[1] WEISH¨AUPL E, YASASIN E, SCHRYEN G. Information security investments: An exploratory multiple case study on decision-making, evaluation and learning [J]. Computers and Security, 2018, 77: 807-823.
[2] GILLMAN D, LIN Y, MAGGS B, et al. Protecting websites from attack with secure delivery networks [J]. Computer, 2015, 48(4): 26-34.
[3] RAJAB M. The relevance of social and behavioral models in determining intention to comply with information security policy in higher education environments [D]. Ypsilanti, MI, USA: Eastern Michigan University, 2019.
[4] KOZLOV O A, RODIONOV D G, GUZIKOVA L A. Information security problems in educational institutions in conditions of network interaction [C]//2018 International Conference on Information Networking (ICOIN ). Chiang Mai, Thailand: IEEE, 2018: 267-269.
[5] HINA S, DOMINIC P D D. Information security policies' compliance: A perspective for higher education institutions [J]. Journal of Computer Information Systems,2020, 60(3): 201-211.
[6] ANTHONY R N, GOVINDARAJAN V. Management control systems [M]. 10th ed. Boston, USA: McGraw-Hill/Irwin, 2000.
[7] CHEN C, ZHOU X. Management [M]. Beijing, China: Tsinghua University Press, 2008 (in Chinese).
[8] HE X H, CHUN Z Z, ZHAO Z Z. Discussion on security protection framework of classified protection construction[J]. Communications Technology, 2011, 44(12):98-100 (in Chinese).
[9] Standardization Administration of the People's Republic of China. Information security technology — Baseline for classified protection of information system:GB/T 22239-2008 [S]. Beijing, China: Standards Press of China, 2008 (in Chinese).
[10] JIANG C Z, ZHANG T, YU Y. Research on information security protection model for smart grid based on classified protection [J]. Computer & Modernization,2012 (4): 12-16 (in Chinese).
[11] ZENG T. Research on combination evaluation model based on game theory integrated weight method and gray fuzzy theory [D]. Lanzhou, China: Lanzhou University,2018 (in Chinese).
[12] ZHANG H. Research on information security evaluation system of intelligent energy industrial control system[D]. Beijing, China: North China Electric Power University (Beijing), 2018 (in Chinese).
[13] WANG X. Quantitative research on Bayesian neural network in information security risk assessment [D]. Guiyang, China: Guizhou University, 2019 (in Chinese).
[14] AMINI A, JAMIL N, AHMAD A R, et al. A fuzzy logic based risk assessment approach for evaluating and prioritizing risks in cloud computing environment[C]//Proceedings of the 2nd International Conference of Reliable Information and Communication Technology.Cham, Switzerland: Springer, 2017: 650-659.
[15] BASALLO Y A, SENT′I V E, S′ANCHEZ N M. Artificial intelligence techniques for information security risk assessment [J]. IEEE Latin America Transactions,2018, 16(3): 897-901.
[16] LIU L Q, WAN P, WU C Z, et al. Research on Yangtze River waterway transportation safety evaluation model based on fuzzy logic theory [C]//Proceedings of the 3rd International Conference on Transportation Information and Safety. Wuhan, China: IEEE, 2015: 732-738.
[17] SAATY T L. How to make a decision: The analytic hierarchy process [J]. Interfaces, 1994, 24(6): 19-43.
[18] LIU S L, ZHAO Q H, WEN M X, et al. Assessing the impact of hydroelectric project construction on the ecological integrity of the Nuozhadu Nature Reserve,southwest China [J]. Stochastic Environmental Research and Risk Assessment, 2013, 27(7): 1709-1718.
[19] CLEMEN R T, REILLY T. Making hard decisions with decision tools [M]. Duxbury, USA: Thomson Learning, 2001.
[20] GUO J Y, ZHANG Z B, SUN Q Y. Study and applications of analytic hierarchy process [J]. China Safety Science Journal, 2008, 18(5): 148-153 (in Chinese).