2015
DOI: 10.14736/kyb-2015-3-0408
|View full text |Cite
|
Sign up to set email alerts
|

IT/IS security management with uncertain information

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
3
0

Year Published

2016
2016
2017
2017

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 5 publications
0
3
0
Order By: Relevance
“…In fact, a number of researchers have identified qualitative and quantitative approaches of IS risk analysis. The reliability of qualitative methods is based on the subjective assessments of experts during the evaluation process (Klimeš and Bartoš, 2015, Walek, 2013, Walek et al, 2013). The quantitative methods are mainly based on mathematical models and can be divided into: i) deterministic methods, ii) probabilistic methods, iii) methods using analogies, and iv) multi-criteria evaluation methods (EIC/ISO).…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…In fact, a number of researchers have identified qualitative and quantitative approaches of IS risk analysis. The reliability of qualitative methods is based on the subjective assessments of experts during the evaluation process (Klimeš and Bartoš, 2015, Walek, 2013, Walek et al, 2013). The quantitative methods are mainly based on mathematical models and can be divided into: i) deterministic methods, ii) probabilistic methods, iii) methods using analogies, and iv) multi-criteria evaluation methods (EIC/ISO).…”
Section: Introductionmentioning
confidence: 99%
“…As to the multi-criteria evaluation methods, Delphi method is often used to evaluate risk factors (Briš, 2009, Procházková, 2011b). However and in order to overcome the drawbacks of available risk analysis approaches, Klimeš and Bartoš (2015) suggested fuzzy approach to decision making process based on six sub processes and including several IF-THEN-rule knowledge bases.…”
Section: Introductionmentioning
confidence: 99%
“…Structure, as showed in Fig. 1 was based on needs to optimize the controlling procedures based on external, so called limited conditions, and concept targets of the top management as well [1,2,3]. Current state of manufacturing process is indicated by means of a monitoring system.…”
Section: Introductionmentioning
confidence: 99%