• Reference Citation Analysis
  • v
  • v
  • Find an Article
Find an Article PDF (4719626)   Today's Articles (1058)
For: Biswas B, Mukhopadhyay A. G-RAM framework for software risk assessment and mitigation strategies in organisations. JEIM 2018. [DOI: 10.1108/jeim-05-2017-0069] [Citation(s) in RCA: 16] [Impact Index Per Article: 2.3] [Reference Citation Analysis] [What about the content of this article? (0)] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
Number Cited by Other Article(s)
1
Bai L, Wei L, Zhang Y, Zheng K, Zhou X. GA-BP neural network modeling for project portfolio risk prediction. JOURNAL OF ENTERPRISE INFORMATION MANAGEMENT 2022. [DOI: 10.1108/jeim-07-2022-0247] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
2
Sharma K, Mukhopadhyay A. Sarima-Based Cyber-Risk Assessment and Mitigation Model for A Smart City’s Traffic Management Systems (Scram). JOURNAL OF ORGANIZATIONAL COMPUTING AND ELECTRONIC COMMERCE 2022. [DOI: 10.1080/10919392.2022.2054259] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 10/18/2022]
3
Sharma K, Mukhopadhyay A. Kernel naïve Bayes classifier-based cyber-risk assessment and mitigation framework for online gaming platforms. JOURNAL OF ORGANIZATIONAL COMPUTING AND ELECTRONIC COMMERCE 2022. [DOI: 10.1080/10919392.2021.1987790] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.7] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 10/19/2022]
4
Searching Deterministic Chaotic Properties in System-Wide Vulnerability Datasets. INFORMATICS 2021. [DOI: 10.3390/informatics8040086] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]  Open
5
Gupta R, Biswas B, Biswas I, Sana SS. Firm investment decisions for information security under a fuzzy environment: a game-theoretic approach. INFORMATION AND COMPUTER SECURITY 2021. [DOI: 10.1108/ics-02-2020-0028] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
6
Yu X, Zhang X. The Impact of Trust on the Willingness of Co-Tenancy Behavior: Evidence from China. Psychol Res Behav Manag 2021;14:365-383. [PMID: 33814935 PMCID: PMC8009545 DOI: 10.2147/prbm.s301393] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 01/13/2021] [Accepted: 03/05/2021] [Indexed: 11/23/2022]  Open
7
Kumar S, Biswas B, Bhatia MS, Dora M. Antecedents for enhanced level of cyber-security in organisations. JOURNAL OF ENTERPRISE INFORMATION MANAGEMENT 2020. [DOI: 10.1108/jeim-06-2020-0240] [Citation(s) in RCA: 8] [Impact Index Per Article: 1.6] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
8
Fattahi R, Tavakkoli-Moghaddam R, Khalilzadeh M, Shahsavari-Pour N, Soltani R. A novel FMEA model based on fuzzy multiple-criteria decision-making methods for risk assessment. JOURNAL OF ENTERPRISE INFORMATION MANAGEMENT 2020. [DOI: 10.1108/jeim-09-2019-0282] [Citation(s) in RCA: 15] [Impact Index Per Article: 3.0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
PrevPage 1 of 1 1Next
© 2004-2025 Baishideng Publishing Group Inc. All rights reserved. 7041 Koll Center Parkway, Suite 160, Pleasanton, CA 94566, USA