{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,19]],"date-time":"2025-11-19T19:22:54Z","timestamp":1763580174550},"reference-count":47,"publisher":"Elsevier BV","issue":"8","license":[{"start":{"date-parts":[[1991,12,1]],"date-time":"1991-12-01T00:00:00Z","timestamp":691545600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computers &amp; Security"],"published-print":{"date-parts":[[1991,12]]},"DOI":"10.1016\/0167-4048(91)90094-t","type":"journal-article","created":{"date-parts":[[2002,10,11]],"date-time":"2002-10-11T13:56:18Z","timestamp":1034344578000},"page":"749-764","source":"Crossref","is-referenced-by-count":29,"title":["Risk analysis as a source of professional knowledge"],"prefix":"10.1016","volume":"10","author":[{"given":"Richard","family":"Baskerville","sequence":"first","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/0167-4048(91)90094-T_BIB1","series-title":"Proc. 10th International Conference on Information Systems","first-page":"369","article-title":"The ecology of MIS research: a twenty year status review","author":"Alavi","year":"1989"},{"key":"10.1016\/0167-4048(91)90094-T_BIB2","doi-asserted-by":"crossref","first-page":"339","DOI":"10.1016\/0167-4048(90)90104-2","article-title":"Computer security methodology: risk analysis and project definition","volume":"9","author":"Badenhorst","year":"1990","journal-title":"Comput. Secur."},{"key":"10.1016\/0167-4048(91)90094-T_BIB3","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1145\/63238.63241","article-title":"Can the field of MIS be disciplined?","volume":"32","author":"Banville","year":"1989","journal-title":"Commun. ACM"},{"issue":"2","key":"10.1016\/0167-4048(91)90094-T_BIB4","doi-asserted-by":"crossref","first-page":"121","DOI":"10.1057\/ejis.1991.20","article-title":"Risk analysis: an interpretive feasibility tool in justifying Information systems security","volume":"1","author":"Baskerville","year":"1991","journal-title":"Eur. J. Information Syst."},{"key":"10.1016\/0167-4048(91)90094-T_BIB5","series-title":"Designing Information Systems Security","author":"Baskerville","year":"1988"},{"key":"10.1016\/0167-4048(91)90094-T_BIB6","series-title":"Software Engineering Economics","author":"Boehm","year":"1981"},{"key":"10.1016\/0167-4048(91)90094-T_BIB7","series-title":"Intermediate Economic Analysis for Management and Engineering","author":"Canada","year":"1971"},{"key":"10.1016\/0167-4048(91)90094-T_BIB8","series-title":"Computer Crime: Computer Security Techniques","year":"1986"},{"key":"10.1016\/0167-4048(91)90094-T_BIB9","series-title":"The Capital Expenditure Decision","author":"Corr","year":"1983"},{"key":"10.1016\/0167-4048(91)90094-T_BIB10","first-page":"97","article-title":"Security risk assessment in electronic data processing","volume":"46","author":"Courtney","year":"1977"},{"key":"10.1016\/0167-4048(91)90094-T_BIB11","series-title":"Proc. 13th Annu. Computer Security Conf.","first-page":"RC3","article-title":"The state of the art in data security","author":"Courtney","year":"1986"},{"key":"10.1016\/0167-4048(91)90094-T_BIB12","doi-asserted-by":"crossref","DOI":"10.1080\/00137916408928690","article-title":"Decision models for the selection of research projects","volume":"9","author":"Cramer","year":"1964","journal-title":"The Eng. Economist"},{"key":"10.1016\/0167-4048(91)90094-T_BIB13_1","series-title":"Corporate Social Policy","first-page":"18","article-title":"A prelude to corporate reform","author":"Dahl","year":"1975"},{"key":"10.1016\/0167-4048(91)90094-T_BIB13_2","series-title":"Ethical Theory and Business","first-page":"103","article-title":"Changing the rules","author":"Bowie","year":"1983"},{"key":"10.1016\/0167-4048(91)90094-T_BIB14","series-title":"Engineering Economy","author":"DeGarmo","year":"1979"},{"key":"10.1016\/0167-4048(91)90094-T_BIB15","doi-asserted-by":"crossref","first-page":"9","DOI":"10.1145\/63238.63239","article-title":"Computing as a discipline","volume":"32","author":"Denning","year":"1989","journal-title":"Commun. ACM"},{"key":"10.1016\/0167-4048(91)90094-T_BIB16_1","first-page":"16","article-title":"Cost\/Benefit Analysis of Information Systems","author":"Emery","year":"1971","journal-title":"The Society of Management Information Systems"},{"key":"10.1016\/0167-4048(91)90094-T_BIB16_2","first-page":"395","article-title":"Systems Analysis Techniques","author":"Couger","year":"1974"},{"key":"10.1016\/0167-4048(91)90094-T_BIB17","series-title":"General and Industrial Management","author":"Fayol","year":"1949"},{"key":"10.1016\/0167-4048(91)90094-T_BIB18","series-title":"Information Systems Security","author":"Fisher","year":"1984"},{"key":"10.1016\/0167-4048(91)90094-T_BIB19","first-page":"1","article-title":"EDP risk analysis for contingency planning","volume":"1","author":"FitzGerald","year":"1978","journal-title":"EDP Audit Control Secur. Newslett."},{"key":"10.1016\/0167-4048(91)90094-T_BIB20","series-title":"Audit and Control of Information Systems","author":"Gallegos","year":"1987"},{"key":"10.1016\/0167-4048(91)90094-T_BIB21","series-title":"Winning at Project Management: What Works, What Fails and Why","author":"Gilbreath","year":"1986"},{"key":"10.1016\/0167-4048(91)90094-T_BIB22","series-title":"Research Methods In Information Systems","article-title":"Information systems epistemology: an historical perspective","author":"Hirschheim","year":"1985"},{"key":"10.1016\/0167-4048(91)90094-T_BIB23","unstructured":"P. Keen, Relevance and rigor in information systems research, keynote address to the IFIP TC 8 WG 8.2 Working Conference on Information Systems Research Arena of the 90's (edited by H-E Nissen, H. Klein and R. Hirschheim)"},{"key":"10.1016\/0167-4048(91)90094-T_BIB24","series-title":"Computers and Profits: Quantifying Financial Benefits of Information","author":"Kleijnen","year":"1980"},{"key":"10.1016\/0167-4048(91)90094-T_BIB25","series-title":"Datawars: The Politics of Modeling in Federal Policymaking","author":"Kraemer","year":"1987"},{"key":"10.1016\/0167-4048(91)90094-T_BIB26","series-title":"Criticism and the Growth of Knowledge","first-page":"91","article-title":"Falsification and the methodology of scientific research programmes","author":"Lakatos","year":"1970"},{"key":"10.1016\/0167-4048(91)90094-T_BIB27","doi-asserted-by":"crossref","first-page":"23","DOI":"10.2307\/1251429","article-title":"Metatheory and metamethodology in marketing: a lakatosian reconstruction","volume":"49","author":"Leong","year":"1985","journal-title":"J. Marketing"},{"key":"10.1016\/0167-4048(91)90094-T_BIB28","first-page":"447","article-title":"The Structure of Science: Problems in The Logic of Scientific Explanation","author":"Nagel","year":"1979"},{"key":"10.1016\/0167-4048(91)90094-T_BIB29","article-title":"Guideline for Automatic Data Processing Risk Analysis","author":"NBS, (National Bureau of Standards)","year":"1979","journal-title":"Federal Information Processing Standards Publication FIPS 65"},{"issue":"3\u20134","key":"10.1016\/0167-4048(91)90094-T_BIB30","doi-asserted-by":"crossref","first-page":"248","DOI":"10.1147\/sj.243.0248","article-title":"Strategies for problem prevention","volume":"24","author":"Newton","year":"1985","journal-title":"IBM Syst. J."},{"key":"10.1016\/0167-4048(91)90094-T_BIB31","unstructured":"J. O'Mara,Computer security, a management blindspot, Computer Security Handbook, Computer Security Institute, Northborough, MA, pp. 2A1\u20132A4."},{"key":"10.1016\/0167-4048(91)90094-T_BIB32","series-title":"Computer Security Risk Management","author":"Palmer","year":"1989"},{"key":"10.1016\/0167-4048(91)90094-T_BIB33","series-title":"Computer Security Management","author":"Parker","year":"1981"},{"key":"10.1016\/0167-4048(91)90094-T_BIB34","series-title":"Crime by Computer","author":"Parker","year":"1976"},{"key":"10.1016\/0167-4048(91)90094-T_BIB35","series-title":"Normal Accidents: Living With High-Risk Technologies","author":"Perrow","year":"1984"},{"key":"10.1016\/0167-4048(91)90094-T_BIB36","series-title":"Introduction to Statistical Decision Theory","author":"Pratt","year":"1965"},{"key":"10.1016\/0167-4048(91)90094-T_BIB37","first-page":"93","article-title":"Data processing-risk assessment","volume":"Vol. 2","author":"Saltmarsh","year":"1983"},{"key":"10.1016\/0167-4048(91)90094-T_BIB38","first-page":"109","article-title":"Data processing-risk assessment","volume":"Vol. 2","author":"Saltmarsh","year":"1983"},{"key":"10.1016\/0167-4048(91)90094-T_BIB39","first-page":"113","article-title":"Data processing-risk assessment","volume":"Vol. 2","author":"Saltmarsh","year":"1983"},{"key":"10.1016\/0167-4048(91)90094-T_BIB40","series-title":"The Reflective Practitioner: How Professionals Think in Action","author":"Sch\u00f6n","year":"1983"},{"key":"10.1016\/0167-4048(91)90094-T_BIB41_1","series-title":"An Inquiry Into the Nature and Causes of the Wealth of Nations","author":"Smith","year":"1776"},{"key":"10.1016\/0167-4048(91)90094-T_BIB41_2","first-page":"194","volume":"Vol. 39","author":"Hutchins","year":"1952"},{"key":"10.1016\/0167-4048(91)90094-T_BIB42_1","series-title":"Towards a Sociology of Management","author":"Vickers","year":"1967"},{"key":"10.1016\/0167-4048(91)90094-T_BIB42_2","series-title":"The Information Systems Research Challenge","first-page":"111","article-title":"Theoretical assumptions and research methodology selection","author":"Weick","year":"1985"},{"key":"10.1016\/0167-4048(91)90094-T_BIB43","series-title":"Introduction To Bayesian Inference and Decisions","author":"Winkler","year":"1972"}],"container-title":["Computers &amp; Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:016740489190094T?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:016740489190094T?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,4,11]],"date-time":"2019-04-11T03:56:00Z","timestamp":1554954960000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/016740489190094T"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1991,12]]},"references-count":47,"journal-issue":{"issue":"8","published-print":{"date-parts":[[1991,12]]}},"alternative-id":["016740489190094T"],"URL":"https:\/\/doi.org\/10.1016\/0167-4048(91)90094-t","relation":{},"ISSN":["0167-4048"],"issn-type":[{"value":"0167-4048","type":"print"}],"subject":[],"published":{"date-parts":[[1991,12]]}}}