Journal of Software Engineering1819-43112152-0941Asian Network for Scientific Information10.3923/jse.2015.818.827FuSha LiuZhongli SunGuang ZhouHangjun LiuWenbin 4201594In allusion to accuracy of security risk assessment for information systems in campus, put forth a method to evaluate security risks of the information system combining fuzzy set with the entropy theory. By analyzing risk factors involved in the information system with fuzzy set, this method constituted the matrix on dependence degrees of evaluation sets corresponding to various factors and then determined weights of risk factors with the entropy coefficient method to reduce subjective bias. During the evaluating process, security risk values of different factors have been integrated with the system integration method, so that levels on security risks of information system in campus can be determined. Case analysis proved that this method can be effectively applied in security risk assessment for information system in campus.]]>Fu, Y., X.P. Wu, Q. Ye and X. Peng,20103814891494Zhang, L., J. Peng, Y. Du and Q. Wang,20125213641369Fu, Y., X.P. Wu and C. Yan,200652631634Dzazali, S. and A.H. Zolait,2012142357Gehani, A.,20032003Bilar, D.,20032003Zhang, T., D.J. Mu, S. Ren and L. Yao,201059395Zhao, D.M., J.F. Ma and Y.S. Wang,2007285164Liu, Y., Q. Lin and K. Meng,2010374548,56Ahmed, M., L. Sharif, A. Issa-Salwe and A. Alharby,201266267BS 7799-2,19991999Zhang, W.H., B.C. Du and Y.Y. Yang,20081020602064Liang, J.Y. and Y.H. Qian,20083820482065Ding, W.P., J.D. Wang, Z.J. Guan and H. Zhu,20103123722376Gong, J., J. Zhang, X. Wu and S. Liu,201128285288