메뉴 건너뛰기




Volumn 50, Issue 1, 2010, Pages 43-54

A web-based multi-perspective decision support system for information security planning

Author keywords

Decision support; Information systems security planning; Inquiring organizations; Multiple criteria decision making

Indexed keywords

CYBER-ATTACKS; DECISION SITUATION; DECISION SUPPORTS; INFORMATION SECURITY; INFORMATION SYSTEMS SECURITY PLANNING; INQUIRING ORGANIZATIONS; MULTI-CRITERIA; MULTI-PERSPECTIVE; MULTI-STAKEHOLDER; MULTICRITERIA DECISION; MULTIPLE CRITERIA DECISION MAKING; SECURITY CONTROLS; SECURITY PLANNING; SELECTION DECISIONS; THEORETICAL BASIS;

EID: 78049467029     PISSN: 01679236     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.dss.2010.07.001     Document Type: Article
Times cited : (36)

References (66)
  • 1
    • 35348822363 scopus 로고
    • Procedures for synthesizing ratio judgments
    • J. Aczel, and T. Saaty Procedures for synthesizing ratio judgments Journal of Mathematical Psychology 27 1 1983 93 102
    • (1983) Journal of Mathematical Psychology , vol.27 , Issue.1 , pp. 93-102
    • Aczel, J.1    Saaty, T.2
  • 2
    • 0020112814 scopus 로고
    • On the generation of alternatives in decision analysis problems
    • A. Arbel, and R. Tong On the generation of alternatives in decision analysis problems Journal of the Operational Research Society 33 1982 377 387 (Pubitemid 12522706)
    • (1982) Journal of the Operational Research Society , vol.33 , Issue.4 , pp. 377-387
    • Arbel, A.1    Tong, R.2
  • 4
    • 13444274614 scopus 로고    scopus 로고
    • Evaluating information security investments using the analytic hierarchy process
    • L.D. Bodin, L.A. Gordon, and M.B. Loeb Evaluating information security investments using the analytic hierarchy process Communications of the ACM 48 2 2005
    • (2005) Communications of the ACM , vol.48 , Issue.2
    • Bodin, L.D.1    Gordon, L.A.2    Loeb, M.B.3
  • 5
    • 39749181513 scopus 로고    scopus 로고
    • Towards a standard approach for quantifying an ICT security investment
    • DOI 10.1016/j.csi.2007.10.013, PII S0920548907000876
    • R. Bojanc, and B. Jenman-Blazic Towards a standard approach for quantifying an ICT security investment Computer Standards & Interfaces 30 4 2008 216 222 (Pubitemid 351308028)
    • (2008) Computer Standards and Interfaces , vol.30 , Issue.4 , pp. 216-222
    • Bojanc, R.1    Jerman-Blazic, B.2
  • 6
    • 0001802446 scopus 로고    scopus 로고
    • Group decision-making and the analytic hierarchy process: Exploring the consensus-relevant information content
    • DOI 10.1016/0305-0548(96)00002-H
    • N. Bryson Group decision-making and the analytic hierarchy process: exploring the consensus-relevant information content Computers & Operations Research 23 1 1996 27 (Pubitemid 126349181)
    • (1996) Computers and Operations Research , vol.23 , Issue.1 , pp. 27-35
    • Bryson, N.1
  • 9
    • 0035342173 scopus 로고    scopus 로고
    • Decision making and knowledge management in inquiring organizations: Toward a new decision-making paradigm for DSS
    • J.F. Courtney Decision making and knowledge management in inquiring organizations: toward a new decision-making paradigm for DSS Decision Support Systems 31 1 2001 17 38
    • (2001) Decision Support Systems , vol.31 , Issue.1 , pp. 17-38
    • Courtney, J.F.1
  • 10
    • 0026854294 scopus 로고
    • Group decision support with the analytic hierarchy process
    • R.F. Dyer, and E.H. Forman Group decision support with the analytic hierarchy process Decision Support Systems 8 2 1992 99 123
    • (1992) Decision Support Systems , vol.8 , Issue.2 , pp. 99-123
    • Dyer, R.F.1    Forman, E.H.2
  • 13
    • 0029307305 scopus 로고
    • The anonymity and proximity factors in group decision support systems
    • M.C. Er, and A.C. Ng The anonymity and proximity factors in group decision support systems Decision support system 14 1995 75 83
    • (1995) Decision Support System , vol.14 , pp. 75-83
    • Er, M.C.1    Ng, A.C.2
  • 14
    • 34249951333 scopus 로고    scopus 로고
    • Aggregation of individual preference structures in AHP-group decision making
    • M.T. Escobar, and J.M. Moreno-Jimenez Aggregation of individual preference structures in AHP-group decision making Group Decision and Negotiation 16 2007 287 301
    • (2007) Group Decision and Negotiation , vol.16 , pp. 287-301
    • Escobar, M.T.1    Moreno-Jimenez, J.M.2
  • 15
    • 0031639903 scopus 로고    scopus 로고
    • The three categories of decision-making and information security
    • T. Finne The three categories of decision-making and information security Computers & Security 17 5 1998 397 405 (Pubitemid 128386700)
    • (1998) Computers and Security , vol.17 , Issue.5 , pp. 397-405
    • Finne, T.1
  • 16
    • 38249007153 scopus 로고
    • Facts and fictions about the analytic hierarchy process
    • E.H. Forman Facts and fictions about the analytic hierarchy process Mathematical Computer Modeling 17 4-5 1993 19 26
    • (1993) Mathematical Computer Modeling , vol.17 , Issue.45 , pp. 19-26
    • Forman, E.H.1
  • 17
    • 0346481810 scopus 로고    scopus 로고
    • The techniques for risk analysis are insufficient in themselves
    • S. Frosdick The techniques for risk analysis are insufficient in themselves Disaster prevention and management 6 3 1997 165 177
    • (1997) Disaster Prevention and Management , vol.6 , Issue.3 , pp. 165-177
    • Frosdick, S.1
  • 19
    • 15744404682 scopus 로고    scopus 로고
    • Management of risk in the information age
    • DOI 10.1016/j.cose.2004.11.002, PII S0167404804002780
    • M. Gerber, and R. von Solms Management of risk in the information age Computers & Security 24 1 2005 16 30 (Pubitemid 40415397)
    • (2005) Computers and Security , vol.24 , Issue.1 , pp. 16-30
    • Gerber, M.1    Von Solms, R.2
  • 22
    • 0242652022 scopus 로고    scopus 로고
    • Design science in information systems research
    • A.R. Hevner, S.T. March, J. Park, and S. Ram Design science in information systems research MIS Quarterly 28 1 2004 75
    • (2004) MIS Quarterly , vol.28 , Issue.1 , pp. 75
    • Hevner, A.R.1    March, S.T.2    Park, J.3    Ram, S.4
  • 23
    • 0024606973 scopus 로고
    • Risk analysis and computer security: Towards a theory at last
    • L.J. Hoffman Risk analysis and computer security: towards a theory at last Computers & Security 8 1 1989 23 24
    • (1989) Computers & Security , vol.8 , Issue.1 , pp. 23-24
    • Hoffman, L.J.1
  • 24
    • 13844255245 scopus 로고    scopus 로고
    • User acceptance of intelligence and security informatics technology: A study of COPLINK
    • P.J.H. Hu User acceptance of intelligence and security informatics technology: a study of COPLINK Journal of the American Society for Information Science and Technology 56 3 2005 235 244
    • (2005) Journal of the American Society for Information Science and Technology , vol.56 , Issue.3 , pp. 235-244
    • Hu, P.J.H.1
  • 26
    • 78049474409 scopus 로고    scopus 로고
    • The myth of technical security, American Bankers Association
    • P. Jager The myth of technical security, American Bankers Association ABA Banking Journal 96 1 2004 8
    • (2004) ABA Banking Journal , vol.96 , Issue.1 , pp. 8
    • Jager, P.1
  • 29
    • 0142007149 scopus 로고    scopus 로고
    • Security engineering and security ROI
    • J. Leach Security engineering and security ROI Computers & Security 22 6 2003
    • (2003) Computers & Security , vol.22 , Issue.6
    • Leach, J.1
  • 31
    • 0023456474 scopus 로고
    • Managerial perspectives on risk and risk taking
    • J.G. March, and Z. Shapira Managerial perspectives on risk and risk taking Management Science 33 11 1987 1404
    • (1987) Management Science , vol.33 , Issue.11 , pp. 1404
    • March, J.G.1    Shapira, Z.2
  • 33
    • 78049469782 scopus 로고    scopus 로고
    • Analysing security costs
    • Mercuri
    • Mercuri Analysing security costs Communications of the ACM 46 6 2003
    • (2003) Communications of the ACM , vol.46 , Issue.6
  • 39
    • 0022835736 scopus 로고
    • A technique using analytical hierarchy process in multi-objective planning models
    • D.L. Olson, M. Venkataramanan, and J.L. Mote A technique using analytical hierarchy process in multi-objective planning models Socio-economic Planning Sciences 20 6 1986 361 368
    • (1986) Socio-economic Planning Sciences , vol.20 , Issue.6 , pp. 361-368
    • Olson, D.L.1    Venkataramanan, M.2    Mote, J.L.3
  • 40
    • 0031332150 scopus 로고    scopus 로고
    • The strategic values of information security in business
    • D. Parker The strategic values of information security in business Computers & Security 16 7 1997 572 582
    • (1997) Computers & Security , vol.16 , Issue.7 , pp. 572-582
    • Parker, D.1
  • 42
    • 34547661980 scopus 로고    scopus 로고
    • Mixing Multiple Criteria Decision Making with soft systems thinking techniques for decision support in complex situations
    • DOI 10.1016/j.dss.2006.03.006, PII S0167923606000443
    • D. Petkov, O. Petkova, T. Andrew, and T. Nepal Mixing multiple criteria decision making with soft systems thinking techniques for decision support in complex situations Decision Support Systems 43 4 2007 1615 1629 (Pubitemid 47223468)
    • (2007) Decision Support Systems , vol.43 , Issue.4 , pp. 1615-1629
    • Petkov, D.1    Petkova, O.2    Andrew, T.3    Nepal, T.4
  • 43
    • 39449096290 scopus 로고    scopus 로고
    • Cybersecurity economic issues: Clearing the path to good practice
    • DOI 10.1109/MS.2008.4
    • S.L. Pfleeger, and R. Rue Cybersecurity economic issues: clearing the path to good practice IEEE Software 25 1 2008 35 42 (Pubitemid 351266657)
    • (2008) IEEE Software , vol.25 , Issue.1 , pp. 35-42
    • Pfleeger, S.L.1    Rue, R.2
  • 44
    • 8444250312 scopus 로고    scopus 로고
    • Improving the ROI of the security management process
    • S.A. Purser Improving the ROI of the security management process Computers & Security 23 7 2004 542 546
    • (2004) Computers & Security , vol.23 , Issue.7 , pp. 542-546
    • Purser, S.A.1
  • 45
    • 0000499550 scopus 로고
    • Group preference aggregation methods employed in AHOP: An evaluation and intrinsic process for deriving members' weightages
    • R. Ramanathan, and L.S. Ganesh Group preference aggregation methods employed in AHOP: an evaluation and intrinsic process for deriving members' weightages European Journal of Operational Research 79 1994 249 265
    • (1994) European Journal of Operational Research , vol.79 , pp. 249-265
    • Ramanathan, R.1    Ganesh, L.S.2
  • 47
    • 0035614907 scopus 로고    scopus 로고
    • An assessment of the Singerian inquiring organizational model: Cases from academia and the utility industry
    • S.M. Richardson, J.F. Courtney, and D.B. Paradice An assessment of the Singerian inquiring organizational model: cases from academia and the utility industry Information Systems Frontiers 3 1 2001 49
    • (2001) Information Systems Frontiers , vol.3 , Issue.1 , pp. 49
    • Richardson, S.M.1    Courtney, J.F.2    Paradice, D.B.3
  • 48
    • 9944238860 scopus 로고
    • Dilemmas in a general theory of planning
    • H.W. Rittle, and M.M. Webber Dilemmas in a general theory of planning Policy Sciences 4 1973 155 169
    • (1973) Policy Sciences , vol.4 , pp. 155-169
    • Rittle, H.W.1    Webber, M.M.2
  • 49
    • 33751084118 scopus 로고    scopus 로고
    • Expected benefits of information security investments
    • DOI 10.1016/j.cose.2006.08.001, PII S0167404806001192
    • J. Ryan, and D.J. Ryan Expected benefits of information security investments Computers & Security 25 8 2006 579 588 (Pubitemid 44765086)
    • (2006) Computers and Security , vol.25 , Issue.8 , pp. 579-588
    • Ryan, J.J.C.H.1    Ryan, D.J.2
  • 51
    • 0026869397 scopus 로고
    • Systems thinking and organizational learning: Acting locally and thinking globally in the organization of the future
    • P. Senge, and J. Sterman Systems thinking and organizational learning: acting locally and thinking globally in the organization of the future European Journal of Operational Research 59 1 1992 137 150
    • (1992) European Journal of Operational Research , vol.59 , Issue.1 , pp. 137-150
    • Senge, P.1    Sterman, J.2
  • 53
    • 53049103906 scopus 로고    scopus 로고
    • Five dimensions of information security awareness
    • M.T. Siponen Five dimensions of information security awareness ACM SIGCAS Computers and Society 31 2 2001 24 29
    • (2001) ACM SIGCAS Computers and Society , vol.31 , Issue.2 , pp. 24-29
    • Siponen, M.T.1
  • 54
    • 33845907941 scopus 로고    scopus 로고
    • Linking analytic hierarchy process and social choice methods to support group decision-making in water management
    • DOI 10.1016/j.dss.2006.08.001, PII S0167923606001163, Decision Support Systems in Emerging Economies
    • B. Srdjevic Linking analytic hierarchy process and social choice methods to support group decision-making in water management Decision Support Systems 42 2007 2261 2273 (Pubitemid 46019807)
    • (2007) Decision Support Systems , vol.42 , Issue.4 , pp. 2261-2273
    • Srdjevic, B.1
  • 55
    • 73549084288 scopus 로고
    • Actualizing Organizational Memory with Information Systems
    • E. Stein, and V. Zwass Actualizing organizational memory with information systems Information Systems Research 6 2 1995 85 117 (Pubitemid 126102973)
    • (1995) Information Systems Research , vol.6 , Issue.2 , pp. 85-117
    • Stein, E.W.1    Zwass, V.2
  • 56
    • 0000924513 scopus 로고
    • A critical survey of the status of multiple criteria decision making theory and practice
    • T. Stewart A critical survey of the status of multiple criteria decision making theory and practice OMEGA 20 5-6 1992 569 586
    • (1992) OMEGA , vol.20 , Issue.56 , pp. 569-586
    • Stewart, T.1
  • 57
    • 0001133137 scopus 로고    scopus 로고
    • Coping with systems risk: Security planning models for management decision making
    • D.W. Straub, and R.J. Welke Coping with systems risk: security planning models for management decision making MIS Quarterly 22 4 1998 441 469
    • (1998) MIS Quarterly , vol.22 , Issue.4 , pp. 441-469
    • Straub, D.W.1    Welke, R.J.2
  • 58
    • 78049471185 scopus 로고
    • Risk assessment and management: The engineering approach
    • Strutt Cranfield University
    • Strutt Risk assessment and management: the engineering approach Center for Industrial Safety and Reliability 1993 Cranfield University
    • (1993) Center for Industrial Safety and Reliability
  • 59
    • 33748594201 scopus 로고    scopus 로고
    • An information systems security risk assessment model under the Dempster-Shafer theory of belief functions
    • L.L. Sun, R.P. Srivastava, and T.J. Mock An information systems security risk assessment model under the Dempster-Shafer theory of belief functions Journal of Management Information Systems 22 4 2006 109 142
    • (2006) Journal of Management Information Systems , vol.22 , Issue.4 , pp. 109-142
    • Sun, L.L.1    Srivastava, R.P.2    Mock, T.J.3
  • 60
    • 0037697305 scopus 로고    scopus 로고
    • Cross: A multicriteria group-decision-making model for evaluating and prioritizing advanced-technology projects at NASA
    • M. Tavana Cross: a multicriteria group-decision-making model for evaluating and prioritizing advanced-technology projects at NASA Interfaces 33 3 2003 40 (Pubitemid 36881232)
    • (2003) Interfaces , vol.33 , Issue.3
    • Tavana, M.1
  • 62
    • 44949288762 scopus 로고
    • An overview of the analytic hierarchy process and its applications
    • L.G. Vargas An overview of the analytic hierarchy process and its applications European Journal of Operational Research 48 1990 2 8
    • (1990) European Journal of Operational Research , vol.48 , pp. 2-8
    • Vargas, L.G.1
  • 66
    • 1242263785 scopus 로고    scopus 로고
    • Holistic security requirement engineering for electronic commerce
    • A. Zuccato Holistic security requirement engineering for electronic commerce Computers & Security 23 1 2004 63
    • (2004) Computers & Security , vol.23 , Issue.1 , pp. 63
    • Zuccato, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.