{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,26]],"date-time":"2025-09-26T08:09:40Z","timestamp":1758874180621},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540283317"},{"type":"electronic","value":"9783540318286"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11540007_148","type":"book-chapter","created":{"date-parts":[[2011,1,12]],"date-time":"2011-01-12T22:26:32Z","timestamp":1294871192000},"page":"1142-1149","source":"Crossref","is-referenced-by-count":3,"title":["The Risk Identification and Assessment in E-Business Development"],"prefix":"10.1007","author":[{"given":"Lin","family":"Wang","sequence":"first","affiliation":[]},{"given":"Yurong","family":"Zeng","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"148_CR1","volume-title":"Frontiers of the electronic commerce","author":"R. Kalakota","year":"1996","unstructured":"Kalakota, R., Winston, A.B.: Frontiers of the electronic commerce. Addison-Wesley, Reading (1996)"},{"key":"148_CR2","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1016\/S0268-4012(02)00066-X","volume":"23","author":"T. Addison","year":"2003","unstructured":"Addison, T.: E-commerce project development risks: evidence from a Delphi survey. International Journal of Information Management\u00a023, 25\u201340 (2003)","journal-title":"International Journal of Information Management"},{"key":"148_CR3","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1016\/j.dss.2003.12.002","volume":"40","author":"E.W.T. Ngai","year":"2005","unstructured":"Ngai, E.W.T., Wat, T.K.T.: Fuzzy decision support system for risk analysis in e-commerce development. Decision Support System\u00a040, 235\u2013255 (2005)","journal-title":"Decision Support System"},{"key":"148_CR4","doi-asserted-by":"crossref","first-page":"129","DOI":"10.1080\/07421222.1991.11517914","volume":"8","author":"R.K.J.R. Rainer","year":"1994","unstructured":"Rainer, R.K.J.R., Snyder, C.A., Carr, H.H.: Risk analysis for information technology. Journal of Management Information Systems\u00a08, 129\u2013147 (1994)","journal-title":"Journal of Management Information Systems"},{"key":"148_CR5","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-56090-3","volume-title":"Managing e-business projects: 99 key success factors","author":"T. Stoehr","year":"2002","unstructured":"Stoehr, T.: Managing e-business projects: 99 key success factors. Springer, Hamburg (2002)"},{"key":"148_CR6","volume-title":"Electronic commerce: security, risk management and control","author":"M. Greenstein","year":"2000","unstructured":"Greenstein, M., Feinman, T.M.: Electronic commerce: security, risk management and control. China Machine Press, Beijing (2000)"},{"unstructured":"Mceachern, C.: Technology risks: don\u2019t panic- financial services firms seem to have cyber risk under control. Wall Street Technology (2001)","key":"148_CR7"},{"key":"148_CR8","volume-title":"Fuzzy sets and their applications","author":"L.A. Zadeh","year":"1975","unstructured":"Zadeh, L.A.: Fuzzy sets and their applications. Academic Press, New York (1975)"},{"issue":"1","key":"148_CR9","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1016\/S0165-0114(03)00033-2","volume":"140","author":"S. Helmer","year":"2003","unstructured":"Helmer, S.: Evaluating different approaches for indexing fuzzy sets. Fuzzy Sets and Systems\u00a0140(1), 167\u2013182 (2003)","journal-title":"Fuzzy Sets and Systems"},{"key":"148_CR10","volume-title":"A basic method of grey system","author":"D. Julong","year":"1987","unstructured":"Julong, D.: A basic method of grey system. Huazhong University of Science and Technology Press, Wuhan (1987)"},{"issue":"1","key":"148_CR11","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1016\/S0377-2217(99)00320-3","volume":"127","author":"H. Chaug-lng","year":"2000","unstructured":"Chaug-lng, H., Yuh-Horng, W.: Application of grey theory and multiobjective programming towards airline network design. European Journal of Operational Research\u00a0127(1), 44\u201368 (2000)","journal-title":"European Journal of Operational Research"},{"issue":"1","key":"148_CR12","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1016\/S0377-2217(02)00228-X","volume":"145","author":"A. Stam","year":"2003","unstructured":"Stam, A., Silva, D., Pedro, A.: On multiplicative priority rating methods for the AHP. European Journal of Operational Research\u00a0145(1), 92\u2013108 (2003)","journal-title":"European Journal of Operational Research"},{"issue":"5","key":"148_CR13","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1016\/S0378-7206(00)00071-9","volume":"38","author":"B. Dae-Ho","year":"2001","unstructured":"Dae-Ho, B.: The AHP approach for selecting an automobile purchase model. Information and Management\u00a038(5), 289\u2013297 (2001)","journal-title":"Information and Management"}],"container-title":["Lecture Notes in Computer Science","Fuzzy Systems and Knowledge Discovery"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11540007_148.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T06:55:49Z","timestamp":1619506549000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11540007_148"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540283317","9783540318286"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/11540007_148","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}