{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T18:01:09Z","timestamp":1754157669836,"version":"3.41.2"},"reference-count":6,"publisher":"Emerald","issue":"3","license":[{"start":{"date-parts":[[1998,8,1]],"date-time":"1998-08-01T00:00:00Z","timestamp":901929600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1998,8,1]]},"abstract":"<jats:p>Many large organizations maintain a significant amount of their data in what are currently referred to as legacy systems. In order to provide end users access to the firm\u2019s legacy applications many organizations have opted to provide what is referred to as a database gateway system. An organization must be able to calculate its exposure in the event of a disaster occurring. Performance, recovery and monitoring considerations of the database gateway system have to be included in the risk analysis. The traditional approach to performing a risk analysis adheres to the procedure: identify the exposures or threats to the system; identify the assets at risk; determine the probability of the exposures happening; compute the expected loss for each asset and threat; consider the impact of existing controls; run a high\/low analysis to determine the domain of risk exposure. Explains, in non\u2010technical terms, the basic concepts of the application of fuzzy logic modelling to risk analysis.<\/jats:p>","DOI":"10.1108\/09685229810225047","type":"journal-article","created":{"date-parts":[[2002,7,27]],"date-time":"2002-07-27T02:08:10Z","timestamp":1027735690000},"page":"138-144","source":"Crossref","is-referenced-by-count":3,"title":["Database gateway processor risk analysis using fuzzy logic"],"prefix":"10.1108","volume":"6","author":[{"given":"Donald R.","family":"Moscato","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"140","reference":[{"key":"key2022031220461174800_b1","unstructured":"Burnette, D. (1995), \u201cMATLIB adopts fuzzy logic approach\u201d, Advanced Systems, March."},{"key":"key2022031220461174800_b2","unstructured":"Fuziware Inc. (1994), Fuzicalc User\u2019s Guide, version 1.5, Fuziware, Inc."},{"key":"key2022031220461174800_b3","doi-asserted-by":"crossref","unstructured":"Kosko, B. (1993), Fuzzy Thinking: The New Science of Fuzzy Logic, Hyperion, New York, NY.","DOI":"10.1038\/scientificamerican0793-76"},{"key":"key2022031220461174800_b4","unstructured":"McNeil, D. and Freiberger, P. (1993), Fuzzy Logic: The Discovery of a Revolutionary Computer Technology, Simon & Schuster, New York, NY."},{"key":"key2022031220461174800_b5","unstructured":"Moscato, D. (1996), \u201cFuzzy logic applied to budgeting: an intuitive approach to coping with uncertainty\u201d, in Rachlin, R. and Sweeny, H.W. (Eds), Handbook of Budgeting (3rd Ed.), Cumulative Supplement, John Wiley & Sons, New York, NY."},{"key":"key2022031220461174800_b6","unstructured":"Yager, R., Ovchinnikov, S., Tong, R. and Nguyen, H.T. (Eds) (1987), Fuzzy Sets and Applications: Selected Papers of Lofti Zadeh, John Wiley & Sons, New York, NY."}],"container-title":["Information Management &amp; Computer Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/09685229810225047","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/09685229810225047\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/09685229810225047\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,25]],"date-time":"2025-07-25T00:09:48Z","timestamp":1753402188000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/ics\/article\/6\/3\/138-144\/186187"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1998,8,1]]},"references-count":6,"journal-issue":{"issue":"3","published-print":{"date-parts":[[1998,8,1]]}},"alternative-id":["10.1108\/09685229810225047"],"URL":"https:\/\/doi.org\/10.1108\/09685229810225047","relation":{},"ISSN":["0968-5227"],"issn-type":[{"type":"print","value":"0968-5227"}],"subject":[],"published":{"date-parts":[[1998,8,1]]}}}