2006
DOI: 10.2753/mis0742-1222220405
|View full text |Cite
|
Sign up to set email alerts
|

An Information Systems Security Risk Assessment Model Under the Dempster-Shafer Theory of Belief Functions

Abstract: This study develops an alternative methodology for the risk analysis of information systems security (ISS), an evidential reasoning approach under the Dempster-Shafer theory of belief functions. The approach has the following important dimensions. First, the evidential reasoning approach provides a rigorous, structured manner to incorporate relevant ISS risk factors, related counter measures and their interrelationships when estimating ISS risk. Secondly, the methodology employs the belief function definition … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
115
0

Year Published

2009
2009
2021
2021

Publication Types

Select...
6
2

Relationship

2
6

Authors

Journals

citations
Cited by 181 publications
(116 citation statements)
references
References 39 publications
1
115
0
Order By: Relevance
“…There are multiple articles on methods of risk assessment, and they are widely described e.g., by Sun et al [4], Ting et al [5], and Vrabel et al [6]. The methods are focused mostly on risk estimation for particular problems (e.g., disease [7,8], cancer [9], earthquakes [10], floods [11]) or calculation of risk with the use of various techniques, e.g., Bayesian networks [12,13], attack trees [14], or the Dempster-Shafer theory of belief functions [4].…”
Section: Review Of Existing Methodologies and Algorithmsmentioning
confidence: 99%
“…There are multiple articles on methods of risk assessment, and they are widely described e.g., by Sun et al [4], Ting et al [5], and Vrabel et al [6]. The methods are focused mostly on risk estimation for particular problems (e.g., disease [7,8], cancer [9], earthquakes [10], floods [11]) or calculation of risk with the use of various techniques, e.g., Bayesian networks [12,13], attack trees [14], or the Dempster-Shafer theory of belief functions [4].…”
Section: Review Of Existing Methodologies and Algorithmsmentioning
confidence: 99%
“…The renormalization constant K for the above case is given by 7 7 7 Plausibility that the assertion "Customer information is protected from unauthorized internal access and is used in ways associated with the entity's business" is not true represents the risk related to this assertion. Sun et al (2004) discuss information security risk in great detail.…”
Section: Applications To Business Decisionsmentioning
confidence: 99%
“…Numerical Example: Information Systems Security Risk Sun et al (2004) have recently developed an evidential reasoning approach to assessing information systems security risk. They use the Dempster-Shafer theory of belief functions to model the uncertainties involved in the evidence.…”
Section: Applications To Business Decisionsmentioning
confidence: 99%
“…Baudrit et al (2006) proposed a risk assessment method of node transmission and possibility exposure. Sun et al (2006) introduced a risk assessment model based on DS evidence reasoning. The disadvantages of all those methods are related to the strong subjectivity of premises.…”
Section: Related Workmentioning
confidence: 99%