{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,10]],"date-time":"2026-02-10T19:13:38Z","timestamp":1770750818176,"version":"3.50.0"},"reference-count":31,"publisher":"SAGE Publications","issue":"6","license":[{"start":{"date-parts":[[2015,11,20]],"date-time":"2015-11-20T00:00:00Z","timestamp":1447977600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["Journal of Intelligent &amp; Fuzzy Systems"],"published-print":{"date-parts":[[2015,11,27]]},"abstract":"<jats:p>Risk management for business processes is critical to the survival and performance of organizations, and has gained the interest of practitioners and academics. In this article, a fuzzy based multi-agent system (FMAS) is proposed as a practical solution to assess the process risk state and provide recommendations for the continuous improvement of business processes. To represent uncertain and ambiguous information obtained from experts, fuzzy theory is introduced to the FMAS. A fuzzy neural network is employed to implement an analysis agent capable of detecting the risk state of business processes within a firm. Furthermore, based on the predictions yielded by the analysis agent, the recommendation agent is then able to identify the possible deviations in the inconsistent process and provide suggestions for improvement. The effectiveness of the proposed FMAS is validated by its implementation in nine firms during twelve months, and the results are presented.<\/jats:p>","DOI":"10.3233\/ifs-151975","type":"journal-article","created":{"date-parts":[[2015,12,9]],"date-time":"2015-12-09T14:29:10Z","timestamp":1449671350000},"page":"2717-2726","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":6,"title":["Managing risk for business processes: A fuzzy based multi-agent system"],"prefix":"10.1177","volume":"29","author":[{"given":"Nan","family":"Feng","sequence":"first","affiliation":[{"name":"College of Management and Economics, Tianjin University, Tianjin, P.R. China"}]},{"given":"Xue","family":"Yu","sequence":"additional","affiliation":[{"name":"College of Management and Economics, Tianjin University, Tianjin, P.R. China"}]},{"given":"Runliang","family":"Dou","sequence":"additional","affiliation":[{"name":"College of Management and Economics, Tianjin University, Tianjin, P.R. China"}]},{"given":"Bingning","family":"Pan","sequence":"additional","affiliation":[{"name":"College of Management and Economics, Tianjin University, Tianjin, P.R. China"}]}],"member":"179","published-online":{"date-parts":[[2015,11,20]]},"reference":[{"key":"e_1_3_2_2_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2013.05.007"},{"key":"e_1_3_2_3_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jocs.2014.11.002"},{"key":"e_1_3_2_4_2","doi-asserted-by":"publisher","DOI":"10.3233\/IFS-130923"},{"key":"e_1_3_2_5_2","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.1060.0515"},{"key":"e_1_3_2_6_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2013.12.024"},{"key":"e_1_3_2_7_2","doi-asserted-by":"publisher","DOI":"10.1057\/jors.2008.144"},{"key":"e_1_3_2_8_2","unstructured":"Zavadskas EK Kaklauskas A2007Multi-attribute Decisions in Construction Fraunhofer IRB Verlag Stuttgart (in German)"},{"key":"e_1_3_2_9_2","doi-asserted-by":"publisher","DOI":"10.3233\/IFS-141158"},{"key":"e_1_3_2_10_2","doi-asserted-by":"publisher","DOI":"10.69554\/GLBJ9875"},{"key":"e_1_3_2_11_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.fss.2013.05.007"},{"key":"e_1_3_2_12_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2009.03.002"},{"key":"e_1_3_2_13_2","unstructured":"Zimmermann HJ2001Fuzzy set theory and its applications2ndBoston Dordrecht LondonKluwer Academic Publishers"},{"key":"e_1_3_2_14_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2008.01.039"},{"issue":"3","key":"e_1_3_2_15_2","first-page":"235","article-title":"A greedy randomized adaptive search procedure applied to the clustering problem as an initialization process using K-Means as a local search procedure","volume":"12","author":"Cano JR","year":"2002","unstructured":"Cano JR, Cordon O, Herrera F, Sanchez L2002A greedy randomized adaptive search procedure applied to the clustering problem as an initialization process using K-Means as a local search procedureJournal of Intelligent & Fuzzy Systems123-4235242","journal-title":"Journal of Intelligent & Fuzzy Systems"},{"key":"e_1_3_2_16_2","doi-asserted-by":"publisher","DOI":"10.1080\/18756891.2014.947111"},{"key":"e_1_3_2_17_2","doi-asserted-by":"publisher","DOI":"10.1016\/0020-0255(75)90046-8"},{"key":"e_1_3_2_18_2","doi-asserted-by":"publisher","DOI":"10.3233\/IFS-130796"},{"key":"e_1_3_2_19_2","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222300110"},{"key":"e_1_3_2_20_2","doi-asserted-by":"publisher","DOI":"10.3233\/IFS-2012-0601"},{"key":"e_1_3_2_21_2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1155\/2014\/167497","article-title":"A cooperative model for IS security risk management in distributed environment","volume":"2014","author":"Feng N","year":"2014","unstructured":"Feng N, Zheng C2014A cooperative model for IS security risk management in distributed environmentScientific World Journal2014110","journal-title":"Scientific World Journal"},{"key":"e_1_3_2_22_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2013.02.036"},{"key":"e_1_3_2_23_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2010.06.005"},{"key":"e_1_3_2_24_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2013.07.024"},{"key":"e_1_3_2_25_2","doi-asserted-by":"publisher","DOI":"10.1080\/00207543.2014.948579"},{"key":"e_1_3_2_26_2","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.44.11.S65"},{"key":"e_1_3_2_27_2","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2006.877264"},{"key":"e_1_3_2_28_2","first-page":"349","article-title":"Risk-aware business process modeling and simulation using xml nets","author":"Betz S","year":"2011","unstructured":"Betz S, Hickl S, Oberweis A2011Risk-aware business process modeling and simulation using xml netsCEC IEEEHofreiter B, Dubois E, Lin KJ, Setzer T349356","journal-title":"CEC IEEE"},{"key":"e_1_3_2_29_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.fss.2013.11.012"},{"key":"e_1_3_2_30_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2005.05.020"},{"key":"e_1_3_2_31_2","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2012.2219061"},{"key":"e_1_3_2_32_2","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2013.2258677"}],"container-title":["Journal of Intelligent &amp; Fuzzy Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.3233\/IFS-151975","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/full-xml\/10.3233\/IFS-151975","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.3233\/IFS-151975","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,10]],"date-time":"2026-02-10T10:47:33Z","timestamp":1770720453000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.3233\/IFS-151975"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,11,20]]},"references-count":31,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2015,11,27]]}},"alternative-id":["10.3233\/IFS-151975"],"URL":"https:\/\/doi.org\/10.3233\/ifs-151975","relation":{},"ISSN":["1064-1246","1875-8967"],"issn-type":[{"value":"1064-1246","type":"print"},{"value":"1875-8967","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,11,20]]}}}