{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T21:50:12Z","timestamp":1729633812384,"version":"3.28.0"},"reference-count":54,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,6]]},"DOI":"10.1109\/fuzzy.2011.6007586","type":"proceedings-article","created":{"date-parts":[[2011,9,12]],"date-time":"2011-09-12T16:27:07Z","timestamp":1315844827000},"page":"2026-2032","source":"Crossref","is-referenced-by-count":1,"title":["Applying Fuzzy AHP to study the KSFs of information security management"],"prefix":"10.1109","author":[{"given":"Jen-Sheng","family":"Wang","sequence":"first","affiliation":[]},{"given":"Che-Hung","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Joseph Z.","family":"Shyu","sequence":"additional","affiliation":[]},{"given":"Hsiao-Wen","family":"Huang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"35","doi-asserted-by":"publisher","DOI":"10.2307\/2392145"},{"key":"36","doi-asserted-by":"publisher","DOI":"10.2307\/249362"},{"key":"33","doi-asserted-by":"publisher","DOI":"10.1016\/0377-2217(93)E0224-L"},{"journal-title":"The KJ method","year":"1986","author":"kawakita","key":"34"},{"key":"39","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-4048(00)08019-6"},{"key":"37","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.1060.0583"},{"key":"38","doi-asserted-by":"publisher","DOI":"10.1016\/0955-1662(96)00158-0"},{"key":"43","doi-asserted-by":"publisher","DOI":"10.1108\/09685220610690817"},{"key":"42","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-4048(98)80066-7"},{"key":"41","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2008.03.002"},{"key":"40","doi-asserted-by":"crossref","first-page":"337","DOI":"10.1016\/S0167-4048(03)00413-9","article-title":"An integral framework for information systems security management","volume":"22","author":"treek","year":"2003","journal-title":"Computers & Security"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1016\/0007-6813(82)90123-9"},{"journal-title":"Strategy Formulation Analytical Concepts","year":"1978","author":"hofer","key":"23"},{"key":"24","first-page":"85","article-title":"Chief executives define their own data needs","author":"rockart","year":"1979","journal-title":"Harvard Business Review"},{"journal-title":"Crafting and Implementing Strategy","year":"1998","author":"thompson","key":"25"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1016\/S0165-0114(83)80082-7"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1016\/0165-0114(85)90090-9"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1016\/0165-0114(89)90187-5"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1016\/0377-2217(95)00300-2"},{"key":"3","doi-asserted-by":"crossref","first-page":"283","DOI":"10.2307\/25148636","article-title":"Review: Information technology and organizational performance: An integrative model of IT business value","volume":"28","author":"melville","year":"2004","journal-title":"MIS Quarterly"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.2307\/249630"},{"key":"1","first-page":"149","article-title":"How information gives you competitive advantage","author":"porter","year":"1999","journal-title":"Harvard Business Review"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/383694.383709"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1016\/S0165-0114(02)00383-4"},{"key":"6","doi-asserted-by":"crossref","first-page":"530","DOI":"10.1007\/11836810_38","article-title":"Managing information systems security: Critical success factors and indicators to measure effectiveness","volume":"4176","author":"torres","year":"2006","journal-title":"Lecture Notes in Computer Science"},{"key":"5","first-page":"39","article-title":"In security: Is technology putting your company's primary asset it's information at risk?","volume":"148","author":"dellecava jr","year":"1996","journal-title":"Sales and Marketing Management"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1016\/0377-2217(89)90231-2"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1097-0266(199705)18:5<375::AID-SMJ876>3.0.CO;2-7"},{"key":"31","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1016\/0165-0114(95)00303-7","article-title":"On fuzzy ratio comparisons in hierarchical decision models","volume":"84","author":"salo","year":"1996","journal-title":"Fuzzy Set and Systems"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-4048(02)00414-5"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1016\/S0268-4012(02)00105-6"},{"key":"19","first-page":"107","article-title":"Management information crisis","volume":"39","author":"dainel","year":"1961","journal-title":"Harvard Business Review"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1080\/00207540210140059"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1111\/j.1540-5915.1989.tb01887.x"},{"key":"15","first-page":"120","article-title":"The myth of secure computing","volume":"81","author":"austin","year":"2003","journal-title":"Harvard Business Review"},{"journal-title":"The Analytic Hierarchy Process","year":"1980","author":"saaty","key":"16"},{"journal-title":"Fighting Computer Crime A New Framework for Protecting Information","year":"1998","author":"parker","key":"13"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-4048(01)00705-2"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-4048(01)00803-3"},{"journal-title":"Computer Security","year":"1999","author":"gollmann","key":"12"},{"key":"21","first-page":"19","article-title":"An assessment of critical success factor","author":"boynton","year":"1984","journal-title":"Sloan Management Review"},{"journal-title":"Strategic Market Management","year":"1984","author":"aakers","key":"20"},{"key":"49","doi-asserted-by":"publisher","DOI":"10.1016\/0167-4048(94)90042-6"},{"key":"48","first-page":"20","article-title":"How to protect your information - An introduction to BS7799","volume":"43","author":"lillywhite","year":"1999","journal-title":"Management Services"},{"key":"45","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-4048(97)85785-9"},{"key":"44","doi-asserted-by":"publisher","DOI":"10.1287\/isre.12.3.304.9708"},{"key":"47","doi-asserted-by":"publisher","DOI":"10.1145\/1107458.1107465"},{"key":"46","doi-asserted-by":"publisher","DOI":"10.1046\/j.1365-2575.2001.00099.x"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1016\/0167-4048(96)88939-5"},{"key":"51","first-page":"69","article-title":"Generally accepted system security principles (GASSP)","volume":"13","author":"ozier","year":"1997","journal-title":"Computers & Security"},{"key":"52","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-4048(01)00712-X"},{"journal-title":"Information Security Architecture","year":"2001","author":"tudor","key":"53"},{"key":"54","doi-asserted-by":"publisher","DOI":"10.1080\/03081069308717504"},{"key":"50","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-4048(97)80248-9"}],"event":{"name":"2011 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE)","start":{"date-parts":[[2011,6,27]]},"location":"Taipei, Taiwan","end":{"date-parts":[[2011,6,30]]}},"container-title":["2011 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE 2011)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5976945\/6007305\/06007586.pdf?arnumber=6007586","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,15]],"date-time":"2019-06-15T07:39:37Z","timestamp":1560584377000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6007586\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,6]]},"references-count":54,"URL":"https:\/\/doi.org\/10.1109\/fuzzy.2011.6007586","relation":{},"subject":[],"published":{"date-parts":[[2011,6]]}}}