{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T20:09:05Z","timestamp":1729627745609,"version":"3.28.0"},"reference-count":13,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,8]]},"DOI":"10.1109\/icnc.2010.5583696","type":"proceedings-article","created":{"date-parts":[[2010,9,29]],"date-time":"2010-09-29T14:03:07Z","timestamp":1285768987000},"page":"1105-1109","source":"Crossref","is-referenced-by-count":0,"title":["IT operational risk assessment and control model based on Bayesian Network"],"prefix":"10.1109","author":[{"given":"Xiaoling","family":"Hao","sequence":"first","affiliation":[]},{"given":"Nan","family":"Yang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1108\/09685229610114178"},{"key":"ref11","first-page":"29","article-title":"Information system risks and risk factors: Are they mostly about information systems?","volume":"1 4","author":"sherer","year":"2004","journal-title":"Communications of the AIS"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"-28i","DOI":"10.17705\/1CAIS.01401","article-title":"A general, but readily adaptable model of information system risk","volume":"14","author":"alter","year":"2004","journal-title":"Communications of The Association for Information Systems"},{"key":"ref13","first-page":"491","article-title":"Research on the Bayesian networks model in situation assessment","volume":"36","author":"chai","year":"0","journal-title":"Journal of Xidian University"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"3","DOI":"10.21314\/JOP.2007.030","article-title":"The Quantification of Operational Risk using Internal Data, Relevant External Data and Expert Opinions","volume":"2","author":"d dominik","year":"2007","journal-title":"Journal of Operational Risk"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/S0378-7206(03)00044-2"},{"key":"ref6","article-title":"Perceptions of Information Technology risk: a Delphi study","author":"james","year":"2007","journal-title":"Conference of AMCIS"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1057\/palgrave.jit.2000122"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"3","DOI":"10.21314\/JOP.2006.016","article-title":"The Structural Modeling of Operational Risk via Bayesian inference: Combining Loss Data with Expert Opinions","volume":"l","author":"shevchenko","year":"2006","journal-title":"The Journal of Operational Risk"},{"key":"ref7","article-title":"Integrating Risks in Business Process Models","author":"muehlen","year":"2005","journal-title":"16th Australasian Conference on Information Systems Integrating Risks in Business Process Models"},{"journal-title":"International Convergence of Capital Measurement and Capital Standards a Revised Model","year":"2004","key":"ref2"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1539-6924.2005.00641.x"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"27","DOI":"10.21314\/JOP.2006.014","article-title":"Bayesian inference, Monte Carlo sampling and operational risk","volume":"1","author":"peters","year":"2006","journal-title":"Journal of Operational Risk"}],"event":{"name":"2010 Sixth International Conference on Natural Computation (ICNC)","start":{"date-parts":[[2010,8,10]]},"location":"Yantai, China","end":{"date-parts":[[2010,8,12]]}},"container-title":["2010 Sixth International Conference on Natural Computation"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5564900\/5582533\/05583696.pdf?arnumber=5583696","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,5]],"date-time":"2019-06-05T00:23:15Z","timestamp":1559694195000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5583696\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,8]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/icnc.2010.5583696","relation":{},"subject":[],"published":{"date-parts":[[2010,8]]}}}