2016
DOI: 10.1007/s10257-016-0306-y
|View full text |Cite
|
Sign up to set email alerts
|

Ranking information security controls by using fuzzy analytic hierarchy process

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
12
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 24 publications
(12 citation statements)
references
References 13 publications
0
12
0
Order By: Relevance
“…It spends the designated investment “ z ” to install new security devices, anti-virus software, intrusion detection system (IDS), firewalls, stringent access controls and upgrade existing ones. It also invests in the information security management system (ISMS) of the organization by employing security experts and framing relevant security policies (Khajouei et al , 2017). Based on the extant literature (Cavusoglu et al , 2008; Huang et al , 2008; Gao and Zhong, 2015; Gao et al , 2014; Gao et al , 2015; Gao and Zhong, 2016; Young et al , 2016; Li and Xu, 2020; Simon and Omar, 2020), we have considered different types of cybersecurity investments (such as an employee-level training, a new firewall or an advanced IDS infrastructure) under a single variable “ z ”.…”
Section: Model Definition and Assumptionsmentioning
confidence: 99%
“…It spends the designated investment “ z ” to install new security devices, anti-virus software, intrusion detection system (IDS), firewalls, stringent access controls and upgrade existing ones. It also invests in the information security management system (ISMS) of the organization by employing security experts and framing relevant security policies (Khajouei et al , 2017). Based on the extant literature (Cavusoglu et al , 2008; Huang et al , 2008; Gao and Zhong, 2015; Gao et al , 2014; Gao et al , 2015; Gao and Zhong, 2016; Young et al , 2016; Li and Xu, 2020; Simon and Omar, 2020), we have considered different types of cybersecurity investments (such as an employee-level training, a new firewall or an advanced IDS infrastructure) under a single variable “ z ”.…”
Section: Model Definition and Assumptionsmentioning
confidence: 99%
“…In a different, but more recent research study, [35] used fuzzy AHP to prioritize and select effective managerial domains and control objectives in information security controls. This research focused on the process of implementing ISO 27001 information security areas in the National Iranian Oil Products Distribution Company.…”
Section: Solution Approachmentioning
confidence: 99%
“…Also, the diversity of data which is generated in the e-commerce business makes it more challenging to decipher results and provide decision making support dynamically. Thus, the need for strategic adoption of right tools of BDA is important (Khajouei et al, 2017).…”
mentioning
confidence: 99%
“…Earlier studies have also debated that the adoption of technologies is dependent largely on culture of the organization and fundamentally governed by the geography of operations of the firm (Khajouei et al, 2017). BDA is one of such technology which involves huge capital and the rate of success depends largely on stakeholders and organizational culture.…”
mentioning
confidence: 99%