A VIKOR technique based on DEMATEL and ANP for information security risk control assessment

被引:171
|
作者
Yang, Yu-Ping Ou [1 ]
Shieh, How-Ming [1 ,2 ]
Tzeng, Gwo-Hshiung [3 ,4 ]
机构
[1] Natl Cent Univ, Dept Business Adm, Chung Li City 320, Taiwan
[2] Natl Cent Univ, Dept Informat Management, Chung Li City 320, Taiwan
[3] Kainan Univ, Dept Informat Management, Tao Yuan 338, Taiwan
[4] Natl Chiao Tung Univ, Inst Management Technol, Hsinchu 300, Taiwan
关键词
VIKOR; Analytic network process (ANP); DEMATEL; Multiple criteria decision making (MCDM); Information security; Risk control assessment; ANALYTIC NETWORK PROCESS; SELECTION;
D O I
10.1016/j.ins.2011.09.012
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As companies and organizations have grown to rely on their computer systems and networks, the issue of information security management has become more significant. To maintain their competitiveness, enterprises should safeguard their information and try to eliminate the risk of information being compromised or reduce this risk to an acceptable level. This paper proposes an information security risk-control assessment model that could improve information security for these companies and organizations. We propose an MCDM model combining VIKOR, DEMATEL, and ANP to solve the problem of conflicting criteria that show dependence and feedback. In addition, an empirical application of evaluating the risk controls is used to illustrate the proposed method. The results show that our proposed method can be effective in helping IT managers validate the effectiveness of their risk controls. (C) 2011 Elsevier Inc. All rights reserved.
引用
收藏
页码:482 / 500
页数:19
相关论文
共 50 条
  • [21] A Software Defined Network information security risk assessment based on Pythagorean fuzzy sets
    Deb, Raktim
    Roy, Sudipta
    EXPERT SYSTEMS WITH APPLICATIONS, 2021, 183
  • [22] Automation of Information Security Risk Assessment
    Akhmetov, Berik
    Lakhno, Valerii
    Chubaievskyi, Vitalyi
    Kaminskyi, Serhii
    Adilzhanova, Saltanat
    Ydyryshbayeva, Moldir
    INTERNATIONAL JOURNAL OF ELECTRONICS AND TELECOMMUNICATIONS, 2022, 68 (03) : 549 - +
  • [23] A Method of Risk Assessment of Information Security Based on Artificial Neural Network
    Zhao, D. M.
    Liu, J. X.
    Zu, J. X.
    ITESS: 2008 PROCEEDINGS OF INFORMATION TECHNOLOGY AND ENVIRONMENTAL SYSTEM SCIENCES, PT 1, 2008, : 246 - 252
  • [24] Gray Relational Analysis based Method for Information Security Risk Assessment
    Zhou, Li
    Zhou, Yanhui
    PROCEEDINGS OF 2012 7TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE & EDUCATION, VOLS I-VI, 2012, : 1086 - 1089
  • [25] Study on risk assessment of information security based on cloud computing model
    Wu, Guo-Hua
    Liu, Yu-Cheng
    Qi, Kai-Kai
    Wang, Peng
    Xu, Jian-Da
    Proceedings of the 2016 International Conference on Engineering and Advanced Technology, 2016, 82 : 91 - 95
  • [26] A Method for Information Security Risk Assessment Based on the Dynamic Bayesian Network
    Wang, Jiao
    Fan, Kefeng
    Mo, Wei
    Xu, Dongyang
    PROCEEDINGS 2016 INTERNATIONAL CONFERENCE ON NETWORKING AND NETWORK APPLICATIONS NANA 2016, 2016, : 279 - 283
  • [27] Information Security Risk Assessment Based on Artificial Immune Danger Theory
    Zhuang, Yi
    Li, Xiaorong
    Xu, Bin
    Zhou, Bo
    2009 FOURTH INTERNATIONAL MULTI-CONFERENCE ON COMPUTING IN THE GLOBAL INFORMATION TECHNOLOGY (ICCGI 2009), 2009, : 169 - 174
  • [28] The model of information security risk assessment based on advanced evidence theory
    Qing H.
    Qingsheng X.
    Shaobo L.
    International Journal of System Assurance Engineering and Management, 2017, 8 (Suppl 3) : 2030 - 2035
  • [29] Information security climate and the assessment of information security risk among healthcare employees
    Kessler, Stacey R.
    Pindek, Shani
    Kleinman, Gary
    Andel, Stephanie A.
    Spector, Paul E.
    HEALTH INFORMATICS JOURNAL, 2020, 26 (01) : 461 - 473
  • [30] A Fuzzy Logic-based Information Security Control Assessment for Organizations
    Otero, Angel R.
    Tejay, Gurvirender
    Otero, Luis Daniel
    Ruiz-Torres, Alex J.
    2012 IEEE CONFERENCE ON OPEN SYSTEMS (ICOS 2012), 2012, : 190 - 195