On multi attribute decision making methods: Prioritizing information security controls

This study deals with the problem of prioritization of Information Security Controls where most organizations aim to address and manage them effectively. Current information security analysis methods lack a quantitative approach and mostly depend on subjective judgments of information security exper...

Full description

Bibliographic Details
Main Authors: AL-Safwani, Nedher, Hassan, Suhaidi, Katuk, Norliza
Format: Article
Language:English
Published: AENSI Publications 2014
Subjects:
Online Access:https://repo.uum.edu.my/id/eprint/14741/1/3a.pdf
_version_ 1803626847386206208
author AL-Safwani, Nedher
Hassan, Suhaidi
Katuk, Norliza
author_facet AL-Safwani, Nedher
Hassan, Suhaidi
Katuk, Norliza
author_sort AL-Safwani, Nedher
collection UUM
description This study deals with the problem of prioritization of Information Security Controls where most organizations aim to address and manage them effectively. Current information security analysis methods lack a quantitative approach and mostly depend on subjective judgments of information security experts.Although, expert opinions assist organizations in measuring the effectiveness of security controls, the subjective judgments may yield different results.Hence, a more objective approach that can be quantified is an alternative.This study implements multiple attribute decision-making concepts for prioritizing and selecting security controls using Hierarchical Adaptive Weighting (HAW) and Simple Adaptive Weighting (SAW).The results of these analysis methods are reported and compared.
first_indexed 2024-07-04T05:56:40Z
format Article
id uum-14741
institution Universiti Utara Malaysia
language English
last_indexed 2024-07-04T05:56:40Z
publishDate 2014
publisher AENSI Publications
record_format dspace
spelling uum-147412016-04-27T00:19:32Z https://repo.uum.edu.my/id/eprint/14741/ On multi attribute decision making methods: Prioritizing information security controls AL-Safwani, Nedher Hassan, Suhaidi Katuk, Norliza QA76 Computer software This study deals with the problem of prioritization of Information Security Controls where most organizations aim to address and manage them effectively. Current information security analysis methods lack a quantitative approach and mostly depend on subjective judgments of information security experts.Although, expert opinions assist organizations in measuring the effectiveness of security controls, the subjective judgments may yield different results.Hence, a more objective approach that can be quantified is an alternative.This study implements multiple attribute decision-making concepts for prioritizing and selecting security controls using Hierarchical Adaptive Weighting (HAW) and Simple Adaptive Weighting (SAW).The results of these analysis methods are reported and compared. AENSI Publications 2014 Article PeerReviewed application/pdf en https://repo.uum.edu.my/id/eprint/14741/1/3a.pdf AL-Safwani, Nedher and Hassan, Suhaidi and Katuk, Norliza (2014) On multi attribute decision making methods: Prioritizing information security controls. Journal of Applied Sciences Research, 14 (16). pp. 1865-1870. ISSN 1819-544X http://doi.org/10.3923/jas.2014.1865.1870 doi:10.3923/jas.2014.1865.1870 doi:10.3923/jas.2014.1865.1870
spellingShingle QA76 Computer software
AL-Safwani, Nedher
Hassan, Suhaidi
Katuk, Norliza
On multi attribute decision making methods: Prioritizing information security controls
title On multi attribute decision making methods: Prioritizing information security controls
title_full On multi attribute decision making methods: Prioritizing information security controls
title_fullStr On multi attribute decision making methods: Prioritizing information security controls
title_full_unstemmed On multi attribute decision making methods: Prioritizing information security controls
title_short On multi attribute decision making methods: Prioritizing information security controls
title_sort on multi attribute decision making methods prioritizing information security controls
topic QA76 Computer software
url https://repo.uum.edu.my/id/eprint/14741/1/3a.pdf
work_keys_str_mv AT alsafwaninedher onmultiattributedecisionmakingmethodsprioritizinginformationsecuritycontrols
AT hassansuhaidi onmultiattributedecisionmakingmethodsprioritizinginformationsecuritycontrols
AT katuknorliza onmultiattributedecisionmakingmethodsprioritizinginformationsecuritycontrols