{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T18:10:29Z","timestamp":1725559829469},"reference-count":42,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,10]]},"DOI":"10.1109\/tencon.2018.8650551","type":"proceedings-article","created":{"date-parts":[[2019,3,18]],"date-time":"2019-03-18T21:10:38Z","timestamp":1552943438000},"page":"2539-2544","source":"Crossref","is-referenced-by-count":1,"title":["Value-at-Risk and Expected Shortfall in Technology Hardware and Equipment Industry Using Fuzzy Model"],"prefix":"10.1109","author":[{"given":"Mayca Joy M.","family":"Amante","sequence":"first","affiliation":[]},{"given":"John Paulo A.","family":"Calinisan","sequence":"additional","affiliation":[]},{"given":"Vicente L.","family":"Co","sequence":"additional","affiliation":[]},{"given":"Venusmar C.","family":"Quevedo","sequence":"additional","affiliation":[]},{"given":"Francispito P.","family":"Quevedo","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TFUZZ.2011.2144599"},{"article-title":"Optimal Portfolios Under a Value at Risk Constraint","year":"2000","author":"vorst","key":"ref38"},{"key":"ref33","first-page":"6","author":"shang","year":"2013","journal-title":"Applying Fuzzy Logic to Risk Assessment and Decision-Making"},{"journal-title":"Value at Risk and Conditional Value at Risk","year":"0","author":"powell","key":"ref32"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/CIFER.1999.771114"},{"article-title":"Applying Fuzzy Set Theory to Evaluate the Rate of Aggregative Risk in Software Development","year":"1995","author":"lee","key":"ref30"},{"article-title":"A Critical Discussion of Risk and Threat Analysis Methods and Methodologies","year":"2004","author":"vidalis","key":"ref37"},{"key":"ref36","first-page":"5","article-title":"Conditional Value-at-Risk (CVaR): Algorithms and Applications","author":"uryasev","year":"2000"},{"article-title":"Value at Risk (Var): The New Benchmark for Managing Market Risk","year":"2002","author":"tardivo","key":"ref35"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1057\/palgrave.jors.2602410"},{"article-title":"Portfolio Optimization with Conditional Value-at-Risk Objective and Constraints","year":"1999","author":"palmquist","key":"ref10"},{"article-title":"Applications of Conditional Value at Risk to Water Resources Management","year":"2009","author":"webby","key":"ref40"},{"article-title":"Portfolio Optimization with Conditional Value-at-Risk Objective and Constraints","year":"1999","author":"palmquist","key":"ref11"},{"key":"ref12","article-title":"Applying Fuzzy Logic to Risk Assessment","author":"shang","year":"2013","journal-title":"Joint Risk Management Section"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1057\/palgrave.jors.2602410"},{"journal-title":"Value at Risk Methodology of International Index Portfolio Under Soft Conditions ( Fuzzy-Stochastic Approach)","year":"2004","author":"zmeskal","key":"ref14"},{"key":"ref15","article-title":"Customers and Markets: Both are Essential to Credit-Risk Measurement in Australian Banks","author":"allen","year":"2011","journal-title":"Australasian Accounting Business and Finance Journal"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1002\/isaf.293"},{"journal-title":"Assessment Questionnaire Examples","year":"0","key":"ref17"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1002\/isaf.294"},{"article-title":"Risk Measures and Their Applications in Asset Management","year":"2008","author":"birbil","key":"ref19"},{"article-title":"Advances in Intelligent and Soft Computing","year":"2014","author":"kacprzyk","key":"ref28"},{"key":"ref4","article-title":"Forensic Risk Analysis","author":"fin","year":"2009","journal-title":"The Finsia Journal of Applied Finance"},{"article-title":"On the Significance of Expected Shortfall","year":"2004","author":"inui","key":"ref27"},{"article-title":"Conditional Value at Risk Applications to the Global Mining Industry","year":"2012","author":"allen","key":"ref3"},{"key":"ref6","first-page":"1","article-title":"Value at Risk: A methodology for Information Security Risk Assessment","author":"jaisingh","year":"2001","journal-title":"Graduate School of Management"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.5772\/37114"},{"article-title":"Fuzzy Stochastic Goal Programming Problems","year":"2005","author":"hop","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/WiCom.2008.2320"},{"key":"ref7","first-page":"1","article-title":"Portfolio Optimisation Using Value at Risk","author":"kaura","year":"2005"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1201\/9781584889267.ch1"},{"key":"ref9","article-title":"Risk Assessment of Information Technology Systems","author":"nikoli?","year":"2009","journal-title":"Informing Science and Information Technology"},{"key":"ref1","first-page":"1","author":"mbairadjim moussa","year":"2014","journal-title":"Fuzzy value-at-risk and expected shortfall for portfolios with"},{"article-title":"A Comparative Framework for Evaluating Information Security Risk Management Methods","year":"2006","author":"bornman","key":"ref20"},{"key":"ref22","first-page":"1","article-title":"Robust Portfolio Optimization","author":"cho","year":"2008","journal-title":"MEng Computing (Software Engineering)"},{"key":"ref21","article-title":"The Application of the Method Environmental Value at Risk (eVaR) in Environmental Economy","author":"bucharest","year":"2014","journal-title":"SEA - Practical Application of Science"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1016\/j.fss.2009.02.007"},{"key":"ref24","article-title":"Risk Identification and Assessment for Build&#x2013; Operate&#x2013;Transfer Projects: A Fuzzy Multi Attribute Decision Making Model","author":"ebrahimnejad","year":"2009","journal-title":"Elsevier"},{"journal-title":"Retrieved from Sample size in qualitative research","year":"0","key":"ref41"},{"article-title":"Mean VaR Models and Algoritms for Fuzzy","year":"2002","author":"dong","key":"ref23"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.3386\/w7341"},{"journal-title":"Understanding the Risk Management Process","year":"2007","author":"edmead","key":"ref25"}],"event":{"name":"TENCON 2018 - 2018 IEEE Region 10 Conference","start":{"date-parts":[[2018,10,28]]},"location":"Jeju, Korea (South)","end":{"date-parts":[[2018,10,31]]}},"container-title":["TENCON 2018 - 2018 IEEE Region 10 Conference"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8643125\/8650051\/08650551.pdf?arnumber=8650551","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,24]],"date-time":"2020-08-24T01:59:36Z","timestamp":1598234376000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8650551\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10]]},"references-count":42,"URL":"https:\/\/doi.org\/10.1109\/tencon.2018.8650551","relation":{},"subject":[],"published":{"date-parts":[[2018,10]]}}}