The international journal of cybernetics, systems and management sciences


Electrical and Electronic Engineering

Table Of Contents: Volume 39 Issue 5 - Special Issue: Risk in services

A review of enterprise risk management in supply chain

David L. Olson, Desheng Dash Wu

The purpose of this paper is to review published approaches to supply chain risk management, to include identification and classification of types of risks, cases, and…

Risk comprehensive evaluation of urban network planning based on fuzzy Bayesian LS_SVM

Yongxiu He, Weijun Tao, Aiying Dai, Lifang Yang, Rui Fang, Furong Li

The purpose of this paper is to use artificial intelligence to evaluate the risks of urban power network planning.

Performance evaluation and risk analysis of online banking service

Dexiang Wu, Desheng Dash Wu

Online banking has attracted a great deal of attention from various bank stakeholders such as bankers, financial service participants, and regulators. The purpose of this…

Strategic orientation of organizations: risk management perspective

Klemen Kavčič, Andrej Bertoncelj

In a global economic environment, companies most likely to succeed should be, at the same time, big and strong as well as small and flexible. The purpose of this paper is…

Risk modeling in crude oil market: a comparison of Markov switching and GARCH models

Cuicui Luo, Luis A. Seco, Haofei Wang, Desheng Dash Wu

The purpose of this paper is to deal with the different phases of volatility behavior and the dependence of the variability of the time series on its own past, models…

The real R&D options value incorporating technological risk management

Lieh‐Ming Luo, Her‐Jiun Sheu

The paper aims to evaluate the real research and development (R&D) options value through the proposed model that can jointly consider the two types of risk management…

Perception of risk in track and field venue management: are hammer facilities overlooked?

Lawrence W. Judge, David Bellar, Jeffrey Petersen, Elizabeth Wanless

The purpose of this paper is to determine the level of compliance with National Collegiate Athletic Association (NCAA) and International Association of Athletics…

A hybrid Delphi‐Bayesian method to establish business data integrity policy

Ming‐Kuen Chen, Shih‐Ching Wang

Over the past decade, many small‐ and medium‐sized enterprises have incurred dramatic losses due to major disasters, causing loss of their business information systems and…

The impacts of adaptive attacking and defending strategies on mitigation of intentional threats

Jing Zhang, Shifei Shen, Rui Yang

The purpose of this paper is to focus on resource allocation and information disclosure policy for defending multiple targets against intentional attacks. The intentional…


Alex M. Andrew

The purpose of this paper is to list and discuss several workers on cybernetics and systems, all fairly recently deceased. Online sources of further details are quoted.



Online date, start – end:


Copyright Holder:

Emerald Publishing Limited

Open access:



  • Dr Igor Perko
  • Dr Stefano Armenia
  • Dr Vojko Potocan
  • Prof. Dr. Gandolfo Dominici