메뉴 건너뛰기




Volumn , Issue , 2010, Pages

A new fuzzy MCDM framework to evaluate e-government security strategy

Author keywords

E government security; Fuzzy application.; Multi criteria decision making

Indexed keywords

COMPREHENSIVE ASSESSMENT; E-GOVERNMENT; E-GOVERNMENT APPLICATIONS; E-GOVERNMENT SERVICES; E-GOVERNMENT SYSTEMS; FUZZY APPLICATION; FUZZY MCDM; FUZZY MULTI-CRITERIA DECISION MAKINGS; INFORMATION SECURITY; MULTI CRITERIA DECISION MAKING; POLICY MAKERS;

EID: 78649587228     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICAICT.2010.5612065     Document Type: Conference Paper
Times cited : (22)

References (18)
  • 1
    • 74249119500 scopus 로고    scopus 로고
    • E-government security management: Key factors and countermeasure
    • 2009 Fifth International Conference on Information Assurance and Security
    • Jin-fu Wang, (2009) "E-government Security Management: Key Factors and Countermeasure," IAS, vol. 2, pp.483-486, 2009 Fifth International Conference on Information Assurance and Security
    • (2009) IAS , vol.2 , pp. 483-486
    • Jin-Fu, W.1
  • 2
    • 49249083359 scopus 로고    scopus 로고
    • Information security becomes a business priority
    • Filipek, R. (2007) "Information security becomes a business priority", Internal Auditor, vol. 64, no.1, pp.18
    • (2007) Internal Auditor , vol.64 , Issue.1 , pp. 18
    • Filipek, R.1
  • 4
    • 67349254655 scopus 로고    scopus 로고
    • National information security policy and its implementation: A case study in taiwan
    • C.Y. Ku, Y.W. Chang and D.C. Yen, (2009) "National information security policy and its implementation: A case study in Taiwan", Telecommunications Policy, vol. 33, no. 7, pp. 371-384.
    • (2009) Telecommunications Policy , vol.33 , Issue.7 , pp. 371-384
    • Ku, C.Y.1    Chang, Y.W.2    Yen, D.C.3
  • 7
    • 23044525969 scopus 로고    scopus 로고
    • Current directions in IS security research: Toward socio-organizational perspectives
    • Backhouse, J. and G. Dhillon (2001) "Current Directions in IS Security Research: Toward Socio-Organizational Perspectives", Information Systems Journal, 11 (2), pp. 127-153
    • (2001) Information Systems Journal , vol.11 , Issue.2 , pp. 127-153
    • Backhouse, J.1    Dhillon, G.2
  • 8
    • 33744830087 scopus 로고    scopus 로고
    • Value focused assessment of information system security in organizations
    • Dhillon, G. and Torkzadeh, G. (2006) "Value Focused Assessment of Information System Security in Organizations". Information Systems Journal. Vol 16. No 3.
    • (2006) Information Systems Journal , vol.16 , Issue.3
    • Dhillon, G.1    Torkzadeh, G.2
  • 11
    • 85019433170 scopus 로고    scopus 로고
    • A review of information security issues and respective research contributions
    • Siponen, M.T & Kukkonen, H.O. (2007) "A review of information security issues and respective research contributions". DATA BASE 38(1): 60-80
    • (2007) Data Base , vol.38 , Issue.1 , pp. 60-80
    • Siponen, M.T.1    Kukkonen, H.O.2
  • 13
    • 0034814690 scopus 로고    scopus 로고
    • Information security - A multidimensional discipline
    • 1 September 2001
    • Basie von Solms, (2001) "Information Security - A Multidimensional Discipline" Computers & Security, Volume 20, Issue 6, 1 September 2001, Pages 504-508
    • (2001) Computers & Security , vol.20 , Issue.6 , pp. 504-508
    • Solms, B.V.1
  • 16
    • 46549093655 scopus 로고
    • Fuzzy hierarchical analysis
    • Buckley, (1985). "Fuzzy hierarchical analysis". Fuzzy Sets and Systems. Vol. 17. pp. 233-247.
    • (1985) Fuzzy Sets and Systems , vol.17 , pp. 233-247
    • Buckley1
  • 18
    • 11144271515 scopus 로고    scopus 로고
    • Evaluating sustainable fishing development strategies using fuzzy MCDM approach
    • Chiou H. Tzeng G. and Cheng D. (2005), "Evaluating sustainable fishing development strategies using fuzzy MCDM approach". Omega, vol. 33, pp 223-234.
    • (2005) Omega , vol.33 , pp. 223-234
    • Chiou, H.1    Tzeng, G.2    Cheng, D.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.