PROVIDE A MODEL FOR IDENTIFYING AND RANKING THE MANAGERIAL FACTORS AFFECTING INFORMATION SECURITY IN ORGANIZATION BY USING VIKOR METHOD; CASE STUDY: TEHRAN UNIVERSITY OF MEDICAL SCIENCES

作者: Shafeghati Somayyeh , Pileveri Nazanin

DOI:

关键词:

摘要: Nowadays, by the expansion of Information Technology in human life and dependence business upon it, data protection, as one most valuable critical assets organization, has become vital tool modern industry prerequisite for sustaining process. In order to face challenges take advantage new opportunities brought forth IT advances we suggest organizations shift focus from a technology-based information security managerial-based approach. Also, get familiar with importance priority key managerial factors affecting security, they will be able increase efficiency organization considering limited resources each criterion. this study, it been tried identify Tehran University Medical Sciences. was intended address more important efficiency. For group decision-making, Delphi method, modeling linguistic valuables uncertainty theories, fuzzy theory used extract major indices organization. Then, using VIKOR technique multi-criterion decision-making methods, obtained Fuzzy method were prioritized.

参考文章(15)
Herbert J. Mattord, Michael E. Whitman, Management Of Information Security ,(2004)
Rossouw von Solms, Information security management (3): the Code of Practice for Information Security Management (BS 7799) Information Management & Computer Security. ,vol. 6, pp. 224- 225 ,(1998) , 10.1108/09685229810240158
Basie von Solms, Rossouw von Solms, The 10 deadly sins of information security management Computers & Security. ,vol. 23, pp. 371- 376 ,(2004) , 10.1016/J.COSE.2004.05.002
Che-Wei Chang, Cheng-Ru Wu, Huang-Chu Chen, Using expert technology to select unstable slicing machine to control wafer slicing quality via fuzzy AHP Expert Systems With Applications. ,vol. 34, pp. 2210- 2220 ,(2008) , 10.1016/J.ESWA.2007.02.042
Jacqueline H. Hall, Shahram Sarkani, Thomas A. Mazzuchi, Impacts of organizational capabilities in information security Information Management & Computer Security. ,vol. 19, pp. 155- 176 ,(2011) , 10.1108/09685221111153546
Debi Ashenden, Information Security management: A human challenge? Information Security Technical Report. ,vol. 13, pp. 195- 201 ,(2008) , 10.1016/J.ISTR.2008.10.006
Serafim Opricovic, Gwo-Hshiung Tzeng, Extended VIKOR method in comparison with outranking methods European Journal of Operational Research. ,vol. 178, pp. 514- 529 ,(2007) , 10.1016/J.EJOR.2006.01.020
Rodrigo Werlinger, Kirstie Hawkey, Konstantin Beznosov, An integrated view of human, organizational, and technological challenges of IT security management Information Management & Computer Security. ,vol. 17, pp. 4- 19 ,(2009) , 10.1108/09685220910944722
Serafim Opricovic, Gwo-Hshiung Tzeng, Compromise solution by MCDM methods: A comparative analysis of VIKOR and TOPSIS European Journal of Operational Research. ,vol. 156, pp. 445- 455 ,(2004) , 10.1016/S0377-2217(03)00020-1
Basie von Solms, Information Security — The Third Wave? Computers & Security. ,vol. 19, pp. 615- 620 ,(2000) , 10.1016/S0167-4048(00)07021-8