{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T17:26:33Z","timestamp":1754155593680,"version":"3.41.2"},"reference-count":25,"publisher":"Emerald","issue":"5","license":[{"start":{"date-parts":[[2014,4,29]],"date-time":"2014-04-29T00:00:00Z","timestamp":1398729600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,4,29]]},"abstract":"<jats:sec>\n               <jats:title content-type=\"abstract-heading\">Purpose<\/jats:title>\n               <jats:p> \u2013 In a risk analysis system, different underlying indices often play different roles in identifying the risk scale of the total target in a system, so a concept of discriminatory weight is introduced first. With the help of discriminatory weight and membership functions, a new method for information security risk analysis is proposed. The purpose of this paper is to discuss the above issues. <\/jats:p>\n            <\/jats:sec>\n            <jats:sec>\n               <jats:title content-type=\"abstract-heading\">Design\/methodology\/approach<\/jats:title>\n               <jats:p> \u2013 First, a concept of discriminatory weight is introduced. Second, with the help of fuzzy sets, risk scales are captured in terms of fuzzy sets (namely their membership functions). Third, a new risk analysis method involving discriminatory weights is proposed to realize a transformation from the membership degrees of the underlying indices to the membership degrees of the total target. At last, an example of information security risk analysis shows the effectiveness and feasibleness of the new method. <\/jats:p>\n            <\/jats:sec>\n            <jats:sec>\n               <jats:title content-type=\"abstract-heading\">Findings<\/jats:title>\n               <jats:p> \u2013 The new method generalizes the weighted-average method. The comparative analysis done with respect to other two methods show that the proposed method exhibits higher classification accuracy. Therefore, the proposed method can be applied to other risk analysis system with a hierarchial. <\/jats:p>\n            <\/jats:sec>\n            <jats:sec>\n               <jats:title content-type=\"abstract-heading\">Originality\/value<\/jats:title>\n               <jats:p> \u2013 This paper proposes a new method for information security risk analysis with the help of membership functions and the concept of discriminatory weight. The new method generalizes the weighted-average method. Comparative analysis done with respect to other two methods show that the proposed method exhibits higher classification accuracy in E-government information security system. What is more, the proposed method can be applied to other risk analysis system with a hierarchial.<\/jats:p>\n            <\/jats:sec>","DOI":"10.1108\/k-10-2013-0235","type":"journal-article","created":{"date-parts":[[2014,5,29]],"date-time":"2014-05-29T10:06:29Z","timestamp":1401357989000},"page":"686-698","source":"Crossref","is-referenced-by-count":5,"title":["A new information security risk analysis method based on membership degree"],"prefix":"10.1108","volume":"43","author":[{"given":"Jiqiang","family":"Chen","sequence":"first","affiliation":[]},{"given":"Witold","family":"Pedrycz","sequence":"additional","affiliation":[]},{"given":"Litao","family":"Ma","sequence":"additional","affiliation":[]},{"given":"Chao","family":"Wang","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"key":"key2021010123134814000_b1","doi-asserted-by":"crossref","unstructured":"Armando, A.\n                and \n                  Compagna, L.\n                (2008), \u201cSAT-based model-checking for security protocols analysis\u201d, International Journal of Information Security, Vol. 7 No. 1, pp. 3-32.","DOI":"10.1007\/s10207-007-0041-y"},{"key":"key2021010123134814000_b2","doi-asserted-by":"crossref","unstructured":"Ates, M.\n               , \n                  Buccafurri, F.\n               , \n                  Fayolle, J.\n                and \n                  Lax, G.\n                (2012), \u201cA warning on how to implement anonymous credential protocols into the information card framework\u201d, International Journal of Information Security, Vol. 11 No. 1, pp. 33-40.","DOI":"10.1007\/s10207-011-0150-5"},{"key":"key2021010123134814000_b3","doi-asserted-by":"crossref","unstructured":"Bai, Y.\n               , \n                  Yao, Z.\n               , \n                  Li, H.\n                and \n                  Zhang, Y.Q.\n                (2012), \u201cRisk assessment for information security based on fuzzy membership matrix\u201d, Network Computing and Information Security, Vol. 345, pp. 547-554.","DOI":"10.1007\/978-3-642-35211-9_69"},{"key":"key2021010123134814000_b4","unstructured":"Bolle, S.R.\n               , \n                  Hasvold, P.\n                and \n                  Henriksen, E.\n                (2011), \u201cVideo calls from lay bystanders to dispatch centers \u2013 risk assessment of information security\u201d, BMC Health Services Research, Vol. 11, p. -, available at: www.biomedcentral.com\/1472-6963\/11\/244"},{"key":"key2021010123134814000_b5","doi-asserted-by":"crossref","unstructured":"Chen, B.\n               , \n                  Liu, X.P.\n                and \n                  Tong, S.C.\n                (2007), \u201cNew delay-dependent stabilization conditions of T-S fuzzy systems with constant delay\u201d, Fuzzy Sets and Systems, Vol. 158 No. 20, pp. 2209-2224.","DOI":"10.1016\/j.fss.2007.02.018"},{"key":"key2021010123134814000_b6","doi-asserted-by":"crossref","unstructured":"Chen, Y.Z.\n               , \n                  Fung, R.Y.K.\n                and \n                  Tang, J.F.\n                (2006), \u201cRating technical attributes in fuzzy QFD by integrating fuzzy weighted average method and fuzzy expected value operator\u201d, European Journal of Operational Research, Vol. 174 No. 3, pp. 1553-1566.","DOI":"10.1016\/j.ejor.2004.12.026"},{"key":"key2021010123134814000_b7","unstructured":"Cheng, Q.S.\n                (1997), \u201cA model of property identification and its application\u201d, Acta Scientiarum Naturalium Universitatis Pekinensis, Vol. 33 No. 1, pp. 12-20."},{"key":"key2021010123134814000_b8","doi-asserted-by":"crossref","unstructured":"Dent, A.W.\n                (2008), \u201cA survey of certificateless encryption schemes and security models\u201d, International Journal of Information Security, Vol. 7 No. 5, pp. 349-377.","DOI":"10.1007\/s10207-008-0055-0"},{"key":"key2021010123134814000_b9","unstructured":"Dogu, Z.F.E.\n                and \n                  Celikoglu, C.C.\n                (2012), \u201cInformation security risk assessment: Bayesian prioritization for AHP group decision making\u201d, International Journal of Innovative Computing, Information and Control, Vol. 8 No. 11, pp. 8019-8032."},{"key":"key2021010123134814000_b10","doi-asserted-by":"crossref","unstructured":"Dombi, J.\n                (1990), \u201cMembership function as an evaluation\u201d, Fuzzy Sets and Systems, Vol. 35 No. 1, pp. 1-21.","DOI":"10.1016\/0165-0114(90)90014-W"},{"key":"key2021010123134814000_b11","doi-asserted-by":"crossref","unstructured":"Feng, N.\n                and \n                  Li, M.Q.\n                (2011), \u201cAn information systems security risk assessment model under uncertain environment\u201d, Applied Soft Computing, Vol. 11 No. 7, pp. 4332-4340.","DOI":"10.1016\/j.asoc.2010.06.005"},{"key":"key2021010123134814000_b12","unstructured":"ISO\/IEC 27002\n                (2005), Information Technology \u2013 Security Techniques \u2013 Code of Practice for Information Security Management, International Organization for Standardization (ISO)."},{"key":"key2021010123134814000_b13","doi-asserted-by":"crossref","unstructured":"Jiang, W.\n               , \n                  Fan, X.\n               , \n                  Duanmu, D.\n                and \n                  Deng, Y.\n                (2013), \u201cA new security risk assessment method of website based on generalized fuzzy numbers\u201d, Journal of Computers, Vol. 8 No. 1, pp. 136-145.","DOI":"10.4304\/jcp.8.1.136-145"},{"key":"key2021010123134814000_b14","doi-asserted-by":"crossref","unstructured":"Kruszewski, A.\n               , \n                  Wang, R.\n                and \n                  Guerra, T.M.\n                (2008), \u201cNonquadratic stabilization conditions for a class of uncertain nonlinear discrete time T-S fuzzy models: a new approach\u201d, IEEE Transactions on Automatic Control, Vol. 53 No. 2, pp. 606-611.","DOI":"10.1109\/TAC.2007.914278"},{"key":"key2021010123134814000_b15","doi-asserted-by":"crossref","unstructured":"Lee, M.C.\n                (2014), \u201cInformation security risk analysis methods and research trends: AHP and fuzzy comprehensive method\u201d, International Journal of Computer Science & Information Technology, Vol. 6 No. 1, pp. 29-45.","DOI":"10.5121\/ijcsit.2014.6103"},{"key":"key2021010123134814000_b16","doi-asserted-by":"crossref","unstructured":"Liu, L.\n               , \n                  Bao, T.G.\n               , \n                  Yuan, J.H.\n                and \n                  Li, C.B.\n                (2013), \u201cRisk assessment of information security based on Grey incidence and D-S theory of evidence\u201d, Journal of Applied Sciences, Vol. 13 No. 10, pp. 1740-1745.","DOI":"10.3923\/jas.2013.1740.1745"},{"key":"key2021010123134814000_b17","doi-asserted-by":"crossref","unstructured":"Lo, C.C.\n                and \n                  Chen, W.J.\n                (2012), \u201cA hybrid information security risk assessment procedure considering interdependences between controls\u201d, Expert Systems with Applications, Vol. 39 No. 1, pp. 247-257.","DOI":"10.1016\/j.eswa.2011.07.015"},{"key":"key2021010123134814000_b18","unstructured":"Ren, S.\n               , \n                  Mu, D.J.\n                and \n                  Zhu, L.B.\n                (2006), \u201cModel of information security evaluation based on gray analytical hierarchy process\u201d, Journal of Computer Applications, Vol. 26 No. 9, pp. 2111-2113."},{"key":"key2021010123134814000_b19","doi-asserted-by":"crossref","unstructured":"Shamala, P.\n               , \n                  Ahmad, R.\n                and \n                  Yusoff, M.\n                (2013), \u201cA conceptual framework of info structure for information security risk assessment\u201d, Journal of Information Security and Applications, Vol. 18 No. 1, pp. 45-52.","DOI":"10.1016\/j.jisa.2013.07.002"},{"key":"key2021010123134814000_b20","unstructured":"Sun, W.H.\n                and \n                  He, D.Q.\n                (2006), \u201cThe fuzzy integrated assessment of information security from qualitative to quantitative\u201d, Systems Engineering-Theory and Practice, Vol. 12, pp. 93-98."},{"key":"key2021010123134814000_b21","doi-asserted-by":"crossref","unstructured":"Tian, E.G.\n                and \n                  Peng, C.\n                (2006), \u201cDelay-dependent stability analysis and synthesis of uncertain T-S fuzzy systems with time-varying delay\u201d, Fuzzy Sets and Systems, Vol. 157 No. 4, pp. 544-559.","DOI":"10.1016\/j.fss.2005.06.022"},{"key":"key2021010123134814000_b22","doi-asserted-by":"crossref","unstructured":"Yang, Y.P.O.\n               , \n                  Shieh, H.M.\n                and \n                  Tzeng, G.H.\n                (2013), \u201cA VIKOR technique based on DEMATEL and ANP for information security risk control assessment\u201d, Information Sciences, Vol. 232, pp. 482-500.","DOI":"10.1016\/j.ins.2011.09.012"},{"key":"key2021010123134814000_b23","doi-asserted-by":"crossref","unstructured":"Yucel, G.\n               , \n                  Cebi, S.\n               , \n                  Hoege, B.\n                and \n                  Ozok, A.F.\n                (2012), \u201cA fuzzy risk assessment model for hospital information system implementation\u201d, Expert Systems with Applications, Vol. 39 No. 1, pp. 1211-1218.","DOI":"10.1016\/j.eswa.2011.07.129"},{"key":"key2021010123134814000_b24","doi-asserted-by":"crossref","unstructured":"Zhang, T.J.\n               , \n                  Feng, G.\n                and \n                  Lu, J.H.\n                (2007), \u201cFuzzy constrained min-max model predictive control based on piecewise lyapunov functions\u201d, IEEE Transactions on Fuzzy Systems, Vol. 15 No. 4, pp. 686-698.","DOI":"10.1109\/TFUZZ.2006.889908"},{"key":"key2021010123134814000_b25","unstructured":"Zhao, D.M.\n               , \n                  Liu, H.F.\n                and \n                  Zhang, J.P.\n                (2009), \u201cModel of risk assessment of information security based on fuzzy neural network\u201d, Computer Engineering and Applications, Vol. 45, pp. 116-124."}],"container-title":["Kybernetes"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/K-10-2013-0235","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/K-10-2013-0235\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/K-10-2013-0235\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T21:50:28Z","timestamp":1753393828000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/k\/article\/43\/5\/686-698\/272756"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,4,29]]},"references-count":25,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2014,4,29]]}},"alternative-id":["10.1108\/K-10-2013-0235"],"URL":"https:\/\/doi.org\/10.1108\/k-10-2013-0235","relation":{},"ISSN":["0368-492X"],"issn-type":[{"type":"print","value":"0368-492X"}],"subject":[],"published":{"date-parts":[[2014,4,29]]}}}