-
1
-
-
35348822363
-
Procedures for synthesizing ratio judgments
-
J. Aczel, and T. Saaty Procedures for synthesizing ratio judgments Journal of Mathematical Psychology 27 1 1983 93 102
-
(1983)
Journal of Mathematical Psychology
, vol.27
, Issue.1
, pp. 93-102
-
-
Aczel, J.1
Saaty, T.2
-
2
-
-
0020112814
-
On the generation of alternatives in decision analysis problems
-
A. Arbel, and R. Tong On the generation of alternatives in decision analysis problems Journal of the Operational Research Society 33 1982 377 387 (Pubitemid 12522706)
-
(1982)
Journal of the Operational Research Society
, vol.33
, Issue.4
, pp. 377-387
-
-
Arbel, A.1
Tong, R.2
-
4
-
-
13444274614
-
Evaluating information security investments using the analytic hierarchy process
-
L.D. Bodin, L.A. Gordon, and M.B. Loeb Evaluating information security investments using the analytic hierarchy process Communications of the ACM 48 2 2005
-
(2005)
Communications of the ACM
, vol.48
, Issue.2
-
-
Bodin, L.D.1
Gordon, L.A.2
Loeb, M.B.3
-
5
-
-
39749181513
-
Towards a standard approach for quantifying an ICT security investment
-
DOI 10.1016/j.csi.2007.10.013, PII S0920548907000876
-
R. Bojanc, and B. Jenman-Blazic Towards a standard approach for quantifying an ICT security investment Computer Standards & Interfaces 30 4 2008 216 222 (Pubitemid 351308028)
-
(2008)
Computer Standards and Interfaces
, vol.30
, Issue.4
, pp. 216-222
-
-
Bojanc, R.1
Jerman-Blazic, B.2
-
6
-
-
0001802446
-
Group decision-making and the analytic hierarchy process: Exploring the consensus-relevant information content
-
DOI 10.1016/0305-0548(96)00002-H
-
N. Bryson Group decision-making and the analytic hierarchy process: exploring the consensus-relevant information content Computers & Operations Research 23 1 1996 27 (Pubitemid 126349181)
-
(1996)
Computers and Operations Research
, vol.23
, Issue.1
, pp. 27-35
-
-
Bryson, N.1
-
9
-
-
0035342173
-
Decision making and knowledge management in inquiring organizations: Toward a new decision-making paradigm for DSS
-
J.F. Courtney Decision making and knowledge management in inquiring organizations: toward a new decision-making paradigm for DSS Decision Support Systems 31 1 2001 17 38
-
(2001)
Decision Support Systems
, vol.31
, Issue.1
, pp. 17-38
-
-
Courtney, J.F.1
-
10
-
-
0026854294
-
Group decision support with the analytic hierarchy process
-
R.F. Dyer, and E.H. Forman Group decision support with the analytic hierarchy process Decision Support Systems 8 2 1992 99 123
-
(1992)
Decision Support Systems
, vol.8
, Issue.2
, pp. 99-123
-
-
Dyer, R.F.1
Forman, E.H.2
-
13
-
-
0029307305
-
The anonymity and proximity factors in group decision support systems
-
M.C. Er, and A.C. Ng The anonymity and proximity factors in group decision support systems Decision support system 14 1995 75 83
-
(1995)
Decision Support System
, vol.14
, pp. 75-83
-
-
Er, M.C.1
Ng, A.C.2
-
14
-
-
34249951333
-
Aggregation of individual preference structures in AHP-group decision making
-
M.T. Escobar, and J.M. Moreno-Jimenez Aggregation of individual preference structures in AHP-group decision making Group Decision and Negotiation 16 2007 287 301
-
(2007)
Group Decision and Negotiation
, vol.16
, pp. 287-301
-
-
Escobar, M.T.1
Moreno-Jimenez, J.M.2
-
15
-
-
0031639903
-
The three categories of decision-making and information security
-
T. Finne The three categories of decision-making and information security Computers & Security 17 5 1998 397 405 (Pubitemid 128386700)
-
(1998)
Computers and Security
, vol.17
, Issue.5
, pp. 397-405
-
-
Finne, T.1
-
16
-
-
38249007153
-
Facts and fictions about the analytic hierarchy process
-
E.H. Forman Facts and fictions about the analytic hierarchy process Mathematical Computer Modeling 17 4-5 1993 19 26
-
(1993)
Mathematical Computer Modeling
, vol.17
, Issue.45
, pp. 19-26
-
-
Forman, E.H.1
-
17
-
-
0346481810
-
The techniques for risk analysis are insufficient in themselves
-
S. Frosdick The techniques for risk analysis are insufficient in themselves Disaster prevention and management 6 3 1997 165 177
-
(1997)
Disaster Prevention and Management
, vol.6
, Issue.3
, pp. 165-177
-
-
Frosdick, S.1
-
19
-
-
15744404682
-
Management of risk in the information age
-
DOI 10.1016/j.cose.2004.11.002, PII S0167404804002780
-
M. Gerber, and R. von Solms Management of risk in the information age Computers & Security 24 1 2005 16 30 (Pubitemid 40415397)
-
(2005)
Computers and Security
, vol.24
, Issue.1
, pp. 16-30
-
-
Gerber, M.1
Von Solms, R.2
-
22
-
-
0242652022
-
Design science in information systems research
-
A.R. Hevner, S.T. March, J. Park, and S. Ram Design science in information systems research MIS Quarterly 28 1 2004 75
-
(2004)
MIS Quarterly
, vol.28
, Issue.1
, pp. 75
-
-
Hevner, A.R.1
March, S.T.2
Park, J.3
Ram, S.4
-
23
-
-
0024606973
-
Risk analysis and computer security: Towards a theory at last
-
L.J. Hoffman Risk analysis and computer security: towards a theory at last Computers & Security 8 1 1989 23 24
-
(1989)
Computers & Security
, vol.8
, Issue.1
, pp. 23-24
-
-
Hoffman, L.J.1
-
24
-
-
13844255245
-
User acceptance of intelligence and security informatics technology: A study of COPLINK
-
P.J.H. Hu User acceptance of intelligence and security informatics technology: a study of COPLINK Journal of the American Society for Information Science and Technology 56 3 2005 235 244
-
(2005)
Journal of the American Society for Information Science and Technology
, vol.56
, Issue.3
, pp. 235-244
-
-
Hu, P.J.H.1
-
26
-
-
78049474409
-
The myth of technical security, American Bankers Association
-
P. Jager The myth of technical security, American Bankers Association ABA Banking Journal 96 1 2004 8
-
(2004)
ABA Banking Journal
, vol.96
, Issue.1
, pp. 8
-
-
Jager, P.1
-
29
-
-
0142007149
-
Security engineering and security ROI
-
J. Leach Security engineering and security ROI Computers & Security 22 6 2003
-
(2003)
Computers & Security
, vol.22
, Issue.6
-
-
Leach, J.1
-
31
-
-
0023456474
-
Managerial perspectives on risk and risk taking
-
J.G. March, and Z. Shapira Managerial perspectives on risk and risk taking Management Science 33 11 1987 1404
-
(1987)
Management Science
, vol.33
, Issue.11
, pp. 1404
-
-
March, J.G.1
Shapira, Z.2
-
33
-
-
78049469782
-
Analysing security costs
-
Mercuri
-
Mercuri Analysing security costs Communications of the ACM 46 6 2003
-
(2003)
Communications of the ACM
, vol.46
, Issue.6
-
-
-
39
-
-
0022835736
-
A technique using analytical hierarchy process in multi-objective planning models
-
D.L. Olson, M. Venkataramanan, and J.L. Mote A technique using analytical hierarchy process in multi-objective planning models Socio-economic Planning Sciences 20 6 1986 361 368
-
(1986)
Socio-economic Planning Sciences
, vol.20
, Issue.6
, pp. 361-368
-
-
Olson, D.L.1
Venkataramanan, M.2
Mote, J.L.3
-
40
-
-
0031332150
-
The strategic values of information security in business
-
D. Parker The strategic values of information security in business Computers & Security 16 7 1997 572 582
-
(1997)
Computers & Security
, vol.16
, Issue.7
, pp. 572-582
-
-
Parker, D.1
-
41
-
-
39749104751
-
A design science research methodology for information systems research
-
K. Peffers, T. Tuunanen, M. Tothenberger, and S. Chaterjee A design science research methodology for information systems research Journal of Management Information Systems 24 3 2008 45 77
-
(2008)
Journal of Management Information Systems
, vol.24
, Issue.3
, pp. 45-77
-
-
Peffers, K.1
Tuunanen, T.2
Tothenberger, M.3
Chaterjee, S.4
-
42
-
-
34547661980
-
Mixing Multiple Criteria Decision Making with soft systems thinking techniques for decision support in complex situations
-
DOI 10.1016/j.dss.2006.03.006, PII S0167923606000443
-
D. Petkov, O. Petkova, T. Andrew, and T. Nepal Mixing multiple criteria decision making with soft systems thinking techniques for decision support in complex situations Decision Support Systems 43 4 2007 1615 1629 (Pubitemid 47223468)
-
(2007)
Decision Support Systems
, vol.43
, Issue.4
, pp. 1615-1629
-
-
Petkov, D.1
Petkova, O.2
Andrew, T.3
Nepal, T.4
-
43
-
-
39449096290
-
Cybersecurity economic issues: Clearing the path to good practice
-
DOI 10.1109/MS.2008.4
-
S.L. Pfleeger, and R. Rue Cybersecurity economic issues: clearing the path to good practice IEEE Software 25 1 2008 35 42 (Pubitemid 351266657)
-
(2008)
IEEE Software
, vol.25
, Issue.1
, pp. 35-42
-
-
Pfleeger, S.L.1
Rue, R.2
-
44
-
-
8444250312
-
Improving the ROI of the security management process
-
S.A. Purser Improving the ROI of the security management process Computers & Security 23 7 2004 542 546
-
(2004)
Computers & Security
, vol.23
, Issue.7
, pp. 542-546
-
-
Purser, S.A.1
-
45
-
-
0000499550
-
Group preference aggregation methods employed in AHOP: An evaluation and intrinsic process for deriving members' weightages
-
R. Ramanathan, and L.S. Ganesh Group preference aggregation methods employed in AHOP: an evaluation and intrinsic process for deriving members' weightages European Journal of Operational Research 79 1994 249 265
-
(1994)
European Journal of Operational Research
, vol.79
, pp. 249-265
-
-
Ramanathan, R.1
Ganesh, L.S.2
-
47
-
-
0035614907
-
An assessment of the Singerian inquiring organizational model: Cases from academia and the utility industry
-
S.M. Richardson, J.F. Courtney, and D.B. Paradice An assessment of the Singerian inquiring organizational model: cases from academia and the utility industry Information Systems Frontiers 3 1 2001 49
-
(2001)
Information Systems Frontiers
, vol.3
, Issue.1
, pp. 49
-
-
Richardson, S.M.1
Courtney, J.F.2
Paradice, D.B.3
-
48
-
-
9944238860
-
Dilemmas in a general theory of planning
-
H.W. Rittle, and M.M. Webber Dilemmas in a general theory of planning Policy Sciences 4 1973 155 169
-
(1973)
Policy Sciences
, vol.4
, pp. 155-169
-
-
Rittle, H.W.1
Webber, M.M.2
-
49
-
-
33751084118
-
Expected benefits of information security investments
-
DOI 10.1016/j.cose.2006.08.001, PII S0167404806001192
-
J. Ryan, and D.J. Ryan Expected benefits of information security investments Computers & Security 25 8 2006 579 588 (Pubitemid 44765086)
-
(2006)
Computers and Security
, vol.25
, Issue.8
, pp. 579-588
-
-
Ryan, J.J.C.H.1
Ryan, D.J.2
-
51
-
-
0026869397
-
Systems thinking and organizational learning: Acting locally and thinking globally in the organization of the future
-
P. Senge, and J. Sterman Systems thinking and organizational learning: acting locally and thinking globally in the organization of the future European Journal of Operational Research 59 1 1992 137 150
-
(1992)
European Journal of Operational Research
, vol.59
, Issue.1
, pp. 137-150
-
-
Senge, P.1
Sterman, J.2
-
53
-
-
53049103906
-
Five dimensions of information security awareness
-
M.T. Siponen Five dimensions of information security awareness ACM SIGCAS Computers and Society 31 2 2001 24 29
-
(2001)
ACM SIGCAS Computers and Society
, vol.31
, Issue.2
, pp. 24-29
-
-
Siponen, M.T.1
-
54
-
-
33845907941
-
Linking analytic hierarchy process and social choice methods to support group decision-making in water management
-
DOI 10.1016/j.dss.2006.08.001, PII S0167923606001163, Decision Support Systems in Emerging Economies
-
B. Srdjevic Linking analytic hierarchy process and social choice methods to support group decision-making in water management Decision Support Systems 42 2007 2261 2273 (Pubitemid 46019807)
-
(2007)
Decision Support Systems
, vol.42
, Issue.4
, pp. 2261-2273
-
-
Srdjevic, B.1
-
55
-
-
73549084288
-
Actualizing Organizational Memory with Information Systems
-
E. Stein, and V. Zwass Actualizing organizational memory with information systems Information Systems Research 6 2 1995 85 117 (Pubitemid 126102973)
-
(1995)
Information Systems Research
, vol.6
, Issue.2
, pp. 85-117
-
-
Stein, E.W.1
Zwass, V.2
-
56
-
-
0000924513
-
A critical survey of the status of multiple criteria decision making theory and practice
-
T. Stewart A critical survey of the status of multiple criteria decision making theory and practice OMEGA 20 5-6 1992 569 586
-
(1992)
OMEGA
, vol.20
, Issue.56
, pp. 569-586
-
-
Stewart, T.1
-
57
-
-
0001133137
-
Coping with systems risk: Security planning models for management decision making
-
D.W. Straub, and R.J. Welke Coping with systems risk: security planning models for management decision making MIS Quarterly 22 4 1998 441 469
-
(1998)
MIS Quarterly
, vol.22
, Issue.4
, pp. 441-469
-
-
Straub, D.W.1
Welke, R.J.2
-
58
-
-
78049471185
-
Risk assessment and management: The engineering approach
-
Strutt Cranfield University
-
Strutt Risk assessment and management: the engineering approach Center for Industrial Safety and Reliability 1993 Cranfield University
-
(1993)
Center for Industrial Safety and Reliability
-
-
-
59
-
-
33748594201
-
An information systems security risk assessment model under the Dempster-Shafer theory of belief functions
-
L.L. Sun, R.P. Srivastava, and T.J. Mock An information systems security risk assessment model under the Dempster-Shafer theory of belief functions Journal of Management Information Systems 22 4 2006 109 142
-
(2006)
Journal of Management Information Systems
, vol.22
, Issue.4
, pp. 109-142
-
-
Sun, L.L.1
Srivastava, R.P.2
Mock, T.J.3
-
60
-
-
0037697305
-
Cross: A multicriteria group-decision-making model for evaluating and prioritizing advanced-technology projects at NASA
-
M. Tavana Cross: a multicriteria group-decision-making model for evaluating and prioritizing advanced-technology projects at NASA Interfaces 33 3 2003 40 (Pubitemid 36881232)
-
(2003)
Interfaces
, vol.33
, Issue.3
-
-
Tavana, M.1
-
62
-
-
44949288762
-
An overview of the analytic hierarchy process and its applications
-
L.G. Vargas An overview of the analytic hierarchy process and its applications European Journal of Operational Research 48 1990 2 8
-
(1990)
European Journal of Operational Research
, vol.48
, pp. 2-8
-
-
Vargas, L.G.1
-
65
-
-
34548477450
-
Network externalities
-
W.T. Yue, M. Cakanyildirim, Y.U. Ryu, and D. Liu Network externalities Layered Protection and IT Security Risk Management, Decision Support Systems 44 1 2007 1 16
-
(2007)
Layered Protection and IT Security Risk Management, Decision Support Systems
, vol.44
, Issue.1
, pp. 1-16
-
-
Yue, W.T.1
Cakanyildirim, M.2
Ryu, Y.U.3
Liu, D.4
-
66
-
-
1242263785
-
Holistic security requirement engineering for electronic commerce
-
A. Zuccato Holistic security requirement engineering for electronic commerce Computers & Security 23 1 2004 63
-
(2004)
Computers & Security
, vol.23
, Issue.1
, pp. 63
-
-
Zuccato, A.1
|