메뉴 건너뛰기




Volumn 5, Issue 10, 2010, Pages 1162-1169

The use of AHP in security policy decision making: An open office calc application

Author keywords

Analytic hierarchy process; Decision making; Information security policy; Open source

Indexed keywords

DATA ANALYSIS; DECISION MAKERS; DECISION-MAKING MECHANISMS; DECISION-MAKING PROBLEM; FUTURE STRATEGY; INFORMATION SECURITY; INFORMATION SECURITY POLICIES; OPEN SOURCE SOFTWARE; OPEN SOURCES; PROPRIETARY SOFTWARE; SECURITY POLICY;

EID: 78651563645     PISSN: 1796217X     EISSN: None     Source Type: Journal    
DOI: 10.4304/jsw.5.10.1162-1169     Document Type: Article
Times cited : (22)

References (35)
  • 3
    • 78651583898 scopus 로고    scopus 로고
    • Open Office, accessed 2 December
    • Open Office, available at http://www.openoffice.org (accessed 2 December 2009).
    • (2009)
  • 4
    • 0002425683 scopus 로고
    • The analytic hierarchy process-a survey of the method and its applications
    • F. Zahedi, "The analytic hierarchy process-a survey of the method and its applications", Interfaces, vol.16, no. 4, pp. 96-108, 1986.
    • (1986) Interfaces , vol.16 , Issue.4 , pp. 96-108
    • Zahedi, F.1
  • 5
    • 0026155802 scopus 로고
    • On the Buzzword 'Security Policy
    • Research in Security and Privacy, IEEE Computer Society Press, Los Alamitos, California
    • D.F. Sterne, "On the Buzzword 'Security Policy,'" Proc. IEEE Computer Society Symp. Research in Security and Privacy, IEEE Computer Society Press, Los Alamitos, California, pp. 219-230, 1991.
    • (1991) Proc. IEEE Computer Society Symp , pp. 219-230
    • Sterne, D.F.1
  • 6
    • 0342571877 scopus 로고
    • A Formal Framework to Support Multiple Security Policies
    • Ottawa, Communication Security Establishment Press
    • W.E. Kuhnhauser and M.K. Ostrowski, "A Formal Framework to Support Multiple Security Policies," Proc. 7th Canadian Computer Security Symposium. Ottawa, Communication Security Establishment Press, pp. 1-19. 1995.
    • (1995) Proc. 7th Canadian Computer Security Symposium , pp. 1-19
    • Kuhnhauser, W.E.1    Ostrowski, M.K.2
  • 8
    • 49249083359 scopus 로고    scopus 로고
    • Information security becomes a business priority
    • R. Filipek, "Information security becomes a business priority", Internal Auditor, vol. 64, no.1, pp.18, 2007.
    • (2007) Internal Auditor , vol.64 , Issue.1 , pp. 18
    • Filipek, R.1
  • 10
    • 0036999868 scopus 로고    scopus 로고
    • Computer attack trends challenge Internet security
    • A. Householder, K. Houle, and C. Dougherty, "Computer attack trends challenge Internet security", Computer IEEE, vol. 35, no. 4, pp. 5-7, 2002.
    • (2002) Computer IEEE , vol.35 , Issue.4 , pp. 5-7
    • Householder, A.1    Houle, K.2    Dougherty, C.3
  • 13
    • 30344453851 scopus 로고    scopus 로고
    • How much security is enough to stop a thief? The economics of outsider theft via computer systems networks
    • Guadeloupe
    • S.E. Schecter and D.S. Michael, "How much security is enough to stop a thief? The economics of outsider theft via computer systems networks", Proceedings of theFinancial Cryptography Conference, Guadeloupe. pp. 122-137, 2003.
    • (2003) Proceedings of TheFinancial Cryptography Conference , pp. 122-137
    • Schecter, S.E.1    Michael, D.S.2
  • 15
    • 0242517401 scopus 로고    scopus 로고
    • Information security awareness: Educating your users effectively
    • M.E. Thomson and R. von Solms, "Information security awareness: educating your users effectively", Information Management and Computer Security, vol. 6, no. 4, pp. 167-173, 1998.
    • (1998) Information Management and Computer Security , vol.6 , Issue.4 , pp. 167-173
    • Thomson, M.E.1    von Solms, R.2
  • 18
    • 34547568567 scopus 로고    scopus 로고
    • Prioritization of e-Government strategies using a SWOT-AHP analysis: The case of Turkey
    • Kahraman, Cengiz, Demirel, N. Cetin, Demirel and Tufan, "Prioritization of e-Government strategies using a SWOT-AHP analysis: the case of Turkey", European Journal of Information Systems, vol. 16, no. 3, pp. 284-298, 2007.
    • (2007) European Journal of Information Systems , vol.16 , Issue.3 , pp. 284-298
    • Kahraman, C.1    Demirel, N.C.2    Demirel3    Tufan4
  • 19
    • 36148947128 scopus 로고    scopus 로고
    • Using AHP and TOPSIS approaches in customer-driven product design process
    • M.C. Lin, C.C. Wang, M.S. Chen and C.A. Chang, Using AHP and TOPSIS approaches in customer-driven product design process, Computers in Industry, vol. 59, no. 1, pp. 17-31, 2008.
    • (2008) Computers In Industry , vol.59 , Issue.1 , pp. 17-31
    • Lin, M.C.1    Wang, C.C.2    Chen, M.S.3    Chang, C.A.4
  • 20
  • 21
    • 72049105575 scopus 로고    scopus 로고
    • Applying AHP to select drugs to be produced by anticipation in a chemotherapy compounding unit
    • L.A. Vidal, E. Sahin, N. Martelli, M. Berhoune and B. Bonan, "Applying AHP to select drugs to be produced by anticipation in a chemotherapy compounding unit", Expert Systems with Applications, vol. 37, no. 2, pp. 1528-1534, 2010.
    • (2010) Expert Systems With Applications , vol.37 , Issue.2 , pp. 1528-1534
    • Vidal, L.A.1    Sahin, E.2    Martelli, N.3    Berhoune, M.4    Bonan, B.5
  • 22
    • 59949093013 scopus 로고    scopus 로고
    • Measuring performance of virtual learning environment system in higher education
    • W. Ho, H.E. Higson, P.K. Dey, X. Xu and R. Bahsoon, "Measuring performance of virtual learning environment system in higher education", Quality Assurance in Education, vol.17, no. 1, pp. 6-29, 2009.
    • (2009) Quality Assurance In Education , vol.17 , Issue.1 , pp. 6-29
    • Ho, W.1    Higson, H.E.2    Dey, P.K.3    Xu, X.4    Bahsoon, R.5
  • 23
    • 25144483067 scopus 로고    scopus 로고
    • Analytic hierarchy process: An overview of applications
    • O.S. Vaidya and S. Kumar, "Analytic hierarchy process: An overview of applications", European Journal of Operational Research, vol. 169, no. 1, pp. 1-29, 2006.
    • (2006) European Journal of Operational Research , vol.169 , Issue.1 , pp. 1-29
    • Vaidya, O.S.1    Kumar, S.2
  • 24
    • 0042363355 scopus 로고    scopus 로고
    • The application of information security policies in large UK-based organizations: An exploratory investigation
    • H. Fulford and N.F. Doherty, "The application of information security policies in large UK-based organizations: an exploratory investigation", Information Management & Computer Security, vol. 11, no. 3, pp. 106-114, 2003.
    • (2003) Information Management & Computer Security , vol.11 , Issue.3 , pp. 106-114
    • Fulford, H.1    Doherty, N.F.2
  • 25
    • 67349254655 scopus 로고    scopus 로고
    • National information security policy and its implementation: A case study in Taiwan
    • C.Y. Ku, Y.W. Chang and D.C. Yen, "National information security policy and its implementation: A case study in Taiwan", Telecommunications Policy, vol. 33, no. 7, pp. 371-384, 2009.
    • (2009) Telecommunications Policy , vol.33 , Issue.7 , pp. 371-384
    • Ku, C.Y.1    Chang, Y.W.2    Yen, D.C.3
  • 26
    • 15844405077 scopus 로고    scopus 로고
    • Information security threats and practices in small businesses
    • K. Shannon, P. Anne, H. Ben, P. Chad and C. Matt, "Information security threats and practices in small businesses", Information Systems Management, vol. 22, no 2 pp. 7-19, 2005.
    • (2005) Information Systems Management , vol.22 , Issue.2 , pp. 7-19
    • Shannon, K.1    Anne, P.2    Ben, H.3    Chad, P.4    Matt, C.5
  • 28
    • 34547121214 scopus 로고    scopus 로고
    • Applying ISO 17799:2005 in information security management
    • M.C. Lee and T. Chang, "Applying ISO 17799:2005 in information security management", International Journal of Services and Standards, vol. 3, no. 3, pp.352-373, 2007.
    • (2007) International Journal of Services and Standards , vol.3 , Issue.3 , pp. 352-373
    • Lee, M.C.1    Chang, T.2
  • 29
    • 67349144062 scopus 로고    scopus 로고
    • Encouraging information security behaviors in organizations: Role of penalties, pressures and perceived effectiveness
    • T. Herath and H.R. Rao, "Encouraging information security behaviors in organizations: Role of penalties, pressures and perceived effectiveness", Decision Support Systems, vol. 47, no. 2, pp. 154-165, 2009.
    • (2009) Decision Support Systems , vol.47 , Issue.2 , pp. 154-165
    • Herath, T.1    Rao, H.R.2
  • 30
    • 67649548424 scopus 로고    scopus 로고
    • Choice and Chance: A Conceptual Model of Paths to Information Security Compromise
    • S. Ransbotham and S. Mitra, "Choice and Chance: A Conceptual Model of Paths to Information Security Compromise", Information Systems Research, vol. 20, no. 1, pp. 121-139, 2009.
    • (2009) Information Systems Research , vol.20 , Issue.1 , pp. 121-139
    • Ransbotham, S.1    Mitra, S.2
  • 31
    • 67651034131 scopus 로고    scopus 로고
    • Security Policy Management for Systems Employing Role Based Access Control Model
    • C. Huang, J. Sun, X. Wang and Y.J. Si, "Security Policy Management for Systems Employing Role Based Access Control Model", Information Technology Journal, vol. 8, no. 5, pp. 726-734, 2009.
    • (2009) Information Technology Journal , vol.8 , Issue.5 , pp. 726-734
    • Huang, C.1    Sun, J.2    Wang, X.3    Si, Y.J.4
  • 32
    • 78651572109 scopus 로고    scopus 로고
    • Network Virus Propagation Model Based on Effects of Removing Time and User Vigilance
    • C. Jin, J. Liu, and Q. Deng, "Network Virus Propagation Model Based on Effects of Removing Time and User Vigilance", International Journal of Network Security, vol. 9, no. 2, pp. 156-163, 2009.
    • (2009) International Journal of Network Security , vol.9 , Issue.2 , pp. 156-163
    • Jin, C.1    Liu, J.2    Deng, Q.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.