<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Risk-Oriented Approach in Multi-Criteria Decision- Making</article-title>
      </title-group>
      <contrib-group>
        <aff id="aff0">
          <label>0</label>
          <institution>Odesa National Polytechnic University</institution>
          ,
          <addr-line>1 Shevchenko av., Odesa, 65044</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <fpage>0000</fpage>
      <lpage>0002</lpage>
      <abstract>
        <p>Decision-making depends on the availability of information and the ability of decision-makers to manipulate this information. This paper proposes an approach that integrates the decision-relevant information, which is subject to uncertainty, to multi-criteria decision-making. An approach must enable decision-makers to explore the uncertainty and risk involved in their decisions. It arose from the theory of risk-based decision-making and the generalization of particular risk-based solutions in different domains. Multi-Attribute Utility Theory (MAUT) became the ground for the proposed approach. Utility functions appropriately account for the associated uncertainty and risk attitude of decision-makers. Three types of weighing policies reflected risk importance from decision-makers' point of view were introduced. MAUT seeks to trade-off among criteria and assigns a ranking to the alternatives. We examined the property of the proposed approach through a quantitative study on the alternatives ranking for decision-making in the transfer from face-to-face to online learning. The results showed that the risk-oriented approach reflected the risk-averse property and consequently provided the rankings similar to ones realized in the natural conditions.</p>
      </abstract>
      <kwd-group>
        <kwd>Informed decision-making</kwd>
        <kwd>Uncertainty</kwd>
        <kwd>Risk</kwd>
        <kwd>Multi-criteria decision-making</kwd>
        <kwd>Multi-Attribute Utility Theory</kwd>
        <kwd>Online learning</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>
        Traditionally decision-making problems are related to constructing the preference
order to rank the alternatives to select the best one. For decision-making problems
where alternatives are compared with one criterion, this may be easily accomplished.
However, the most realistic cases should evaluate multiple conflicting attributes.
Conflicting attributes usually arise in a case when decision-makers should take into
attention the interest of different stakeholders. Multi-criteria decision-making (MCDM)
suggests many analytical frameworks that facilitate decision-makers to perform
tradeoffs between conflicting attributes [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. The theory of MCDM is well-developed; the
existed methods traditionally are classified into three types [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]:
Copyright © 2020 for this paper by its authors. This volume and its papers are published under
the Creative Commons License Attribution 4.0 International (CC BY 4.0).
─ unique criterion or synthesis methods based on an analytical combination of all
criteria in order to produce the relative ranking of all possible alternatives under
considerations based on the preference structure of the decision-maker;
─ outranking methods sought to eliminate all the alternatives that are explicitly
dominant to produce a partial pre-order;
─ interactive methods associated with discrete or continuous problems where the
objective is defined in a set of targeted values.
      </p>
      <p>In theory, multiple objectives defined by performance goals, that are often competing
and conflicting with each other, cause the complexity of MCDM. However,
uncertainty as well is one of the causes of decision-making complexity. If the
decisionmaker knew precisely the outcome of each alternative, she would define precisely her
preferences.</p>
      <p>Ignoring uncertainty and its associated risk may simplify the decision-making
process. However, as well it degrades the quality of decisions. Sometimes
decisionmaker uses risk as one of the criteria to consider uncertainty. Sometimes risk analysis
and decision-making are realized in parallel. Both approaches cause information loss.
The first one does not reflect the risk from the points of view of stakeholders; the
second one does not give the proper weight to dependencies between alternatives and
risk sources.</p>
      <p>In this paper, we present the approach to risk-oriented attributes definition. The
involvement of risk-oriented attributes simplifies to make informed decisions under
uncertainty and risk.</p>
      <p>The remainder of the paper is structured as follows. Section 2 discusses some
related work in the area of risk-based decision-making and MCDM. Section 3
describes the main components of the proposed approach. Section 4 demonstrates the
practical use of the proposed approach through two application examples of
educational decision-making problems. Section 5 concludes the paper and outlines
some perspectives for future work.
2</p>
    </sec>
    <sec id="sec-2">
      <title>Related Works</title>
      <p>
        Decision-making is the process of making choices by identifying objectives, gathering
information, and assessing or ordering alternatives. Risk-based decision-making
(RBDM) is “a process that organizes information about the possibility for one or more
unwanted outcomes into a broad, orderly structure that helps decision-makers make
more informed management choices” [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]. RBDM comprises five major components,
as shown in Fig. 1.
      </p>
      <p>
        RBDM is an iterative, never-ending process. For example, in [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ], the authors
demonstrated the overlap of the stages of risk-management on the stages of business
process execution. They used a business-process model with four phases – Process
Design, Implementation, Enactment, and Analysis [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]. Also, they added an initial
phase, namely Risk Identification. Identified risks were mapped onto specific aspects
of the process model during the Process Design phase, obtaining a risk-annotated
process model. Next, the risk was detailed, linked with particular aspects of the
business process, controlled, and monitored. Therefore, the RBDM process is appropriate
for embedding into the working process and not oriented to choosing the best
alternative.
The approach to making uncertainty an integral part of decision-making proposed in
[
        <xref ref-type="bibr" rid="ref6">6</xref>
        ] is to view the whole process as one of determining the risk associated with the
decision. In this approach, a decision-maker specifies the risk criterion to be used and
the uncertainty for each input variable (Fig. 2).
Traditionally risk is characterized by probability or the likelihood and impact or
severity. This approach to risk evaluation assists in the decision about risk treatment.
However, if a decision-maker took into account the broader context and the actual and
perceived consequences to internal and external stakeholders, she would be able to
incorporate input uncertainty into the decision-making model. There are some
successful implementations of the approach.
      </p>
      <p>
        The paper [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ] presented a model for evaluating the security of a software system
under design based on individual risks presented by system components. Risk
evaluation based on the likelihood and impact would have provided the individual risk
ranking. Instead, the authors had calculated violation risk for a particular transaction based
on the security policy and individual risks considering context and other risk factors.
As a result, they demonstrated that small individual risks could be transformed into
significant risks when combined.
      </p>
      <p>
        Risk issues obstruct the selection of the cloud provider because of the reliability
and security of the cloud as a public platform. The automated categorization and
selection of the cloud provider based on risk metrics is quite a challenging task. The
authors of [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ] presented a framework for risk-driven cloud selection, which
contributes with a set of cloud security metrics and risk-based weighting policies, distributed
components for metric extraction and aggregation, and decision-making plugins for
ranking and selection. It is the case of incorporation of context and risk factors into
well-known MCDM methods.
      </p>
      <p>
        One additional example is risk-based testing described in [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ], which helps to
optimize the allocation of resources. Risk-based testing approaches consider risks of the
software product as the guiding factor to prioritize the requirements. Such
incorporation leads to the generic testing methodology, enhancing an established test process to
address risks. The decision provides such benefits as faster detection of defects
resulting in an earlier release, a more reliable release quality statement, and the
encapsulated test-process optimization.
      </p>
      <p>
        As an MCDA method, the most promising one is representative of unique criterion
methods. Between them, the most popular are methods AHP [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ] and MAUT [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ].
Method AHP is more complicated than MAUT because of the need in pair-wise
comparisons of alternatives and calculation of principal eigenvectors and principal
eigenvalue. In [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ], there is shown that MAUT is always significantly faster than AHP.
MAUT is a domain-neutral method, which was successfully applied, e.g., for bridges
maintenance planning [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ], railway infrastructure maintenance planning [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ], ranking
banks [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ], hybrid energy storage systems allocation [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ].
      </p>
      <p>In this paper, we encapsulate the risk-oriented assessment of alternatives into
MAUT and examine how this approach works for some decision-making problems.
3</p>
    </sec>
    <sec id="sec-3">
      <title>Approach to Uncertainty and Risk Involvement in Decision</title>
    </sec>
    <sec id="sec-4">
      <title>Making</title>
      <p>Let A = {a1, a2, ..., aN} is a finite nonempty set of alternatives among which the
decision-maker must choose. As well, there is a collection of criteria C = {c1, ..., cM} to be
satisfied by the different alternatives. Each criterion should be risk-oriented, i.e.,
formulated in terms of risk consequences. For example, in the case of “hackers’ attack”
risk, the criteria could be “the volume of damaged data” or “the time for service
recovery.” It is quite close to the concept of “impact” in traditional risk evaluation.
However, usually impact is evaluated as “cost” of risk consequences, which is
“derivate” of starting measure. Correspondingly, each criterion, i, is connected with a
measurement scale Si∈R. So that, we can define the partial score si(aj) of alternative aj
in accordance with criterion i.</p>
      <p>
        We use MAUT as MCDM means so that we have to convert the partial scores into
utility value on a standardized scale [
        <xref ref-type="bibr" rid="ref1">0,1</xref>
        ]. Let Ui(aj) represents the utility of
alternative aj in accordance with criterion i. Because all criteria are risk-oriented, we should
shape the utility function in such a way where the maximal value of the utility
function corresponds to the minimal value of partial scores. The simplest solution is a
linear utility function:
      </p>
      <p>Ui ( a j ) = 1 −
si ( a j ) − smini ,
where smini and smaxi are the minimum and the maximum values of partial scores
under criterion i, respectively.</p>
      <p>Since different criteria might have different degrees of importance, the
decisionmaker should define a weight, wi, associated with each criterion i, which represents
the hazard of risk of this criterion. We can apply different weighing policies.</p>
      <p>The first policy is uniform, where every criterion is given the same weight as the
others:
wi =
1
M
∀i = 1,..., M .
(1)
(2)
(3)
The numerical score obtained for each alternative determines the final ranking, where
the highest value indicates the most preferred alternative.</p>
      <p>The scheme of the whole process is shown in Fig. 3.
This weighting policy can be applied to any tasks when decision-makers are not able
to define risks order more precisely.</p>
      <p>The second policy is customization by the decision-maker, where every criterion is
given the weight reflecting its importance. The values wi should be normalized so
that ∑ M</p>
      <p>i=1 wi = 1 .</p>
      <p>The third policy is customization by risk profiles, where every criterion is given the
weight, which is assigned based on risk profiles. The difference between this policy
and the previous one lies in the source of weighting: is it a decision-maker or third
party information.</p>
      <p>Finally, we aggregate all the utilities following an additive aggregation function as
follows:</p>
      <p>U ( a j )</p>
      <p>M
=∑ wi ×Ui ( a j ) .</p>
      <p>i=1
The first step in this process is the identification of a set of criteria and suitable
measurement scales. At this step, the decision-maker should involve other stakeholders to
understand the criteria better. Utility assessment is a step of evaluating the partial
scores of alternatives and the transition to utility values. Risk weighing is a step of
definition and realization weighing policy. Finally, the aggregation utility function
provides the possibility for ranking the alternative and choosing the best one. During
all stages, a decision-maker is the driver of the process.
4</p>
    </sec>
    <sec id="sec-5">
      <title>The Experiment</title>
      <p>The examination of the proposed risk-oriented approach was established while
faceto-face learning had been transformed for online learning due to quarantine
limitations. We applied the proposed approach for two issues – choosing the delivery
channel for courses and modifying the teaching materials.
4.1</p>
      <sec id="sec-5-1">
        <title>Choosing the delivery channels</title>
        <p>
          The type of learning environment can lead to problems related to the scope and
instructional characteristics [
          <xref ref-type="bibr" rid="ref15">15</xref>
          ]. Although the existence of the learning management
system, which had been realized with Moodle software, not all teachers were ready to
deploy their courses quickly in this environment. As well, some teachers planned to
maintain the lecture classes in synchronous mode. Therefore, we considered the
following alternatives:
─ a1: learning management system;
─ a2: learning management system and some video conferencing tool;
─ a3: Google Classroom and Google Meet;
─ a4: group chats on Telegram.
        </p>
        <p>Lockdown caused the transfer to online learning but was unexpected by teachers.
Therefore, there were a lot of potential problems. The primary of them composed the
set of risk-oriented criteria:
─ r1: the frequency of breakdowns of the learning environment will be unacceptable;
─ r2: the time for adoption the course to learning environments will be inappropriate;
─ r3: the means provided by learning environments will not be enough for learning
activities in a course;
─ r4: the teachers’ efforts to become proficient in learning environments will be
enormous.</p>
        <p>We got the teaching staff working in the Computer Systems Institute to take part in
assessing. We used an ordinal scale with marks in the interval from 1 to 10. The
medians of the partial scores given by a group of teachers are shown in Table 1.</p>
        <p>In Table 1, the values of utility functions Ui(aj) were calculated according to (1).
While calculating the aggregation U(aj), we used the first weighing policy (2).</p>
        <p>As we see, the preference order was a1&gt;a2&gt;a4&gt;a3, which was far from an expected
order. In particular, group chats in Telegram with inadequate support of learning
activities turned out better than powerful Google Classroom.
Alternatives Risk-oriented criteria Utility function U
r1 r2 r3 r4 U1 U2 U3 U4
a1 8 3 3 3 0,00 1,00 0,86 0,83 0,67
a2 8 3 2 5 0,00 1,00 1,00 0,50 0,63
a3 2 9 6 8 1,00 0,00 0,43 0,00 0,36
a4 2 7 9 2 1,00 0,33 0,00 1,00 0,58
In the mid of the semester, the dean office gathered data about learning environments
involved in online teaching. The source of data was students who could have met
different technologies in different courses. The results are shown in Fig. 4.
The ranking resulting from the data agreed with the preference order above. The
“other” technology in Fig. 4 represents different rare solutions such as communication
through e-mail only, Microsoft Teams, face-to-face communications.</p>
        <p>In this case, using risk-oriented criteria supplied the explanation for teachers’
choice. If we used traditional domain-oriented criteria, e.g., supported activities,
provided means, types of test questions, we would get a different order and not
understand the real choice.
4.2</p>
      </sec>
      <sec id="sec-5-2">
        <title>Modifying the teaching materials</title>
        <p>After the first week of the lockdown, the teachers ascertained that teaching materials
for face-to-face learning were not enough for online learning. Time pressure was too
hard for transforming the course for e-learning. Therefore, the decision lay in
enriching existing course materials by linking with third-party materials. There were
considered four alternatives:
─ a1: the whole particular courses provided by the “Coursera for Campus” program;
─ a2: the predefined videos and/or assignments from the courses provided by the
“Coursera for Campus” program;
─ a3: the set of recommended reading materials;
─ a4: the sequence of guided assignments.</p>
        <p>We defined two sets of criteria to provide a comparison of the proposed approach
with the traditional one.</p>
        <p>
          The set of domain-oriented criteria was defined based on [
          <xref ref-type="bibr" rid="ref16">16</xref>
          ]. In this research,
there were defined 24 items that affect students’ engagement in e-learning
environments. As well, six factors – psychological motivation, peer collaboration, cognitive
problem solving, interaction with instructors, community support, and learning
management – that determine the items were found. In our experiment, we used one item
from each factor as criteria because we should have reduced the efforts of teachers
who participated in the assessment of alternatives. Therefore, the set of
domainoriented criteria were composed by
─ d1: usefulness of the course for students;
─ d2: supporting collaborative learning;
─ d3: providing the possibility for applying knowledge;
─ d4: communicating with the instructor;
─ d5: facilitation of interactions with peers;
─ d6: managing own learning schedule.
        </p>
        <p>
          The set of risk-oriented criteria was defined based on [
          <xref ref-type="bibr" rid="ref17">17</xref>
          ], which listed potential
design problems of an online classroom. Again, we took as criteria not all the listed
problems to reduce the efforts on assessment. The worked set of risk-oriented criteria
were composed by
─ r1: more time can be spent learning course logistics than learning course topics;
─ r2: an assignment includes only the information necessary for completion;
─ r3: unreasonable time limits detract from learning;
─ r4: multiple activities in the same course are challenging to navigate and update.
Alternatives Domain-oriented set Risk-oriented set
d1 d2 d3 d4 d5 d6 r1 r2 r3 r4
a1 7 3 9 4 4 7 2 7 10 8
a2 6 3 8 3 2 9 6 10 7 10
a3 5 2 2 2 2 9 8 5 6 5
a4 6 10 10 5 8 8 10 2 7 8
Table 2 shows the results of the assessment. We got the teaching staff working on the
bachelor and master programs on Software Engineering to take part in assessing. On
simplicity ground, we used an ordinal scale with marks in the interval from 1 to 10. In
each cell, we point the median of the partial score given by a group of teachers.
        </p>
        <p>To begin, we converted the partial scores into utility value. For the assessment with
risk-oriented criteria, we used (1). A linear utility function for domain-oriented
criteria was calculated as follows:</p>
        <p>Ui ( a j ) =
si ( a j ) − smini .
(4)
In both cases, we used the first weighing policy (2). Table 3 provides the result of
aggregation.
Alternatives Udomain Urisk
a1 0,50 0,44
a2 0,45 0,31
a3 0,17 0,72
a4 0,83 0,54
To define which order was more realistic, we asked the students to assess the
additional materials after the courses had been completed. In the survey, we used an
ordinal scale with marks in the interval from 1 to 5. Fig. 5 shows the distributions of
marks.
It turned out that the preferences of students were closer to order built along with
riskoriented criteria. The teachers can forecast the students’ behavior quire well; the
riskoriented criteria took into account this forecast. Instead, the domain-driven criteria
took into account only the theoretical point of view.</p>
        <p>Overall, the risk-oriented approach seems to be more practical. It is known that
humans are not risk-averse. Therefore, a risk-oriented approach can be more
reasonable for decision-makers.
5</p>
      </sec>
    </sec>
    <sec id="sec-6">
      <title>Conclusion</title>
      <p>We proposed an approach that allows decision-makers to make informed decisions
and raising their awareness of uncertainty and risk involved in their decisions. The
approach relies on a risk account while defining the criteria of decision-making. As
well, decision-makers are able to input their risk preferences by choosing the
weighting policy. MAUT became the ground for seeking to trade-off among criteria
and assigning a ranking to the alternatives.</p>
      <p>We executed two experiments with different alternatives and sets of criteria. All
assessments had been realized but not used in the real-life process. It gave the
possibility to compare calculated rankings with “natural” ones. In both experiments, using
a risk-oriented set of criteria provides the ranking correlated with observation in
reallife processes. However, while this shows that the approach is reasonable, in reality, it
might not always be feasible due to specific criteria definition.</p>
      <p>The approach suffers from some limitations. First, it lacks an empirical evaluation
of its usefulness with domain experts. Second, it lacks research on the impact of a
utility function definition. We used only a linear utility function because it is the
simplest solution. Both issues will be addressed in future work.</p>
      <p>More evaluation studies are also needed to provide more evidence of the usefulness
of a risk-oriented approach to support informed decision-making under uncertainty
and risk. These studies should be expanded beyond controlled decision-making
scenarios in a friendly environment.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Bukhsha</surname>
            ,
            <given-names>Z. A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Stipanovica</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Klankerb</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <given-names>O</given-names>
            <surname>'Connorc</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            ,
            <surname>Doreea</surname>
          </string-name>
          ,
          <string-name>
            <surname>A. G.</surname>
          </string-name>
          :
          <article-title>Network level bridges maintenance planning using Multi-Attribute Utility Theory. Structure and infrastructure engineering 15(7</article-title>
          ),
          <fpage>872</fpage>
          -
          <lpage>885</lpage>
          (
          <year>2019</year>
          ).
          <source>DOI: 10.1080/15732479</source>
          .
          <year>2017</year>
          .1414858
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>de Almeida</surname>
            ,
            <given-names>A. T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Cavalcante</surname>
            ,
            <given-names>C. A. V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Alencar</surname>
            ,
            <given-names>M. H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ferreira</surname>
            ,
            <given-names>R. J. P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>de AlmeidaFilho</surname>
          </string-name>
          , A. T.,
          <string-name>
            <surname>Garcez</surname>
            ,
            <given-names>T. V.</given-names>
          </string-name>
          :
          <article-title>Multicriteria and Multiobjective Models for Risk, Reliability and Maintenance Decision Analysis</article-title>
          . Springer International Publishing (
          <year>2015</year>
          ).
          <source>DOI: 10.1007/978-3-319-17969-8</source>
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <given-names>ABS</given-names>
            <surname>Consulting</surname>
          </string-name>
          <article-title>: Principles of Risk-Based Decision Making</article-title>
          . Government
          <string-name>
            <surname>Institutes</surname>
          </string-name>
          (
          <year>2002</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Conforti</surname>
            , R., de Leoni,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <given-names>La</given-names>
            <surname>Rosa</surname>
          </string-name>
          , M.,
          <string-name>
            <surname>van der Aalst</surname>
            ,
            <given-names>W .M. P.</given-names>
          </string-name>
          :
          <article-title>Supporting RiskInformed Decisions during Business Process Execution</article-title>
          . In: Salinesi C.,
          <string-name>
            <surname>Norrie</surname>
            <given-names>M. C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pastor</surname>
            <given-names>Ó</given-names>
          </string-name>
          . (eds)
          <article-title>Advanced Information Systems Engineering</article-title>
          .
          <source>CAiSE 2013. Lecture Notes in Computer Science</source>
          <volume>7908</volume>
          ,
          <fpage>116</fpage>
          -
          <lpage>132</lpage>
          . DOI:
          <volume>10</volume>
          .1007/978-3-
          <fpage>642</fpage>
          -38709-
          <issue>8</issue>
          _
          <fpage>8</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Dumas</surname>
          </string-name>
          , M.,
          <string-name>
            <surname>van der Aalst</surname>
            ,
            <given-names>W. M. P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>ter Hofstede</surname>
            ,
            <given-names>A. H. M.</given-names>
          </string-name>
          :
          <string-name>
            <surname>Process-Aware Information</surname>
            <given-names>Systems</given-names>
          </string-name>
          :
          <article-title>Bridging People and Software through Process Technology</article-title>
          . Wiley &amp; Sons (
          <year>2005</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Daradkeh</surname>
            ,
            <given-names>M. K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Churcher</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>McKinnon</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Supporting Informed Decision-Making under Uncertainty and Risk through Interactive Visualization</article-title>
          .
          <source>In: AUIC '13: Proceedings of the Fourteenth Australasian User Interface Conference</source>
          <volume>139</volume>
          ,
          <fpage>23</fpage>
          -
          <lpage>32</lpage>
          (
          <year>2013</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Dwaikat</surname>
            ,
            <given-names>Z.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Parisi-Presicce</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          :
          <article-title>Risky trust: risk-based analysis of software systems</article-title>
          .
          <source>ACM SIGSOFT Software Engineering Notes</source>
          <volume>30</volume>
          ,
          <fpage>1</fpage>
          -
          <lpage>7</lpage>
          (
          <year>2005</year>
          ).
          <source>DOI: 10.1145/1082983</source>
          .1083206
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Cabarcos</surname>
            ,
            <given-names>P.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Almenárez</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sánchez</surname>
            ,
            <given-names>D.D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>López</surname>
            ,
            <given-names>A.M.:</given-names>
          </string-name>
          <article-title>FRiCS: A Framework for Risk-driven Cloud Selection</article-title>
          .
          <source>In: Proceedings of 2nd International Workshop on Multimedia Privacy and Security (MPS'18)</source>
          ,
          <fpage>18</fpage>
          -
          <lpage>26</lpage>
          (
          <year>2018</year>
          ).
          <source>DOI: 10.1145/3267357</source>
          .3267362
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Felderer</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ramler</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          :
          <article-title>Integrating risk-based testing in industrial test processes</article-title>
          .
          <source>Software Quality Journal</source>
          <volume>22</volume>
          ,
          <fpage>543</fpage>
          -
          <lpage>575</lpage>
          (
          <year>2014</year>
          ). DOI:
          <volume>10</volume>
          .1007/s11219-013-9226-y
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Lina C.-C.</surname>
          </string-name>
          ,
          <string-name>
            <surname>Wang</surname>
            <given-names>W.-C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Yu W</surname>
          </string-name>
          .-D.
          <article-title>Improving AHP for construction with an adaptive AHP approach</article-title>
          .
          <source>Automation in Construction</source>
          <volume>17</volume>
          (
          <issue>2</issue>
          ),
          <fpage>180</fpage>
          -
          <lpage>187</lpage>
          (
          <year>2008</year>
          ). DOI:
          <volume>10</volume>
          .1016/j.autcon.
          <year>2007</year>
          .
          <volume>03</volume>
          .004
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Alinezhad</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Khalili</surname>
            ,
            <given-names>J.: MAUT</given-names>
          </string-name>
          <string-name>
            <surname>Method</surname>
          </string-name>
          . In:
          <article-title>New Methods and Applications in Multiple Attribute Decision Making (MADM)</article-title>
          .
          <source>International Series in Operations Research &amp; Management Science</source>
          <volume>277</volume>
          ,
          <fpage>127</fpage>
          -
          <lpage>131</lpage>
          (
          <year>2019</year>
          ). DOI:
          <volume>10</volume>
          .1007/978-3-
          <fpage>030</fpage>
          -15009-9_
          <fpage>18</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Kovačević</surname>
            ,
            <given-names>M. S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bačić</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Stipanović</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gavin</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          :
          <article-title>Categorization of the Condition of Railway Embankments Using a Multi-Attribute Utility Theory</article-title>
          .
          <source>Applied Science</source>
          <volume>9</volume>
          ,
          <issue>5089</issue>
          (
          <year>2019</year>
          ).
          <source>DOI: 10.3390/app9235089</source>
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Rebai</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Azaiez</surname>
            ,
            <given-names>M. N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Saidane</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          :
          <article-title>A multi-attribute utility model for generating a sustainability index in the banking sector</article-title>
          .
          <source>Journal of Cleaner Production</source>
          <volume>113</volume>
          ,
          <fpage>835</fpage>
          -
          <lpage>849</lpage>
          (
          <year>2016</year>
          ). DOI:
          <volume>10</volume>
          .1016/j.jclepro.
          <year>2015</year>
          .
          <volume>10</volume>
          .129
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>Feng</surname>
            ,
            <given-names>X.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gu</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Guan</surname>
            ,
            <given-names>X.</given-names>
          </string-name>
          :
          <article-title>Optimal allocation of hybrid energy storage for microgrids based on multi-attribute utility theory</article-title>
          .
          <source>Journal of Modern Power Systems and Clean Energy</source>
          <volume>6</volume>
          ,
          <fpage>107</fpage>
          -
          <lpage>117</lpage>
          (
          <year>2018</year>
          ).
          <source>DOI: 10.1007/s40565-017-0310-3</source>
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>Moore</surname>
            ,
            <given-names>J. L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dickson-Deane</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Galyen</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          :
          <article-title>e-Learning, online learning, and distance learning environments: Are they the same? The Internet</article-title>
          and
          <source>Higher Education</source>
          <volume>14</volume>
          (
          <issue>2</issue>
          ),
          <fpage>129</fpage>
          -
          <lpage>135</lpage>
          (
          <year>2011</year>
          ). DOI:
          <volume>10</volume>
          .1016/j.iheduc.
          <year>2010</year>
          .
          <volume>10</volume>
          .001
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <surname>Lee</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Song</surname>
          </string-name>
          , H.
          <string-name>
            <surname>-D.</surname>
          </string-name>
          ,
          <string-name>
            <surname>Hong</surname>
            ,
            <given-names>A.J.</given-names>
          </string-name>
          :
          <article-title>Exploring Factors and Indicators for Measuring Students' Sustainable Engagement in e-Learning</article-title>
          .
          <source>Sustainability 11</source>
          ,
          <issue>985</issue>
          (
          <year>2019</year>
          ).
          <source>DOI: 10.3390/su11040985</source>
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <surname>Burk</surname>
          </string-name>
          , E.:
          <article-title>Online Learning Indicators</article-title>
          . eLearn
          <string-name>
            <surname>Magazine</surname>
          </string-name>
          (
          <year>2011</year>
          ). https://elearnmag.acm.org/archive.cfm?aid=
          <fpage>2001334</fpage>
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>