On multi attribute decision making methods: Prioritizing information security controls
This study deals with the problem of prioritization of Information Security Controls where most organizations aim to address and manage them effectively. Current information security analysis methods lack a quantitative approach and mostly depend on subjective judgments of information security exper...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
AENSI Publications
2014
|
Subjects: | |
Online Access: | https://repo.uum.edu.my/id/eprint/14741/1/3a.pdf |
_version_ | 1803626847386206208 |
---|---|
author | AL-Safwani, Nedher Hassan, Suhaidi Katuk, Norliza |
author_facet | AL-Safwani, Nedher Hassan, Suhaidi Katuk, Norliza |
author_sort | AL-Safwani, Nedher |
collection | UUM |
description | This study deals with the problem of prioritization of Information Security Controls where most organizations aim to address and manage them effectively. Current information security analysis methods lack a quantitative approach and mostly depend on subjective judgments of information security experts.Although, expert opinions assist organizations in measuring the effectiveness of security controls, the subjective judgments may yield different results.Hence, a more objective approach that can be quantified is an alternative.This study implements multiple attribute decision-making concepts for prioritizing and selecting security controls using Hierarchical Adaptive Weighting (HAW) and Simple Adaptive Weighting (SAW).The results of these analysis methods are reported and compared. |
first_indexed | 2024-07-04T05:56:40Z |
format | Article |
id | uum-14741 |
institution | Universiti Utara Malaysia |
language | English |
last_indexed | 2024-07-04T05:56:40Z |
publishDate | 2014 |
publisher | AENSI Publications |
record_format | dspace |
spelling | uum-147412016-04-27T00:19:32Z https://repo.uum.edu.my/id/eprint/14741/ On multi attribute decision making methods: Prioritizing information security controls AL-Safwani, Nedher Hassan, Suhaidi Katuk, Norliza QA76 Computer software This study deals with the problem of prioritization of Information Security Controls where most organizations aim to address and manage them effectively. Current information security analysis methods lack a quantitative approach and mostly depend on subjective judgments of information security experts.Although, expert opinions assist organizations in measuring the effectiveness of security controls, the subjective judgments may yield different results.Hence, a more objective approach that can be quantified is an alternative.This study implements multiple attribute decision-making concepts for prioritizing and selecting security controls using Hierarchical Adaptive Weighting (HAW) and Simple Adaptive Weighting (SAW).The results of these analysis methods are reported and compared. AENSI Publications 2014 Article PeerReviewed application/pdf en https://repo.uum.edu.my/id/eprint/14741/1/3a.pdf AL-Safwani, Nedher and Hassan, Suhaidi and Katuk, Norliza (2014) On multi attribute decision making methods: Prioritizing information security controls. Journal of Applied Sciences Research, 14 (16). pp. 1865-1870. ISSN 1819-544X http://doi.org/10.3923/jas.2014.1865.1870 doi:10.3923/jas.2014.1865.1870 doi:10.3923/jas.2014.1865.1870 |
spellingShingle | QA76 Computer software AL-Safwani, Nedher Hassan, Suhaidi Katuk, Norliza On multi attribute decision making methods: Prioritizing information security controls |
title | On multi attribute decision making methods: Prioritizing information security controls |
title_full | On multi attribute decision making methods: Prioritizing information security controls |
title_fullStr | On multi attribute decision making methods: Prioritizing information security controls |
title_full_unstemmed | On multi attribute decision making methods: Prioritizing information security controls |
title_short | On multi attribute decision making methods: Prioritizing information security controls |
title_sort | on multi attribute decision making methods prioritizing information security controls |
topic | QA76 Computer software |
url | https://repo.uum.edu.my/id/eprint/14741/1/3a.pdf |
work_keys_str_mv | AT alsafwaninedher onmultiattributedecisionmakingmethodsprioritizinginformationsecuritycontrols AT hassansuhaidi onmultiattributedecisionmakingmethodsprioritizinginformationsecuritycontrols AT katuknorliza onmultiattributedecisionmakingmethodsprioritizinginformationsecuritycontrols |