{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T14:03:44Z","timestamp":1725545024432},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540329695"},{"type":"electronic","value":"9783540329701"}],"license":[{"start":{"date-parts":[[2006,1,1]],"date-time":"2006-01-01T00:00:00Z","timestamp":1136073600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11686699_58","type":"book-chapter","created":{"date-parts":[[2006,2,24]],"date-time":"2006-02-24T02:42:49Z","timestamp":1140748969000},"page":"573-585","source":"Crossref","is-referenced-by-count":0,"title":["Solving Consensus Measure of Ambiguous GDM Problems Using Vague Sets \u2013 An Application of Risk Assessment"],"prefix":"10.1007","author":[{"given":"Chi-Chun","family":"Lo","sequence":"first","affiliation":[]},{"given":"Ping","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Kuo-Ming","family":"Chao","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"58_CR1","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1016\/S0165-0114(86)80034-3","volume":"20","author":"K. Atanassov","year":"1986","unstructured":"Atanassov, K.: Intuitionistic fuzzy sets. Fuzzy Sets and Systems\u00a020, 87\u201396 (1986)","journal-title":"Fuzzy Sets and Systems"},{"key":"58_CR2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-7908-1870-3","volume-title":"Intuitionistic Fuzzy Sets: Theory and Applications","author":"K. Atanassov","year":"1999","unstructured":"Atanassov, K.: Intuitionistic Fuzzy Sets: Theory and Applications. Springer, Heidelberg (1999)"},{"key":"58_CR3","unstructured":"BSI: BS 7799-2:2002, Information Security Management- Part 2: Specification for Information Security Management, Systems, London"},{"key":"58_CR4","volume-title":"Computer Security Handbook","author":"J.M. Carroll","year":"1985","unstructured":"Carroll, J.M.: Information Security Risk Management. In: Computer Security Handbook, Wiley, New York (1985)"},{"key":"58_CR5","doi-asserted-by":"publisher","first-page":"217","DOI":"10.1016\/0165-0114(94)00339-9","volume":"74","author":"S.M. Chen","year":"1995","unstructured":"Chen, S.M.: Measures of similarity between vague sets. Fuzzy Sets and Systems\u00a074, 217\u2013223 (1995)","journal-title":"Fuzzy Sets and Systems"},{"key":"58_CR6","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1109\/3477.552198","volume":"27","author":"S.M. Chen","year":"1997","unstructured":"Chen, S.M.: Measures of similarity between vague sets and elements. IEEE Transactions on System, Man and Cybernetics - Part B, Cybernetics\u00a027, 153\u2013158 (1997)","journal-title":"IEEE Transactions on System, Man and Cybernetics - Part B, Cybernetics"},{"issue":"1","key":"58_CR7","first-page":"82","volume":"1","author":"S.M. Chen","year":"2003","unstructured":"Chen, S.M.: Analyzing fuzzy system reliability using vague set theory. International Journal pf Applied Science and Engineering\u00a01(1), 82\u201388 (2003)","journal-title":"International Journal pf Applied Science and Engineering"},{"key":"58_CR8","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1016\/S0165-0114(96)00339-9","volume":"97","author":"F. Chiclana","year":"1998","unstructured":"Chiclana, F., Herrera, F., Herrera-Viedma, E.: Integrating three representation models in fuzzy multipurpose decision making based on fuzzy preference relations. Fuzzy Sets and Systems\u00a097, 33\u201348 (1998)","journal-title":"Fuzzy Sets and Systems"},{"key":"58_CR9","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1016\/S0165-0114(98)00235-8","volume":"117","author":"S.K. De","year":"2001","unstructured":"De, S.K., Biswas, R., Roy, A.R.: An application of intuitionistic fuzzy sets in medical diagnosis. Fuzzy Sets and Systems\u00a0117, 209\u2013213 (2001)","journal-title":"Fuzzy Sets and Systems"},{"key":"58_CR10","unstructured":"Gary, S., et al.: Risk Management Guide for Information Technology Systems. In: Special Publication 800-300, National Institute of Standards and Technology (2001)"},{"key":"58_CR11","doi-asserted-by":"publisher","first-page":"610","DOI":"10.1109\/21.229476","volume":"23","author":"W.L. Gau","year":"1993","unstructured":"Gau, W.L., Buehrer, D.j.: Vague sets. IEEE Trans Systems Man Cybernetics\u00a023, 610\u2013614 (1993)","journal-title":"IEEE Trans Systems Man Cybernetics"},{"key":"58_CR12","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1016\/S0165-0114(96)00047-4","volume":"88","author":"F. Herrera","year":"1997","unstructured":"Herrera, F., et al.: A rational consensus model in Group decision making using linguistic assessments. Fuzzy set and Systems\u00a088, 31\u201349 (1997)","journal-title":"Fuzzy set and Systems"},{"key":"58_CR13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-61580-1","volume-title":"Group Decision Making under Multiple Criteria","author":"C.L. Hwang","year":"1987","unstructured":"Hwang, C.L., Lin, M.J.: Group Decision Making under Multiple Criteria. Springer, New York (1987)"},{"key":"58_CR14","doi-asserted-by":"publisher","first-page":"316","DOI":"10.1016\/0377-2217(88)90152-X","volume":"34","author":"J. Kacprzyk","year":"1988","unstructured":"Kacprzyk, J., Fedrizzi, M.: A soft\u2019 measurement of consensus in the setting of partial (fuzzy) preference. European Journal of Operation Research\u00a034, 316\u2013326 (1988)","journal-title":"European Journal of Operation Research"},{"key":"58_CR15","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1007\/978-94-009-2109-2","volume-title":"Multi-person decision making using fuzzy sets and possibility","author":"J. Kacprzyk","year":"1990","unstructured":"Kacprzyk, J., Fedrizzi, M.: Multi-person decision making using fuzzy sets and possibility, pp. 231\u2013241. Kluwer Academic Publishers, Netherlands (1990)"},{"key":"58_CR16","doi-asserted-by":"publisher","first-page":"2687","DOI":"10.1016\/S0167-8655(03)00111-9","volume":"24","author":"Z. Liang","year":"2003","unstructured":"Liang, Z., Shi, P.: Similarity measures on intuitionistic fuzzy sets. Pattern Recognition Letters\u00a024, 2687\u20132693 (2003)","journal-title":"Pattern Recognition Letters"},{"issue":"1\u20133","key":"58_CR17","first-page":"221","volume":"23","author":"D. Li","year":"2002","unstructured":"Li, D., Cheng, C.: New similarity measures of intuitionistic fuzzy sets and application to pattern recognition. Pattern Recognition, Letters\u00a023(1\u20133), 221\u2013225 (2002)","journal-title":"Pattern Recognition, Letters"},{"key":"58_CR18","doi-asserted-by":"crossref","unstructured":"Szmidt, E., Kacprzyk, J.: Evaluation of agreement in a group of experts via distance between intuitionistic fuzzy preference. International IEEE Symposium \u201cintelligent systems\u201d (2002)","DOI":"10.1109\/IS.2002.1044249"},{"key":"58_CR19","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1016\/0898-1221(83)90013-5","volume":"9","author":"L.A. Zadeh","year":"1983","unstructured":"Zadeh, L.A.: A computational approach to fuzzy quantifiers in natural languages. Comput. Math. Appl.\u00a09, 149\u2013184 (1983)","journal-title":"Comput. Math. Appl."},{"key":"58_CR20","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1016\/S0165-0114(83)80118-3","volume":"10","author":"H.J. Zimmermann","year":"1983","unstructured":"Zimmermann, H.J., Zysno, P.: Decision and evaluations by hierarchical aggregation of information. Fuzzy Sets and Systems\u00a010, 243\u2013260 (1983)","journal-title":"Fuzzy Sets and Systems"},{"key":"58_CR21","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1016\/0888-613X(87)90015-6","volume":"1","author":"R. Zwick","year":"1987","unstructured":"Zwick, R., Carlstein, E., Budescu, D.V.: Measures of similarity among fuzzy concepts: A comparative analysis. Internet. J. Approximate Reasoning\u00a01, 221\u2013242 (1987)","journal-title":"Internet. J. Approximate Reasoning"}],"container-title":["Lecture Notes in Computer Science","Computer Supported Cooperative Work in Design II"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11686699_58","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,12]],"date-time":"2019-03-12T05:08:20Z","timestamp":1552367300000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11686699_58"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540329695","9783540329701"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/11686699_58","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}