<?xml version="1.0" encoding="utf-8"?><!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.0 20120330//EN" "JATS-journalpublishing1.dtd"><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" article-type="research-article">
<front>
<journal-meta>
<journal-id journal-id-type="publisher-id">INFORMATICA</journal-id>
<journal-title-group><journal-title>Informatica</journal-title></journal-title-group>
<issn pub-type="epub">1822-8844</issn><issn pub-type="ppub">0868-4952</issn><issn-l>0868-4952</issn-l>
<publisher>
<publisher-name>Vilnius University</publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id pub-id-type="publisher-id">INFO1213</article-id>
<article-id pub-id-type="doi">10.15388/Informatica.2019.203</article-id>
<article-categories><subj-group subj-group-type="heading">
<subject>Research Article</subject></subj-group></article-categories>
<title-group>
<article-title>Information Security Risk Assessment in Critical Infrastructure: A Hybrid MCDM Approach</article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name><surname>Turskis</surname><given-names>Zenonas</given-names></name><email xlink:href="zenonas.turskis@vgtu.lt">zenonas.turskis@vgtu.lt</email><xref ref-type="aff" rid="j_info1213_aff_001">1</xref><bio>
<p><bold>Z. Turskis</bold> is prof. dr. of technical sciences, professor at the Department of Construction Management and Real Estate, chief research fellow at the Laboratory of Operational Research, Research Institute of Sustainable Construction, Vilnius Gediminas Technical University, Lithuania. Research interests: building technology and management, decisionmaking theory, computer-aided automation in design, expert systems. He is the author of more than 120 research papers, which are referred in the Web of Science database.</p></bio>
</contrib>
<contrib contrib-type="author">
<name><surname>Goranin</surname><given-names>Nikolaj</given-names></name><email xlink:href="nikolaj.goranin@vgtu.lt">nikolaj.goranin@vgtu.lt</email><xref ref-type="aff" rid="j_info1213_aff_002">2</xref><xref ref-type="corresp" rid="cor1">∗</xref><bio>
<p><bold>N. Goranin</bold>, PhD, associated professor at the Department of Information Systems, vice-dean for research and international relations at Faculty of Fundamental Sciences at Vilnius Gediminas Technical University. Has job experience as a system administrator, FP6 and EU structural funds project coordinator. Member of ISACA Lithuania Board. Keeps the position of Chief Information Security Officer at Level 1 (VISA classification) service provider (responsible for PCI DSS compliance and certification). Keeps the CISM and CISA certificates. Has published over 30 papers. Research interests: information security technologies, information security management, artificial intelligence in information security, information security process modelling.</p></bio>
</contrib>
<contrib contrib-type="author">
<name><surname>Nurusheva</surname><given-names>Assel</given-names></name><xref ref-type="aff" rid="j_info1213_aff_003">3</xref><bio>
<p><bold>A. Nurusheva</bold> is a PhD student at the Department of Information Systems, Gumilyov Eurasian National University, Astana, Kazakhstan. Research interests: information technologies, risk management, reliability, decision-making theory, computer-aided automation in design, expert systems.</p></bio>
</contrib>
<contrib contrib-type="author">
<name><surname>Boranbayev</surname><given-names>Seilkhan</given-names></name><email xlink:href="sboranba@yandex.kz">sboranba@yandex.kz</email><xref ref-type="aff" rid="j_info1213_aff_003">3</xref><bio>
<p><bold>S. Boranbayev</bold> is prof. dr. of technical sciences, professor at the Department of Information Systems, Gumilyov Eurasian National University, Astana, Kazakhstan. Member of American Mathematical Society (2006), academician of the International Academy of Informatization (2009). The author and co-author of more than 100 papers and monographs. Scientific interests: information and computer technologies, reliability and security of information and computer systems, mathematical cybernetics, mathematical and computer modelling, system analysis, artificial intelligence.</p></bio>
</contrib>
<aff id="j_info1213_aff_001"><label>1</label>Institute of Sustainable Construction, Faculty of Civil Engineering, <institution>Vilnius Gediminas Technical University</institution>, Sauletekio al. 11, LT-10223 Vilnius, <country>Lithuania</country></aff>
<aff id="j_info1213_aff_002"><label>2</label>Faculty of Fundamental Sciences, <institution>Vilnius Gediminas Technical University</institution>, Sauletekio al. 11, LT-10223 Vilnius, <country>Lithuania</country></aff>
<aff id="j_info1213_aff_003"><label>3</label>Department of Information Systems, <institution>L.N. Gumilyov Eurasian National University</institution>, Satpayev st., 2, 010008 Astana, <country>Kazakhstan</country></aff>
</contrib-group>
<author-notes>
<corresp id="cor1"><label>∗</label>Corresponding author.</corresp>
</author-notes>
<pub-date pub-type="ppub"><year>2019</year></pub-date>
<pub-date pub-type="epub"><day>1</day><month>1</month><year>2019</year></pub-date><volume>30</volume><issue>1</issue><fpage>187</fpage><lpage>211</lpage><history><date date-type="received"><month>9</month><year>2018</year></date><date date-type="accepted"><month>1</month><year>2019</year></date></history>
<permissions><copyright-statement>© 2019 Vilnius University</copyright-statement><copyright-year>2019</copyright-year>
<license license-type="open-access" xlink:href="http://creativecommons.org/licenses/by/4.0/">
<license-p>Open access article under the <ext-link ext-link-type="uri" xlink:href="http://creativecommons.org/licenses/by/4.0/">CC BY</ext-link> license.</license-p></license></permissions>
<abstract>
<p>The risk analysis has always been one of the essential procedures for any areas. The majority of security incidents occur because of ignoring risks or their inaccurate assessment. It is especially dangerous for critical infrastructures. Thus, the article is devoted to the description of the developed model of risk assessment for the essential infrastructures. The goal of the model is to provide a reliable method for multifaceted risk assessment of information infrastructure. The purpose of the article is to present a developed model based on integrated MCDM approaches that allow to correctly assess the risks of the critical information infrastructures.</p>
</abstract>
<kwd-group>
<label>Key words</label>
<kwd>information security</kwd>
<kwd>fuzzy</kwd>
<kwd>risk assessment</kwd>
<kwd>infrastructure</kwd>
<kwd>AHP</kwd>
<kwd>Delphi method</kwd>
<kwd>Eckenrode method</kwd>
<kwd>MCDM</kwd>
</kwd-group>
</article-meta>
</front>
<body>
<sec id="j_info1213_s_001">
<label>1</label>
<title>Introduction and Problem Statement</title>
<p>Nowadays, we often come up against a situation where companies use information infrastructures without due regard for their information security, reliability, fault tolerance, etc. The companies save time and do not spend financial resources on tools for risk analysis and experts. As a result, the number of information security incidents increases. Such dynamics are not acceptable for critical infrastructures due to the possible globalization of their incidents’ consequences.</p>
<p>The rapid development of the IT sector leads to accelerated application and introduction of digital innovations, including blockchain technologies, open data, robotization and artificial intelligence, biometric authentication, crowdfunding, big data, etc. Digital technology development raises the need to increase the level of information security and reliability of implemented technologies (Boranbayev <italic>et al.</italic>, <xref ref-type="bibr" rid="j_info1213_ref_013">2018b</xref>). It is well known that modern society is becoming increasingly dependent on information technology, its continuous and trouble-free operation, respectively, on its reliability and security (Boranbayev <italic>et al.</italic>, <xref ref-type="bibr" rid="j_info1213_ref_012">2018a</xref>). At the same time, the amount of known/reported cybersecurity crimes keeps growing (Olifer <italic>et al.</italic>, <xref ref-type="bibr" rid="j_info1213_ref_051">2017</xref>).</p>
<p>Research aimed at risk assessment is becoming more widespread (Grabauskyte <italic>et al.</italic>, <xref ref-type="bibr" rid="j_info1213_ref_027">2018</xref>; Ijadi Maghsoodi <italic>et al.</italic>, <xref ref-type="bibr" rid="j_info1213_ref_034">2018</xref>). Risk assessment is an important aspect of decision making in industry, government, financial, environmental, and other sectors (Tamilselvi, <xref ref-type="bibr" rid="j_info1213_ref_062">2018</xref>). It is widely used in considering various aspects of the operations and safety of large complex systems that can adversely affect the health and safety of society (Bell, <xref ref-type="bibr" rid="j_info1213_ref_010">1989</xref>). So risk assessment has been identified as an essential element of effective decision-making, management, and development of information infrastructures but often it has been missed (Boehm, <xref ref-type="bibr" rid="j_info1213_ref_011">1991</xref>).</p>
<p>Some information and automated systems are responsible for the vital services of modern society. For example, the systems such as water management heating, and public transport depend on the proper functioning of information and automated systems that support their operations. These support infrastructures, usually called critical ones, are crucial elements for the functioning of the economy and society.</p>
<p>Information security, reliability and fault tolerance of the critical infrastructures are one of the primary and priority tasks of any country (Miao <italic>et al.</italic>, <xref ref-type="bibr" rid="j_info1213_ref_048">2010</xref>). Countries around the world are experiencing failures and incidents caused by different causes in the essential infrastructure sector (Yusta <italic>et al.</italic>, <xref ref-type="bibr" rid="j_info1213_ref_072">2011</xref>). For systems, risk analysis is an investment that will ensure future high quality and reliability of systems (Cagliano <italic>et al.</italic>, <xref ref-type="bibr" rid="j_info1213_ref_016">2015</xref>). Reducing operational risks and errors is the key to improving the security and accessibility of cloud services (Hu <italic>et al.</italic>, <xref ref-type="bibr" rid="j_info1213_ref_033">2017</xref>). To manage risks in the critical information infrastructures (CII), the decision support systems should integrate the multi-alternative design and multi-criteria decision-making approaches (Kaklauskas <italic>et al.</italic>, <xref ref-type="bibr" rid="j_info1213_ref_036">2018</xref>).</p>
<p>According to ISO 27005, the determining of risk level is based on indicators of its impact on infrastructure and the probability of risk realization. These indicators can be calculated by standard methods for small and medium-sized organizations. However, companies that provide critical services must accurately identify the dangerous risks and mitigate them promptly. Otherwise, the realization of undetected or incorrectly assessed risks can lead to catastrophic situations, significant financial and human losses, etc. The purpose of the article is to present a developed model based on integrated multi-criteria decision-making (MCDM) approach that allows to correctly evaluate the risks of the information infrastructures.</p>
</sec>
<sec id="j_info1213_s_002">
<label>2</label>
<title>Risks</title>
<p>According to ISO 27005, the risk of information security is the potential that a given threat will exploit vulnerabilities of an asset or group of assets and thereby cause harm to the company.</p>
<sec id="j_info1213_s_003">
<label>2.1</label>
<title>Risk Management Description</title>
<p>Risk management is a significant, costly, not time-consuming, and straightforward process (Haimes, <xref ref-type="bibr" rid="j_info1213_ref_030">1991</xref>). It often requires the involvement of experts, resources, etc. (Vrhovec <italic>et al.</italic>, <xref ref-type="bibr" rid="j_info1213_ref_068">2015</xref>). The advantages that it gives significantly outweigh the outlay cost and expended funds (Han, <xref ref-type="bibr" rid="j_info1213_ref_031">2015</xref>).</p>
<p>Risk management involves taking measures aimed at reducing the frequency of threat implementation and reducing the damage from them (Boranbayev <italic>et al.</italic>, <xref ref-type="bibr" rid="j_info1213_ref_014">2018c</xref>). Depending on the received risk indicators, the owner of the information system must choose a risk management strategy. There are four main risk management strategies:</p>
<list>
<list-item id="j_info1213_li_001">
<label>1)</label>
<p>Risk acceptance;</p>
</list-item>
<list-item id="j_info1213_li_002">
<label>2)</label>
<p>Risk mitigation;</p>
</list-item>
<list-item id="j_info1213_li_003">
<label>3)</label>
<p>Risk avoidance;</p>
</list-item>
<list-item id="j_info1213_li_004">
<label>4)</label>
<p>Risk transfer to third parties.</p>
</list-item>
</list>
<p>The components of the risk management process for information systems are shown in Fig. <xref rid="j_info1213_fig_001">1</xref>.</p>
<fig id="j_info1213_fig_001">
<label>Fig. 1</label>
<caption>
<p>Components of the risk management process for information systems.</p>
</caption>
<graphic xlink:href="info1213_g001.jpg"/>
</fig>
<p>The necessity and effectiveness of using the risk management process in the design and operation of the software are confirmed by many studies (Sangaiah <italic>et al.</italic>, <xref ref-type="bibr" rid="j_info1213_ref_057">2018</xref>).</p>
<p>As you can see from (Fig. <xref rid="j_info1213_fig_001">1</xref>), firstly the input data are installed. Further, the identification and assessment of risks are carried out. Based on them, a risk report is formed. Also, it is necessary to determine whether the handling is required for identified risks. If there are risks at the output that need modification to an acceptable level, then the handling phase of risks (mitigation) occurs (Caplinskas <italic>et al.</italic>, <xref ref-type="bibr" rid="j_info1213_ref_018">2012</xref>). It is possible that risk-handling will not immediately yield the result in an acceptable level of residual risk.</p>
<p>The primary purpose of the article is to present the developed model, which allows to evaluate risks in order to determine which should be neutralized firstly.</p>
<p>As part of the research to develop a risk assessment model for CII, the study was conducted on factors affecting their safe and reliable operation.</p>
<p>New methods of risk analysis are continually being developed (Boranbayev <italic>et al.</italic>, <xref ref-type="bibr" rid="j_info1213_ref_015">2018d</xref>). These include association rules (Garcia <italic>et al.</italic>, <xref ref-type="bibr" rid="j_info1213_ref_023">2008</xref>), genetic algorithms (Pfeifer <italic>et al.</italic>, <xref ref-type="bibr" rid="j_info1213_ref_053">2015</xref>), models of processes (Aloini <italic>et al.</italic>, <xref ref-type="bibr" rid="j_info1213_ref_004">2012</xref>), and cluster analysis (Bannerman, <xref ref-type="bibr" rid="j_info1213_ref_007">2008</xref>). Each method has its unique advantages and disadvantages.</p>
<p>The topic of risk analysis in various sectors is the most important topic that many researchers are paying attention to these days (Navickiene <italic>et al.</italic>, <xref ref-type="bibr" rid="j_info1213_ref_050">2018</xref>). The goal of the model is to prevent or reduce the threats of negative financial and non-financial consequences associated with the use of information infrastructures, as well as external factors affecting information infrastructures. The model is aimed at minimizing risks in the organization’s activities related to the violation of the integrity, confidentiality, and availability of information infrastructures arising from the deliberate destructive impact of employees or third parties. The model also takes into account the criticality of the checked information infrastructures, possible direct and indirect losses, as well as the probability of risk realization.</p>
<p>One of the essential steps to ensure the reliability and security of the information infrastructures is to take measures to mitigate the level of failures by identifying the most dangerous and harmful elements that pose a risk to the system and eliminate them (Lo and Liou, <xref ref-type="bibr" rid="j_info1213_ref_042">2018</xref>).</p>
</sec>
<sec id="j_info1213_s_004">
<label>2.2</label>
<title>Literature Review of Methods for Risk Assessment</title>
<p>Most organizations that specialize in solving information security problems offer various methods for assessing information risks. Known techniques can be divided into single-stage and multi-stage ones according to the type of decision-making procedure used in them. In a one-step methodology (“Risk Matrix”), risk assessment is performed using a one-time decisive procedure. In a multi-stage methodology (NIST, CRAMM), risk assessment is performed with a preliminary assessment of key parameters. The mechanism of risk assessment based on fuzzy logic is an expert system, in which certain rules form the knowledge base. For example, “table” logic or logic reflecting the relationships formed by “if, … , then” rules. The method for assessing the critical threats, assets and vulnerabilities OCTAVE (Operationally Critical Threat, Asset, and Vulnerability Evaluation) is a methodology based on strategic risk assessment (Bamakan and Dehghanimohammadabadi, <xref ref-type="bibr" rid="j_info1213_ref_006">2015</xref>).</p>
<p>The analysis of the companies’ choice of risk assessment tools and methods showed that the FMEA – Failure Modes and Effects Analysis (Baynal <italic>et al.</italic>, <xref ref-type="bibr" rid="j_info1213_ref_009">2018</xref>), FTA – Fault Tree Analysis (Giraud and Galy, <xref ref-type="bibr" rid="j_info1213_ref_025">2018</xref>), Bow-Tie Analysis (Muniz <italic>et al.</italic>, <xref ref-type="bibr" rid="j_info1213_ref_049">2018</xref>), HAZOP – Hazards and Operability Studies (Taylor, <xref ref-type="bibr" rid="j_info1213_ref_064">2017</xref>) and LOPA – Layer of Protection Analysis (Yan and Xu, <xref ref-type="bibr" rid="j_info1213_ref_070">2018</xref>) are the most common tools used in the most significant and industrial organizations. These tools assess potential risks and try to keep them within acceptable limits (Yasseri and Mahani, <xref ref-type="bibr" rid="j_info1213_ref_071">2013</xref>).</p>
<p>Many studies were is reviewed for improving FMEA (Lo and Liou, <xref ref-type="bibr" rid="j_info1213_ref_042">2018</xref>). For example, FMEA combined with methods, such as Grey Relational Analysis (GRA) (Zhou and Thai, <xref ref-type="bibr" rid="j_info1213_ref_083">2016</xref>), the Visekriterijumska Optimizacija i Kompromisno Resenje (VIKOR) method (Safari <italic>et al.</italic>, <xref ref-type="bibr" rid="j_info1213_ref_056">2016</xref>), the Decision-Making Trial and Evaluation Laboratory (DEMATEL) method (Govindan and Chaudhuri, <xref ref-type="bibr" rid="j_info1213_ref_026">2016</xref>), MULTIMOORA (Zhao <italic>et al.</italic>, <xref ref-type="bibr" rid="j_info1213_ref_082">2017</xref>) and others. To apply FMEA-WASPAS, an approach was proposed (Can, <xref ref-type="bibr" rid="j_info1213_ref_017">2018</xref>).</p>
<p>The issue of measuring according to some criteria is known as MCDM (Zolfani <italic>et al.</italic>, <xref ref-type="bibr" rid="j_info1213_ref_081">2013</xref>; Zavadskas <italic>et al.</italic>, <xref ref-type="bibr" rid="j_info1213_ref_077">2009</xref>; Medineckiene <italic>et al.</italic>, <xref ref-type="bibr" rid="j_info1213_ref_046">2015</xref>). Scientists used MCDM approaches previously in risk management. The processes using MCDM approaches for the issue of managing risks for a nuclear and radiation emergency were presented by (Papamichail and French, <xref ref-type="bibr" rid="j_info1213_ref_052">2012</xref>). An overview of risk assessment using MCDM approaches was presented in the researches (Linkov <italic>et al.</italic>, <xref ref-type="bibr" rid="j_info1213_ref_040">2006</xref>) and (Ananda and Herath, <xref ref-type="bibr" rid="j_info1213_ref_003">2009</xref>). Evaluating risk assessment approaches for solid waste management were reviewed in (Allesch and Brunner, <xref ref-type="bibr" rid="j_info1213_ref_002">2014</xref>). Criteria such as safety and risk in the context of maintenance and reliability can be widely found among the criteria evaluated in MCDM approaches (de Almeida <italic>et al.</italic>, <xref ref-type="bibr" rid="j_info1213_ref_019">2015</xref>). Besides, MCDM methods were applied in different areas of activity (Zavadskas <italic>et al.</italic>, <xref ref-type="bibr" rid="j_info1213_ref_074">2013</xref>; Sivilevicius <italic>et al.</italic>, <xref ref-type="bibr" rid="j_info1213_ref_061">2008</xref>; Saparauskas <italic>et al.</italic>, <xref ref-type="bibr" rid="j_info1213_ref_058">2011</xref>; Turskis <italic>et al.</italic>, <xref ref-type="bibr" rid="j_info1213_ref_066">2015</xref>). Effective use of the MCDM method is presented in Zavadskas <italic>et al.</italic> (<xref ref-type="bibr" rid="j_info1213_ref_078">2012</xref>, <xref ref-type="bibr" rid="j_info1213_ref_079">2015a</xref>, <xref ref-type="bibr" rid="j_info1213_ref_080">2015b</xref>).</p>
<p>The researches on the use of various methods for risk assessment were reviewed (de Almeida <italic>et al.</italic>, <xref ref-type="bibr" rid="j_info1213_ref_019">2015</xref>). Some of them are AHP (Ma <italic>et al.</italic>, <xref ref-type="bibr" rid="j_info1213_ref_044">2013</xref>), MAUT/MAVT (Garcez and de Almeida, <xref ref-type="bibr" rid="j_info1213_ref_022">2014</xref>), Weighted sum (Akbari <italic>et al.</italic>, <xref ref-type="bibr" rid="j_info1213_ref_005">2014</xref>), TOPSIS (Jozi and Majd, <xref ref-type="bibr" rid="j_info1213_ref_029">2014</xref>), NSGA (Woodward <italic>et al.</italic>, <xref ref-type="bibr" rid="j_info1213_ref_069">2014</xref>), ELECTRE (Macary <italic>et al.</italic>, <xref ref-type="bibr" rid="j_info1213_ref_045">2014</xref>), ANP (Tavana <italic>et al.</italic>, <xref ref-type="bibr" rid="j_info1213_ref_063">2013</xref>), PROMETHEE (Bates <italic>et al.</italic>, <xref ref-type="bibr" rid="j_info1213_ref_008">2014</xref>), and other methods (Jin <italic>et al.</italic>, <xref ref-type="bibr" rid="j_info1213_ref_028">2014</xref>).</p>
<fig id="j_info1213_fig_002">
<label>Fig. 2</label>
<caption>
<p>The proposed framework for the risk assessment process.</p>
</caption>
<graphic xlink:href="info1213_g002.jpg"/>
</fig>
<p>In our case, according to Saaty and Ergu (<xref ref-type="bibr" rid="j_info1213_ref_055">2015</xref>), the MCDM method was chosen. Hybrid MCDM approach was applied. Earlier hybrid MCDM methods were proposed to use in Zavadskas <italic>et al.</italic> (<xref ref-type="bibr" rid="j_info1213_ref_075">2016a</xref>, <xref ref-type="bibr" rid="j_info1213_ref_076">2016b</xref>).</p>
</sec>
</sec>
<sec id="j_info1213_s_005" sec-type="methods">
<label>3</label>
<title>Methods</title>
<p>In this article, the model for implementing the methodology for risk analysis (Fig. <xref rid="j_info1213_fig_002">2</xref>) is considered in more detail. Below are the main steps of information security risk analysis.</p>
<p>At the beginning of the process, the experts identified the main CII that require the risk assessment. Also, they determined threats affecting the risk implementation, and the characteristics of the threats, which allow identifying the degree of adverse impact of the threat realization on the CII (Fig. <xref rid="j_info1213_fig_003">3</xref>).</p>
<p>To assess risks, an expert needs to work on identifying types of threats. The list of threats is based on existing threats that create conditions for the entire information system to malfunction related to information security attributes (C – confidentiality, I – integrity, A – accessibility).</p>
<fig id="j_info1213_fig_003">
<label>Fig. 3</label>
<caption>
<p>Flowchart of the risk evaluation.</p>
</caption>
<graphic xlink:href="info1213_g003.jpg"/>
</fig>
<p>In the proposed model Integrated Delphic–Eckenrode’s Likert-Type Scale-Based Fuzzy Rating and AHP methods were applied. AHP method is one of the most popular ones among MDM methods (Saaty and Erdener, <xref ref-type="bibr" rid="j_info1213_ref_054">1979</xref>).</p>
<sec id="j_info1213_s_006">
<label>3.1</label>
<title>Brief Review of Methodology of an Integrated Delphic-Eckenrode’s Likert-Type Scale-Based Fuzzy Rating (Turskis <italic>et al.</italic>, <xref ref-type="bibr" rid="j_info1213_ref_067">2019</xref>)</title>
<p>The group decision-making processes are necessary to design and evaluate a set of different alternatives. One of the most important tasks is to reject those alternatives that do not meet lower bounds of the important criteria values. For a long time, a rigorous agreement was seen as a final group’s opinion. In most cases, a group of experts who make real-life decisions have no strict and steady opinion about the same criteria and alternatives. An agreement of the group is reached when the most dominant players agree with the criteria ratings and performances of the considered alternatives. Real-life problems’ modelling and solution lead the group of decision-makers to situations when models are based on vague logic. Besides, most often the models are based on the criteria rating in words. Such type of ratings cannot be replaced by the strict (crisp) numerical values. The fuzzy set theory allows decision takers to apply partially obtained information into the issue solving framework (Turskis <italic>et al.</italic>, <xref ref-type="bibr" rid="j_info1213_ref_065">2012</xref>). A fuzzy set is characterized by a membership (characteristic) function which assigns to each object a grade of membership ranging (Zadeh, <xref ref-type="bibr" rid="j_info1213_ref_073">1965</xref>). Different types of membership functions are available. In this research, the most commonly used triangular membership function is used (Dubois and Prade, <xref ref-type="bibr" rid="j_info1213_ref_020">1978</xref>). A fuzzy triangular number will be denoted as <inline-formula id="j_info1213_ineq_001"><alternatives><mml:math>
<mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo>
<mml:mi mathvariant="italic">α</mml:mi>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mi mathvariant="italic">β</mml:mi>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mi mathvariant="italic">γ</mml:mi>
<mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo></mml:math><tex-math><![CDATA[$(\alpha ,\beta ,\gamma )$]]></tex-math></alternatives></inline-formula> (<italic>α</italic> – lower value of the fuzzy number, <italic>β</italic> – modal value of the fuzzy number, <italic>γ</italic> – upper value of the fuzzy number).</p>
<p>It is required to identify the importance of the activities of the different process managers before starting to assess the critical challenges of workplace safety’s management, efficiency level of safety solutions and quality improvement. In order to achieve this, experts can use weighting methods for criteria. There are a lot of different subjective approaches for assessing weights: SWARA (Kersuliene <italic>et al.</italic>, <xref ref-type="bibr" rid="j_info1213_ref_037">2010</xref>; Keshavarz-Ghorabaee <italic>et al.</italic>, <xref ref-type="bibr" rid="j_info1213_ref_038">2018</xref>), FARE (FActor RElationship) (Ginevicius, <xref ref-type="bibr" rid="j_info1213_ref_024">2011</xref>), and others.</p>
<p>Nominal group technique Delphi (Linstone and Turoff, <xref ref-type="bibr" rid="j_info1213_ref_041">2002</xref>) is a useful tool for solving complicated problems which need expert data. It is a group decision-making process and includes idea generation, problem description, data assessment, and generation of feasible alternatives.</p>
<p>Likert scales are known as a tool for the measurement and assessment of attitudes. The reason for this is that the Likert scale is a straightforward tool to use and can be analysed effectively as interval or fuzzy scales (Allen <italic>et al.</italic>, <xref ref-type="bibr" rid="j_info1213_ref_001">2017</xref>).</p>
<p>Eckenrode (<xref ref-type="bibr" rid="j_info1213_ref_021">1965</xref>) presented seminal work on criteria weights elicitation. Rating is sufficient for personal assessment, and it is especially useful for group decision making. It works well because it forces the expert to get clarity on his criteria and create a shared set of criteria. Eckenrode’s Rating method is selected and modified by applying the basics of fuzzy sets theory in this study.</p>
<p>Risk assessment for each information infrastructure and analysis of the adequacy of risk management measures are carried out by experts.</p>
</sec>
<sec id="j_info1213_s_007">
<label>3.2</label>
<title>Problem Solution: Fuzzy Group Multi-Criteria Method in Assessing the Impact of Threat Implementation on the CII and Threat Probability</title>
<p>To ensure sustainable functioning of CII, stakeholders should implement risk management processes. An integrated method of determination of criteria significance is developed to achieve the goals as mentioned earlier. The problem could be solved based on the survey of experts’ data. There was formed a team of five experts, who have a university degree in IT and information security as well as actively work with risk management.</p>
<p>The standard seven-stage Delphi procedure is applied in the case research. Firstly, a facilitator describes to the participants the purpose and the procedure of the issue. Secondly, members of the group silently explain their opinion about the solution (criteria), with a short explanation in writing, not consulting or discussing their ideas with other participants. It ensures that all participants get an opportunity to make an equal contribution. Thirdly, a facilitator encourages a sharing and a discussion of reasons for the choices made (criteria) by each group member to identify common ground. Fourthly, participants verbally explain in details all presented ideas which are not clear for all participants of the groups or further details about any of the ideas that colleagues have produced and which may not be apparent to them. Fifthly, a facilitator eliminates duplicate solutions (criteria) from the list of all solutions, and the members proceed to rank the solutions starting from the most important to the least important. Sixthly, a facilitator includes a prioritizing procedure of the recorded ideas concerning the original problem. Following the voting and ranking process, a facilitator asks participants who have a different opinion about ranks from average criteria ranking some questions. Seventhly, a final ranking and rating of criteria should be done (Turskis <italic>et al.</italic>, <xref ref-type="bibr" rid="j_info1213_ref_067">2019</xref>).</p>
</sec>
<sec id="j_info1213_s_008">
<label>3.3</label>
<title>Selection of Criteria and Sub-Criteria</title>
<p>When solving problems by the MCDM method, first of all, a set of possible alternatives is formed, consisting of the CII. Next step is the selection of criteria and sub-criteria.</p>
<p>Criteria for risk assessment can be different. They depend on the infrastructure for which the risk is determined. In this case, the threats were taken as criteria. The experts determine the choice of threats aimed at the information infrastructure according to the Delphi method. The participants of the experts form a group, based on Sherwood <italic>et al.</italic> (<xref ref-type="bibr" rid="j_info1213_ref_060">2005</xref>). Then experts ranked and rated the impact of threats and probability of threats in the prevention of accidents at work. Based on the results, the following five threats that are most associated with cybersecurity were identified as criteria:</p>
<p>1) Health and safety threat (T1) – the threat to the personal health and safety of staff, customers and members of the population.</p>
<p>2) Technology threat (T2) – the threat of failure to plan, manage and monitor the performance of technology-related projects, product, services, processes, staff and delivery channels.</p>
<p>3) Information security threat (T3) – the threat of unauthorized disclosure or modification to information, or loss of availability of information, or inappropriate use of information.</p>
<p>4) Legal and regulatory compliance threat (T4) – the threat of failure to comply with the laws of the states in which business operations are carried out, or failure to comply with any regulatory, reporting, and taxation standards, or failure to comply with contracts, or failure of contracts to protect business interests.</p>
<p>5) Climate and weather threat (T5) – the threat of loss or damage caused by unusual climate conditions, including drought, heat, flood, cold, storm, and winds.</p>
<p>Each of the threats has its characteristics. According to Kosseff (<xref ref-type="bibr" rid="j_info1213_ref_039">2018</xref>), it is necessary to promote “identification, confidentiality, and integrality of public and private information, systems, and networks”. Mena <italic>et al.</italic> (<xref ref-type="bibr" rid="j_info1213_ref_047">2018</xref>) focused on IoT inherent vulnerabilities and their implications to the fundamental information security challenges in confidentiality, integrity, and availability.</p>
<p>In this paper, the characteristics of the threats were taken as sub-criteria. It was proposed to choose sub-criteria, which focus on almost every aspect of security, i.e. protection of data from beginning to end. This work focuses on major six aspects of security, i.e. confidentiality, availability, integrity, direct losses, indirect losses, and criticality.</p>
<p>Thus, the following sub-criteria were chosen to solve the MCDM problem:</p>
<p>1) Loss of availability. Availability is the property of being accessible and usable upon demand by an authorized entity. Loss of availability can conclude performance degradation, short-term/long-term interruption, total loss (destruction).</p>
<p>2) Loss of confidentiality. Confidentiality is the property that information is not made available or disclosed to unauthorized individuals, entities, or processes. Confidentiality refers to keeping information secret from unauthorized entities (Sherman <italic>et al.</italic>, <xref ref-type="bibr" rid="j_info1213_ref_059">2018</xref>). Loss of confidentiality can lead to internal disclosure, external disclosure of information, and others.</p>
<p>3) Loss of integrity. Integrity is the property of protecting the accuracy and completeness of assets. Loss of integrity can conclude accidental modification, deliberate modification, incorrect results, incomplete results, etc.</p>
<table-wrap id="j_info1213_tab_001">
<label>Table 1</label>
<caption>
<p>Weight ranking scale based on Immawan <italic>et al.</italic> (<xref ref-type="bibr" rid="j_info1213_ref_035">2018</xref>).</p>
</caption>
<table>
<thead>
<tr>
<td style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin">Rating</td>
<td style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin">Description</td>
<td style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin">Definition</td>
</tr>
</thead>
<tbody>
<tr>
<td style="vertical-align: top; text-align: left">10</td>
<td style="vertical-align: top; text-align: left">Extremely dangerous</td>
<td style="vertical-align: top; text-align: left">Failure could cause the death of a person or infrastructure breakdown</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">8–9</td>
<td style="vertical-align: top; text-align: left">Very dangerous</td>
<td style="vertical-align: top; text-align: left">Failure could cause a significant injury or major infrastructure disruption with the interruption in service</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">6–7</td>
<td style="vertical-align: top; text-align: left">Dangerous</td>
<td style="vertical-align: top; text-align: left">Failure could cause a minor to moderate injury with a high degree of personal dissatisfaction or significant infrastructure issues requiring repairs</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">5</td>
<td style="vertical-align: top; text-align: left">Moderate danger</td>
<td style="vertical-align: top; text-align: left">Failure could cause a minor injury with some person dissatisfaction or significant infrastructure issues</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">3–4</td>
<td style="vertical-align: top; text-align: left">Low to moderate danger</td>
<td style="vertical-align: top; text-align: left">Failure could cause a very minor or no injury but annoys customers or results in minor infrastructure issues that can be overcome with minor modifications to the infrastructure or business</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">2</td>
<td style="vertical-align: top; text-align: left">Slight danger</td>
<td style="vertical-align: top; text-align: left">Failure could cause no injury, and the customer is unaware of the issue; however, the potential for minor injury exists</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">1</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">No danger</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">Failure causes no injury and has no impact on the infrastructure</td>
</tr>
</tbody>
</table>
</table-wrap>
<p>4) Direct losses are losses arising naturally, according to the usual course of things, from the breach of contract itself, and are therefore foreseeable and recoverable. Often these include financial costs.</p>
<p>5) Indirect losses are losses that arise from a particular circumstance of the case. Indirect losses, often referred to as “consequential losses”, are not inflicted by the peril itself but describe losses which were suffered as a result or consequence of the direct loss. For example, reputational risks.</p>
<p>6) Criticality is the quality, state, or degree of being of the highest importance. In RCM terms, criticality is based on the consequence of failure. It is an essential criterion for information infrastructures provided critical services.</p>
</sec>
<sec id="j_info1213_s_009">
<label>3.4</label>
<title>The Importance of Threat Impact on CII</title>
<p>According to the analysis of severity (Lough <italic>et al.</italic>, <xref ref-type="bibr" rid="j_info1213_ref_043">2008</xref>), the importance of severity can be divided into five categories: insignificant (the client noticed a very slight failure), low (slight irritation of the client), medium (causes customer dissatisfaction, customer is annoyed), high (product does not work, client evils) and very high (the client is at risk, the safety rules are violated).</p>
<table-wrap id="j_info1213_tab_002">
<label>Table 2</label>
<caption>
<p>Weight ranking scale for the impact of the threats on CII.</p>
</caption>
<table>
<thead>
<tr>
<td rowspan="2" style="vertical-align: middle; text-align: left; border-top: solid thin; border-bottom: solid thin">Threat impact abbreviation</td>
<td rowspan="2" style="vertical-align: middle; text-align: left; border-top: solid thin; border-bottom: solid thin">Value</td>
<td rowspan="2" style="vertical-align: middle; text-align: left; border-top: solid thin; border-bottom: solid thin">Threat impact level</td>
<td colspan="3" style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin">Fuzzy triangular numbers</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin"><italic>α</italic></td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin"><italic>β</italic></td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin"><italic>γ</italic></td>
</tr>
</thead>
<tbody>
<tr>
<td style="vertical-align: top; text-align: left">ED</td>
<td style="vertical-align: top; text-align: left">10</td>
<td style="vertical-align: top; text-align: left">Extremely dangerous</td>
<td style="vertical-align: top; text-align: left">0.9</td>
<td style="vertical-align: top; text-align: left">1</td>
<td style="vertical-align: top; text-align: left">1</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">VD(H)</td>
<td style="vertical-align: top; text-align: left">9</td>
<td style="vertical-align: top; text-align: left">Very dangerous (high level)</td>
<td style="vertical-align: top; text-align: left">0.8</td>
<td style="vertical-align: top; text-align: left">0.9</td>
<td style="vertical-align: top; text-align: left">1</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">VD(M)</td>
<td style="vertical-align: top; text-align: left">8</td>
<td style="vertical-align: top; text-align: left">Very dangerous (medium level)</td>
<td style="vertical-align: top; text-align: left">0.8</td>
<td style="vertical-align: top; text-align: left">0.9</td>
<td style="vertical-align: top; text-align: left">1</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">D(H)</td>
<td style="vertical-align: top; text-align: left">7</td>
<td style="vertical-align: top; text-align: left">Dangerous (high)</td>
<td style="vertical-align: top; text-align: left">0.6</td>
<td style="vertical-align: top; text-align: left">0.7</td>
<td style="vertical-align: top; text-align: left">0.8</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">D(M)</td>
<td style="vertical-align: top; text-align: left">6</td>
<td style="vertical-align: top; text-align: left">Dangerous (medium level)</td>
<td style="vertical-align: top; text-align: left">0.5</td>
<td style="vertical-align: top; text-align: left">0.6</td>
<td style="vertical-align: top; text-align: left">0.7</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">MD</td>
<td style="vertical-align: top; text-align: left">5</td>
<td style="vertical-align: top; text-align: left">Moderate danger</td>
<td style="vertical-align: top; text-align: left">0.4</td>
<td style="vertical-align: top; text-align: left">0.5</td>
<td style="vertical-align: top; text-align: left">0.6</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">LM(H)</td>
<td style="vertical-align: top; text-align: left">4</td>
<td style="vertical-align: top; text-align: left">Low to moderate danger (high level)</td>
<td style="vertical-align: top; text-align: left">0.3</td>
<td style="vertical-align: top; text-align: left">0.4</td>
<td style="vertical-align: top; text-align: left">0.5</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">LM(M)</td>
<td style="vertical-align: top; text-align: left">3</td>
<td style="vertical-align: top; text-align: left">Low to moderate danger (medium level)</td>
<td style="vertical-align: top; text-align: left">0.2</td>
<td style="vertical-align: top; text-align: left">0.3</td>
<td style="vertical-align: top; text-align: left">0.4</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">SD</td>
<td style="vertical-align: top; text-align: left">2</td>
<td style="vertical-align: top; text-align: left">Slight danger</td>
<td style="vertical-align: top; text-align: left">0.1</td>
<td style="vertical-align: top; text-align: left">0.2</td>
<td style="vertical-align: top; text-align: left">0.3</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">ND</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">1</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">No danger</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">0</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">0.1</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">0.2</td>
</tr>
</tbody>
</table>
</table-wrap>
<fig id="j_info1213_fig_004">
<label>Fig. 4</label>
<caption>
<p>Likert-type scale to determine the threat impact on CII.</p>
</caption>
<graphic xlink:href="info1213_g004.jpg"/>
</fig>
<p>At the same time, some methods of risk analysis apply a 10-point scale for ranking the severity of risks (Table <xref rid="j_info1213_tab_001">1</xref>).</p>
<p>The 10-level scale has more exact results of calculations. The weight depending on their importance determines further criteria. More critical criteria get higher weight values.</p>
<p>Based on the scale proposed in Table <xref rid="j_info1213_tab_001">1</xref>, the Likert-type scale is presented (Table <xref rid="j_info1213_tab_002">2</xref>, Fig. <xref rid="j_info1213_fig_004">4</xref>).</p>
<p>Rating: The raw rating assigned by the judge to each criterion, taking into account the sub-criteria, against the scale of 0 to 10 (10 most valuable) is treated as follows (Tables <xref rid="j_info1213_tab_003">3</xref>–<xref rid="j_info1213_tab_004">4</xref>): 
<disp-formula id="j_info1213_eq_001">
<label>(1)</label><alternatives><mml:math display="block">
<mml:mtable displaystyle="true">
<mml:mtr>
<mml:mtd>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">w</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">c</mml:mi>
<mml:mi mathvariant="italic">j</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>=</mml:mo><mml:mstyle displaystyle="true">
<mml:mfrac>
<mml:mrow>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">p</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">c</mml:mi>
<mml:mi mathvariant="italic">j</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
<mml:mrow>
<mml:msubsup>
<mml:mrow>
<mml:mo largeop="false" movablelimits="false">∑</mml:mo>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">c</mml:mi>
<mml:mo>=</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">m</mml:mi>
</mml:mrow>
</mml:msubsup>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">p</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">c</mml:mi>
<mml:mi mathvariant="italic">j</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:mfrac>
</mml:mstyle>
<mml:mo mathvariant="normal">,</mml:mo>
</mml:mtd>
</mml:mtr>
</mml:mtable></mml:math><tex-math><![CDATA[\[ {w_{cj}}=\frac{{p_{cj}}}{{\textstyle\textstyle\sum _{c=1}^{m}}{p_{cj}}},\]]]></tex-math></alternatives>
</disp-formula> 
where <inline-formula id="j_info1213_ineq_002"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">w</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">c</mml:mi>
<mml:mi mathvariant="italic">j</mml:mi>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${w_{cj}}$]]></tex-math></alternatives></inline-formula> – weight computed for criterion <italic>c</italic> from the rating given by judge <italic>j</italic>, <inline-formula id="j_info1213_ineq_003"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">p</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">c</mml:mi>
<mml:mi mathvariant="italic">j</mml:mi>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${p_{cj}}$]]></tex-math></alternatives></inline-formula> – rating given by judge <italic>j</italic> to criterion <italic>c</italic>, and <inline-formula id="j_info1213_ineq_004"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">w</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">c</mml:mi>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${w_{c}}$]]></tex-math></alternatives></inline-formula> is calculated as follows: 
<disp-formula id="j_info1213_eq_002">
<label>(2)</label><alternatives><mml:math display="block">
<mml:mtable displaystyle="true">
<mml:mtr>
<mml:mtd>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">w</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">c</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>=</mml:mo><mml:mstyle displaystyle="true">
<mml:mfrac>
<mml:mrow>
<mml:msubsup>
<mml:mrow>
<mml:mo largeop="false" movablelimits="false">∑</mml:mo>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">j</mml:mi>
<mml:mo>=</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">n</mml:mi>
</mml:mrow>
</mml:msubsup>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">w</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">c</mml:mi>
<mml:mi mathvariant="italic">j</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
<mml:mrow>
<mml:msubsup>
<mml:mrow>
<mml:mo largeop="false" movablelimits="false">∑</mml:mo>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">j</mml:mi>
<mml:mo>=</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">n</mml:mi>
</mml:mrow>
</mml:msubsup>
<mml:msubsup>
<mml:mrow>
<mml:mo largeop="false" movablelimits="false">∑</mml:mo>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">c</mml:mi>
<mml:mo>=</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">m</mml:mi>
</mml:mrow>
</mml:msubsup>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">w</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">c</mml:mi>
<mml:mi mathvariant="italic">j</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:mfrac>
</mml:mstyle>
<mml:mo>.</mml:mo>
</mml:mtd>
</mml:mtr>
</mml:mtable></mml:math><tex-math><![CDATA[\[ {w_{c}}=\frac{{\textstyle\textstyle\sum _{j=1}^{n}}{w_{cj}}}{{\textstyle\textstyle\sum _{j=1}^{n}}{\textstyle\textstyle\sum _{c=1}^{m}}{w_{cj}}}.\]]]></tex-math></alternatives>
</disp-formula>
</p>
<table-wrap id="j_info1213_tab_003">
<label>Table 3</label>
<caption>
<p>Impact ofthe threats on CII lexical evaluation based on Likert-type scale.</p>
</caption>
<table>
<thead>
<tr>
<td rowspan="2" style="vertical-align: middle; text-align: left; border-top: solid thin; border-bottom: solid thin">Impact of threats on CII</td>
<td colspan="5" style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin">Loss of availability experts</td>
<td style="vertical-align: top; text-align: left; border-top: solid thin">…</td>
<td colspan="5" style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin">Criticality experts</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin"><inline-formula id="j_info1213_ineq_005"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">E</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${E_{1}}$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin"><inline-formula id="j_info1213_ineq_006"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">E</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${E_{2}}$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin"><inline-formula id="j_info1213_ineq_007"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">E</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>3</mml:mn>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${E_{3}}$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin"><inline-formula id="j_info1213_ineq_008"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">E</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>4</mml:mn>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${E_{4}}$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin"><inline-formula id="j_info1213_ineq_009"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">E</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>5</mml:mn>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${E_{5}}$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">…</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin"><inline-formula id="j_info1213_ineq_010"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">E</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${E_{1}}$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin"><inline-formula id="j_info1213_ineq_011"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">E</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${E_{2}}$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin"><inline-formula id="j_info1213_ineq_012"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">E</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>3</mml:mn>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${E_{3}}$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin"><inline-formula id="j_info1213_ineq_013"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">E</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>4</mml:mn>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${E_{4}}$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin"><inline-formula id="j_info1213_ineq_014"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">E</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>5</mml:mn>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${E_{5}}$]]></tex-math></alternatives></inline-formula></td>
</tr>
</thead>
<tbody>
<tr>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_info1213_ineq_015"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">I</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${I_{1}}$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left">VD(M)</td>
<td style="vertical-align: top; text-align: left">VD(M)</td>
<td style="vertical-align: top; text-align: left">VD(H)</td>
<td style="vertical-align: top; text-align: left">VD(H)</td>
<td style="vertical-align: top; text-align: left">VD(H)</td>
<td style="vertical-align: top; text-align: left">…</td>
<td style="vertical-align: top; text-align: left">ED</td>
<td style="vertical-align: top; text-align: left">ED</td>
<td style="vertical-align: top; text-align: left">ED</td>
<td style="vertical-align: top; text-align: left">VD(H)</td>
<td style="vertical-align: top; text-align: left">ED</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_info1213_ineq_016"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">I</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${I_{2}}$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left">D(H)</td>
<td style="vertical-align: top; text-align: left">VD(M)</td>
<td style="vertical-align: top; text-align: left">D(M)</td>
<td style="vertical-align: top; text-align: left">D(M)</td>
<td style="vertical-align: top; text-align: left">D(H)</td>
<td style="vertical-align: top; text-align: left">…</td>
<td style="vertical-align: top; text-align: left">VD(H)</td>
<td style="vertical-align: top; text-align: left">VD(H)</td>
<td style="vertical-align: top; text-align: left">ED</td>
<td style="vertical-align: top; text-align: left">VD(H)</td>
<td style="vertical-align: top; text-align: left">VD(H)</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_info1213_ineq_017"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">I</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>3</mml:mn>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${I_{3}}$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left">D(M)</td>
<td style="vertical-align: top; text-align: left">D(H)</td>
<td style="vertical-align: top; text-align: left">D(H)</td>
<td style="vertical-align: top; text-align: left">D(H)</td>
<td style="vertical-align: top; text-align: left">D(M)</td>
<td style="vertical-align: top; text-align: left">…</td>
<td style="vertical-align: top; text-align: left">VD(M)</td>
<td style="vertical-align: top; text-align: left">VD(M)</td>
<td style="vertical-align: top; text-align: left">VD(M)</td>
<td style="vertical-align: top; text-align: left">VD(M)</td>
<td style="vertical-align: top; text-align: left">VD(M)</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_info1213_ineq_018"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">I</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>4</mml:mn>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${I_{4}}$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left">LM(H)</td>
<td style="vertical-align: top; text-align: left">LM(M)</td>
<td style="vertical-align: top; text-align: left">SD</td>
<td style="vertical-align: top; text-align: left">SD</td>
<td style="vertical-align: top; text-align: left">LM(M)</td>
<td style="vertical-align: top; text-align: left">…</td>
<td style="vertical-align: top; text-align: left">LM(H)</td>
<td style="vertical-align: top; text-align: left">MD</td>
<td style="vertical-align: top; text-align: left">D(M)</td>
<td style="vertical-align: top; text-align: left">LM(H)</td>
<td style="vertical-align: top; text-align: left">D(M)</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin"><inline-formula id="j_info1213_ineq_019"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">I</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>5</mml:mn>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${I_{5}}$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">D(M)</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">VD(H)</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">D(H)</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">D(M)</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">VD(M)</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">…</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">VD(M)</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">D(H)</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">D(M)</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">MD</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">MD</td>
</tr>
</tbody>
</table>
</table-wrap>
<p>Using rules of fuzzy arithmetic, the equations (<xref rid="j_info1213_eq_001">1</xref>) and (<xref rid="j_info1213_eq_002">2</xref>) are modified as follows: 
<disp-formula id="j_info1213_eq_003">
<label>(3)</label><alternatives><mml:math display="block">
<mml:mtable displaystyle="true" columnalign="left">
<mml:mtr>
<mml:mtd class="align-odd">
<mml:msub>
<mml:mrow>
<mml:mover accent="true">
<mml:mrow>
<mml:mi mathvariant="italic">w</mml:mi>
</mml:mrow>
<mml:mo stretchy="false">˜</mml:mo></mml:mover>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">c</mml:mi>
<mml:mi mathvariant="italic">j</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>=</mml:mo><mml:mstyle displaystyle="true">
<mml:mfrac>
<mml:mrow>
<mml:msub>
<mml:mrow>
<mml:mover accent="true">
<mml:mrow>
<mml:mi mathvariant="italic">p</mml:mi>
</mml:mrow>
<mml:mo stretchy="false">˜</mml:mo></mml:mover>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">c</mml:mi>
<mml:mi mathvariant="italic">j</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
<mml:mrow>
<mml:msubsup>
<mml:mrow>
<mml:mo largeop="false" movablelimits="false">∑</mml:mo>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">c</mml:mi>
<mml:mo>=</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">m</mml:mi>
</mml:mrow>
</mml:msubsup>
<mml:msub>
<mml:mrow>
<mml:mover accent="true">
<mml:mrow>
<mml:mi mathvariant="italic">p</mml:mi>
</mml:mrow>
<mml:mo stretchy="false">˜</mml:mo></mml:mover>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">c</mml:mi>
<mml:mi mathvariant="italic">j</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:mfrac>
</mml:mstyle>
<mml:mo>=</mml:mo>
<mml:mo maxsize="2.03em" minsize="2.03em" fence="true" mathvariant="normal">(</mml:mo><mml:mstyle displaystyle="true">
<mml:mfrac>
<mml:mrow>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">p</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">c</mml:mi>
<mml:mi mathvariant="italic">α</mml:mi>
<mml:mi mathvariant="italic">j</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
<mml:mrow>
<mml:msubsup>
<mml:mrow>
<mml:mo largeop="false" movablelimits="false">∑</mml:mo>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">c</mml:mi>
<mml:mo>=</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">m</mml:mi>
</mml:mrow>
</mml:msubsup>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">p</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">c</mml:mi>
<mml:mi mathvariant="italic">γ</mml:mi>
<mml:mi mathvariant="italic">j</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:mfrac>
</mml:mstyle>
<mml:mo>;</mml:mo><mml:mstyle displaystyle="true">
<mml:mfrac>
<mml:mrow>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">p</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">c</mml:mi>
<mml:mi mathvariant="italic">β</mml:mi>
<mml:mi mathvariant="italic">j</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
<mml:mrow>
<mml:msubsup>
<mml:mrow>
<mml:mo largeop="false" movablelimits="false">∑</mml:mo>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">c</mml:mi>
<mml:mo>=</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">m</mml:mi>
</mml:mrow>
</mml:msubsup>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">p</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">c</mml:mi>
<mml:mi mathvariant="italic">β</mml:mi>
<mml:mi mathvariant="italic">j</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:mfrac>
</mml:mstyle>
<mml:mo>;</mml:mo><mml:mstyle displaystyle="true">
<mml:mfrac>
<mml:mrow>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">p</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">c</mml:mi>
<mml:mi mathvariant="italic">γ</mml:mi>
<mml:mi mathvariant="italic">j</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
<mml:mrow>
<mml:msubsup>
<mml:mrow>
<mml:mo largeop="false" movablelimits="false">∑</mml:mo>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">c</mml:mi>
<mml:mo>=</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">m</mml:mi>
</mml:mrow>
</mml:msubsup>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">p</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">c</mml:mi>
<mml:mi mathvariant="italic">α</mml:mi>
<mml:mi mathvariant="italic">j</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:mfrac>
</mml:mstyle>
<mml:mo maxsize="2.03em" minsize="2.03em" fence="true" mathvariant="normal">)</mml:mo>
<mml:mo mathvariant="normal">,</mml:mo>
</mml:mtd>
</mml:mtr>
<mml:mtr>
<mml:mtd class="align-odd">
<mml:msub>
<mml:mrow>
<mml:mover accent="true">
<mml:mrow>
<mml:mi mathvariant="italic">w</mml:mi>
</mml:mrow>
<mml:mo stretchy="false">˜</mml:mo></mml:mover>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">c</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>=</mml:mo>
<mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">w</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">c</mml:mi>
<mml:mi mathvariant="italic">α</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>;</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">w</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">c</mml:mi>
<mml:mi mathvariant="italic">β</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>;</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">w</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">c</mml:mi>
<mml:mi mathvariant="italic">γ</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo>
<mml:mo>=</mml:mo><mml:mstyle displaystyle="true">
<mml:mfrac>
<mml:mrow>
<mml:msubsup>
<mml:mrow>
<mml:mo largeop="false" movablelimits="false">∑</mml:mo>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">j</mml:mi>
<mml:mo>=</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">n</mml:mi>
</mml:mrow>
</mml:msubsup>
<mml:msub>
<mml:mrow>
<mml:mover accent="true">
<mml:mrow>
<mml:mi mathvariant="italic">w</mml:mi>
</mml:mrow>
<mml:mo stretchy="false">˜</mml:mo></mml:mover>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">c</mml:mi>
<mml:mi mathvariant="italic">j</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
<mml:mrow>
<mml:msubsup>
<mml:mrow>
<mml:mo largeop="false" movablelimits="false">∑</mml:mo>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">j</mml:mi>
<mml:mo>=</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">n</mml:mi>
</mml:mrow>
</mml:msubsup>
<mml:msubsup>
<mml:mrow>
<mml:mo largeop="false" movablelimits="false">∑</mml:mo>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">c</mml:mi>
<mml:mo>=</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">m</mml:mi>
</mml:mrow>
</mml:msubsup>
<mml:msub>
<mml:mrow>
<mml:mover accent="true">
<mml:mrow>
<mml:mi mathvariant="italic">w</mml:mi>
</mml:mrow>
<mml:mo stretchy="false">˜</mml:mo></mml:mover>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">c</mml:mi>
<mml:mi mathvariant="italic">j</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:mfrac>
</mml:mstyle>
</mml:mtd>
</mml:mtr>
<mml:mtr>
<mml:mtd class="align-odd">
<mml:mspace width="1em"/>
<mml:mo>=</mml:mo>
<mml:mo maxsize="2.03em" minsize="2.03em" fence="true" mathvariant="normal">(</mml:mo><mml:mstyle displaystyle="true">
<mml:mfrac>
<mml:mrow>
<mml:msubsup>
<mml:mrow>
<mml:mo largeop="false" movablelimits="false">∑</mml:mo>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">j</mml:mi>
<mml:mo>=</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">n</mml:mi>
</mml:mrow>
</mml:msubsup>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">w</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">c</mml:mi>
<mml:mi mathvariant="italic">α</mml:mi>
<mml:mi mathvariant="italic">j</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
<mml:mrow>
<mml:msubsup>
<mml:mrow>
<mml:mo largeop="false" movablelimits="false">∑</mml:mo>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">j</mml:mi>
<mml:mo>=</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">n</mml:mi>
</mml:mrow>
</mml:msubsup>
<mml:msubsup>
<mml:mrow>
<mml:mo largeop="false" movablelimits="false">∑</mml:mo>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">c</mml:mi>
<mml:mo>=</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">m</mml:mi>
</mml:mrow>
</mml:msubsup>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">w</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">c</mml:mi>
<mml:mi mathvariant="italic">γ</mml:mi>
<mml:mi mathvariant="italic">j</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:mfrac>
</mml:mstyle>
<mml:mo>;</mml:mo><mml:mstyle displaystyle="true">
<mml:mfrac>
<mml:mrow>
<mml:msubsup>
<mml:mrow>
<mml:mo largeop="false" movablelimits="false">∑</mml:mo>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">j</mml:mi>
<mml:mo>=</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">n</mml:mi>
</mml:mrow>
</mml:msubsup>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">w</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">c</mml:mi>
<mml:mi mathvariant="italic">β</mml:mi>
<mml:mi mathvariant="italic">j</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
<mml:mrow>
<mml:msubsup>
<mml:mrow>
<mml:mo largeop="false" movablelimits="false">∑</mml:mo>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">j</mml:mi>
<mml:mo>=</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">n</mml:mi>
</mml:mrow>
</mml:msubsup>
<mml:msubsup>
<mml:mrow>
<mml:mo largeop="false" movablelimits="false">∑</mml:mo>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">c</mml:mi>
<mml:mo>=</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">m</mml:mi>
</mml:mrow>
</mml:msubsup>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">w</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">c</mml:mi>
<mml:mi mathvariant="italic">β</mml:mi>
<mml:mi mathvariant="italic">j</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:mfrac>
</mml:mstyle>
<mml:mo>;</mml:mo><mml:mstyle displaystyle="true">
<mml:mfrac>
<mml:mrow>
<mml:msubsup>
<mml:mrow>
<mml:mo largeop="false" movablelimits="false">∑</mml:mo>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">j</mml:mi>
<mml:mo>=</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">n</mml:mi>
</mml:mrow>
</mml:msubsup>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">w</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">c</mml:mi>
<mml:mi mathvariant="italic">γ</mml:mi>
<mml:mi mathvariant="italic">j</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
<mml:mrow>
<mml:msubsup>
<mml:mrow>
<mml:mo largeop="false" movablelimits="false">∑</mml:mo>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">j</mml:mi>
<mml:mo>=</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">n</mml:mi>
</mml:mrow>
</mml:msubsup>
<mml:msubsup>
<mml:mrow>
<mml:mo largeop="false" movablelimits="false">∑</mml:mo>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">c</mml:mi>
<mml:mo>=</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">m</mml:mi>
</mml:mrow>
</mml:msubsup>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">w</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">c</mml:mi>
<mml:mi mathvariant="italic">α</mml:mi>
<mml:mi mathvariant="italic">j</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:mfrac>
</mml:mstyle>
<mml:mo maxsize="2.03em" minsize="2.03em" fence="true" mathvariant="normal">)</mml:mo>
<mml:mo mathvariant="normal">,</mml:mo>
</mml:mtd>
</mml:mtr>
</mml:mtable></mml:math><tex-math><![CDATA[\[\begin{array}{l}\displaystyle {\tilde{w}_{cj}}=\frac{{\tilde{p}_{cj}}}{{\textstyle\textstyle\sum _{c=1}^{m}}{\tilde{p}_{cj}}}=\bigg(\frac{{p_{c\alpha j}}}{{\textstyle\textstyle\sum _{c=1}^{m}}{p_{c\gamma j}}};\frac{{p_{c\beta j}}}{{\textstyle\textstyle\sum _{c=1}^{m}}{p_{c\beta j}}};\frac{{p_{c\gamma j}}}{{\textstyle\textstyle\sum _{c=1}^{m}}{p_{c\alpha j}}}\bigg),\\ {} \displaystyle {\tilde{w}_{c}}=({w_{c\alpha }};{w_{c\beta }};{w_{c\gamma }})=\frac{{\textstyle\textstyle\sum _{j=1}^{n}}{\tilde{w}_{cj}}}{{\textstyle\textstyle\sum _{j=1}^{n}}{\textstyle\textstyle\sum _{c=1}^{m}}{\tilde{w}_{cj}}}\\ {} \displaystyle \hspace{1em}=\bigg(\frac{{\textstyle\textstyle\sum _{j=1}^{n}}{w_{c\alpha j}}}{{\textstyle\textstyle\sum _{j=1}^{n}}{\textstyle\textstyle\sum _{c=1}^{m}}{w_{c\gamma j}}};\frac{{\textstyle\textstyle\sum _{j=1}^{n}}{w_{c\beta j}}}{{\textstyle\textstyle\sum _{j=1}^{n}}{\textstyle\textstyle\sum _{c=1}^{m}}{w_{c\beta j}}};\frac{{\textstyle\textstyle\sum _{j=1}^{n}}{w_{c\gamma j}}}{{\textstyle\textstyle\sum _{j=1}^{n}}{\textstyle\textstyle\sum _{c=1}^{m}}{w_{c\alpha j}}}\bigg),\end{array}\]]]></tex-math></alternatives>
</disp-formula> 
where <inline-formula id="j_info1213_ineq_020"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">w</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">j</mml:mi>
<mml:mi mathvariant="italic">α</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>=</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mo movablelimits="false">min</mml:mo>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">k</mml:mi>
</mml:mrow>
</mml:msub>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">y</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">j</mml:mi>
<mml:mi mathvariant="italic">k</mml:mi>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${w_{j\alpha }}={\min _{k}}{y_{jk}}$]]></tex-math></alternatives></inline-formula>, <inline-formula id="j_info1213_ineq_021"><alternatives><mml:math>
<mml:mi mathvariant="italic">j</mml:mi>
<mml:mo>=</mml:mo><mml:mover accent="false">
<mml:mrow>
<mml:mn>1</mml:mn>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mi mathvariant="italic">n</mml:mi>
</mml:mrow>
<mml:mo accent="true">‾</mml:mo></mml:mover></mml:math><tex-math><![CDATA[$j=\overline{1,n}$]]></tex-math></alternatives></inline-formula>, <inline-formula id="j_info1213_ineq_022"><alternatives><mml:math>
<mml:mi mathvariant="italic">k</mml:mi>
<mml:mo>=</mml:mo><mml:mover accent="false">
<mml:mrow>
<mml:mn>1</mml:mn>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mi mathvariant="italic">p</mml:mi>
</mml:mrow>
<mml:mo accent="true">‾</mml:mo></mml:mover></mml:math><tex-math><![CDATA[$k=\overline{1,p}$]]></tex-math></alternatives></inline-formula>, is minimum possible value of <italic>j</italic>-th criterion, <inline-formula id="j_info1213_ineq_023"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">w</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">j</mml:mi>
<mml:mi mathvariant="italic">β</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>=</mml:mo>
<mml:msup>
<mml:mrow>
<mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo>
<mml:msubsup>
<mml:mrow>
<mml:mo largeop="false" movablelimits="false">∏</mml:mo>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">k</mml:mi>
<mml:mo>=</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">p</mml:mi>
</mml:mrow>
</mml:msubsup>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">y</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">j</mml:mi>
<mml:mi mathvariant="italic">k</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo>
</mml:mrow>
<mml:mrow>
<mml:mstyle displaystyle="false">
<mml:mfrac>
<mml:mrow>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">p</mml:mi>
</mml:mrow>
</mml:mfrac>
</mml:mstyle>
</mml:mrow>
</mml:msup></mml:math><tex-math><![CDATA[${w_{j\beta }}={({\textstyle\prod _{k=1}^{p}}{y_{jk}})^{\frac{1}{p}}}$]]></tex-math></alternatives></inline-formula>, <inline-formula id="j_info1213_ineq_024"><alternatives><mml:math>
<mml:mi mathvariant="italic">j</mml:mi>
<mml:mo>=</mml:mo><mml:mover accent="false">
<mml:mrow>
<mml:mn>1</mml:mn>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mi mathvariant="italic">n</mml:mi>
</mml:mrow>
<mml:mo accent="true">‾</mml:mo></mml:mover></mml:math><tex-math><![CDATA[$j=\overline{1,n}$]]></tex-math></alternatives></inline-formula>, is the most possible value of <italic>j</italic>-th criterion and <inline-formula id="j_info1213_ineq_025"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">w</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">j</mml:mi>
<mml:mi mathvariant="italic">γ</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>=</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mo movablelimits="false">max</mml:mo>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">k</mml:mi>
</mml:mrow>
</mml:msub>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">y</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">j</mml:mi>
<mml:mi mathvariant="italic">k</mml:mi>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${w_{j\gamma }}={\max _{k}}{y_{jk}}$]]></tex-math></alternatives></inline-formula>, <inline-formula id="j_info1213_ineq_026"><alternatives><mml:math>
<mml:mi mathvariant="italic">j</mml:mi>
<mml:mo>=</mml:mo><mml:mover accent="false">
<mml:mrow>
<mml:mn>1</mml:mn>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mi mathvariant="italic">n</mml:mi>
</mml:mrow>
<mml:mo accent="true">‾</mml:mo></mml:mover></mml:math><tex-math><![CDATA[$j=\overline{1,n}$]]></tex-math></alternatives></inline-formula>, <inline-formula id="j_info1213_ineq_027"><alternatives><mml:math>
<mml:mi mathvariant="italic">k</mml:mi>
<mml:mo>=</mml:mo><mml:mover accent="false">
<mml:mrow>
<mml:mn>1</mml:mn>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mi mathvariant="italic">p</mml:mi>
</mml:mrow>
<mml:mo accent="true">‾</mml:mo></mml:mover></mml:math><tex-math><![CDATA[$k=\overline{1,p}$]]></tex-math></alternatives></inline-formula>, is the maximal possible value of <italic>j</italic>-th criterion.</p>
<table-wrap id="j_info1213_tab_004">
<label>Table 4</label>
<caption>
<p>Impact ofthe threats on CII expressed by fuzzy triangular numbers corresponding to the linguistic scale.</p>
</caption>
<table>
<thead>
<tr>
<td style="vertical-align: top; text-align: left; border-top: solid thin"/>
<td colspan="3" style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin"><inline-formula id="j_info1213_ineq_028"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">E</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${E_{1}}$]]></tex-math></alternatives></inline-formula></td>
<td colspan="3" style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin"><inline-formula id="j_info1213_ineq_029"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">E</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${E_{2}}$]]></tex-math></alternatives></inline-formula></td>
<td colspan="3" style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin"><inline-formula id="j_info1213_ineq_030"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">E</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>3</mml:mn>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${E_{3}}$]]></tex-math></alternatives></inline-formula></td>
<td colspan="3" style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin"><inline-formula id="j_info1213_ineq_031"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">E</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>4</mml:mn>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${E_{4}}$]]></tex-math></alternatives></inline-formula></td>
<td colspan="3" style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin"><inline-formula id="j_info1213_ineq_032"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">E</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>5</mml:mn>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${E_{5}}$]]></tex-math></alternatives></inline-formula></td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin"/>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin"><italic>α</italic></td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin"><italic>β</italic></td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin"><italic>γ</italic></td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin"><italic>α</italic></td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin"><italic>β</italic></td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin"><italic>γ</italic></td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin"><italic>α</italic></td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin"><italic>β</italic></td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin"><italic>γ</italic></td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin"><italic>α</italic></td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin"><italic>β</italic></td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin"><italic>γ</italic></td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin"><italic>α</italic></td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin"><italic>β</italic></td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin"><italic>γ</italic></td>
</tr>
</thead>
<tbody>
<tr>
<td colspan="16" style="vertical-align: top; text-align: left"><italic>Loss of availability sub-criterion</italic></td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_info1213_ineq_033"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">I</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${I_{1}}$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left">0.7</td>
<td style="vertical-align: top; text-align: left">0.8</td>
<td style="vertical-align: top; text-align: left">0.9</td>
<td style="vertical-align: top; text-align: left">0.7</td>
<td style="vertical-align: top; text-align: left">0.8</td>
<td style="vertical-align: top; text-align: left">0.9</td>
<td style="vertical-align: top; text-align: left">0.8</td>
<td style="vertical-align: top; text-align: left">0.9</td>
<td style="vertical-align: top; text-align: left">1</td>
<td style="vertical-align: top; text-align: left">0.8</td>
<td style="vertical-align: top; text-align: left">0.9</td>
<td style="vertical-align: top; text-align: left">1</td>
<td style="vertical-align: top; text-align: left">0.8</td>
<td style="vertical-align: top; text-align: left">0.9</td>
<td style="vertical-align: top; text-align: left">1</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_info1213_ineq_034"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">I</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${I_{2}}$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left">0.6</td>
<td style="vertical-align: top; text-align: left">0.7</td>
<td style="vertical-align: top; text-align: left">0.8</td>
<td style="vertical-align: top; text-align: left">0.7</td>
<td style="vertical-align: top; text-align: left">0.8</td>
<td style="vertical-align: top; text-align: left">0.9</td>
<td style="vertical-align: top; text-align: left">0.5</td>
<td style="vertical-align: top; text-align: left">0.6</td>
<td style="vertical-align: top; text-align: left">0.7</td>
<td style="vertical-align: top; text-align: left">0.5</td>
<td style="vertical-align: top; text-align: left">0.6</td>
<td style="vertical-align: top; text-align: left">0.7</td>
<td style="vertical-align: top; text-align: left">0.6</td>
<td style="vertical-align: top; text-align: left">0.7</td>
<td style="vertical-align: top; text-align: left">0.8</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_info1213_ineq_035"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">I</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>3</mml:mn>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${I_{3}}$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left">0.5</td>
<td style="vertical-align: top; text-align: left">0.6</td>
<td style="vertical-align: top; text-align: left">0.7</td>
<td style="vertical-align: top; text-align: left">0.6</td>
<td style="vertical-align: top; text-align: left">0.7</td>
<td style="vertical-align: top; text-align: left">0.8</td>
<td style="vertical-align: top; text-align: left">0.6</td>
<td style="vertical-align: top; text-align: left">0.7</td>
<td style="vertical-align: top; text-align: left">0.8</td>
<td style="vertical-align: top; text-align: left">0.6</td>
<td style="vertical-align: top; text-align: left">0.7</td>
<td style="vertical-align: top; text-align: left">0.8</td>
<td style="vertical-align: top; text-align: left">0.5</td>
<td style="vertical-align: top; text-align: left">0.6</td>
<td style="vertical-align: top; text-align: left">0.7</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_info1213_ineq_036"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">I</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>4</mml:mn>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${I_{4}}$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left">0.3</td>
<td style="vertical-align: top; text-align: left">0.4</td>
<td style="vertical-align: top; text-align: left">0.5</td>
<td style="vertical-align: top; text-align: left">0.2</td>
<td style="vertical-align: top; text-align: left">0.3</td>
<td style="vertical-align: top; text-align: left">0.4</td>
<td style="vertical-align: top; text-align: left">0.1</td>
<td style="vertical-align: top; text-align: left">0.2</td>
<td style="vertical-align: top; text-align: left">0.3</td>
<td style="vertical-align: top; text-align: left">0.1</td>
<td style="vertical-align: top; text-align: left">0.2</td>
<td style="vertical-align: top; text-align: left">0.3</td>
<td style="vertical-align: top; text-align: left">0.2</td>
<td style="vertical-align: top; text-align: left">0.3</td>
<td style="vertical-align: top; text-align: left">0.4</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_info1213_ineq_037"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">I</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>5</mml:mn>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${I_{5}}$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left">0.5</td>
<td style="vertical-align: top; text-align: left">0.6</td>
<td style="vertical-align: top; text-align: left">0.7</td>
<td style="vertical-align: top; text-align: left">0.8</td>
<td style="vertical-align: top; text-align: left">0.9</td>
<td style="vertical-align: top; text-align: left">1</td>
<td style="vertical-align: top; text-align: left">0.6</td>
<td style="vertical-align: top; text-align: left">0.7</td>
<td style="vertical-align: top; text-align: left">0.8</td>
<td style="vertical-align: top; text-align: left">0.5</td>
<td style="vertical-align: top; text-align: left">0.6</td>
<td style="vertical-align: top; text-align: left">0.7</td>
<td style="vertical-align: top; text-align: left">0.7</td>
<td style="vertical-align: top; text-align: left">0.8</td>
<td style="vertical-align: top; text-align: left">0.9</td>
</tr>
<tr>
<td colspan="16" style="vertical-align: top; text-align: left"><italic>Loss of confidentiality sub-criterion</italic></td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_info1213_ineq_038"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">I</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${I_{1}}$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left">0.3</td>
<td style="vertical-align: top; text-align: left">0.4</td>
<td style="vertical-align: top; text-align: left">0.5</td>
<td style="vertical-align: top; text-align: left">0.1</td>
<td style="vertical-align: top; text-align: left">0.2</td>
<td style="vertical-align: top; text-align: left">0.3</td>
<td style="vertical-align: top; text-align: left">0.2</td>
<td style="vertical-align: top; text-align: left">0.3</td>
<td style="vertical-align: top; text-align: left">0.4</td>
<td style="vertical-align: top; text-align: left">0.2</td>
<td style="vertical-align: top; text-align: left">0.3</td>
<td style="vertical-align: top; text-align: left">0.4</td>
<td style="vertical-align: top; text-align: left">0.1</td>
<td style="vertical-align: top; text-align: left">0.2</td>
<td style="vertical-align: top; text-align: left">0.3</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_info1213_ineq_039"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">I</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${I_{2}}$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left">0.2</td>
<td style="vertical-align: top; text-align: left">0.3</td>
<td style="vertical-align: top; text-align: left">0.4</td>
<td style="vertical-align: top; text-align: left">0.2</td>
<td style="vertical-align: top; text-align: left">0.3</td>
<td style="vertical-align: top; text-align: left">0.4</td>
<td style="vertical-align: top; text-align: left">0.1</td>
<td style="vertical-align: top; text-align: left">0.2</td>
<td style="vertical-align: top; text-align: left">0.3</td>
<td style="vertical-align: top; text-align: left">0.1</td>
<td style="vertical-align: top; text-align: left">0.2</td>
<td style="vertical-align: top; text-align: left">0.3</td>
<td style="vertical-align: top; text-align: left">0.1</td>
<td style="vertical-align: top; text-align: left">0.2</td>
<td style="vertical-align: top; text-align: left">0.3</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_info1213_ineq_040"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">I</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>3</mml:mn>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${I_{3}}$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left">0.2</td>
<td style="vertical-align: top; text-align: left">0.3</td>
<td style="vertical-align: top; text-align: left">0.4</td>
<td style="vertical-align: top; text-align: left">0.2</td>
<td style="vertical-align: top; text-align: left">0.3</td>
<td style="vertical-align: top; text-align: left">0.4</td>
<td style="vertical-align: top; text-align: left">0</td>
<td style="vertical-align: top; text-align: left">0.1</td>
<td style="vertical-align: top; text-align: left">0.2</td>
<td style="vertical-align: top; text-align: left">0.2</td>
<td style="vertical-align: top; text-align: left">0.3</td>
<td style="vertical-align: top; text-align: left">0.4</td>
<td style="vertical-align: top; text-align: left">0.1</td>
<td style="vertical-align: top; text-align: left">0.2</td>
<td style="vertical-align: top; text-align: left">0.3</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_info1213_ineq_041"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">I</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>4</mml:mn>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${I_{4}}$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left">0.1</td>
<td style="vertical-align: top; text-align: left">0.2</td>
<td style="vertical-align: top; text-align: left">0.3</td>
<td style="vertical-align: top; text-align: left">0</td>
<td style="vertical-align: top; text-align: left">0.1</td>
<td style="vertical-align: top; text-align: left">0.2</td>
<td style="vertical-align: top; text-align: left">0.1</td>
<td style="vertical-align: top; text-align: left">0.2</td>
<td style="vertical-align: top; text-align: left">0.3</td>
<td style="vertical-align: top; text-align: left">0.1</td>
<td style="vertical-align: top; text-align: left">0.2</td>
<td style="vertical-align: top; text-align: left">0.3</td>
<td style="vertical-align: top; text-align: left">0.1</td>
<td style="vertical-align: top; text-align: left">0.2</td>
<td style="vertical-align: top; text-align: left">0.3</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_info1213_ineq_042"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">I</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>5</mml:mn>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${I_{5}}$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left">0.1</td>
<td style="vertical-align: top; text-align: left">0.2</td>
<td style="vertical-align: top; text-align: left">0.3</td>
<td style="vertical-align: top; text-align: left">0.1</td>
<td style="vertical-align: top; text-align: left">0.2</td>
<td style="vertical-align: top; text-align: left">0.3</td>
<td style="vertical-align: top; text-align: left">0</td>
<td style="vertical-align: top; text-align: left">0.1</td>
<td style="vertical-align: top; text-align: left">0.2</td>
<td style="vertical-align: top; text-align: left">0.1</td>
<td style="vertical-align: top; text-align: left">0.2</td>
<td style="vertical-align: top; text-align: left">0.3</td>
<td style="vertical-align: top; text-align: left">0</td>
<td style="vertical-align: top; text-align: left">0.1</td>
<td style="vertical-align: top; text-align: left">0.2</td>
</tr>
<tr>
<td colspan="16" style="vertical-align: top; text-align: left"><italic>Loss of integrity sub-criterion</italic></td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_info1213_ineq_043"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">I</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${I_{1}}$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left">0.7</td>
<td style="vertical-align: top; text-align: left">0.8</td>
<td style="vertical-align: top; text-align: left">0.9</td>
<td style="vertical-align: top; text-align: left">0.7</td>
<td style="vertical-align: top; text-align: left">0.8</td>
<td style="vertical-align: top; text-align: left">0.9</td>
<td style="vertical-align: top; text-align: left">0.6</td>
<td style="vertical-align: top; text-align: left">0.7</td>
<td style="vertical-align: top; text-align: left">0.8</td>
<td style="vertical-align: top; text-align: left">0.8</td>
<td style="vertical-align: top; text-align: left">0.9</td>
<td style="vertical-align: top; text-align: left">1</td>
<td style="vertical-align: top; text-align: left">0.6</td>
<td style="vertical-align: top; text-align: left">0.7</td>
<td style="vertical-align: top; text-align: left">0.8</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_info1213_ineq_044"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">I</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${I_{2}}$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left">0.5</td>
<td style="vertical-align: top; text-align: left">0.6</td>
<td style="vertical-align: top; text-align: left">0.7</td>
<td style="vertical-align: top; text-align: left">0.5</td>
<td style="vertical-align: top; text-align: left">0.6</td>
<td style="vertical-align: top; text-align: left">0.7</td>
<td style="vertical-align: top; text-align: left">0.3</td>
<td style="vertical-align: top; text-align: left">0.4</td>
<td style="vertical-align: top; text-align: left">0.5</td>
<td style="vertical-align: top; text-align: left">0.3</td>
<td style="vertical-align: top; text-align: left">0.4</td>
<td style="vertical-align: top; text-align: left">0.5</td>
<td style="vertical-align: top; text-align: left">0.3</td>
<td style="vertical-align: top; text-align: left">0.4</td>
<td style="vertical-align: top; text-align: left">0.5</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_info1213_ineq_045"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">I</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>3</mml:mn>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${I_{3}}$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left">0.3</td>
<td style="vertical-align: top; text-align: left">0.4</td>
<td style="vertical-align: top; text-align: left">0.5</td>
<td style="vertical-align: top; text-align: left">0.3</td>
<td style="vertical-align: top; text-align: left">0.4</td>
<td style="vertical-align: top; text-align: left">0.5</td>
<td style="vertical-align: top; text-align: left">0.3</td>
<td style="vertical-align: top; text-align: left">0.4</td>
<td style="vertical-align: top; text-align: left">0.5</td>
<td style="vertical-align: top; text-align: left">0.3</td>
<td style="vertical-align: top; text-align: left">0.4</td>
<td style="vertical-align: top; text-align: left">0.5</td>
<td style="vertical-align: top; text-align: left">0.5</td>
<td style="vertical-align: top; text-align: left">0.6</td>
<td style="vertical-align: top; text-align: left">0.7</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_info1213_ineq_046"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">I</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>4</mml:mn>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${I_{4}}$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left">0.1</td>
<td style="vertical-align: top; text-align: left">0.2</td>
<td style="vertical-align: top; text-align: left">0.3</td>
<td style="vertical-align: top; text-align: left">0.1</td>
<td style="vertical-align: top; text-align: left">0.2</td>
<td style="vertical-align: top; text-align: left">0.3</td>
<td style="vertical-align: top; text-align: left">0.1</td>
<td style="vertical-align: top; text-align: left">0.2</td>
<td style="vertical-align: top; text-align: left">0.3</td>
<td style="vertical-align: top; text-align: left">0.1</td>
<td style="vertical-align: top; text-align: left">0.2</td>
<td style="vertical-align: top; text-align: left">0.3</td>
<td style="vertical-align: top; text-align: left">0.2</td>
<td style="vertical-align: top; text-align: left">0.3</td>
<td style="vertical-align: top; text-align: left">0.4</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_info1213_ineq_047"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">I</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>5</mml:mn>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${I_{5}}$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left">0.3</td>
<td style="vertical-align: top; text-align: left">0.4</td>
<td style="vertical-align: top; text-align: left">0.5</td>
<td style="vertical-align: top; text-align: left">0.3</td>
<td style="vertical-align: top; text-align: left">0.4</td>
<td style="vertical-align: top; text-align: left">0.5</td>
<td style="vertical-align: top; text-align: left">0.3</td>
<td style="vertical-align: top; text-align: left">0.4</td>
<td style="vertical-align: top; text-align: left">0.5</td>
<td style="vertical-align: top; text-align: left">0.1</td>
<td style="vertical-align: top; text-align: left">0.2</td>
<td style="vertical-align: top; text-align: left">0.3</td>
<td style="vertical-align: top; text-align: left">0.3</td>
<td style="vertical-align: top; text-align: left">0.4</td>
<td style="vertical-align: top; text-align: left">0.5</td>
</tr>
<tr>
<td colspan="16" style="vertical-align: top; text-align: left"><italic>Direct losses sub-criterion</italic></td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_info1213_ineq_048"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">I</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${I_{1}}$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left">0.7</td>
<td style="vertical-align: top; text-align: left">0.8</td>
<td style="vertical-align: top; text-align: left">0.9</td>
<td style="vertical-align: top; text-align: left">0.7</td>
<td style="vertical-align: top; text-align: left">0.8</td>
<td style="vertical-align: top; text-align: left">0.9</td>
<td style="vertical-align: top; text-align: left">0.6</td>
<td style="vertical-align: top; text-align: left">0.7</td>
<td style="vertical-align: top; text-align: left">0.8</td>
<td style="vertical-align: top; text-align: left">0.8</td>
<td style="vertical-align: top; text-align: left">0.9</td>
<td style="vertical-align: top; text-align: left">1</td>
<td style="vertical-align: top; text-align: left">0.6</td>
<td style="vertical-align: top; text-align: left">0.7</td>
<td style="vertical-align: top; text-align: left">0.8</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_info1213_ineq_049"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">I</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${I_{2}}$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left">0.6</td>
<td style="vertical-align: top; text-align: left">0.7</td>
<td style="vertical-align: top; text-align: left">0.8</td>
<td style="vertical-align: top; text-align: left">0.6</td>
<td style="vertical-align: top; text-align: left">0.7</td>
<td style="vertical-align: top; text-align: left">0.8</td>
<td style="vertical-align: top; text-align: left">0.6</td>
<td style="vertical-align: top; text-align: left">0.7</td>
<td style="vertical-align: top; text-align: left">0.8</td>
<td style="vertical-align: top; text-align: left">0.5</td>
<td style="vertical-align: top; text-align: left">0.6</td>
<td style="vertical-align: top; text-align: left">0.7</td>
<td style="vertical-align: top; text-align: left">0.6</td>
<td style="vertical-align: top; text-align: left">0.7</td>
<td style="vertical-align: top; text-align: left">0.8</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_info1213_ineq_050"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">I</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>3</mml:mn>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${I_{3}}$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left">0.5</td>
<td style="vertical-align: top; text-align: left">0.6</td>
<td style="vertical-align: top; text-align: left">0.7</td>
<td style="vertical-align: top; text-align: left">0.5</td>
<td style="vertical-align: top; text-align: left">0.6</td>
<td style="vertical-align: top; text-align: left">0.7</td>
<td style="vertical-align: top; text-align: left">0.3</td>
<td style="vertical-align: top; text-align: left">0.4</td>
<td style="vertical-align: top; text-align: left">0.5</td>
<td style="vertical-align: top; text-align: left">0.3</td>
<td style="vertical-align: top; text-align: left">0.4</td>
<td style="vertical-align: top; text-align: left">0.5</td>
<td style="vertical-align: top; text-align: left">0.5</td>
<td style="vertical-align: top; text-align: left">0.6</td>
<td style="vertical-align: top; text-align: left">0.7</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_info1213_ineq_051"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">I</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>4</mml:mn>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${I_{4}}$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left">0.1</td>
<td style="vertical-align: top; text-align: left">0.2</td>
<td style="vertical-align: top; text-align: left">0.3</td>
<td style="vertical-align: top; text-align: left">0.1</td>
<td style="vertical-align: top; text-align: left">0.2</td>
<td style="vertical-align: top; text-align: left">0.3</td>
<td style="vertical-align: top; text-align: left">0.1</td>
<td style="vertical-align: top; text-align: left">0.2</td>
<td style="vertical-align: top; text-align: left">0.3</td>
<td style="vertical-align: top; text-align: left">0.1</td>
<td style="vertical-align: top; text-align: left">0.2</td>
<td style="vertical-align: top; text-align: left">0.3</td>
<td style="vertical-align: top; text-align: left">0.2</td>
<td style="vertical-align: top; text-align: left">0.3</td>
<td style="vertical-align: top; text-align: left">0.4</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_info1213_ineq_052"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">I</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>5</mml:mn>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${I_{5}}$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left">0.3</td>
<td style="vertical-align: top; text-align: left">0.4</td>
<td style="vertical-align: top; text-align: left">0.5</td>
<td style="vertical-align: top; text-align: left">0.3</td>
<td style="vertical-align: top; text-align: left">0.4</td>
<td style="vertical-align: top; text-align: left">0.5</td>
<td style="vertical-align: top; text-align: left">0.3</td>
<td style="vertical-align: top; text-align: left">0.4</td>
<td style="vertical-align: top; text-align: left">0.5</td>
<td style="vertical-align: top; text-align: left">0.1</td>
<td style="vertical-align: top; text-align: left">0.2</td>
<td style="vertical-align: top; text-align: left">0.3</td>
<td style="vertical-align: top; text-align: left">0.1</td>
<td style="vertical-align: top; text-align: left">0.2</td>
<td style="vertical-align: top; text-align: left">0.3</td>
</tr>
<tr>
<td colspan="16" style="vertical-align: top; text-align: left"><italic>Indirect losses sub-criterion</italic></td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_info1213_ineq_053"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">I</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${I_{1}}$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left">0.8</td>
<td style="vertical-align: top; text-align: left">0.9</td>
<td style="vertical-align: top; text-align: left">1</td>
<td style="vertical-align: top; text-align: left">0.7</td>
<td style="vertical-align: top; text-align: left">0.8</td>
<td style="vertical-align: top; text-align: left">0.9</td>
<td style="vertical-align: top; text-align: left">0.6</td>
<td style="vertical-align: top; text-align: left">0.7</td>
<td style="vertical-align: top; text-align: left">0.8</td>
<td style="vertical-align: top; text-align: left">0.7</td>
<td style="vertical-align: top; text-align: left">0.8</td>
<td style="vertical-align: top; text-align: left">0.9</td>
<td style="vertical-align: top; text-align: left">0.8</td>
<td style="vertical-align: top; text-align: left">0.9</td>
<td style="vertical-align: top; text-align: left">1</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_info1213_ineq_054"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">I</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${I_{2}}$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left">0.6</td>
<td style="vertical-align: top; text-align: left">0.7</td>
<td style="vertical-align: top; text-align: left">0.8</td>
<td style="vertical-align: top; text-align: left">0.6</td>
<td style="vertical-align: top; text-align: left">0.7</td>
<td style="vertical-align: top; text-align: left">0.8</td>
<td style="vertical-align: top; text-align: left">0.6</td>
<td style="vertical-align: top; text-align: left">0.7</td>
<td style="vertical-align: top; text-align: left">0.8</td>
<td style="vertical-align: top; text-align: left">0.7</td>
<td style="vertical-align: top; text-align: left">0.8</td>
<td style="vertical-align: top; text-align: left">0.9</td>
<td style="vertical-align: top; text-align: left">0.7</td>
<td style="vertical-align: top; text-align: left">0.8</td>
<td style="vertical-align: top; text-align: left">0.9</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_info1213_ineq_055"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">I</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>3</mml:mn>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${I_{3}}$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left">0.3</td>
<td style="vertical-align: top; text-align: left">0.4</td>
<td style="vertical-align: top; text-align: left">0.5</td>
<td style="vertical-align: top; text-align: left">0.5</td>
<td style="vertical-align: top; text-align: left">0.6</td>
<td style="vertical-align: top; text-align: left">0.7</td>
<td style="vertical-align: top; text-align: left">0.3</td>
<td style="vertical-align: top; text-align: left">0.4</td>
<td style="vertical-align: top; text-align: left">0.5</td>
<td style="vertical-align: top; text-align: left">0.7</td>
<td style="vertical-align: top; text-align: left">0.8</td>
<td style="vertical-align: top; text-align: left">0.9</td>
<td style="vertical-align: top; text-align: left">0.3</td>
<td style="vertical-align: top; text-align: left">0.4</td>
<td style="vertical-align: top; text-align: left">0.5</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_info1213_ineq_056"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">I</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>4</mml:mn>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${I_{4}}$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left">0.3</td>
<td style="vertical-align: top; text-align: left">0.4</td>
<td style="vertical-align: top; text-align: left">0.5</td>
<td style="vertical-align: top; text-align: left">0.4</td>
<td style="vertical-align: top; text-align: left">0.5</td>
<td style="vertical-align: top; text-align: left">0.6</td>
<td style="vertical-align: top; text-align: left">0.1</td>
<td style="vertical-align: top; text-align: left">0.2</td>
<td style="vertical-align: top; text-align: left">0.3</td>
<td style="vertical-align: top; text-align: left">0.3</td>
<td style="vertical-align: top; text-align: left">0.4</td>
<td style="vertical-align: top; text-align: left">0.5</td>
<td style="vertical-align: top; text-align: left">0.2</td>
<td style="vertical-align: top; text-align: left">0.3</td>
<td style="vertical-align: top; text-align: left">0.4</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_info1213_ineq_057"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">I</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>5</mml:mn>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${I_{5}}$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left">0.5</td>
<td style="vertical-align: top; text-align: left">0.6</td>
<td style="vertical-align: top; text-align: left">0.7</td>
<td style="vertical-align: top; text-align: left">0.3</td>
<td style="vertical-align: top; text-align: left">0.4</td>
<td style="vertical-align: top; text-align: left">0.5</td>
<td style="vertical-align: top; text-align: left">0.5</td>
<td style="vertical-align: top; text-align: left">0.6</td>
<td style="vertical-align: top; text-align: left">0.7</td>
<td style="vertical-align: top; text-align: left">0.3</td>
<td style="vertical-align: top; text-align: left">0.4</td>
<td style="vertical-align: top; text-align: left">0.5</td>
<td style="vertical-align: top; text-align: left">0.3</td>
<td style="vertical-align: top; text-align: left">0.4</td>
<td style="vertical-align: top; text-align: left">0.5</td>
</tr>
<tr>
<td colspan="16" style="vertical-align: top; text-align: left"><italic>Criticality sub-criterion</italic></td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_info1213_ineq_058"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">I</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${I_{1}}$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left">0.9</td>
<td style="vertical-align: top; text-align: left">1</td>
<td style="vertical-align: top; text-align: left">1</td>
<td style="vertical-align: top; text-align: left">0.9</td>
<td style="vertical-align: top; text-align: left">1</td>
<td style="vertical-align: top; text-align: left">1</td>
<td style="vertical-align: top; text-align: left">0.9</td>
<td style="vertical-align: top; text-align: left">1</td>
<td style="vertical-align: top; text-align: left">1</td>
<td style="vertical-align: top; text-align: left">0.8</td>
<td style="vertical-align: top; text-align: left">0.9</td>
<td style="vertical-align: top; text-align: left">1</td>
<td style="vertical-align: top; text-align: left">0.9</td>
<td style="vertical-align: top; text-align: left">1</td>
<td style="vertical-align: top; text-align: left">1</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_info1213_ineq_059"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">I</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${I_{2}}$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left">0.8</td>
<td style="vertical-align: top; text-align: left">0.9</td>
<td style="vertical-align: top; text-align: left">1</td>
<td style="vertical-align: top; text-align: left">0.8</td>
<td style="vertical-align: top; text-align: left">0.9</td>
<td style="vertical-align: top; text-align: left">1</td>
<td style="vertical-align: top; text-align: left">0.9</td>
<td style="vertical-align: top; text-align: left">1</td>
<td style="vertical-align: top; text-align: left">1</td>
<td style="vertical-align: top; text-align: left">0.8</td>
<td style="vertical-align: top; text-align: left">0.9</td>
<td style="vertical-align: top; text-align: left">1</td>
<td style="vertical-align: top; text-align: left">0.8</td>
<td style="vertical-align: top; text-align: left">0.9</td>
<td style="vertical-align: top; text-align: left">1</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_info1213_ineq_060"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">I</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>3</mml:mn>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${I_{3}}$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left">0.7</td>
<td style="vertical-align: top; text-align: left">0.8</td>
<td style="vertical-align: top; text-align: left">0.9</td>
<td style="vertical-align: top; text-align: left">0.7</td>
<td style="vertical-align: top; text-align: left">0.8</td>
<td style="vertical-align: top; text-align: left">0.9</td>
<td style="vertical-align: top; text-align: left">0.7</td>
<td style="vertical-align: top; text-align: left">0.8</td>
<td style="vertical-align: top; text-align: left">0.9</td>
<td style="vertical-align: top; text-align: left">0.7</td>
<td style="vertical-align: top; text-align: left">0.8</td>
<td style="vertical-align: top; text-align: left">0.9</td>
<td style="vertical-align: top; text-align: left">0.7</td>
<td style="vertical-align: top; text-align: left">0.8</td>
<td style="vertical-align: top; text-align: left">0.9</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_info1213_ineq_061"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">I</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>4</mml:mn>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${I_{4}}$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left">0.3</td>
<td style="vertical-align: top; text-align: left">0.4</td>
<td style="vertical-align: top; text-align: left">0.5</td>
<td style="vertical-align: top; text-align: left">0.4</td>
<td style="vertical-align: top; text-align: left">0.5</td>
<td style="vertical-align: top; text-align: left">0.6</td>
<td style="vertical-align: top; text-align: left">0.5</td>
<td style="vertical-align: top; text-align: left">0.6</td>
<td style="vertical-align: top; text-align: left">0.7</td>
<td style="vertical-align: top; text-align: left">0.3</td>
<td style="vertical-align: top; text-align: left">0.4</td>
<td style="vertical-align: top; text-align: left">0.5</td>
<td style="vertical-align: top; text-align: left">0.5</td>
<td style="vertical-align: top; text-align: left">0.6</td>
<td style="vertical-align: top; text-align: left">0.7</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin"><inline-formula id="j_info1213_ineq_062"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">I</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>5</mml:mn>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${I_{5}}$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">0.7</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">0.8</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">0.9</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">0.6</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">0.7</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">0.8</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">0.5</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">0.6</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">0.7</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">0.4</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">0.5</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">0.6</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">0.4</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">0.5</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">0.6</td>
</tr>
</tbody>
</table>
</table-wrap>
<p>A defuzzification should be applied before final decisions are made. The defuzzification is a process of producing a quantifiable result in crisp logic, given fuzzy logic, and corresponding membership degrees. A common and useful defuzzification technique is a centre of gravity. This method is selected in the case study (Turskis <italic>et al.</italic>, <xref ref-type="bibr" rid="j_info1213_ref_067">2019</xref>). 
<disp-formula id="j_info1213_eq_004">
<label>(4)</label><alternatives><mml:math display="block">
<mml:mtable displaystyle="true">
<mml:mtr>
<mml:mtd>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">w</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">c</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>=</mml:mo><mml:mstyle displaystyle="true">
<mml:mfrac>
<mml:mrow>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mn>3</mml:mn>
</mml:mrow>
</mml:mfrac>
</mml:mstyle>
<mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">w</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">c</mml:mi>
<mml:mi mathvariant="italic">α</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>+</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">w</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">c</mml:mi>
<mml:mi mathvariant="italic">β</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>+</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">w</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">c</mml:mi>
<mml:mi mathvariant="italic">γ</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo>
<mml:mo>.</mml:mo>
</mml:mtd>
</mml:mtr>
</mml:mtable></mml:math><tex-math><![CDATA[\[ {w_{c}}=\frac{1}{3}({w_{c\alpha }}+{w_{c\beta }}+{w_{c\gamma }}).\]]]></tex-math></alternatives>
</disp-formula>
</p>
<p>The experts were requested to rate the main threats according to linguistic significance scale. Finally, linguistic variables are converted to fuzzy numbers and ranks determined (Tables <xref rid="j_info1213_tab_003">3</xref>–<xref rid="j_info1213_tab_004">4</xref>, Fig. <xref rid="j_info1213_fig_005">5</xref>).</p>
<p>Fuzzy threat impact on CII values defuzzified as follows (Fig. <xref rid="j_info1213_fig_005">5</xref>).</p>
<p>The last stage is a calculation of a relative impact index (<inline-formula id="j_info1213_ineq_063"><alternatives><mml:math>
<mml:mi mathvariant="italic">R</mml:mi>
<mml:mi mathvariant="italic">I</mml:mi></mml:math><tex-math><![CDATA[$RI$]]></tex-math></alternatives></inline-formula>) of each considered threat (Fig. <xref rid="j_info1213_fig_006">6</xref>): 
<disp-formula id="j_info1213_eq_005">
<label>(5)</label><alternatives><mml:math display="block">
<mml:mtable displaystyle="true">
<mml:mtr>
<mml:mtd>
<mml:mi mathvariant="italic">R</mml:mi>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">I</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">c</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>=</mml:mo><mml:mstyle displaystyle="true">
<mml:mfrac>
<mml:mrow>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">w</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">c</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
<mml:mrow>
<mml:msub>
<mml:mrow>
<mml:mo movablelimits="false">max</mml:mo>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">c</mml:mi>
</mml:mrow>
</mml:msub>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">w</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">c</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:mfrac>
</mml:mstyle>
<mml:mo>.</mml:mo>
</mml:mtd>
</mml:mtr>
</mml:mtable></mml:math><tex-math><![CDATA[\[ R{I_{c}}=\frac{{w_{c}}}{{\max _{c}}{w_{c}}}.\]]]></tex-math></alternatives>
</disp-formula>
</p>
</sec>
<sec id="j_info1213_s_010">
<label>3.5</label>
<title>Calculation of Probability of Threats Implementation</title>
<p>Based on the method described above, the probability of threats implementation was defined (Tables <xref rid="j_info1213_tab_005">5</xref>–<xref rid="j_info1213_tab_008">8</xref>, Fig. <xref rid="j_info1213_fig_007">7</xref>).</p>
<p>Fuzzy threat probability level values defuzzified as follows (Figs. <xref rid="j_info1213_fig_008">8</xref>, <xref rid="j_info1213_fig_009">9</xref>).</p>
</sec>
</sec>
<sec id="j_info1213_s_011">
<label>4</label>
<title>Results and Discussions</title>
<p>As a result of the calculations, components that are necessary to calculate risk were obtained (Fig. <xref rid="j_info1213_fig_010">10</xref>).</p>
<fig id="j_info1213_fig_005">
<label>Fig. 5</label>
<caption>
<p>Assessment of the threat impact on CII.</p>
</caption>
<graphic xlink:href="info1213_g005.jpg"/>
</fig>
<fig id="j_info1213_fig_006">
<label>Fig. 6</label>
<caption>
<p>RI-relative importance of the threat impact on CII.</p>
</caption>
<graphic xlink:href="info1213_g006.jpg"/>
</fig>
<table-wrap id="j_info1213_tab_005">
<label>Table 5</label>
<caption>
<p>Weight ranking scale for the probability of the threats.</p>
</caption>
<table>
<thead>
<tr>
<td style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin">Rating</td>
<td style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin">Description</td>
<td style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin">Definition</td>
</tr>
</thead>
<tbody>
<tr>
<td style="vertical-align: top; text-align: left">4</td>
<td style="vertical-align: top; text-align: left">The probability is very high</td>
<td style="vertical-align: top; text-align: left">Incidents were previously registered, and measures to prevent them have not been taken. Statistical data, the experience of other organizations, and world practice show the growth trend of these threats and their relevance for a given period. There is a great interest in the realization of this threat among intruders or competitors. There are a lot of critical vulnerabilities to implement the threats, or there is no check for vulnerabilities.</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">3</td>
<td style="vertical-align: top; text-align: left">The probability is high</td>
<td style="vertical-align: top; text-align: left">Incidents were previously registered, and measures to prevent them have not been fully implemented. Statistical data, the experience of other organizations, and world practice show the growth trend of these threats. There is an interest in the realization of this threat from intruders or competitors. There are critical vulnerabilities to implement the threat, or a vulnerability check has not been carried out.</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">2</td>
<td style="vertical-align: top; text-align: left">The probability is medium</td>
<td style="vertical-align: top; text-align: left">Incidents were previously registered, but measures to prevent them have been taken in full. Statistical data, the experience of other organizations, and world practice show no significant increase in the trend of the threats. There is little interest in the realization of this threat among intruders or competitors. There are no critical vulnerabilities to implement the threat.</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">1</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">The probability is low</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">Preventive incident prevention measures are taken regularly. Statistics, the experience of other organizations, and world practice shows a low growth trend of the threats. The interest in realizing this threat among intruders or competitors is low. There are minor vulnerabilities to the threat.</td>
</tr>
</tbody>
</table>
</table-wrap>
<fig id="j_info1213_fig_007">
<label>Fig. 7</label>
<caption>
<p>Likert-type scale to determine the probability of the threats.</p>
</caption>
<graphic xlink:href="info1213_g007.jpg"/>
</fig>
<p>AHP approach was used to compare each criteria taking into account the sub-criteria. As mentioned above, the Likert-type scale was used. Also, the questionnaire about expert’s evaluation level toward threat choice was applied. It consists of 10 various levels.</p>
<p>The experts determine criteria weights. Table <xref rid="j_info1213_tab_009">9</xref> presents the experts’ integrated results for sub-criterion “Loss of availability”. The priority weight vector describes the significance level of the criteria in the decision matrix. After getting the significance level of criteria, next calculations were used to assess the risk index of information infrastructures.</p>
<table-wrap id="j_info1213_tab_006">
<label>Table 6</label>
<caption>
<p>Weight ranking scale for the probability of the threats.</p>
</caption>
<table>
<thead>
<tr>
<td rowspan="2" style="vertical-align: middle; text-align: left; border-top: solid thin; border-bottom: solid thin">Threat probability abbreviation</td>
<td rowspan="2" style="vertical-align: middle; text-align: left; border-top: solid thin; border-bottom: solid thin">Value</td>
<td rowspan="2" style="vertical-align: middle; text-align: left; border-top: solid thin; border-bottom: solid thin">Probability level</td>
<td colspan="3" style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin">Fuzzy triangular numbers</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin"><italic>α</italic></td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin"><italic>β</italic></td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin"><italic>γ</italic></td>
</tr>
</thead>
<tbody>
<tr>
<td style="vertical-align: top; text-align: left">VH</td>
<td style="vertical-align: top; text-align: left">4</td>
<td style="vertical-align: top; text-align: left">The probability is very high</td>
<td style="vertical-align: top; text-align: left">0.8</td>
<td style="vertical-align: top; text-align: left">1</td>
<td style="vertical-align: top; text-align: left">1</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">H</td>
<td style="vertical-align: top; text-align: left">3</td>
<td style="vertical-align: top; text-align: left">The probability is high</td>
<td style="vertical-align: top; text-align: left">0.6</td>
<td style="vertical-align: top; text-align: left">0.8</td>
<td style="vertical-align: top; text-align: left">1</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">M</td>
<td style="vertical-align: top; text-align: left">2</td>
<td style="vertical-align: top; text-align: left">The probability is medium</td>
<td style="vertical-align: top; text-align: left">0.4</td>
<td style="vertical-align: top; text-align: left">0.6</td>
<td style="vertical-align: top; text-align: left">0.8</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">L</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">1</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">The probability is low</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">0.2</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">0.4</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">0.6</td>
</tr>
</tbody>
</table>
</table-wrap>
<table-wrap id="j_info1213_tab_007">
<label>Table 7</label>
<caption>
<p>Probability of the threats lexical evaluation based on Likert-type scale.</p>
</caption>
<table>
<thead>
<tr>
<td rowspan="2" style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin">Probability of threats on CII</td>
<td colspan="5" style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin">Experts</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin"><inline-formula id="j_info1213_ineq_064"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">E</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${E_{1}}$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin"><inline-formula id="j_info1213_ineq_065"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">E</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${E_{2}}$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin"><inline-formula id="j_info1213_ineq_066"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">E</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>3</mml:mn>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${E_{3}}$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin"><inline-formula id="j_info1213_ineq_067"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">E</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>4</mml:mn>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${E_{4}}$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin"><inline-formula id="j_info1213_ineq_068"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">E</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>5</mml:mn>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${E_{5}}$]]></tex-math></alternatives></inline-formula></td>
</tr>
</thead>
<tbody>
<tr>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_info1213_ineq_069"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">P</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${P_{1}}$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left">H</td>
<td style="vertical-align: top; text-align: left">M</td>
<td style="vertical-align: top; text-align: left">M</td>
<td style="vertical-align: top; text-align: left">M</td>
<td style="vertical-align: top; text-align: left">M</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_info1213_ineq_070"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">P</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${P_{2}}$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left">H</td>
<td style="vertical-align: top; text-align: left">M</td>
<td style="vertical-align: top; text-align: left">M</td>
<td style="vertical-align: top; text-align: left">L</td>
<td style="vertical-align: top; text-align: left">M</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_info1213_ineq_071"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">P</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>3</mml:mn>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${P_{3}}$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left">M</td>
<td style="vertical-align: top; text-align: left">M</td>
<td style="vertical-align: top; text-align: left">M</td>
<td style="vertical-align: top; text-align: left">M</td>
<td style="vertical-align: top; text-align: left">M</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_info1213_ineq_072"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">P</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>4</mml:mn>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${P_{4}}$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left">L</td>
<td style="vertical-align: top; text-align: left">L</td>
<td style="vertical-align: top; text-align: left">M</td>
<td style="vertical-align: top; text-align: left">M</td>
<td style="vertical-align: top; text-align: left">M</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin"><inline-formula id="j_info1213_ineq_073"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">P</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>5</mml:mn>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${P_{5}}$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">L</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">L</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">L</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">M</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">L</td>
</tr>
</tbody>
</table>
</table-wrap>
<table-wrap id="j_info1213_tab_008">
<label>Table 8</label>
<caption>
<p>Probability level expressed by triangular fuzzy numbers corresponding to the linguistic scale.</p>
</caption>
<table>
<thead>
<tr>
<td style="vertical-align: top; text-align: left; border-top: solid thin"/>
<td colspan="3" style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin"><inline-formula id="j_info1213_ineq_074"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">E</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${E_{1}}$]]></tex-math></alternatives></inline-formula></td>
<td colspan="3" style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin"><inline-formula id="j_info1213_ineq_075"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">E</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${E_{2}}$]]></tex-math></alternatives></inline-formula></td>
<td colspan="3" style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin"><inline-formula id="j_info1213_ineq_076"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">E</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>3</mml:mn>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${E_{3}}$]]></tex-math></alternatives></inline-formula></td>
<td colspan="3" style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin"><inline-formula id="j_info1213_ineq_077"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">E</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>4</mml:mn>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${E_{4}}$]]></tex-math></alternatives></inline-formula></td>
<td colspan="3" style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin"><inline-formula id="j_info1213_ineq_078"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">E</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>5</mml:mn>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${E_{5}}$]]></tex-math></alternatives></inline-formula></td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin"/>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin"><italic>α</italic></td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin"><italic>β</italic></td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin"><italic>γ</italic></td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin"><italic>α</italic></td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin"><italic>β</italic></td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin"><italic>γ</italic></td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin"><italic>α</italic></td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin"><italic>β</italic></td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin"><italic>γ</italic></td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin"><italic>α</italic></td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin"><italic>β</italic></td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin"><italic>γ</italic></td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin"><italic>α</italic></td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin"><italic>β</italic></td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin"><italic>γ</italic></td>
</tr>
</thead>
<tbody>
<tr>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_info1213_ineq_079"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">P</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${P_{1}}$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left">0.6</td>
<td style="vertical-align: top; text-align: left">0.8</td>
<td style="vertical-align: top; text-align: left">1</td>
<td style="vertical-align: top; text-align: left">0.4</td>
<td style="vertical-align: top; text-align: left">0.6</td>
<td style="vertical-align: top; text-align: left">0.8</td>
<td style="vertical-align: top; text-align: left">0.4</td>
<td style="vertical-align: top; text-align: left">0.6</td>
<td style="vertical-align: top; text-align: left">0.8</td>
<td style="vertical-align: top; text-align: left">0.4</td>
<td style="vertical-align: top; text-align: left">0.6</td>
<td style="vertical-align: top; text-align: left">0.8</td>
<td style="vertical-align: top; text-align: left">0.4</td>
<td style="vertical-align: top; text-align: left">0.6</td>
<td style="vertical-align: top; text-align: left">0.8</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_info1213_ineq_080"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">P</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${P_{2}}$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left">0.6</td>
<td style="vertical-align: top; text-align: left">0.8</td>
<td style="vertical-align: top; text-align: left">1</td>
<td style="vertical-align: top; text-align: left">0.4</td>
<td style="vertical-align: top; text-align: left">0.6</td>
<td style="vertical-align: top; text-align: left">0.8</td>
<td style="vertical-align: top; text-align: left">0.4</td>
<td style="vertical-align: top; text-align: left">0.6</td>
<td style="vertical-align: top; text-align: left">0.8</td>
<td style="vertical-align: top; text-align: left">0.2</td>
<td style="vertical-align: top; text-align: left">0.4</td>
<td style="vertical-align: top; text-align: left">0.6</td>
<td style="vertical-align: top; text-align: left">0.4</td>
<td style="vertical-align: top; text-align: left">0.6</td>
<td style="vertical-align: top; text-align: left">0.8</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_info1213_ineq_081"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">P</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>3</mml:mn>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${P_{3}}$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left">0.4</td>
<td style="vertical-align: top; text-align: left">0.6</td>
<td style="vertical-align: top; text-align: left">0.8</td>
<td style="vertical-align: top; text-align: left">0.4</td>
<td style="vertical-align: top; text-align: left">0.6</td>
<td style="vertical-align: top; text-align: left">0.8</td>
<td style="vertical-align: top; text-align: left">0.4</td>
<td style="vertical-align: top; text-align: left">0.6</td>
<td style="vertical-align: top; text-align: left">0.8</td>
<td style="vertical-align: top; text-align: left">0.4</td>
<td style="vertical-align: top; text-align: left">0.6</td>
<td style="vertical-align: top; text-align: left">0.8</td>
<td style="vertical-align: top; text-align: left">0.4</td>
<td style="vertical-align: top; text-align: left">0.6</td>
<td style="vertical-align: top; text-align: left">0.8</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_info1213_ineq_082"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">P</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>4</mml:mn>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${P_{4}}$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left">0.2</td>
<td style="vertical-align: top; text-align: left">0.4</td>
<td style="vertical-align: top; text-align: left">0.6</td>
<td style="vertical-align: top; text-align: left">0.2</td>
<td style="vertical-align: top; text-align: left">0.4</td>
<td style="vertical-align: top; text-align: left">0.6</td>
<td style="vertical-align: top; text-align: left">0.4</td>
<td style="vertical-align: top; text-align: left">0.6</td>
<td style="vertical-align: top; text-align: left">0.8</td>
<td style="vertical-align: top; text-align: left">0.4</td>
<td style="vertical-align: top; text-align: left">0.6</td>
<td style="vertical-align: top; text-align: left">0.8</td>
<td style="vertical-align: top; text-align: left">0.4</td>
<td style="vertical-align: top; text-align: left">0.6</td>
<td style="vertical-align: top; text-align: left">0.8</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin"><inline-formula id="j_info1213_ineq_083"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">P</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>5</mml:mn>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${P_{5}}$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">0.2</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">0.4</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">0.6</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">0.2</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">0.4</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">0.6</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">0.2</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">0.4</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">0.6</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">0.4</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">0.6</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">0.8</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">0.2</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">0.4</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">0.6</td>
</tr>
</tbody>
</table>
</table-wrap>
<fig id="j_info1213_fig_008">
<label>Fig. 8</label>
<caption>
<p>Assessment of the threat probability values.</p>
</caption>
<graphic xlink:href="info1213_g008.jpg"/>
</fig>
<fig id="j_info1213_fig_009">
<label>Fig. 9</label>
<caption>
<p>Relative probability values.</p>
</caption>
<graphic xlink:href="info1213_g009.jpg"/>
</fig>
<fig id="j_info1213_fig_010">
<label>Fig. 10</label>
<caption>
<p>Assessment of the threat impact on CII and probability of threat values.</p>
</caption>
<graphic xlink:href="info1213_g010.jpg"/>
</fig>
<table-wrap id="j_info1213_tab_009">
<label>Table 9</label>
<caption>
<p>Pairwise comparisons of criteria weight.</p>
</caption>
<table>
<thead>
<tr>
<td style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin"/>
<td style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin"/>
<td style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin"><inline-formula id="j_info1213_ineq_084"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">x</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${x_{1}}$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin"><inline-formula id="j_info1213_ineq_085"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">x</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${x_{2}}$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin"><inline-formula id="j_info1213_ineq_086"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">x</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>3</mml:mn>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${x_{3}}$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin"><inline-formula id="j_info1213_ineq_087"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">x</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>4</mml:mn>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${x_{4}}$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin"><inline-formula id="j_info1213_ineq_088"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">x</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>5</mml:mn>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${x_{5}}$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin"><italic>w</italic></td>
</tr>
</thead>
<tbody>
<tr>
<td style="vertical-align: top; text-align: left">Health and safety threat</td>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_info1213_ineq_089"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">x</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${x_{1}}$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left">1</td>
<td style="vertical-align: top; text-align: left">3</td>
<td style="vertical-align: top; text-align: left">2</td>
<td style="vertical-align: top; text-align: left">5</td>
<td style="vertical-align: top; text-align: left">2</td>
<td style="vertical-align: top; text-align: left">0.38</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">Technology threat</td>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_info1213_ineq_090"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">x</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${x_{2}}$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left">1/3</td>
<td style="vertical-align: top; text-align: left">1</td>
<td style="vertical-align: top; text-align: left">3</td>
<td style="vertical-align: top; text-align: left">4</td>
<td style="vertical-align: top; text-align: left">3</td>
<td style="vertical-align: top; text-align: left">0.28</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">Information security threat</td>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_info1213_ineq_091"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">x</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>3</mml:mn>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${x_{3}}$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left">1/2</td>
<td style="vertical-align: top; text-align: left">1/3</td>
<td style="vertical-align: top; text-align: left">1</td>
<td style="vertical-align: top; text-align: left">2</td>
<td style="vertical-align: top; text-align: left">2</td>
<td style="vertical-align: top; text-align: left">0.16</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">Legal and regulatory compliance threat</td>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_info1213_ineq_092"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">x</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>4</mml:mn>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${x_{4}}$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left">1/5</td>
<td style="vertical-align: top; text-align: left">1/4</td>
<td style="vertical-align: top; text-align: left">1/2</td>
<td style="vertical-align: top; text-align: left">1</td>
<td style="vertical-align: top; text-align: left">1</td>
<td style="vertical-align: top; text-align: left">0.08</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">Climate and weather threat</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin"><inline-formula id="j_info1213_ineq_093"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">x</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>5</mml:mn>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${x_{5}}$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">1/2</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">1/3</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">1/2</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">1</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">1</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">0.10</td>
</tr>
</tbody>
</table>
</table-wrap>
<p>Thus, other matrices were created for all sub-criteria by five experts (Table <xref rid="j_info1213_tab_010">10</xref>).</p>
<table-wrap id="j_info1213_tab_010">
<label>Table 10</label>
<caption>
<p>The results of the comparison of criteria weights.</p>
</caption>
<table>
<thead>
<tr>
<td style="vertical-align: top; text-align: left; border-top: solid thin"/>
<td colspan="5" style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin">Loss of availability</td>
<td style="vertical-align: top; text-align: left; border-top: solid thin">…</td>
<td colspan="5" style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin">Criticality</td>
<td style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin">Result</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin"/>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin"><inline-formula id="j_info1213_ineq_094"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">E</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${E_{1}}$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin"><inline-formula id="j_info1213_ineq_095"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">E</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${E_{2}}$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin"><inline-formula id="j_info1213_ineq_096"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">E</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>3</mml:mn>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${E_{3}}$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin"><inline-formula id="j_info1213_ineq_097"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">E</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>4</mml:mn>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${E_{4}}$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin"><inline-formula id="j_info1213_ineq_098"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">E</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>5</mml:mn>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${E_{5}}$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">…</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin"><inline-formula id="j_info1213_ineq_099"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">E</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${E_{1}}$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin"><inline-formula id="j_info1213_ineq_100"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">E</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${E_{2}}$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin"><inline-formula id="j_info1213_ineq_101"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">E</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>3</mml:mn>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${E_{3}}$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin"><inline-formula id="j_info1213_ineq_102"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">E</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>4</mml:mn>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${E_{4}}$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin"><inline-formula id="j_info1213_ineq_103"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">E</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>5</mml:mn>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${E_{5}}$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin"/>
</tr>
</thead>
<tbody>
<tr>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_info1213_ineq_104"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">T</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${T_{1}}$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left">0.38</td>
<td style="vertical-align: top; text-align: left">0.38</td>
<td style="vertical-align: top; text-align: left">0.31</td>
<td style="vertical-align: top; text-align: left">0.44</td>
<td style="vertical-align: top; text-align: left">0.33</td>
<td style="vertical-align: top; text-align: left">…</td>
<td style="vertical-align: top; text-align: left">0.39</td>
<td style="vertical-align: top; text-align: left">0.41</td>
<td style="vertical-align: top; text-align: left">0.35</td>
<td style="vertical-align: top; text-align: left">0.43</td>
<td style="vertical-align: top; text-align: left">0.33</td>
<td style="vertical-align: top; text-align: left">0.34</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_info1213_ineq_105"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">T</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${T_{2}}$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left">0.28</td>
<td style="vertical-align: top; text-align: left">0.25</td>
<td style="vertical-align: top; text-align: left">0.32</td>
<td style="vertical-align: top; text-align: left">0.18</td>
<td style="vertical-align: top; text-align: left">0.30</td>
<td style="vertical-align: top; text-align: left">…</td>
<td style="vertical-align: top; text-align: left">0.24</td>
<td style="vertical-align: top; text-align: left">0.20</td>
<td style="vertical-align: top; text-align: left">0.25</td>
<td style="vertical-align: top; text-align: left">0.21</td>
<td style="vertical-align: top; text-align: left">0.30</td>
<td style="vertical-align: top; text-align: left">0.25</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_info1213_ineq_106"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">T</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>3</mml:mn>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${T_{3}}$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left">0.16</td>
<td style="vertical-align: top; text-align: left">0.17</td>
<td style="vertical-align: top; text-align: left">0.16</td>
<td style="vertical-align: top; text-align: left">0.18</td>
<td style="vertical-align: top; text-align: left">0.15</td>
<td style="vertical-align: top; text-align: left">…</td>
<td style="vertical-align: top; text-align: left">0.20</td>
<td style="vertical-align: top; text-align: left">0.20</td>
<td style="vertical-align: top; text-align: left">0.22</td>
<td style="vertical-align: top; text-align: left">0.16</td>
<td style="vertical-align: top; text-align: left">0.16</td>
<td style="vertical-align: top; text-align: left">0.19</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_info1213_ineq_107"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">T</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>4</mml:mn>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${T_{4}}$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left">0.08</td>
<td style="vertical-align: top; text-align: left">0.09</td>
<td style="vertical-align: top; text-align: left">0.10</td>
<td style="vertical-align: top; text-align: left">0.10</td>
<td style="vertical-align: top; text-align: left">0.11</td>
<td style="vertical-align: top; text-align: left">…</td>
<td style="vertical-align: top; text-align: left">0.08</td>
<td style="vertical-align: top; text-align: left">0.10</td>
<td style="vertical-align: top; text-align: left">0.08</td>
<td style="vertical-align: top; text-align: left">0.10</td>
<td style="vertical-align: top; text-align: left">0.11</td>
<td style="vertical-align: top; text-align: left">0.11</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin"><inline-formula id="j_info1213_ineq_108"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">T</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>5</mml:mn>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${T_{5}}$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">0.10</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">0.11</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">0.11</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">0.10</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">0.11</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">…</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">0.10</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">0.10</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">0.10</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">0.10</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">0.10</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">0.11</td>
</tr>
</tbody>
</table>
</table-wrap>
<p>The probability level of threat implementation was also determined by the AHP method (Table <xref rid="j_info1213_tab_011">11</xref>).</p>
<table-wrap id="j_info1213_tab_011">
<label>Table 11</label>
<caption>
<p>Pairwise comparisons of probability level.</p>
</caption>
<table>
<thead>
<tr>
<td style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin"/>
<td style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin"/>
<td style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin"><inline-formula id="j_info1213_ineq_109"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">x</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${x_{1}}$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin"><inline-formula id="j_info1213_ineq_110"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">x</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${x_{2}}$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin"><inline-formula id="j_info1213_ineq_111"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">x</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>3</mml:mn>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${x_{3}}$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin"><inline-formula id="j_info1213_ineq_112"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">x</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>4</mml:mn>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${x_{4}}$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin"><inline-formula id="j_info1213_ineq_113"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">x</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>5</mml:mn>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${x_{5}}$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin"><italic>w</italic></td>
</tr>
</thead>
<tbody>
<tr>
<td style="vertical-align: top; text-align: left">Health and safety threat</td>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_info1213_ineq_114"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">x</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${x_{1}}$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left">1</td>
<td style="vertical-align: top; text-align: left">2</td>
<td style="vertical-align: top; text-align: left">1</td>
<td style="vertical-align: top; text-align: left">4</td>
<td style="vertical-align: top; text-align: left">5</td>
<td style="vertical-align: top; text-align: left">1</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">Technology threat</td>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_info1213_ineq_115"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">x</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${x_{2}}$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left">1/2</td>
<td style="vertical-align: top; text-align: left">1</td>
<td style="vertical-align: top; text-align: left">1</td>
<td style="vertical-align: top; text-align: left">4</td>
<td style="vertical-align: top; text-align: left">4</td>
<td style="vertical-align: top; text-align: left">0.50</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">Information security threat</td>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_info1213_ineq_116"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">x</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>3</mml:mn>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${x_{3}}$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left">1</td>
<td style="vertical-align: top; text-align: left">1</td>
<td style="vertical-align: top; text-align: left">1</td>
<td style="vertical-align: top; text-align: left">3</td>
<td style="vertical-align: top; text-align: left">3</td>
<td style="vertical-align: top; text-align: left">1.00</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">Legal and regulatory compliance threat</td>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_info1213_ineq_117"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">x</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>4</mml:mn>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${x_{4}}$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left">1/4</td>
<td style="vertical-align: top; text-align: left">1/4</td>
<td style="vertical-align: top; text-align: left">1/3</td>
<td style="vertical-align: top; text-align: left">1</td>
<td style="vertical-align: top; text-align: left">2</td>
<td style="vertical-align: top; text-align: left">0.25</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">Climate and weather threat</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin"><inline-formula id="j_info1213_ineq_118"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">x</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>5</mml:mn>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${x_{5}}$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">1/5</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">1/4</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">1/3</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">1/2</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">1</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">0.20</td>
</tr>
</tbody>
</table>
</table-wrap>
<p>Thus, other matrices were created according to the results of the five experts’ answers (Table <xref rid="j_info1213_tab_012">12</xref>).</p>
<table-wrap id="j_info1213_tab_012">
<label>Table 12</label>
<caption>
<p>Weight comparison results.</p>
</caption>
<table>
<thead>
<tr>
<td style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin"/>
<td style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin"><inline-formula id="j_info1213_ineq_119"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">E</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${E_{1}}$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin"><inline-formula id="j_info1213_ineq_120"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">E</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${E_{2}}$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin"><inline-formula id="j_info1213_ineq_121"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">E</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>3</mml:mn>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${E_{3}}$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin"><inline-formula id="j_info1213_ineq_122"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">E</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>4</mml:mn>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${E_{4}}$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin"><inline-formula id="j_info1213_ineq_123"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">E</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>5</mml:mn>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${E_{5}}$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin"><italic>w</italic></td>
</tr>
</thead>
<tbody>
<tr>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_info1213_ineq_124"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">T</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${T_{1}}$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left">0.34</td>
<td style="vertical-align: top; text-align: left">0.26</td>
<td style="vertical-align: top; text-align: left">0.27</td>
<td style="vertical-align: top; text-align: left">0.41</td>
<td style="vertical-align: top; text-align: left">0.35</td>
<td style="vertical-align: top; text-align: left">0.33</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_info1213_ineq_125"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">T</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${T_{2}}$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left">0.25</td>
<td style="vertical-align: top; text-align: left">0.25</td>
<td style="vertical-align: top; text-align: left">0.30</td>
<td style="vertical-align: top; text-align: left">0.22</td>
<td style="vertical-align: top; text-align: left">0.28</td>
<td style="vertical-align: top; text-align: left">0.26</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_info1213_ineq_126"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">T</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>3</mml:mn>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${T_{3}}$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left">0.26</td>
<td style="vertical-align: top; text-align: left">0.34</td>
<td style="vertical-align: top; text-align: left">0.28</td>
<td style="vertical-align: top; text-align: left">0.20</td>
<td style="vertical-align: top; text-align: left">0.20</td>
<td style="vertical-align: top; text-align: left">0.25</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_info1213_ineq_127"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">T</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>4</mml:mn>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${T_{4}}$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left">0.09</td>
<td style="vertical-align: top; text-align: left">0.06</td>
<td style="vertical-align: top; text-align: left">0.08</td>
<td style="vertical-align: top; text-align: left">0.11</td>
<td style="vertical-align: top; text-align: left">0.10</td>
<td style="vertical-align: top; text-align: left">0.09</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin"><inline-formula id="j_info1213_ineq_128"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">T</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>5</mml:mn>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${T_{5}}$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">0.06</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">0.09</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">0.07</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">0.06</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">0.08</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">0.07</td>
</tr>
</tbody>
</table>
</table-wrap>
<p>Normalized weight for impact and probability indexes is presented in Table <xref rid="j_info1213_tab_013">13</xref>.</p>
<table-wrap id="j_info1213_tab_013">
<label>Table 13</label>
<caption>
<p>Normalized weight for impact and probability indexes.</p>
</caption>
<table>
<thead>
<tr>
<td style="vertical-align: top; text-align: left; border-top: solid thin"/>
<td colspan="2" style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin">For impact</td>
<td colspan="2" style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin">For probability</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin"/>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin"><inline-formula id="j_info1213_ineq_129"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">w</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">Eck</mml:mi>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${w_{\mathit{Eck}}}$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin"><inline-formula id="j_info1213_ineq_130"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">w</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">AHP</mml:mi>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${w_{\mathit{AHP}}}$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin"><inline-formula id="j_info1213_ineq_131"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">w</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">Eck</mml:mi>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${w_{\mathit{Eck}}}$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin"><inline-formula id="j_info1213_ineq_132"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">w</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">AHP</mml:mi>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${w_{\mathit{AHP}}}$]]></tex-math></alternatives></inline-formula></td>
</tr>
</thead>
<tbody>
<tr>
<td style="vertical-align: top; text-align: left">Health and safety threat</td>
<td style="vertical-align: top; text-align: left">0.29</td>
<td style="vertical-align: top; text-align: left">0.34</td>
<td style="vertical-align: top; text-align: left">0.24</td>
<td style="vertical-align: top; text-align: left">0.33</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">Technology threat</td>
<td style="vertical-align: top; text-align: left">0.24</td>
<td style="vertical-align: top; text-align: left">0.25</td>
<td style="vertical-align: top; text-align: left">0.21</td>
<td style="vertical-align: top; text-align: left">0.26</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">Information security threat</td>
<td style="vertical-align: top; text-align: left">0.20</td>
<td style="vertical-align: top; text-align: left">0.19</td>
<td style="vertical-align: top; text-align: left">0.21</td>
<td style="vertical-align: top; text-align: left">0.25</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">Legal and regulatory compliance threat</td>
<td style="vertical-align: top; text-align: left">0.11</td>
<td style="vertical-align: top; text-align: left">0.11</td>
<td style="vertical-align: top; text-align: left">0.18</td>
<td style="vertical-align: top; text-align: left">0.09</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">Climate and weather threat</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">0.16</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">0.11</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">0.17</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">0.07</td>
</tr>
</tbody>
</table>
</table-wrap>
<p><italic>Integrating two methods.</italic></p>
<p>The previously normalized results of the weights of the criteria and the threat probability were integrated according to Hwang and Yoon (<xref ref-type="bibr" rid="j_info1213_ref_032">1981</xref>): 
<disp-formula id="j_info1213_eq_006">
<label>(6)</label><alternatives><mml:math display="block">
<mml:mtable displaystyle="true">
<mml:mtr>
<mml:mtd>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">w</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">j</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>=</mml:mo><mml:mstyle displaystyle="true">
<mml:mfrac>
<mml:mrow>
<mml:msubsup>
<mml:mrow>
<mml:mi mathvariant="italic">w</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">A</mml:mi>
<mml:mi mathvariant="italic">H</mml:mi>
<mml:mi mathvariant="italic">P</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">j</mml:mi>
</mml:mrow>
</mml:msubsup>
<mml:msubsup>
<mml:mrow>
<mml:mi mathvariant="italic">w</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">E</mml:mi>
<mml:mi mathvariant="italic">c</mml:mi>
<mml:mi mathvariant="italic">k</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">j</mml:mi>
</mml:mrow>
</mml:msubsup>
</mml:mrow>
<mml:mrow>
<mml:msubsup>
<mml:mrow>
<mml:mo largeop="false" movablelimits="false">∑</mml:mo>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">j</mml:mi>
<mml:mo>=</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">n</mml:mi>
</mml:mrow>
</mml:msubsup>
<mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo>
<mml:msubsup>
<mml:mrow>
<mml:mi mathvariant="italic">w</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">A</mml:mi>
<mml:mi mathvariant="italic">H</mml:mi>
<mml:mi mathvariant="italic">P</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">j</mml:mi>
</mml:mrow>
</mml:msubsup>
<mml:msubsup>
<mml:mrow>
<mml:mi mathvariant="italic">w</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">E</mml:mi>
<mml:mi mathvariant="italic">c</mml:mi>
<mml:mi mathvariant="italic">k</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">j</mml:mi>
</mml:mrow>
</mml:msubsup>
<mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo>
</mml:mrow>
</mml:mfrac>
</mml:mstyle>
<mml:mo>.</mml:mo>
</mml:mtd>
</mml:mtr>
</mml:mtable></mml:math><tex-math><![CDATA[\[ {w_{j}}=\frac{{w_{AHP}^{j}}{w_{Eck}^{j}}}{{\textstyle\textstyle\sum _{j=1}^{n}}({w_{AHP}^{j}}{w_{Eck}^{j}})}.\]]]></tex-math></alternatives>
</disp-formula> 
where <inline-formula id="j_info1213_ineq_133"><alternatives><mml:math>
<mml:mi mathvariant="italic">j</mml:mi>
<mml:mo>=</mml:mo><mml:mover accent="false">
<mml:mrow>
<mml:mn>1</mml:mn>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mi mathvariant="italic">n</mml:mi>
</mml:mrow>
<mml:mo accent="true">‾</mml:mo></mml:mover></mml:math><tex-math><![CDATA[$j=\overline{1,n}$]]></tex-math></alternatives></inline-formula>.</p>
<p>The results of calculations by the equation (<xref rid="j_info1213_eq_006">6</xref>) are given in Table <xref rid="j_info1213_tab_014">14</xref>.</p>
<table-wrap id="j_info1213_tab_014">
<label>Table 14</label>
<caption>
<p>The normalized integrated weight.</p>
</caption>
<table>
<thead>
<tr>
<td style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin"/>
<td style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin">The normalized integrated weight for impact index</td>
<td style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin">The normalized integrated weight for probability index</td>
</tr>
</thead>
<tbody>
<tr>
<td style="vertical-align: top; text-align: left">Health and safety threat</td>
<td style="vertical-align: top; text-align: left">0.31</td>
<td style="vertical-align: top; text-align: left">0.29</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">Technology threat</td>
<td style="vertical-align: top; text-align: left">0.25</td>
<td style="vertical-align: top; text-align: left">0.24</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">Information security threat</td>
<td style="vertical-align: top; text-align: left">0.20</td>
<td style="vertical-align: top; text-align: left">0.24</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">Legal and regulatory compliance threat</td>
<td style="vertical-align: top; text-align: left">0.11</td>
<td style="vertical-align: top; text-align: left">0.12</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">Climate and weather threat</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">0.13</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">0.11</td>
</tr>
</tbody>
</table>
</table-wrap>
<p>According to OHSAS 18001, the risk for information infrastructure <italic>R</italic> is calculated as: 
<disp-formula id="j_info1213_eq_007">
<label>(7)</label><alternatives><mml:math display="block">
<mml:mtable displaystyle="true">
<mml:mtr>
<mml:mtd>
<mml:mi mathvariant="italic">R</mml:mi>
<mml:mo>=</mml:mo>
<mml:mi mathvariant="italic">I</mml:mi>
<mml:mo>×</mml:mo>
<mml:mi mathvariant="italic">P</mml:mi>
<mml:mo mathvariant="normal">,</mml:mo>
</mml:mtd>
</mml:mtr>
</mml:mtable></mml:math><tex-math><![CDATA[\[ R=I\times P,\]]]></tex-math></alternatives>
</disp-formula> 
where <italic>I</italic> – impact of the threat implementation on information infrastructure, <italic>P</italic> – probability of implementation of the threats.</p>
<p>The risk was calculated according to equation (<xref rid="j_info1213_eq_007">7</xref>), and the following results were obtained (Table <xref rid="j_info1213_tab_015">15</xref>, Fig. <xref rid="j_info1213_fig_011">11</xref>).</p>
<table-wrap id="j_info1213_tab_015">
<label>Table 15</label>
<caption>
<p>Risks indicators and their ranking.</p>
</caption>
<table>
<thead>
<tr>
<td style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin">The threats</td>
<td style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin">Risk value</td>
<td style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin">Rank</td>
</tr>
</thead>
<tbody>
<tr>
<td style="vertical-align: top; text-align: left">Health and safety threat</td>
<td style="vertical-align: top; text-align: left">0.399</td>
<td style="vertical-align: top; text-align: left">1</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">Technology threat</td>
<td style="vertical-align: top; text-align: left">0.265</td>
<td style="vertical-align: top; text-align: left">2</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">Information security threat</td>
<td style="vertical-align: top; text-align: left">0.213</td>
<td style="vertical-align: top; text-align: left">3</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">Legal and regulatory compliance threat</td>
<td style="vertical-align: top; text-align: left">0.060</td>
<td style="vertical-align: top; text-align: left">5</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">Climate and weather threat</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">0.063</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">4</td>
</tr>
</tbody>
</table>
</table-wrap>
<fig id="j_info1213_fig_011">
<label>Fig. 11</label>
<caption>
<p>Relative assessment of risk indicators for the proposed threats.</p>
</caption>
<graphic xlink:href="info1213_g011.jpg"/>
</fig>
<p>Thus, the most dangerous risk for CII is Health and safety risk. Technology as well as Information security risks are less significant risks. The lowest risks are Climate and weather as well as Legal and regulatory compliance risks.</p>
<p>The results of the study show what risks of threat realization must be mitigated initially.</p>
</sec>
<sec id="j_info1213_s_012">
<label>5</label>
<title>Conclusions</title>
<p>This article describes a new model developed to analyse the risks of critical information infrastructures.</p>
<p>As described above, any failure in the information infrastructure, especially in the critical infrastructure, can lead not only to the disruption or termination of its functioning, but also to more global consequences in the form of large-scale monetary loss, its irreversible harmful destruction or a significant decrease in the level of public safety for an extended period of time. The possibility of disruption of such the infrastructures raises the risks that are associated with these technologies. In turn, the existence of risks leads to the need to find effective methods for evaluating them.</p>
<p>An important issue for each country is to prevent accidents and the suspension of production at CII. The introduction of the necessary measures to prevent the most probable and dangerous risks begins with their identification. However, risk identification is only one of the first steps in the risk management process. It is necessary to determine the importance of risks and their probability to start mitigating the most dangerous ones.</p>
<p>The best solutions to solve the issue can be achieved by applying scientific methods involving a large amount of information and calculations.</p>
<p>Experts present the initial data in similar group decision-making approaches in words. Each of the experts has his/her own opinion about criteria values. The significance of expert estimations was assessed with the help of the modified fuzzy group Eckenrode’s rating method and the AHP method. The proposed approach is superior to conventional techniques because the proposed method can make group decisions in two environments. Therefore, it is a powerful tool to solve such problems.</p>
<p>Regular checking for risks using effective MCDM methods allows to prevent consequences that could suspend or damage the system. Risk assessment should be based on expert knowledge, which makes it possible to determine the frequency of occurrences of failures and their consequences to predict potential failures in the information infrastructures. Information about the risks realized, and the incidents that have occurred should be correctly collected, as inaccurate information can lead to severe losses. Thus, it is a very important and relevant topic for both Lithuania and other countries of the world.</p>
<p>The proposed model is aimed to solve the problem of calculating risks of the information infrastructures by applying the MCDM approach. Six main criteria were defined: “Loss of availability” and “Loss of confidentiality”; “Loss of integrity”, “Direct losses”, “Indirect losses” and “Criticality”.</p>
<p>The study shows that the most important and possible risks rank as follows: Health and safety threat (rates as 0.4), Technology threat and Information security threat (rates from 0.21 to 0.27), Legal and regulatory compliance threat and Climate and weather threat (rates 0.06 and 0.063, respectively). The model presented in this study is suitable for determining the probability of risk and its impact, or for determining the importance of criteria in the multi-criteria utility function.</p>
<p>This model is proposed to be used further to calculate the risks of critical information infrastructures.</p>
</sec>
</body>
<back>
<ref-list id="j_info1213_reflist_001">
<title>References</title>
<ref id="j_info1213_ref_001">
<mixed-citation publication-type="journal"><string-name><surname>Allen</surname>, <given-names>D.E.</given-names></string-name>, <string-name><surname>McAleer</surname>, <given-names>M.</given-names></string-name>, <string-name><surname>Singh</surname>, <given-names>A.K.</given-names></string-name> (<year>2017</year>). <article-title>Risk measurement and risk modelling using applications of Vine copulas</article-title>. <source>Sustainability</source>, <volume>9</volume>(<issue>10</issue>), <fpage>1762</fpage>.</mixed-citation>
</ref>
<ref id="j_info1213_ref_002">
<mixed-citation publication-type="journal"><string-name><surname>Allesch</surname>, <given-names>A.</given-names></string-name>, <string-name><surname>Brunner</surname>, <given-names>P.H.</given-names></string-name> (<year>2014</year>). <article-title>Assessment methods for solid waste management: a literature review</article-title>. <source>Waste Management &amp; Research</source>, <volume>32</volume>(<issue>6</issue>), <fpage>461</fpage>–<lpage>473</lpage>.</mixed-citation>
</ref>
<ref id="j_info1213_ref_003">
<mixed-citation publication-type="journal"><string-name><surname>Ananda</surname>, <given-names>J.</given-names></string-name>, <string-name><surname>Herath</surname>, <given-names>G.</given-names></string-name> (<year>2009</year>). <article-title>A critical review of multi-criteria decision making methods with special reference to forest management and planning</article-title>. <source>Ecological Economics</source>, <volume>68</volume>(<issue>10</issue>), <fpage>2535</fpage>–<lpage>2548</lpage>.</mixed-citation>
</ref>
<ref id="j_info1213_ref_004">
<mixed-citation publication-type="journal"><string-name><surname>Aloini</surname>, <given-names>D.</given-names></string-name>, <string-name><surname>Dulmin</surname>, <given-names>R.</given-names></string-name>, <string-name><surname>Mininno</surname>, <given-names>V.</given-names></string-name> (<year>2012</year>). <article-title>Risk assessment in ERP projects</article-title>. <source>Information Systems</source>, <volume>37</volume>(<issue>3</issue>), <fpage>183</fpage>–<lpage>199</lpage>.</mixed-citation>
</ref>
<ref id="j_info1213_ref_005">
<mixed-citation publication-type="journal"><string-name><surname>Akbari</surname>, <given-names>M.</given-names></string-name>, <string-name><surname>Afshar</surname>, <given-names>A.</given-names></string-name>, <string-name><surname>Mousavi</surname>, <given-names>S.J.</given-names></string-name> (<year>2014</year>). <article-title>Multi-objective reservoir operation under emergency condition: abbaspour reservoir case study with non-functional spillways</article-title>. <source>Journal of Flood Risk Management</source>, <volume>7</volume>(<issue>4</issue>), <fpage>374</fpage>–<lpage>384</lpage>.</mixed-citation>
</ref>
<ref id="j_info1213_ref_006">
<mixed-citation publication-type="journal"><string-name><surname>Bamakan</surname>, <given-names>S.M.H.</given-names></string-name>, <string-name><surname>Dehghanimohammadabadi</surname>, <given-names>M.</given-names></string-name> (<year>2015</year>). <article-title>A weighted Monte Carlo simulation approach to risk assessment of information security management system</article-title>. <source>International Journal of Enterprise Information Systems (IJEIS)</source>, <volume>11</volume>(<issue>4</issue>), <fpage>63</fpage>–<lpage>78</lpage>.</mixed-citation>
</ref>
<ref id="j_info1213_ref_007">
<mixed-citation publication-type="journal"><string-name><surname>Bannerman</surname>, <given-names>P.L.</given-names></string-name> (<year>2008</year>). <article-title>Risk and risk management in software projects: A reassessment</article-title>. <source>Journal of Systems and Software</source>, <volume>81</volume>(<issue>12</issue>), <fpage>2118</fpage>–<lpage>2133</lpage>.</mixed-citation>
</ref>
<ref id="j_info1213_ref_008">
<mixed-citation publication-type="journal"><string-name><surname>Bates</surname>, <given-names>M.E.</given-names></string-name>, <string-name><surname>Sparrevik</surname>, <given-names>M.</given-names></string-name>, <string-name><surname>De Lichy</surname>, <given-names>N.</given-names></string-name>, <string-name><surname>Linkov</surname>, <given-names>I.</given-names></string-name> (<year>2014</year>). <article-title>The value of information for managing contaminated sediments</article-title>. <source>Environmental Science &amp; Technology</source>, <volume>48</volume>(<issue>16</issue>), <fpage>9478</fpage>–<lpage>9485</lpage>.</mixed-citation>
</ref>
<ref id="j_info1213_ref_009">
<mixed-citation publication-type="journal"><string-name><surname>Baynal</surname>, <given-names>K.</given-names></string-name>, <string-name><surname>Sari</surname>, <given-names>T.</given-names></string-name>, <string-name><surname>Akpinar</surname>, <given-names>B.</given-names></string-name> (<year>2018</year>). <article-title>Risk management in automotive manufacturing process based on FMEA and grey relational analysis: a case study</article-title>. <source>Advances In Production Engineering &amp; Management</source>, <volume>13</volume>(<issue>1</issue>), <fpage>69</fpage>–<lpage>80</lpage>.</mixed-citation>
</ref>
<ref id="j_info1213_ref_010">
<mixed-citation publication-type="journal"><string-name><surname>Bell</surname>, <given-names>T.E.</given-names></string-name> (<year>1989</year>). <article-title>Managing Murphy’s law: engineering a minimum-risk system</article-title>. <source>IEEE Spectrum</source>, <volume>26</volume>(<issue>6</issue>), <fpage>24</fpage>–<lpage>27</lpage>.</mixed-citation>
</ref>
<ref id="j_info1213_ref_011">
<mixed-citation publication-type="journal"><string-name><surname>Boehm</surname>, <given-names>B.W.</given-names></string-name> (<year>1991</year>). <article-title>Software risk management: principles and practices</article-title>. <source>IEEE Software</source>, <volume>8</volume>(<issue>1</issue>), <fpage>32</fpage>–<lpage>41</lpage>.</mixed-citation>
</ref>
<ref id="j_info1213_ref_012">
<mixed-citation publication-type="chapter"><string-name><surname>Boranbayev</surname>, <given-names>A.</given-names></string-name>, <string-name><surname>Boranbayev</surname>, <given-names>S.</given-names></string-name>, <string-name><surname>Nurusheva</surname>, <given-names>A.</given-names></string-name>, <string-name><surname>Yersakhanov</surname>, <given-names>K.</given-names></string-name> (<year>2018</year>a). <chapter-title>The modern state and the further development prospects of information security in the Republic of Kazakhstan</chapter-title>. In: <source>Information Technology – New Generations</source>. <publisher-name>Springer</publisher-name>, <publisher-loc>Cham</publisher-loc>, pp. <fpage>33</fpage>–<lpage>38</lpage>.</mixed-citation>
</ref>
<ref id="j_info1213_ref_013">
<mixed-citation publication-type="journal"><string-name><surname>Boranbayev</surname>, <given-names>A.</given-names></string-name>, <string-name><surname>Boranbayev</surname>, <given-names>S.</given-names></string-name>, <string-name><surname>Nurusheva</surname>, <given-names>A.</given-names></string-name>, <string-name><surname>Yersakhanov</surname>, <given-names>K.</given-names></string-name> (<year>2018</year>b). <article-title>Development of a software system to ensure the reliability and fault tolerance in information systems</article-title>. <source>Journal of Engineering and Applied Sciences</source>, <volume>13</volume>(<issue>23</issue>), <fpage>10080</fpage>–<lpage>10085</lpage>.</mixed-citation>
</ref>
<ref id="j_info1213_ref_014">
<mixed-citation publication-type="chapter"><string-name><surname>Boranbayev</surname>, <given-names>A.</given-names></string-name>, <string-name><surname>Boranbayev</surname>, <given-names>S.</given-names></string-name>, <string-name><surname>Yersakhanov</surname>, <given-names>Y.</given-names></string-name>, <string-name><surname>Nurusheva</surname>, <given-names>A.</given-names></string-name>, <string-name><surname>Taberkhan</surname>, <given-names>R.</given-names></string-name> (<year>2018</year>c). <chapter-title>Methods of ensuring the reliability and fault tolerance of information systems</chapter-title>. In: <source>Information Technology – New Generations</source>. <publisher-name>Springer</publisher-name>, <publisher-loc>Cham</publisher-loc>, pp. <fpage>729</fpage>–<lpage>730</lpage>.</mixed-citation>
</ref>
<ref id="j_info1213_ref_015">
<mixed-citation publication-type="journal"><string-name><surname>Boranbayev</surname>, <given-names>S.</given-names></string-name>, <string-name><surname>Goranin</surname>, <given-names>N.</given-names></string-name>, <string-name><surname>Nurusheva</surname>, <given-names>A.</given-names></string-name> (<year>2018</year>d). <article-title>The methods and technologies of reliability and security of information systems and information and communication infrastructures</article-title>. <source>Journal of Theoretical and Applied Information Technology</source>, <volume>96</volume>(<issue>18</issue>), <fpage>6172</fpage>–<lpage>6188</lpage>.</mixed-citation>
</ref>
<ref id="j_info1213_ref_016">
<mixed-citation publication-type="journal"><string-name><surname>Cagliano</surname>, <given-names>A.C.</given-names></string-name>, <string-name><surname>Grimaldi</surname>, <given-names>S.</given-names></string-name>, <string-name><surname>Rafele</surname>, <given-names>C.</given-names></string-name> (<year>2015</year>). <article-title>Choosing project risk management techniques. A theoretical framework</article-title>. <source>Journal of Risk Research</source>, <volume>18</volume>(<issue>2</issue>), <fpage>232</fpage>–<lpage>248</lpage>.</mixed-citation>
</ref>
<ref id="j_info1213_ref_017">
<mixed-citation publication-type="journal"><string-name><surname>Can</surname>, <given-names>G.F.</given-names></string-name> (<year>2018</year>). <article-title>An intuitionistic approach based on failure mode and effect analysis for prioritizing corrective and preventive strategies</article-title>. <source>Human Factors and Ergonomics in Manufacturing &amp; Service Industries</source>, <volume>28</volume>(<issue>3</issue>), <fpage>130</fpage>–<lpage>147</lpage>.</mixed-citation>
</ref>
<ref id="j_info1213_ref_018">
<mixed-citation publication-type="journal"><string-name><surname>Caplinskas</surname>, <given-names>A.</given-names></string-name>, <string-name><surname>Dzemyda</surname>, <given-names>G.</given-names></string-name>, <string-name><surname>Kiss</surname>, <given-names>F.</given-names></string-name>, <string-name><surname>Lupeikiene</surname>, <given-names>A.</given-names></string-name> (<year>2012</year>). <article-title>Processing of undesirable business events in advanced production planning systems</article-title>. <source>Informatica</source>, <volume>23</volume>(<issue>4</issue>), <fpage>563</fpage>–<lpage>579</lpage>.</mixed-citation>
</ref>
<ref id="j_info1213_ref_019">
<mixed-citation publication-type="journal"><string-name><surname>de Almeida</surname>, <given-names>A.T.</given-names></string-name>, <string-name><surname>Ferreira</surname>, <given-names>R.J.P.</given-names></string-name>, <string-name><surname>Cavalcante</surname>, <given-names>C.A.V.</given-names></string-name> (<year>2015</year>). <article-title>A review of the use of multicriteria and multi-objective models in maintenance and reliability</article-title>. <source>IMA Journal of Management Mathematics</source>, <volume>26</volume>(<issue>3</issue>), <fpage>249</fpage>–<lpage>271</lpage>.</mixed-citation>
</ref>
<ref id="j_info1213_ref_020">
<mixed-citation publication-type="journal"><string-name><surname>Dubois</surname>, <given-names>D.</given-names></string-name>, <string-name><surname>Prade</surname>, <given-names>H.</given-names></string-name> (<year>1978</year>). <article-title>Operations on fuzzy numbers</article-title>. <source>International Journal of Systems Science</source>, <volume>9</volume>(<issue>6</issue>), <fpage>613</fpage>–<lpage>626</lpage>.</mixed-citation>
</ref>
<ref id="j_info1213_ref_021">
<mixed-citation publication-type="journal"><string-name><surname>Eckenrode</surname>, <given-names>R.T.</given-names></string-name> (<year>1965</year>). <article-title>Weighting multiple criteria</article-title>. <source>Management Science</source>, <volume>12</volume>(<issue>3</issue>), <fpage>180</fpage>–<lpage>192</lpage>.</mixed-citation>
</ref>
<ref id="j_info1213_ref_022">
<mixed-citation publication-type="journal"><string-name><surname>Garcez</surname>, <given-names>T.V.</given-names></string-name>, <string-name><surname>de Almeida</surname>, <given-names>A.T.</given-names></string-name> (<year>2014</year>). <article-title>Multidimensional risk assessment of manhole events as a decision tool for ranking the vaults of an underground electricity distribution system</article-title>. <source>IEEE Transactions on Power Delivery</source>, <volume>29</volume>(<issue>2</issue>), <fpage>624</fpage>–<lpage>632</lpage>.</mixed-citation>
</ref>
<ref id="j_info1213_ref_023">
<mixed-citation publication-type="journal"><string-name><surname>Garcia</surname>, <given-names>M.N.M.</given-names></string-name>, <string-name><surname>Roman</surname>, <given-names>I.</given-names></string-name>, <string-name><surname>Garcia</surname>, <given-names>P.F.</given-names></string-name>, <string-name><surname>Bonilla</surname>, <given-names>M.</given-names></string-name> (<year>2008</year>). <article-title>An association rule mining method for estimating the impact of project management policies on software quality, development time and effort</article-title>. <source>Expert Systems with Applications</source>, <volume>34</volume>(<issue>1</issue>), <fpage>522</fpage>–<lpage>529</lpage>.</mixed-citation>
</ref>
<ref id="j_info1213_ref_024">
<mixed-citation publication-type="journal"><string-name><surname>Ginevicius</surname>, <given-names>R.</given-names></string-name> (<year>2011</year>). <article-title>A new determining method for the criteria weights in multicriteria evaluation</article-title>. <source>International Journal of Information Technology &amp; Decision Making</source>, <volume>10</volume>(<issue>6</issue>), <fpage>1067</fpage>–<lpage>1095</lpage>.</mixed-citation>
</ref>
<ref id="j_info1213_ref_025">
<mixed-citation publication-type="journal"><string-name><surname>Giraud</surname>, <given-names>L.</given-names></string-name>, <string-name><surname>Galy</surname>, <given-names>B.</given-names></string-name> (<year>2018</year>). <article-title>Fault tree analysis and risk mitigation strategies for mine hoists</article-title>. <source>Safety Science</source>, <volume>110</volume>, <fpage>222</fpage>–<lpage>234</lpage>.</mixed-citation>
</ref>
<ref id="j_info1213_ref_026">
<mixed-citation publication-type="journal"><string-name><surname>Govindan</surname>, <given-names>K.</given-names></string-name>, <string-name><surname>Chaudhuri</surname>, <given-names>A.</given-names></string-name> (<year>2016</year>). <article-title>Interrelationships of risks faced by third party logistics service providers: a DEMATEL based approach</article-title>. <source>Transportation Research Part E: Logistics and Transportation Review</source>, <volume>90</volume>, <fpage>177</fpage>–<lpage>195</lpage>.</mixed-citation>
</ref>
<ref id="j_info1213_ref_027">
<mixed-citation publication-type="journal"><string-name><surname>Grabauskyte</surname>, <given-names>I.</given-names></string-name>, <string-name><surname>Tamosiunas</surname>, <given-names>A.</given-names></string-name>, <string-name><surname>Kavaliauskas</surname>, <given-names>M.</given-names></string-name>, <string-name><surname>Radisauskas</surname>, <given-names>R.</given-names></string-name>, <string-name><surname>Bernotiene</surname>, <given-names>G.</given-names></string-name>, <string-name><surname>Janilionis</surname>, <given-names>V.</given-names></string-name> (<year>2018</year>). <article-title>A comparison of decision tree induction with binary logistic regression for the prediction of the risk of cardiovascular diseases in adult men</article-title>. <source>Informatica</source>, <volume>29</volume>(<issue>4</issue>), <fpage>675</fpage>–<lpage>692</lpage>.</mixed-citation>
</ref>
<ref id="j_info1213_ref_028">
<mixed-citation publication-type="journal"><string-name><surname>Jin</surname>, <given-names>F.</given-names></string-name>, <string-name><surname>Pei</surname>, <given-names>L.</given-names></string-name>, <string-name><surname>Chen</surname>, <given-names>H.</given-names></string-name>, <string-name><surname>Zhou</surname>, <given-names>L.</given-names></string-name> (<year>2014</year>). <article-title>Interval-valued intuitionistic fuzzy continuous weighted entropy and its application to multi-criteria fuzzy group decision making</article-title>. <source>Knowledge-Based Systems</source>, <volume>59</volume>, <fpage>132</fpage>–<lpage>141</lpage>.</mixed-citation>
</ref>
<ref id="j_info1213_ref_029">
<mixed-citation publication-type="journal"><string-name><surname>Jozi</surname>, <given-names>S.A.</given-names></string-name>, <string-name><surname>Majd</surname>, <given-names>N.M.</given-names></string-name> (<year>2014</year>). <article-title>Health, safety, and environmental risk assessment of steel production complex in central Iran using TOPSIS</article-title>. <source>Environmental Monitoring and Assessment</source>, <volume>186</volume>(<issue>10</issue>), <fpage>6969</fpage>–<lpage>6983</lpage>.</mixed-citation>
</ref>
<ref id="j_info1213_ref_030">
<mixed-citation publication-type="journal"><string-name><surname>Haimes</surname>, <given-names>Y.Y.</given-names></string-name> (<year>1991</year>). <article-title>Total risk management</article-title>. <source>Risk Analysis</source>, <volume>11</volume>(<issue>2</issue>), <fpage>169</fpage>–<lpage>171</lpage>.</mixed-citation>
</ref>
<ref id="j_info1213_ref_031">
<mixed-citation publication-type="journal"><string-name><surname>Han</surname>, <given-names>W.M.</given-names></string-name> (<year>2015</year>). <article-title>Discriminating risky software project using neural networks</article-title>. <source>Computer Standards &amp; Interfaces</source>, <volume>40</volume>, <fpage>15</fpage>–<lpage>22</lpage>.</mixed-citation>
</ref>
<ref id="j_info1213_ref_032">
<mixed-citation publication-type="book"><string-name><surname>Hwang</surname>, <given-names>C.L.</given-names></string-name>, <string-name><surname>Yoon</surname>, <given-names>K.</given-names></string-name> (<year>1981</year>). <source>Multiple Attribute Decision Making: Methods and Applications</source>. <publisher-name>Springer-Verlag</publisher-name>, <publisher-loc>Berlin</publisher-loc>, pp. <fpage>15</fpage>–<lpage>22</lpage>.</mixed-citation>
</ref>
<ref id="j_info1213_ref_033">
<mixed-citation publication-type="journal"><string-name><surname>Hu</surname>, <given-names>K.H.</given-names></string-name>, <string-name><surname>Jianguo</surname>, <given-names>W.</given-names></string-name>, <string-name><surname>Tzeng</surname>, <given-names>G.H.</given-names></string-name> (<year>2017</year>). <article-title>Risk factor assessment improvement for China’s cloud computing auditing using a new hybrid MADM model</article-title>. <source>International Journal of Information Technology &amp; Decision Making</source>, <volume>16</volume>(<issue>03</issue>), <fpage>737</fpage>–<lpage>777</lpage>.</mixed-citation>
</ref>
<ref id="j_info1213_ref_034">
<mixed-citation publication-type="journal"><string-name><surname>Ijadi Maghsoodi</surname>, <given-names>A.</given-names></string-name>, <string-name><surname>Hafezalkotob</surname>, <given-names>A.</given-names></string-name>, <string-name><surname>Azizi Ari</surname>, <given-names>I.</given-names></string-name>, <string-name><surname>Ijadi Maghsoodi</surname>, <given-names>S.</given-names></string-name>, <string-name><surname>Hafezalkotob</surname>, <given-names>A.</given-names></string-name> (<year>2018</year>). <article-title>Selection of waste lubricant oil regenerative technology using entropy-weighted risk-based fuzzy axiomatic design approach</article-title>. <source>Informatica</source>, <volume>29</volume>(<issue>1</issue>), <fpage>41</fpage>–<lpage>74</lpage>.</mixed-citation>
</ref>
<ref id="j_info1213_ref_035">
<mixed-citation publication-type="chapter"><string-name><surname>Immawan</surname>, <given-names>T.</given-names></string-name>, <string-name><surname>Sutrisno</surname>, <given-names>W.</given-names></string-name>, <string-name><surname>Rachman</surname>, <given-names>A.K.</given-names></string-name> (<year>2018</year>). <chapter-title>Operational risk analysis with fuzzy FMEA (Failure Mode and Effect Analysis) approach (case study: optimus creative bandung)</chapter-title>. In: <source>MATEC Web Conference</source>, Vol. <volume>154</volume>, <fpage>01084</fpage>. <publisher-name>EDP Sciences</publisher-name>.</mixed-citation>
</ref>
<ref id="j_info1213_ref_036">
<mixed-citation publication-type="other"><string-name><surname>Kaklauskas</surname>, <given-names>A.</given-names></string-name>, <string-name><surname>Dzemyda</surname>, <given-names>G.</given-names></string-name>, <string-name><surname>Tupenaite</surname>, <given-names>L.</given-names></string-name>, <string-name><surname>Voitau</surname>, <given-names>I.</given-names></string-name>, <string-name><surname>Kurasova</surname>, <given-names>O.</given-names></string-name>, <string-name><surname>Naimaviciene</surname>, <given-names>J.</given-names></string-name>, <string-name><surname>Rassokha</surname>, <given-names>Y.</given-names></string-name>, <string-name><surname>Kanapeckiene</surname>, <given-names>L.</given-names></string-name> (2018). Artificial neural network-based decision support system for development of an energy-efficient built environment. <italic>Energies</italic>, <italic>11</italic>(8).</mixed-citation>
</ref>
<ref id="j_info1213_ref_037">
<mixed-citation publication-type="journal"><string-name><surname>Kersuliene</surname>, <given-names>V.</given-names></string-name>, <string-name><surname>Zavadskas</surname>, <given-names>E.K.</given-names></string-name>, <string-name><surname>Turskis</surname>, <given-names>Z.</given-names></string-name> (<year>2010</year>). <article-title>Selection of rational dispute resolution method by applying new step?wise weight assessment ratio analysis (SWARA)</article-title>. <source>Journal of Business Economics and Management</source>, <volume>11</volume>(<issue>2</issue>), <fpage>243</fpage>–<lpage>258</lpage>.</mixed-citation>
</ref>
<ref id="j_info1213_ref_038">
<mixed-citation publication-type="journal"><string-name><surname>Keshavarz-Ghorabaee</surname>, <given-names>M.</given-names></string-name>, <string-name><surname>Amiri</surname>, <given-names>M.</given-names></string-name>, <string-name><surname>Zavadskas</surname>, <given-names>E.K.</given-names></string-name>, <string-name><surname>Turskis</surname>, <given-names>Z.</given-names></string-name>, <string-name><surname>Antucheviciene</surname>, <given-names>J.</given-names></string-name> (<year>2018</year>). <article-title>An extended step-wise weight assessment ratio analysis with symmetric interval type-2 fuzzy sets for determining the subjective weights of criteria in multi-criteria decision-making problems</article-title>. <source>Symmetry</source>, <volume>10</volume>(<issue>4</issue>), <fpage>91</fpage>.</mixed-citation>
</ref>
<ref id="j_info1213_ref_039">
<mixed-citation publication-type="journal"><string-name><surname>Kosseff</surname>, <given-names>J.</given-names></string-name> (<year>2018</year>). <article-title>Cybersecurity of the Person</article-title>. <source>Law Review</source>, <volume>103</volume>(<issue>3</issue>), <fpage>985</fpage>–<lpage>1031</lpage>.</mixed-citation>
</ref>
<ref id="j_info1213_ref_040">
<mixed-citation publication-type="journal"><string-name><surname>Linkov</surname>, <given-names>I.</given-names></string-name>, <string-name><surname>Satterstrom</surname>, <given-names>F.K.</given-names></string-name>, <string-name><surname>Kiker</surname>, <given-names>G.</given-names></string-name>, <string-name><surname>Batchelor</surname>, <given-names>C.</given-names></string-name>, <string-name><surname>Bridges</surname>, <given-names>T.</given-names></string-name>, <string-name><surname>Ferguson</surname>, <given-names>E.</given-names></string-name> (<year>2006</year>). <article-title>From comparative risk assessment to multi-criteria decision analysis and adaptive management: Recent developments and applications</article-title>. <source>Environment International</source>, <volume>32</volume>(<issue>8</issue>), <fpage>1072</fpage>–<lpage>1093</lpage>.</mixed-citation>
</ref>
<ref id="j_info1213_ref_041">
<mixed-citation publication-type="book"><string-name><surname>Linstone</surname>, <given-names>H.A.</given-names></string-name>, <string-name><surname>Turoff</surname>, <given-names>M.</given-names></string-name> (<year>2002</year>). <source>The Delphi Method: Techniques and Applications</source>. <series>Addison-Wesley Publishing Company: Advanced Book Program</series>, <volume>18</volume>.</mixed-citation>
</ref>
<ref id="j_info1213_ref_042">
<mixed-citation publication-type="journal"><string-name><surname>Lo</surname>, <given-names>H.W.</given-names></string-name>, <string-name><surname>Liou</surname>, <given-names>J.J.H.</given-names></string-name> (<year>2018</year>). <article-title>A novel multiple-criteria decision-making-based FMEA model for risk assessment</article-title>. <source>Applied Soft Computing</source>, <volume>73</volume>, <fpage>684</fpage>–<lpage>696</lpage>.</mixed-citation>
</ref>
<ref id="j_info1213_ref_043">
<mixed-citation publication-type="journal"><string-name><surname>Lough</surname>, <given-names>K.G.</given-names></string-name>, <string-name><surname>Stone</surname>, <given-names>R.B.</given-names></string-name>, <string-name><surname>Tumer</surname>, <given-names>I.</given-names></string-name> (<year>2008</year>). <article-title>Implementation procedures for the risk in early design (red) method</article-title>. <source>Journal of Industrial and Systems Engineering (JISE)</source>, <volume>2</volume>(<issue>2</issue>), <fpage>126</fpage>–<lpage>143</lpage>.</mixed-citation>
</ref>
<ref id="j_info1213_ref_044">
<mixed-citation publication-type="journal"><string-name><surname>Ma</surname>, <given-names>J.</given-names></string-name>, <string-name><surname>Bai</surname>, <given-names>Y.</given-names></string-name>, <string-name><surname>Shen</surname>, <given-names>J.</given-names></string-name>, <string-name><surname>Zhou</surname>, <given-names>F.</given-names></string-name> (<year>2013</year>). <article-title>Examining the impact of adverse weather on urban rail transit facilities on the basis of fault tree analysis and fuzzy synthetic evaluation</article-title>. <source>Journal of Transportation Engineering</source>, <volume>140</volume>(<issue>3</issue>), <elocation-id>04013011</elocation-id>.</mixed-citation>
</ref>
<ref id="j_info1213_ref_045">
<mixed-citation publication-type="journal"><string-name><surname>Macary</surname>, <given-names>F.</given-names></string-name>, <string-name><surname>Dias</surname>, <given-names>J.A.</given-names></string-name>, <string-name><surname>Figueira</surname>, <given-names>J.R.</given-names></string-name>, <string-name><surname>Roy</surname>, <given-names>B.</given-names></string-name> (<year>2014</year>). <article-title>A multiple criteria decision analysis model based on ELECTRE TRI-C for erosion risk assessment in agricultural areas</article-title>. <source>Environmental Modeling &amp; Assessment</source>, <volume>19</volume>(<issue>3</issue>), <fpage>221</fpage>–<lpage>242</lpage>.</mixed-citation>
</ref>
<ref id="j_info1213_ref_046">
<mixed-citation publication-type="journal"><string-name><surname>Medineckiene</surname>, <given-names>M.</given-names></string-name>, <string-name><surname>Zavadskas</surname>, <given-names>E.K.</given-names></string-name>, <string-name><surname>Bjork</surname>, <given-names>F.</given-names></string-name>, <string-name><surname>Turskis</surname>, <given-names>Z.</given-names></string-name> (<year>2015</year>). <article-title>Multi-criteria decision-making system for sustainable building assessment/certification</article-title>. <source>Archives of Civil and Mechanical Engineering</source>, <volume>15</volume>, <fpage>11</fpage>–<lpage>18</lpage>.</mixed-citation>
</ref>
<ref id="j_info1213_ref_047">
<mixed-citation publication-type="journal"><string-name><surname>Mena</surname>, <given-names>D.M.</given-names></string-name>, <string-name><surname>Papapanagiotou</surname>, <given-names>I.</given-names></string-name>, <string-name><surname>Yang</surname>, <given-names>B.J.</given-names></string-name> (<year>2018</year>). <article-title>Internet of things: survey on security</article-title>. <source>Information Security Journal</source>, <volume>27</volume>(<issue>3</issue>), <fpage>162</fpage>–<lpage>182</lpage>.</mixed-citation>
</ref>
<ref id="j_info1213_ref_048">
<mixed-citation publication-type="journal"><string-name><surname>Miao</surname>, <given-names>X.</given-names></string-name>, <string-name><surname>Yu</surname>, <given-names>B.</given-names></string-name>, <string-name><surname>Xi</surname>, <given-names>B.</given-names></string-name>, <string-name><surname>Tangd</surname>, <given-names>Y.H.</given-names></string-name> (<year>2010</year>). <article-title>Modeling of bilevel games and incentives for a sustainable critical infrastructure system</article-title>. <source>Technological and Economic Development of Economy</source>, <volume>16</volume>(<issue>3</issue>), <fpage>365</fpage>–<lpage>379</lpage>.</mixed-citation>
</ref>
<ref id="j_info1213_ref_049">
<mixed-citation publication-type="journal"><string-name><surname>Muniz</surname>, <given-names>M.V.P.</given-names></string-name>, <string-name><surname>Lima</surname>, <given-names>G.B.A.</given-names></string-name>, <string-name><surname>Caiado</surname>, <given-names>R.G.G.</given-names></string-name>, <string-name><surname>Quelhas</surname>, <given-names>O.L.G.</given-names></string-name> (<year>2018</year>). <article-title>Bow tie to improve risk management of natural gas pipelines</article-title>. <source>Process Safety Progress</source>, <volume>37</volume>(<issue>2</issue>), <fpage>169</fpage>–<lpage>175</lpage>.</mixed-citation>
</ref>
<ref id="j_info1213_ref_050">
<mixed-citation publication-type="journal"><string-name><surname>Navickiene</surname>, <given-names>O.</given-names></string-name>, <string-name><surname>Sprindys</surname>, <given-names>J.</given-names></string-name>, <string-name><surname>Siaulys</surname>, <given-names>J.</given-names></string-name> (<year>2018</year>). <article-title>The Gerber–Shiu discounted penalty function for the bi-seasonal discrete time risk model</article-title>. <source>Informatica</source>, <volume>29</volume>(<issue>4</issue>), <fpage>733</fpage>–<lpage>756</lpage>.</mixed-citation>
</ref>
<ref id="j_info1213_ref_051">
<mixed-citation publication-type="chapter"><string-name><surname>Olifer</surname>, <given-names>D.</given-names></string-name>, <string-name><surname>Goranin</surname>, <given-names>N.</given-names></string-name>, <string-name><surname>Janulevicius</surname>, <given-names>J.</given-names></string-name>, <string-name><surname>Kaceniauskas</surname>, <given-names>A.</given-names></string-name>, <string-name><surname>Cenys</surname>, <given-names>A.</given-names></string-name> (<year>2017</year>). <chapter-title>Improvement of security costs evaluation process by using data automatically captured from BPMN and EPC models</chapter-title>. In: <source>International Conference on Business Process Management</source>. <publisher-name>Springer</publisher-name>, <publisher-loc>Cham</publisher-loc>, pp. <fpage>698</fpage>–<lpage>709</lpage>.</mixed-citation>
</ref>
<ref id="j_info1213_ref_052">
<mixed-citation publication-type="journal"><string-name><surname>Papamichail</surname>, <given-names>K.N.</given-names></string-name>, <string-name><surname>French</surname>, <given-names>S.</given-names></string-name> (<year>2012</year>). <article-title>25 years of MCDA in nuclear emergency management</article-title>. <source>IMA Journal of Management Mathematics</source>, <volume>24</volume>(<issue>4</issue>), <fpage>481</fpage>–<lpage>503</lpage>.</mixed-citation>
</ref>
<ref id="j_info1213_ref_053">
<mixed-citation publication-type="journal"><string-name><surname>Pfeifer</surname>, <given-names>J.</given-names></string-name>, <string-name><surname>Barker</surname>, <given-names>K.</given-names></string-name>, <string-name><surname>Ramirez-Marquez</surname>, <given-names>J.E.</given-names></string-name>, <string-name><surname>Morshedlou</surname>, <given-names>N.</given-names></string-name> (<year>2015</year>). <article-title>Quantifying the risk of project delays with a genetic algorithm</article-title>. <source>International Journal of Production Economics</source>, <volume>170</volume>, <fpage>34</fpage>–<lpage>44</lpage>.</mixed-citation>
</ref>
<ref id="j_info1213_ref_054">
<mixed-citation publication-type="journal"><string-name><surname>Saaty</surname>, <given-names>T.L.</given-names></string-name>, <string-name><surname>Erdener</surname>, <given-names>E.</given-names></string-name> (<year>1979</year>). <article-title>A new approach to performance measurement the analytic hierarchy process</article-title>. <source>Design Methods and Theories</source>, <volume>13</volume>(<issue>2</issue>), <fpage>62</fpage>–<lpage>68</lpage>.</mixed-citation>
</ref>
<ref id="j_info1213_ref_055">
<mixed-citation publication-type="journal"><string-name><surname>Saaty</surname>, <given-names>T.L.</given-names></string-name>, <string-name><surname>Ergu</surname>, <given-names>D.</given-names></string-name> (<year>2015</year>). <article-title>When is a decision-making method trustworthy? Criteria for evaluating multi-criteria decision-making methods</article-title>. <source>International Journal of Information Technology &amp; Decision Making</source>, <volume>14</volume>(<issue>6</issue>), <fpage>1171</fpage>–<lpage>1187</lpage>.</mixed-citation>
</ref>
<ref id="j_info1213_ref_056">
<mixed-citation publication-type="journal"><string-name><surname>Safari</surname>, <given-names>H.</given-names></string-name>, <string-name><surname>Faraji</surname>, <given-names>Z.</given-names></string-name>, <string-name><surname>Majidian</surname>, <given-names>S.</given-names></string-name> (<year>2016</year>). <article-title>Identifying and evaluating enterprise architecture risks using FMEA and fuzzy VIKOR</article-title>. <source>Journal of Intelligent Manufacturing</source>, <volume>27</volume>(<issue>2</issue>), <fpage>475</fpage>–<lpage>486</lpage>.</mixed-citation>
</ref>
<ref id="j_info1213_ref_057">
<mixed-citation publication-type="journal"><string-name><surname>Sangaiah</surname>, <given-names>A.K.</given-names></string-name>, <string-name><surname>Samuel</surname>, <given-names>O.W.</given-names></string-name>, <string-name><surname>Li</surname>, <given-names>X.</given-names></string-name>, <string-name><surname>Abdel-Basset</surname>, <given-names>M.</given-names></string-name>, <string-name><surname>Wang</surname>, <given-names>H.</given-names></string-name> (<year>2018</year>). <article-title>Towards an efficient risk assessment in software projects – fuzzy reinforcement paradigm</article-title>. <source>Computers &amp; Electrical Engineering</source>, <volume>71</volume>, <fpage>833</fpage>–<lpage>846</lpage>.</mixed-citation>
</ref>
<ref id="j_info1213_ref_058">
<mixed-citation publication-type="journal"><string-name><surname>Saparauskas</surname>, <given-names>J.</given-names></string-name>, <string-name><surname>Zavadskas</surname>, <given-names>E.K.</given-names></string-name>, <string-name><surname>Turskis</surname>, <given-names>Z.</given-names></string-name> (<year>2011</year>). <article-title>Selection of facade’s alternatives of commercial and public buildings based on multiple criteria</article-title>. <source>International Journal of Strategic Property Management</source>, <volume>15</volume>(<issue>2</issue>), <fpage>189</fpage>–<lpage>203</lpage>.</mixed-citation>
</ref>
<ref id="j_info1213_ref_059">
<mixed-citation publication-type="journal"><string-name><surname>Sherman</surname>, <given-names>A.T.</given-names></string-name>, <string-name><surname>DeLatte</surname>, <given-names>D.</given-names></string-name>, <string-name><surname>Neary</surname>, <given-names>M.</given-names></string-name>, <string-name><surname>Oliva</surname>, <given-names>L.</given-names></string-name>, <string-name><surname>Phatak</surname>, <given-names>D.</given-names></string-name>, <string-name><surname>Scheponik</surname>, <given-names>T.</given-names></string-name>, <string-name><surname>Herman</surname>, <given-names>G.L.</given-names></string-name>, <string-name><surname>Thompson</surname>, <given-names>J.</given-names></string-name> (<year>2018</year>). <article-title>Cybersecurity: exploring core concepts through six scenarios</article-title>. <source>Cryptologia</source>, <volume>42</volume>(<issue>4</issue>), <fpage>337</fpage>–<lpage>377</lpage>.</mixed-citation>
</ref>
<ref id="j_info1213_ref_060">
<mixed-citation publication-type="book"><string-name><surname>Sherwood</surname>, <given-names>J.</given-names></string-name>, <string-name><surname>Clark</surname>, <given-names>A.</given-names></string-name>, <string-name><surname>Lynas</surname>, <given-names>D.</given-names></string-name> (<year>2005</year>). <source>Enterprise Security Architecture: A Business-Driven Approach</source>. <publisher-name>Computer Security Institute, CMPBooks</publisher-name>, <publisher-loc>CA, USA, Gail Saari</publisher-loc>.</mixed-citation>
</ref>
<ref id="j_info1213_ref_061">
<mixed-citation publication-type="journal"><string-name><surname>Sivilevicius</surname>, <given-names>H.</given-names></string-name>, <string-name><surname>Zavadskas</surname>, <given-names>E.K.</given-names></string-name>, <string-name><surname>Turskis</surname>, <given-names>Z.</given-names></string-name> (<year>2008</year>). <article-title>Quality attributes and complex assessment methodology of the asphalt mixing plant</article-title>. <source>Baltic Journal of Road &amp; Bridge Engineering</source>, <volume>3</volume>(<issue>3</issue>), <fpage>161</fpage>–<lpage>166</lpage>.</mixed-citation>
</ref>
<ref id="j_info1213_ref_062">
<mixed-citation publication-type="journal"><string-name><surname>Tamilselvi</surname>, <given-names>J.J.</given-names></string-name> (<year>2018</year>). <article-title>Fuzzy multi-criteria random seed and cutoff point approach for credit risk assessment</article-title>. <source>Journal of Theoretical and Applied Information Technology</source>, <volume>96</volume>(<issue>4</issue>), <fpage>1150</fpage>–<lpage>1163</lpage>.</mixed-citation>
</ref>
<ref id="j_info1213_ref_063">
<mixed-citation publication-type="journal"><string-name><surname>Tavana</surname>, <given-names>M.</given-names></string-name>, <string-name><surname>Khalili-Damghani</surname>, <given-names>K.</given-names></string-name>, <string-name><surname>Abtahi</surname>, <given-names>A.R.</given-names></string-name> (<year>2013</year>). <article-title>A hybrid fuzzy group decision support framework for advanced-technology prioritization at NASA</article-title>. <source>Expert Systems Applications</source>, <volume>40</volume>(<issue>2</issue>), <fpage>480</fpage>–<lpage>491</lpage>.</mixed-citation>
</ref>
<ref id="j_info1213_ref_064">
<mixed-citation publication-type="journal"><string-name><surname>Taylor</surname>, <given-names>J.R.</given-names></string-name> (<year>2017</year>). <article-title>Automated HAZOP revisited</article-title>. <source>Process Safety and Environmental Protection</source>, <volume>111</volume>, <fpage>635</fpage>–<lpage>651</lpage>.</mixed-citation>
</ref>
<ref id="j_info1213_ref_065">
<mixed-citation publication-type="journal"><string-name><surname>Turskis</surname>, <given-names>Z.</given-names></string-name>, <string-name><surname>Lazauskas</surname>, <given-names>M.</given-names></string-name>, <string-name><surname>Zavadskas</surname>, <given-names>E.K.</given-names></string-name> (<year>2012</year>). <article-title>Fuzzy multiple criteria assessment of construction site alternatives for non-hazardous waste incineration plant in Vilnius city, applying ARAS-F and AHP methods</article-title>. <source>Journal of Environmental Engineering and Landscape Management</source>, <volume>20</volume>(<issue>2</issue>), <fpage>110</fpage>–<lpage>120</lpage>.</mixed-citation>
</ref>
<ref id="j_info1213_ref_066">
<mixed-citation publication-type="journal"><string-name><surname>Turskis</surname>, <given-names>Z.</given-names></string-name>, <string-name><surname>Zavadskas</surname>, <given-names>E.K.</given-names></string-name>, <string-name><surname>Antucheviciene</surname>, <given-names>J.</given-names></string-name>, <string-name><surname>Kosareva</surname>, <given-names>N.A.</given-names></string-name> (<year>2015</year>). <article-title>Hybrid model based on fuzzy AHP and fuzzy WASPAS for construction site selection</article-title>. <source>International Journal of Computers Communications &amp; Control</source>, <volume>10</volume>(<issue>6</issue>), <fpage>873</fpage>–<lpage>888</lpage>.</mixed-citation>
</ref>
<ref id="j_info1213_ref_067">
<mixed-citation publication-type="journal"><string-name><surname>Turskis</surname>, <given-names>Z.</given-names></string-name>, <string-name><surname>Dzitac</surname>, <given-names>S.</given-names></string-name>, <string-name><surname>Stankiuviene</surname>, <given-names>A.</given-names></string-name>, <string-name><surname>Sukys</surname>, <given-names>R.</given-names></string-name> (<year>2019</year>). <article-title>A fuzzy group decision-making model for determining the most influential persons in the sustainable prevention of accidents in the construction SMEs</article-title>. <source>International Journal of Computers, Communications &amp; Control</source>, <volume>14</volume>(<issue>1</issue>), <fpage>90</fpage>–<lpage>106</lpage>. <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.15837/ijccc.2019.1.3364" xlink:type="simple">https://doi.org/10.15837/ijccc.2019.1.3364</ext-link>.</mixed-citation>
</ref>
<ref id="j_info1213_ref_068">
<mixed-citation publication-type="journal"><string-name><surname>Vrhovec</surname>, <given-names>S.L.</given-names></string-name>, <string-name><surname>Hovelja</surname>, <given-names>T.</given-names></string-name>, <string-name><surname>Vavpotic</surname>, <given-names>D.</given-names></string-name>, <string-name><surname>Krisper</surname>, <given-names>M.</given-names></string-name> (<year>2015</year>). <article-title>Diagnosing organizational risks in software projects: Stakeholder resistance</article-title>. <source>International Journal of Project Management</source>, <volume>33</volume>(<issue>6</issue>), <fpage>1262</fpage>–<lpage>1273</lpage>.</mixed-citation>
</ref>
<ref id="j_info1213_ref_069">
<mixed-citation publication-type="journal"><string-name><surname>Woodward</surname>, <given-names>M.</given-names></string-name>, <string-name><surname>Kapelan</surname>, <given-names>Z.</given-names></string-name>, <string-name><surname>Gouldby</surname>, <given-names>B.</given-names></string-name> (<year>2014</year>). <article-title>Adaptive flood risk management under climate change uncertainty using real options and optimization</article-title>. <source>Risk Analysis</source>, <volume>34</volume>(<issue>1</issue>), <fpage>75</fpage>–<lpage>92</lpage>.</mixed-citation>
</ref>
<ref id="j_info1213_ref_070">
<mixed-citation publication-type="journal"><string-name><surname>Yan</surname>, <given-names>F.</given-names></string-name>, <string-name><surname>Xu</surname>, <given-names>K.</given-names></string-name> (<year>2018</year>). <article-title>A set pair analysis based layer of protection analysis and its application in quantitative risk assessment</article-title>. <source>Journal of Loss Prevention in the Process Industries</source>, <volume>55</volume>, <fpage>313</fpage>–<lpage>319</lpage>.</mixed-citation>
</ref>
<ref id="j_info1213_ref_071">
<mixed-citation publication-type="book"><string-name><surname>Yasseri</surname>, <given-names>S.</given-names></string-name>, <string-name><surname>Mahani</surname>, <given-names>R.</given-names></string-name> (<year>2013</year>). <source>Quantitative Risk Assessment for Oil and Gas Facilities</source>. <publisher-name>Smart Petroleum Ltd.</publisher-name>, <publisher-loc>Manchester, UK</publisher-loc>.</mixed-citation>
</ref>
<ref id="j_info1213_ref_072">
<mixed-citation publication-type="journal"><string-name><surname>Yusta</surname>, <given-names>J.M.</given-names></string-name>, <string-name><surname>Correa</surname>, <given-names>G.J.</given-names></string-name>, <string-name><surname>Lacal-Arántegui</surname>, <given-names>R.</given-names></string-name> (<year>2011</year>). <article-title>Methodologies and applications for critical infrastructure protection: state-of-the-art</article-title>. <source>Energy Policy</source>, <volume>39</volume>(<issue>10</issue>), <fpage>6100</fpage>–<lpage>6119</lpage>.</mixed-citation>
</ref>
<ref id="j_info1213_ref_073">
<mixed-citation publication-type="journal"><string-name><surname>Zadeh</surname>, <given-names>L.A.</given-names></string-name> (<year>1965</year>). <article-title>Fuzzy sets</article-title>. <source>Information and Control</source>, <volume>8</volume>(<issue>3</issue>), <fpage>338</fpage>–<lpage>353</lpage>.</mixed-citation>
</ref>
<ref id="j_info1213_ref_074">
<mixed-citation publication-type="journal"><string-name><surname>Zavadskas</surname>, <given-names>E.K.</given-names></string-name>, <string-name><surname>Antucheviciene</surname>, <given-names>J.</given-names></string-name>, <string-name><surname>Saparauskas</surname>, <given-names>J.</given-names></string-name>, <string-name><surname>Turskis</surname>, <given-names>Z.</given-names></string-name> (<year>2013</year>). <article-title>MCDM methods WASPAS and MULTIMOORA: verification of robustness of methods when assessing alternative solutions</article-title>. <source>Economic Computation and Economic Cybernetics Studies and Research</source>, <volume>47</volume>(<issue>2</issue>), <fpage>5</fpage>–<lpage>20</lpage>.</mixed-citation>
</ref>
<ref id="j_info1213_ref_075">
<mixed-citation publication-type="journal"><string-name><surname>Zavadskas</surname>, <given-names>E.K.</given-names></string-name>, <string-name><surname>Antucheviciene</surname>, <given-names>J.</given-names></string-name>, <string-name><surname>Turskis</surname>, <given-names>Z.</given-names></string-name>, <string-name><surname>Adeli</surname>, <given-names>H.</given-names></string-name> (<year>2016</year>a). <article-title>Hybrid multiple-criteria decision-making methods: A review of applications in engineering</article-title>. <source>Scientia Iranica. Transaction A, Civil Engineering</source>, <volume>23</volume>(<issue>1</issue>), <fpage>1</fpage>–<lpage>20</lpage>.</mixed-citation>
</ref>
<ref id="j_info1213_ref_076">
<mixed-citation publication-type="journal"><string-name><surname>Zavadskas</surname>, <given-names>E.K.</given-names></string-name>, <string-name><surname>Govindan</surname>, <given-names>K.</given-names></string-name>, <string-name><surname>Antucheviciene</surname>, <given-names>J.</given-names></string-name>, <string-name><surname>Turskis</surname>, <given-names>Z.</given-names></string-name> (<year>2016</year>b). <article-title>Hybrid multiple criteria decision-making methods: a review of applications for sustainability issues</article-title>. <source>Economic Research-Ekonomska Istrazivanja</source>, <volume>29</volume>(<issue>1</issue>), <fpage>857</fpage>–<lpage>887</lpage>.</mixed-citation>
</ref>
<ref id="j_info1213_ref_077">
<mixed-citation publication-type="journal"><string-name><surname>Zavadskas</surname>, <given-names>E.K.</given-names></string-name>, <string-name><surname>Kaklauskas</surname>, <given-names>A.</given-names></string-name>, <string-name><surname>Turskis</surname>, <given-names>Z.</given-names></string-name>, <string-name><surname>Kalibatas</surname>, <given-names>D.</given-names></string-name> (<year>2009</year>). <article-title>An approach to multi-attribute assessment of indoor environment before and after refurbishment of dwellings</article-title>. <source>Journal of Environmental Engineering and Landscape Management</source>, <volume>17</volume>(<issue>1</issue>), <fpage>5</fpage>–<lpage>11</lpage>.</mixed-citation>
</ref>
<ref id="j_info1213_ref_078">
<mixed-citation publication-type="journal"><string-name><surname>Zavadskas</surname>, <given-names>E.K.</given-names></string-name>, <string-name><surname>Turskis</surname>, <given-names>Z.</given-names></string-name>, <string-name><surname>Antucheviciene</surname>, <given-names>J.</given-names></string-name>, <string-name><surname>Zakarevicius</surname>, <given-names>A.</given-names></string-name> (<year>2012</year>). <article-title>Optimization of weighted aggregated sum product assessment</article-title>. <source>Elektronika ir Elektrotechnika</source>, <volume>122</volume>(<issue>6</issue>), <fpage>3</fpage>–<lpage>6</lpage>.</mixed-citation>
</ref>
<ref id="j_info1213_ref_079">
<mixed-citation publication-type="journal"><string-name><surname>Zavadskas</surname>, <given-names>E.K.</given-names></string-name>, <string-name><surname>Turskis</surname>, <given-names>Z.</given-names></string-name>, <string-name><surname>Antucheviciene</surname>, <given-names>J.</given-names></string-name> (<year>2015</year>a). <article-title>Selecting a contractor by using a novel method for multiple attribute analysis: weighted aggregated sum product assessment with grey values (WASPAS-G)</article-title>. <source>Studies in Informatics and Control</source>, <volume>24</volume>(<issue>2</issue>), <fpage>141</fpage>–<lpage>150</lpage>.</mixed-citation>
</ref>
<ref id="j_info1213_ref_080">
<mixed-citation publication-type="journal"><string-name><surname>Zavadskas</surname>, <given-names>E.K.</given-names></string-name>, <string-name><surname>Turskis</surname>, <given-names>Z.</given-names></string-name>, <string-name><surname>Bagocius</surname>, <given-names>V.</given-names></string-name> (<year>2015</year>b). <article-title>Multi-criteria selection of a deep-water port in the Eastern Baltic Sea</article-title>. <source>Applied Soft Computing</source>, <volume>26</volume>, <fpage>180</fpage>–<lpage>192</lpage>.</mixed-citation>
</ref>
<ref id="j_info1213_ref_081">
<mixed-citation publication-type="journal"><string-name><surname>Zolfani</surname>, <given-names>S.H.</given-names></string-name>, <string-name><surname>Zavadskas</surname>, <given-names>E.K.</given-names></string-name>, <string-name><surname>Turskis</surname>, <given-names>Z.</given-names></string-name> (<year>2013</year>). <article-title>Design of products with both International and Local perspectives based on Yin-Yang balance theory and SWARA method</article-title>. <source>Economic Research-Ekonomska Istrazivanja</source>, <volume>26</volume>(<issue>2</issue>), <fpage>153</fpage>–<lpage>166</lpage>.</mixed-citation>
</ref>
<ref id="j_info1213_ref_082">
<mixed-citation publication-type="journal"><string-name><surname>Zhao</surname>, <given-names>H.</given-names></string-name>, <string-name><surname>You</surname>, <given-names>J.X.</given-names></string-name>, <string-name><surname>Liu</surname>, <given-names>H.C.</given-names></string-name> (<year>2017</year>). <article-title>Failure mode and effect analysis using MULTIMOORA method with continuous weighted entropy under interval-valued intuitionistic fuzzy environment</article-title>. <source>Soft Computing</source>, <volume>21</volume>(<issue>18</issue>), <fpage>5355</fpage>–<lpage>5367</lpage>.</mixed-citation>
</ref>
<ref id="j_info1213_ref_083">
<mixed-citation publication-type="journal"><string-name><surname>Zhou</surname>, <given-names>Q.</given-names></string-name>, <string-name><surname>Thai</surname>, <given-names>V.V.</given-names></string-name> (<year>2016</year>). <article-title>Fuzzy and grey theories in failure mode and effect analysis for tanker equipment failure prediction</article-title>. <source>Safety Science</source>, <volume>83</volume>, <fpage>74</fpage>–<lpage>79</lpage>.</mixed-citation>
</ref>
</ref-list>
</back>
</article>