Database gateway processor risk analysis using fuzzy logic

Article Properties
Abstract
Cite
Moscato, Donald R. “Database Gateway Processor Risk Analysis Using Fuzzy Logic”. Information Management &Amp; Computer Security, vol. 6, no. 3, 1998, pp. 138-44, https://doi.org/10.1108/09685229810225047.
Moscato, D. R. (1998). Database gateway processor risk analysis using fuzzy logic. Information Management &Amp; Computer Security, 6(3), 138-144. https://doi.org/10.1108/09685229810225047
Moscato DR. Database gateway processor risk analysis using fuzzy logic. Information Management & Computer Security. 1998;6(3):138-44.
Description

Can fuzzy logic improve risk analysis for database gateway processors? This paper addresses the critical need for organizations to assess their exposure to disasters affecting database gateway systems. As organizations increasingly rely on legacy systems and gateway processors for data access, a thorough risk analysis is essential for safeguarding valuable assets. The traditional risk analysis approach is outlined, encompassing threat identification, asset valuation, probability assessment, and control evaluation. The paper introduces the application of fuzzy logic modeling to risk analysis, providing a non-technical explanation of the methodology. It is very important for information management. By utilizing fuzzy logic, organizations can gain a more nuanced and accurate understanding of their risk exposure. This insight enables them to develop more effective strategies for disaster preparedness and data protection.

Refrences
Citations
Citations Analysis
The first research to cite this article was titled Integrating fuzzy logic into decision suppport systems: current research and future prospects and was published in 2003. The most recent citation comes from a 2010 study titled Integrating fuzzy logic into decision suppport systems: current research and future prospects . This article reached its peak citation in 2010 , with 1 citations.It has been cited in 3 different journals. Among related journals, the Journal of Computing in Civil Engineering cited this research the most, with 1 citations. The chart below illustrates the annual citation trends for this article.
Citations used this article by year