{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T03:15:12Z","timestamp":1730258112650,"version":"3.28.0"},"reference-count":12,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/icsmc.2004.1400993","type":"proceedings-article","created":{"date-parts":[[2005,3,31]],"date-time":"2005-03-31T13:26:51Z","timestamp":1112275611000},"page":"5044-5049","source":"Crossref","is-referenced-by-count":2,"title":["Decision support for information systems selection"],"prefix":"10.1109","volume":"6","author":[{"given":"L.","family":"Mikhailov","sequence":"first","affiliation":[]},{"given":"A.","family":"Masizana","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"3","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.1991.20"},{"journal-title":"Opportunities and Risks","year":"1991","author":"angel","key":"2"},{"journal-title":"The Analytic Hierarchy Process","year":"1980","author":"saaty","key":"10"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1061\/(ASCE)9742-597X(1994)10:3(65)"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1016\/S0305-0483(99)00029-8"},{"journal-title":"Practical Risk Analysis an Application through Case Histories","year":"1984","author":"hertz","key":"6"},{"journal-title":"Fuzzy Sets and Systems Theory and Applications","year":"1980","author":"duboi","key":"5"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/52.62930"},{"journal-title":"Computer Security Risk Management in Action","year":"1978","author":"pritchard","key":"9"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1016\/S0165-0114(02)00383-4"},{"key":"11","first-page":"369","article-title":"The three dimensions of software risk","author":"sherer","year":"1995","journal-title":"Proceedings HICSS"},{"key":"12","first-page":"203","article-title":"Risk management in information systems: Problems and potential","volume":"7","author":"smith","year":"2001","journal-title":"Communications in IS"}],"event":{"name":"2004 IEEE International Conference on Systems, Man and Cybernetics (IEEE Cat. No.04CH37583)","acronym":"ICSMC-04","location":"The Hague, Netherlands"},"container-title":["2004 IEEE International Conference on Systems, Man and Cybernetics (IEEE Cat. No.04CH37583)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/9622\/30425\/01400993.pdf?arnumber=1400993","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,14]],"date-time":"2017-03-14T18:46:13Z","timestamp":1489517173000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1400993\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/icsmc.2004.1400993","relation":{},"subject":[]}}