Application of fuzzy set theory to evaluate the rate of aggregative risk in information security
Organizations use different types of information system to reach their goals. Decision makers are required to allocate a security budget and treatment strategy based on the risk priority of information systems. Each of the information systems has different components or assets. However, there is dif...
Main Authors: | Tamjidyamcholo, Alireza, Yamchello, Hamed Tamjid, Baba, Mohd Sapiyan, Gholipour, Rahmatollah |
---|---|
Format: | Conference or Workshop Item |
Language: | English |
Published: |
IEEE
2013
|
Online Access: | http://psasir.upm.edu.my/id/eprint/44940/1/Application%20of%20fuzzy%20set%20theory%20to%20evaluate%20the%20rate%20of%20aggregative%20risk%20in%20information%20security.pdf |
Similar Items
-
Information security professional perceptions of knowledge-sharing intention in virtual communities under social cognitive theory
by: Tamjidyamcholo, Alireza, et al.
Published: (2013) -
Prioritizing lean manufacturing practices in small to medium enterprises by applying TOPSIS in fuzzy environment
by: Yamchello, Hamed Tamjid, et al.
Published: (2014) -
A review of the critical success factors in the adoption of lean production system by small and medium sized enterprises
by: Yamchello, Hamed Tamjid, et al.
Published: (2014) -
Information Security Risk Assessment in Industry Information System Based on Fuzzy Set Theory and Artificial Neural Network
by: Amanuel Estifanos Asfha, et al.
Published: (2024-03-01) -
Aggregation of infinite chains of intuitionistic fuzzy sets and their application to choices with temporal intuitionistic fuzzy information
by: Alcantud, José Carlos R., et al.
Published: (2020)