7'th International Symposium on Telecommunications (IST'2014) 2014
DOI: 10.1109/istel.2014.7000827
|View full text |Cite
|
Sign up to set email alerts
|

FAHP-TOPSIS risks ranking models in ISMS

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
7
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(7 citation statements)
references
References 14 publications
0
7
0
Order By: Relevance
“…There were found certain relevant articles in the area of information security risk management and usage of some multi criteria decision analysis technique such as TOPSIS or PROMETHEE, but they were always in joint mixture models with the AHP technique [35], [36]. On the other hand, VECTOR matrix method was selected due to its simplicity and proven speed for the ranking of critical assets or security risks [12], [36].…”
Section: Vector Matrix Methodsmentioning
confidence: 99%
“…There were found certain relevant articles in the area of information security risk management and usage of some multi criteria decision analysis technique such as TOPSIS or PROMETHEE, but they were always in joint mixture models with the AHP technique [35], [36]. On the other hand, VECTOR matrix method was selected due to its simplicity and proven speed for the ranking of critical assets or security risks [12], [36].…”
Section: Vector Matrix Methodsmentioning
confidence: 99%
“…Risk is the combination of likelihood and severity and can occur at different levels, thus has different effects and requires specific mitigation measures at any level [30]. In fact, all organizations are exposed to its underpinning security threats (e.g., malware, ransomware, phishing, denial of service, etc.…”
Section: Information Security Elements In Service Sciencementioning
confidence: 99%
“…Risks have different dimensions and effects with the ability to occur at different levels and require their own specific preventative measures at any level [1]. Today, there is no organization that is not facing with certain security threats (e.g.…”
Section: Introductionmentioning
confidence: 99%