{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,12]],"date-time":"2026-02-12T14:13:11Z","timestamp":1770905591337,"version":"3.50.1"},"reference-count":81,"publisher":"Informa UK Limited","issue":"7","content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Enterprise Information Systems"],"published-print":{"date-parts":[[2020,8,8]]},"DOI":"10.1080\/17517575.2019.1686657","type":"journal-article","created":{"date-parts":[[2019,11,13]],"date-time":"2019-11-13T08:13:11Z","timestamp":1573632791000},"page":"1027-1060","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":13,"title":["Business continuity-inspired fuzzy risk assessment framework for hospital information systems"],"prefix":"10.1080","volume":"14","author":[{"given":"S.","family":"Motevali Haghighi","sequence":"first","affiliation":[{"name":"University of Tehran","place":["Tehran, Iran"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9764-9679","authenticated-orcid":false,"given":"S. Ali","family":"Torabi","sequence":"additional","affiliation":[{"name":"University of Tehran","place":["Tehran, Iran"]}]}],"member":"301","published-online":{"date-parts":[[2019,11,13]]},"reference":[{"key":"e_1_3_3_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.09.011"},{"key":"e_1_3_3_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijpe.2014.11.013"},{"key":"e_1_3_3_4_1","doi-asserted-by":"publisher","DOI":"10.1197\/jamia.M1471"},{"key":"e_1_3_3_5_1","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.1993.11518006"},{"key":"e_1_3_3_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2014.2334493"},{"key":"e_1_3_3_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24852-1_21"},{"key":"e_1_3_3_8_1","volume-title":"Business Continuity Management \u2013 Part2: Specification Business Continuity Management","author":"BS25999, B.S.","year":"2007","unstructured":"BS25999, B.S.. 2007. Business Continuity Management \u2013 Part2: Specification Business Continuity Management. British Standards Institution (BSI)."},{"key":"e_1_3_3_9_1","doi-asserted-by":"publisher","DOI":"10.1108\/K-12-2017-0497"},{"key":"e_1_3_3_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2014.11.025"},{"issue":"2","key":"e_1_3_3_11_1","first-page":"185","article-title":"Some Properties of Graded Mean Integration Representation of LR Type Fuzzy Numbers","volume":"22","author":"Chen S. H.","year":"2006","unstructured":"Chen, S. H., S. T. Wang, and S. M. Chang. 2006. \u201cSome Properties of Graded Mean Integration Representation of LR Type Fuzzy Numbers.\u201d Tamsui Oxford Journal of Mathematical Sciences 22 (2): 185.","journal-title":"Tamsui Oxford Journal of Mathematical Sciences"},{"key":"e_1_3_3_12_1","doi-asserted-by":"publisher","DOI":"10.1108\/09685220910978103"},{"key":"e_1_3_3_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jenvman.2019.06.038"},{"key":"e_1_3_3_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2015.09.003"},{"key":"e_1_3_3_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2018.08.008"},{"key":"e_1_3_3_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12525-013-0150-6"},{"key":"e_1_3_3_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10799-005-5880-5"},{"key":"e_1_3_3_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ssci.2017.10.018"},{"key":"e_1_3_3_19_1","doi-asserted-by":"publisher","DOI":"10.3390\/app7101037"},{"key":"e_1_3_3_20_1","doi-asserted-by":"publisher","DOI":"10.1080\/17517575.2014.986217"},{"key":"e_1_3_3_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2013.02.036"},{"key":"e_1_3_3_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2010.06.005"},{"key":"e_1_3_3_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijmedinf.2009.08.006"},{"issue":"1","key":"e_1_3_3_24_1","first-page":"51","article-title":"Information System Security Threats Classifications","volume":"31","author":"Geri\u0107 S.","year":"2007","unstructured":"Geri\u0107, S., and \u017d. Hutinski. 2007. \u201cInformation System Security Threats Classifications.\u201d Journal of Information and Organizational Sciences 31 (1): 51\u201361.","journal-title":"Journal of Information and Organizational Sciences"},{"issue":"10","key":"e_1_3_3_25_1","first-page":"32","article-title":"Making Expensive Decisions","volume":"4","author":"Gonnella G.","year":"1988","unstructured":"Gonnella, G. 1988. \u201cMaking Expensive Decisions.\u201d Information Center 4 (10): 32\u201335.","journal-title":"Information Center"},{"key":"e_1_3_3_26_1","doi-asserted-by":"publisher","DOI":"10.1080\/07399018908960149"},{"key":"e_1_3_3_27_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2005.06.002"},{"key":"e_1_3_3_28_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jlp.2015.11.023"},{"key":"e_1_3_3_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1101908.1101935"},{"key":"e_1_3_3_30_1","doi-asserted-by":"publisher","DOI":"10.1108\/09685229610114178"},{"key":"e_1_3_3_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICRIIS.2017.8002450"},{"key":"e_1_3_3_32_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ssci.2017.10.025"},{"key":"e_1_3_3_33_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2013.03.001"},{"key":"e_1_3_3_34_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejor.2005.10.002"},{"key":"e_1_3_3_35_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2016.04.227"},{"key":"e_1_3_3_36_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2014.05.452"},{"key":"e_1_3_3_37_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2015.05.024"},{"key":"e_1_3_3_38_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ssci.2018.04.031"},{"key":"e_1_3_3_39_1","doi-asserted-by":"publisher","DOI":"10.1016\/0165-0114(92)90318-X"},{"key":"e_1_3_3_40_1","volume-title":"A Threat Tree for Health Information Security and Privacy","author":"Landry J. P.","year":"2011","unstructured":"Landry, J. P., J. H. Pardue, T. Johnsten, M. Campbell, and P. Patidar. 2011 August. A Threat Tree for Health Information Security and Privacy. In AMCIS,\u00a017th Americas Conference on Information Systems, Detroit, Michigan, USA, August, 4-8."},{"key":"e_1_3_3_41_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2006.08.022"},{"key":"e_1_3_3_42_1","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222230205"},{"key":"e_1_3_3_43_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbi.2005.10.003"},{"key":"e_1_3_3_44_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0020-7373(75)80002-2"},{"key":"e_1_3_3_45_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jhazmat.2008.03.055"},{"key":"e_1_3_3_46_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2012.08.018"},{"key":"e_1_3_3_47_1","doi-asserted-by":"publisher","DOI":"10.1177\/1460458210377468"},{"key":"e_1_3_3_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/1839294.1839331"},{"issue":"1","key":"e_1_3_3_49_1","first-page":"106","article-title":"Threats to Healthcare Date: A Threat Tree for Risk Assessment","volume":"12","author":"Pardue J. H.","year":"2011","unstructured":"Pardue, J. H., and P. Patidar. 2011. \u201cThreats to Healthcare Date: A Threat Tree for Risk Assessment.\u201d Issues in Information Systems 12 (1): 106\u2013113.","journal-title":"Issues in Information Systems"},{"key":"e_1_3_3_50_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2008.01.009"},{"key":"e_1_3_3_51_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2015.04.126"},{"key":"e_1_3_3_52_1","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.1991.11517914"},{"key":"e_1_3_3_53_1","doi-asserted-by":"publisher","DOI":"10.1080\/09537287.2016.1190877"},{"key":"e_1_3_3_54_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jclepro.2016.06.125"},{"key":"e_1_3_3_55_1","doi-asserted-by":"publisher","DOI":"10.1080\/00207543.2018.1483586"},{"key":"e_1_3_3_56_1","doi-asserted-by":"publisher","DOI":"10.1108\/01443570710725563"},{"key":"e_1_3_3_57_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejor.2014.09.055"},{"key":"e_1_3_3_58_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijpe.2017.12.009"},{"key":"e_1_3_3_59_1","doi-asserted-by":"publisher","DOI":"10.1109\/IAS.2009.312"},{"key":"e_1_3_3_60_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2017.07.022"},{"key":"e_1_3_3_61_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.envsoft.2015.10.003"},{"key":"e_1_3_3_62_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2019.105559"},{"key":"e_1_3_3_63_1","doi-asserted-by":"publisher","DOI":"10.4236\/jis.2012.32020"},{"key":"e_1_3_3_64_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-016-0591-5"},{"key":"e_1_3_3_65_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2014.07.005"},{"key":"e_1_3_3_66_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-4048(02)00313-9"},{"key":"e_1_3_3_67_1","volume-title":"Sp 800-30. Risk Management Guide for Information Technology Systems","author":"Stoneburner G.","year":"2002","unstructured":"Stoneburner, G., A. Y. Goguen, and A. Feringa. 2002. Sp 800-30. Risk Management Guide for Information Technology Systems. National Institute of Standards and Technology (NIST), NIST Special Publication 800-30."},{"key":"e_1_3_3_68_1","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222220405"},{"key":"e_1_3_3_69_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ssci.2016.06.015"},{"key":"e_1_3_3_70_1","doi-asserted-by":"publisher","DOI":"10.1108\/IMDS-09-2017-0384"},{"key":"e_1_3_3_71_1","doi-asserted-by":"publisher","DOI":"10.1145\/859670"},{"key":"e_1_3_3_72_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2003.12.003"},{"key":"e_1_3_3_73_1","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.1994.13"},{"key":"e_1_3_3_74_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0950-5849(03)00010-7"},{"key":"e_1_3_3_75_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ssci.2018.03.005"},{"key":"e_1_3_3_76_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2007.05.003"},{"key":"e_1_3_3_77_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2011.07.129"},{"key":"e_1_3_3_78_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0019-9958(65)90241-X"},{"key":"e_1_3_3_79_1","doi-asserted-by":"publisher","DOI":"10.1080\/17517575.2012.690049"},{"key":"e_1_3_3_80_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.energy.2018.11.129"},{"key":"e_1_3_3_81_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jclepro.2015.11.042"},{"key":"e_1_3_3_82_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSESS.2017.8342953"}],"container-title":["Enterprise Information Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/17517575.2019.1686657","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,12]],"date-time":"2026-02-12T13:21:52Z","timestamp":1770902512000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/17517575.2019.1686657"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11,13]]},"references-count":81,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2020,8,8]]}},"alternative-id":["10.1080\/17517575.2019.1686657"],"URL":"https:\/\/doi.org\/10.1080\/17517575.2019.1686657","relation":{},"ISSN":["1751-7575","1751-7583"],"issn-type":[{"value":"1751-7575","type":"print"},{"value":"1751-7583","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,11,13]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=teis20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=teis20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2019-04-29","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2019-10-26","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2019-11-13","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}