{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:42:45Z","timestamp":1742913765238,"version":"3.40.3"},"publisher-location":"London","reference-count":19,"publisher":"Springer London","isbn-type":[{"type":"print","value":"9781447128182"},{"type":"electronic","value":"9781447128199"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-1-4471-2819-9_28","type":"book-chapter","created":{"date-parts":[[2012,2,24]],"date-time":"2012-02-24T07:22:59Z","timestamp":1330068179000},"page":"317-328","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Fuzzy Logic-based Risk Evaluation in a Virtual Organisation"],"prefix":"10.1007","author":[{"given":"Muqi","family":"Wulan","sequence":"first","affiliation":[]},{"given":"Dobrila","family":"Petrovic","sequence":"additional","affiliation":[]},{"given":"Keith","family":"Popplewell","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2012,2,9]]},"reference":[{"issue":"2","key":"28_CR1_28","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1016\/S1478-4092(03)00004-9","volume":"9","author":"C Harland","year":"2003","unstructured":"Harland C, Brenchley R, Walker H. Risk in supply networks. Journal of Purchasing and Supply management 2003; 9(2): 51-62","journal-title":"Journal of Purchasing and Supply management"},{"key":"28_CR2_28","unstructured":"Risk: analysis, perception and management. London: The Royal Society; 1992"},{"issue":"20","key":"28_CR3_28","doi-asserted-by":"publisher","first-page":"6041","DOI":"10.1080\/00207543.2010.519735","volume":"49","author":"M Alawamleh","year":"2011","unstructured":"Alawamleh M, Popplewell K. Interpretive structural modeling of risk sources in a virtual organisation, International Journal of Production Research 2011; 49(20): 6041-6063","journal-title":"International Journal of Production Research"},{"issue":"6","key":"28_CR4_28","doi-asserted-by":"publisher","first-page":"704","DOI":"10.1287\/orsc.10.6.704","volume":"10","author":"M Grabowski","year":"1999","unstructured":"Grabowski M, Roberts KH. Risk mitigation in Virtual Organizations, Organization Science. 1999; 10(6): 704-721","journal-title":"Organization Science."},{"key":"28_CR5_28","doi-asserted-by":"crossref","unstructured":"Liu G, Zhang J, Zhang W, Zhou X. Risk assessment of virtual enterprise based on the fuzzy comprehensive evaluation method. In: Wang W. Li Y, Duan Z, Yan L, Li H, Yang X. editor. Integration and Innovation Orient to E-Society. Boston: Springer; 2007. 58-66","DOI":"10.1007\/978-0-387-75466-6_8"},{"issue":"2","key":"28_CR6_28","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1111\/j.1467-8551.1995.tb00089.x","volume":"6","author":"V Mitchell","year":"1995","unstructured":"Mitchell V. Organisational risk perception and reduction: A literature review, British Journal of Management. 1995; 6(2): 115-133","journal-title":"British Journal of Management."},{"issue":"1","key":"28_CR7_28","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1109\/TFUZZ.2002.806316","volume":"11","author":"SJ Chen","year":"2003","unstructured":"Chen SJ, Chen SM. Fuzzy risk analysis based on similarity measures of generalized fuzzy numbers. IEEE Transaction on Fuzzy Systems 2003; 11(1): 45-56","journal-title":"IEEE Transaction on Fuzzy Systems"},{"issue":"1","key":"28_CR8_28","doi-asserted-by":"publisher","first-page":"589","DOI":"10.1016\/j.eswa.2007.09.033","volume":"36","author":"S Wei","year":"2009","unstructured":"Wei S, Chen S. A new approach for fuzzy risk analysis based on similarity measures of generalized fuzzy numbers. Expert Systems with Applications 2009; 36(1): 589-598","journal-title":"Expert Systems with Applications"},{"issue":"3","key":"28_CR9_28","doi-asserted-by":"publisher","first-page":"1920","DOI":"10.1016\/j.eswa.2009.07.015","volume":"37","author":"Z Xu","year":"2010","unstructured":"Xu Z, Shang S, Qian W, Shu W. A method for fuzzy risk analysis based on the new similarity of trapezoidal fuzzy numbers. Expert Systems with Applications 2010; 37(3): 1920-1927","journal-title":"Expert Systems with Applications"},{"key":"28_CR10_28","doi-asserted-by":"crossref","first-page":"102","DOI":"10.4018\/978-1-59140-405-7.ch005","volume-title":"Virtual enterprise integration: technological and organizational perspectives","author":"S Ellmann","year":"2005","unstructured":"Ellmann S. Collaborative network models: overview and functional requirements. In: Putnik G, Curz-Cunha M. Virtual enterprise integration: technological and organizational perspectives. Hershey: Idea Group; 2005. 102-123"},{"issue":"2","key":"28_CR11_28","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1016\/S0166-3615(03)00033-2","volume":"51","author":"L Camarinha-Matos","year":"2003","unstructured":"Camarinha-Matos L, Afsarmanesh H. Elements of a base VE infrastructure, Computers in Industry 2003; 51(2): 139-163","journal-title":"Computers in Industry"},{"issue":"2","key":"28_CR12_28","doi-asserted-by":"crossref","first-page":"141","DOI":"10.1080\/17509653.2008.10671042","volume":"3","author":"M Singh","year":"2008","unstructured":"Singh M, Kant R. Knowledge management barriers: an interpretive structural modeling approach. International Journal of Management Science and Engineering Management 2008; 3(2): 141-150","journal-title":"International Journal of Management Science and Engineering Management"},{"issue":"1","key":"28_CR13_28","doi-asserted-by":"crossref","first-page":"73","DOI":"10.2307\/258630","volume":"21","author":"T Chiles","year":"1996","unstructured":"Chiles T, MicMakin J. Integrating variable risk preferences, trust, and transaction cost economics. The Academy of Management Review 1996; 21(1): 73-99","journal-title":"The Academy of Management Review"},{"key":"28_CR14_28","volume-title":"Establishing the foundation of collaboration networks","author":"K Thoben","year":"2007","unstructured":"Thoben K, Seifert M, Westpal I. Measuring collaboration performance in Virtual Organisations. In: Camarinha-Matos L, Afsarmanesh H, Novais P, Analide C. editor. Establishing the foundation of collaboration networks. Boston: Springer; 2007"},{"issue":"3","key":"28_CR15_28","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1108\/02635570110386625","volume":"101","author":"Z Yu","year":"2001","unstructured":"Yu Z, Yan H, Cheng T. Benefits of information sharing with supply chain partnerships. Industrial Management and Data Systems 2001; 101(3): 114-121","journal-title":"Industrial Management and Data Systems"},{"key":"28_CR16_28","volume-title":"Financial markets and risk","author":"D Brighouse","year":"2008","unstructured":"Brighouse D, Hontoir J. Financial markets and risk. London: Global Professional Publishing; 2008"},{"issue":"5","key":"28_CR17_28","doi-asserted-by":"publisher","first-page":"397","DOI":"10.1108\/09600030410545445","volume":"34","author":"G Zsidisin","year":"2004","unstructured":"Zsidisin G, Ellram L, Carter J. An analysis of supply risk assessment techniques. International Journal of Physical Distribution & Logistics Management 2004; 34(5): 397-413","journal-title":"International Journal of Physical Distribution & Logistics Management"},{"issue":"3","key":"28_CR18_28","first-page":"85","volume":"77","author":"R Simons","year":"1999","unstructured":"Simons R. How risky is your company? Harvard Business Review 1999; 77(3): 85-95","journal-title":"Harvard Business Review"},{"key":"28_CR19_28","volume-title":"Fuzzy sets, natural language computations, and risk analysis","author":"KJ Schmucker","year":"1984","unstructured":"Schmucker KJ. Fuzzy sets, natural language computations, and risk analysis. Maryland: Computer Science Press; 1984"}],"container-title":["Proceedings of the I-ESA Conferences","Enterprise Interoperability V"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-1-4471-2819-9_28","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,7]],"date-time":"2023-02-07T07:37:36Z","timestamp":1675755456000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-1-4471-2819-9_28"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9781447128182","9781447128199"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-1-4471-2819-9_28","relation":{},"ISSN":["2199-2533","2199-2541"],"issn-type":[{"type":"print","value":"2199-2533"},{"type":"electronic","value":"2199-2541"}],"subject":[],"published":{"date-parts":[[2012]]},"assertion":[{"value":"9 February 2012","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}