{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T13:24:21Z","timestamp":1742995461964,"version":"3.40.3"},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030519704"},{"type":"electronic","value":"9783030519711"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-51971-1_10","type":"book-chapter","created":{"date-parts":[[2020,8,8]],"date-time":"2020-08-08T17:03:00Z","timestamp":1596906180000},"page":"120-130","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Computer-Based Support for Searching Rational Strategies for Investors in Case of Insufficient Information on the Condition of the Counterparty"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8849-9648","authenticated-orcid":false,"given":"V. A.","family":"Lakhno","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7533-1555","authenticated-orcid":false,"given":"V. G.","family":"Malikov","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2642-8908","authenticated-orcid":false,"given":"D. Y.","family":"Kasatkin","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4377-0916","authenticated-orcid":false,"given":"A. I.","family":"Blozva","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3059-6787","authenticated-orcid":false,"given":"V. G.","family":"Saiko","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0624-460X","authenticated-orcid":false,"given":"V. N.","family":"Domrachev","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,8,9]]},"reference":[{"key":"10_CR1","doi-asserted-by":"crossref","unstructured":"Irani, Z., Love, P.E.: The propagation of technology management taxonomies for evaluating investments in information systems. J. Manag. Inf. Syst. 161\u2013177 (2000)","DOI":"10.1080\/07421222.2000.11045650"},{"issue":"2","key":"10_CR2","first-page":"31","volume":"28","author":"ST Parente","year":"2006","unstructured":"Parente, S.T., Van Horn, R.L.: Valuing hospital investment in information technology: does governance make a difference? Health Care Finan. Rev. 28(2), 31 (2006)","journal-title":"Health Care Finan. Rev."},{"issue":"1","key":"10_CR3","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1111\/jsbm.12058","volume":"53","author":"TH Nguyen","year":"2015","unstructured":"Nguyen, T.H., Newby, M., Macaulay, M.J.: Information technology adoption in small business: confirmation of a proposed framework. J. Small Bus. Manag. 53(1), 207\u2013227 (2015)","journal-title":"J. Small Bus. Manag."},{"issue":"4","key":"10_CR4","doi-asserted-by":"publisher","first-page":"809","DOI":"10.25300\/MISQ\/2015\/39.4.4","volume":"39","author":"R Sabherwal","year":"2015","unstructured":"Sabherwal, R., Jeyaraj, A.: Information technology impacts on firm performance: an extension of Kohli and Devaraj (2003). MIS Q. 39(4), 809\u2013836 (2015)","journal-title":"MIS Q."},{"key":"10_CR5","doi-asserted-by":"publisher","first-page":"399","DOI":"10.1016\/j.asoc.2014.11.028","volume":"27","author":"M Kilic","year":"2015","unstructured":"Kilic, M., Kaya, \u0130.: Investment project evaluation by a decision making methodology based on type-2 fuzzy sets. Appl. Soft Comput. 27, 399\u2013410 (2015)","journal-title":"Appl. Soft Comput."},{"issue":"2","key":"10_CR6","doi-asserted-by":"publisher","first-page":"282","DOI":"10.1108\/K-04-2015-0093","volume":"45","author":"S Zeng","year":"2016","unstructured":"Zeng, S., Xiao, Y.: TOPSIS method for intuitionistic fuzzy multiple-criteria decision making and its application to investment selection. Kybernetes 45(2), 282\u2013296 (2016)","journal-title":"Kybernetes"},{"issue":"1","key":"10_CR7","doi-asserted-by":"publisher","first-page":"6","DOI":"10.3390\/sym11010006","volume":"11","author":"R Wang","year":"2019","unstructured":"Wang, R., Wang, J., Gao, H., Wei, G.: Methods for MADM with picture fuzzy muirhead mean operators and their application for evaluating the financial investment risk. Symmetry 11(1), 6 (2019)","journal-title":"Symmetry"},{"issue":"1","key":"10_CR8","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1504\/IJBIR.2016.077613","volume":"11","author":"J Sandstr\u00f6m","year":"2016","unstructured":"Sandstr\u00f6m, J., Kyl\u00e4heiko, K., Collan, M.: Managing uncertainty in long life cycle investments: unifying investment planning, management, and post-audit with a fuzzy DSS. Int. J. Bus. Innov. Res. 11(1), 133\u2013145 (2016)","journal-title":"Int. J. Bus. Innov. Res."},{"issue":"1","key":"10_CR9","first-page":"13","volume":"1","author":"K Goztepe","year":"2012","unstructured":"Goztepe, K.: Designing fuzzy rule based expert system for cyber security. Int. J. Inf. Secur. Sci. 1(1), 13\u201319 (2012)","journal-title":"Int. J. Inf. Secur. Sci."},{"key":"10_CR10","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1016\/j.dss.2016.02.012","volume":"86","author":"A Fielder","year":"2016","unstructured":"Fielder, A., Panaousis, E., Malacaria, P., et al.: Decision support approaches for cyber security investment. Decis. Support Syst. 86, 13\u201323 (2016)","journal-title":"Decis. Support Syst."},{"key":"10_CR11","doi-asserted-by":"crossref","unstructured":"Lakhno, V.A.: Development of a support system for managing the cyber security. Radio Electron. Comput. Sci. Control (2), 109\u2013116 (2017)","DOI":"10.15588\/1607-3274-2017-2-12"},{"key":"10_CR12","doi-asserted-by":"crossref","unstructured":"Chen, L., Pan, W.: An intelligent decision support system for improving information integrity in procuring infrastructures in Hong Kong. In: Proceedings of the 21st International Symposium on Advancement of Construction Management and Real Estate, pp. 213\u2013221. Springer, Singapore (2018)","DOI":"10.1007\/978-981-10-6190-5_20"},{"issue":"1\u20132","key":"10_CR13","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1002\/mcda.1524","volume":"22","author":"JR Ribas","year":"2015","unstructured":"Ribas, J.R., da Silva Rocha, M.: A decision support system for prioritizing investments in an energy efficiency program in favelas in the city of Rio de Janeiro. J. Multi-Criteria Decis. Anal. 22(1\u20132), 89\u201399 (2015)","journal-title":"J. Multi-Criteria Decis. Anal."},{"key":"10_CR14","doi-asserted-by":"crossref","unstructured":"Dai, J., Wang, D., Yang, X., Wei, X.: Design and implementation of a group decision support system for university innovation projects evaluation. In: 2016 11th International Conference on Computer Science & Education (ICCSE), pp. 148\u2013151. IEEE, August 2016","DOI":"10.1109\/ICCSE.2016.7581571"},{"issue":"1","key":"10_CR15","doi-asserted-by":"publisher","first-page":"140","DOI":"10.3846\/20294913.2016.1212742","volume":"23","author":"MI Ribeiro","year":"2017","unstructured":"Ribeiro, M.I., Ferreira, F.A., Jalali, M.S., Meidut\u0117-Kavaliauskien\u0117, I.: A fuzzy knowledge-based framework for risk assessment of residential real estate investments. Technol. Econ. Dev. Econ. 23(1), 140\u2013156 (2017)","journal-title":"Technol. Econ. Dev. Econ."},{"issue":"3","key":"10_CR16","first-page":"24","volume":"6","author":"V Lakhno","year":"2017","unstructured":"Lakhno, V., Malyukov, V., Gerasymchuk, N., et al.: Development of the decision making support system to control a procedure of financial investment. Eastern-Eur. J. Enterprise Technol. 6(3), 24\u201341 (2017)","journal-title":"Eastern-Eur. J. Enterprise Technol."},{"key":"10_CR17","unstructured":"Shea, V.J., Dow, K.E., Chong, A.Y.L., Ngai, E.W.: An examination of the long-term business value of investments in information technology. Inf. Syst. Front. 21(1), 213\u2013227 (2019)"},{"issue":"3","key":"10_CR18","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2480741.2480742","volume":"45","author":"MH Manshaei","year":"2013","unstructured":"Manshaei, M.H., Zhu, Q., Alpcan, T., et al.: Game theory meets network security and privacy. ACM Comput. Surv. 45(3), 1\u201339 (2013)","journal-title":"ACM Comput. Surv."},{"key":"10_CR19","unstructured":"Akhmetov, B.S., Akhmetov, B.B., et al.: Adaptive model of mutual financial investment procedure control in cybersecurity systems of situational transport centers. News Natl. Acad. Sci. Repub. Kaz. Ser. Geol. Tech. Sci. 3(435), 159\u2013172 (2019)"},{"key":"10_CR20","unstructured":"Isaacs, R.: Differential games: a mathematical theory with applications to warfare and pursuit, control and optimization. Courier Corporation (1999)"}],"container-title":["Advances in Intelligent Systems and Computing","Artificial Intelligence and Bioinspired Computational Methods"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-51971-1_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,12]],"date-time":"2021-04-12T19:11:00Z","timestamp":1618254660000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-51971-1_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030519704","9783030519711"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-51971-1_10","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"9 August 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CSOC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Computer Science On-line Conference","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Zlin","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Czech Republic","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 July 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 July 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"csolc2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/csoc.openpublish.eu","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}