912 |
|
|
|a GBV_ILN_4306
|
912 |
|
|
|a GBV_ILN_4307
|
912 |
|
|
|a GBV_ILN_4313
|
912 |
|
|
|a GBV_ILN_4322
|
912 |
|
|
|a GBV_ILN_4323
|
912 |
|
|
|a GBV_ILN_4324
|
912 |
|
|
|a GBV_ILN_4325
|
912 |
|
|
|a GBV_ILN_4326
|
912 |
|
|
|a GBV_ILN_4335
|
912 |
|
|
|a GBV_ILN_4338
|
912 |
|
|
|a GBV_ILN_4346
|
912 |
|
|
|a GBV_ILN_4393
|
912 |
|
|
|a GBV_ILN_4700
|
951 |
|
|
|a AR
|
952 |
|
|
|d 22
|j 2006
|e 4
|h 109-142
|