{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,13]],"date-time":"2026-02-13T09:30:20Z","timestamp":1770975020291,"version":"3.50.1"},"reference-count":35,"publisher":"Informa UK Limited","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Journal of Management Information Systems"],"published-print":{"date-parts":[[1991,6]]},"DOI":"10.1080\/07421222.1991.11517914","type":"journal-article","created":{"date-parts":[[2015,12,18]],"date-time":"2015-12-18T21:11:59Z","timestamp":1450473119000},"page":"129-147","source":"Crossref","is-referenced-by-count":115,"title":["Risk Analysis for Information Technology"],"prefix":"10.1080","volume":"8","author":[{"suffix":"Jr.","given":"Rex Kelly","family":"Rainer","sequence":"first","affiliation":[]},{"given":"Charles A.","family":"Snyder","sequence":"additional","affiliation":[]},{"given":"Houston H.","family":"Carr","sequence":"additional","affiliation":[]}],"member":"301","published-online":{"date-parts":[[2015,12,18]]},"reference":[{"key":"CIT0001","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.1985.11517734"},{"issue":"12","key":"CIT0002","first-page":"19","volume":"23","author":"Bacon M.","year":"1983","journal-title":"Telecommunications"},{"issue":"47","key":"CIT0006","first-page":"1","volume":"6","author":"Briere D.","year":"1989","journal-title":"Network World"},{"key":"CIT0008","volume-title":"Corporate Information Systems Management","author":"Cash J.I.","year":"1988","edition":"2"},{"key":"CIT0009","doi-asserted-by":"publisher","DOI":"10.1016\/0167-4048(87)90068-X"},{"key":"CIT0011","volume-title":"An introduction to Risk Management","author":"Crockford N.","year":"1980"},{"key":"CIT0012","volume-title":"Risk Benefit Analysis","author":"Crouch E.A.C.","year":"1982"},{"key":"CIT0013","volume-title":"Corporate Risk Management","author":"Doherty N.A.","year":"1985"},{"key":"CIT0014","first-page":"37","volume":"47","author":"Emmett A.","year":"1988","journal-title":"Network World"},{"key":"CIT0016","first-page":"14","volume":"9","author":"Farthing D.","year":"1987","journal-title":"National Underwriter"},{"issue":"1","key":"CIT0018","first-page":"36","volume":"2","author":"Gerard T.","year":"1990","journal-title":"Datacenter Manager"},{"issue":"10","key":"CIT0019","first-page":"32","volume":"4","author":"Gonnella G.","year":"1988","journal-title":"Information Center"},{"key":"CIT0020","doi-asserted-by":"publisher","DOI":"10.1080\/07399018908960149"},{"issue":"23","key":"CIT0021","first-page":"4","volume":"10","author":"Greenstein I.","year":"1989","journal-title":"Management Information Systems Week"},{"key":"CIT0022","doi-asserted-by":"publisher","DOI":"10.1016\/0167-4048(87)90030-7"},{"key":"CIT0023","first-page":"655","volume-title":"Handbook of MIS Management","author":"Hammond R.","year":"1988","edition":"2"},{"key":"CIT0024","doi-asserted-by":"publisher","DOI":"10.2307\/249195"},{"key":"CIT0025","first-page":"A2","author":"Keller J.J.","year":"1990","journal-title":"Wall Street Journal"},{"key":"CIT0026","doi-asserted-by":"publisher","DOI":"10.1080\/07399018608965276"},{"issue":"12","key":"CIT0028","first-page":"67","volume":"23","author":"Mansur B.J.","year":"1989","journal-title":"Telecommunications"},{"key":"CIT0029","first-page":"27","volume-title":"Corporate Information Systems Management","author":"McFarlan F.W.","year":"1983"},{"key":"CIT0033","unstructured":"National Bureau of Standards. Guidelines for ADP risk analysis. Washington, DC: U.S. Department of Commerce, FIPS Publication 87, March 1981."},{"key":"CIT0034","unstructured":"Newton, J.D. Developing and implementing an EDP disaster contingency plan for a small national bank. Unpublished master\u2019s thesis, Auburn University, 1987."},{"key":"CIT0036","volume-title":"Computer Security Management","author":"Parker D.B.","year":"1981"},{"key":"CIT0037","first-page":"104","author":"Perschke G.A.","year":"1986","journal-title":"Journal of Accountancy"},{"issue":"9","key":"CIT0038","first-page":"18","volume":"5","author":"Pickard R.","year":"1989","journal-title":"Information Center"},{"key":"CIT0039","first-page":"149","volume-title":"Harvard Business Review","author":"Porter M.E.","year":"1985"},{"key":"CIT0040","doi-asserted-by":"publisher","DOI":"10.2307\/249191"},{"key":"CIT0041","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.1986.11517770"},{"key":"CIT0042","first-page":"36","volume-title":"Computer Decisions","author":"Radding A.","year":"1987"},{"issue":"9","key":"CIT0043","first-page":"11","volume":"5","author":"Riemer M.S.","year":"1989","journal-title":"information Center"},{"key":"CIT0044","doi-asserted-by":"publisher","DOI":"10.1016\/0378-7206(85)90037-0"},{"issue":"1","key":"CIT0048","first-page":"30","volume":"2","author":"Stem E.","year":"1990","journal-title":"Datacenter Manager"},{"key":"CIT0050","doi-asserted-by":"publisher","DOI":"10.2307\/249185"},{"key":"CIT0051","doi-asserted-by":"publisher","DOI":"10.1016\/0167-4048(87)90032-0"}],"container-title":["Journal of Management Information Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/07421222.1991.11517914","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,7,16]],"date-time":"2018-07-16T19:38:49Z","timestamp":1531769929000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/07421222.1991.11517914"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1991,6]]},"references-count":35,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2015,12,18]]},"published-print":{"date-parts":[[1991,6]]}},"alternative-id":["10.1080\/07421222.1991.11517914"],"URL":"https:\/\/doi.org\/10.1080\/07421222.1991.11517914","relation":{},"ISSN":["0742-1222","1557-928X"],"issn-type":[{"value":"0742-1222","type":"print"},{"value":"1557-928X","type":"electronic"}],"subject":[],"published":{"date-parts":[[1991,6]]}}}