As the structure of modern organizations shifts, so correspondingly must the methodologies which underlie the evaluation and development of the security posture of their information systems. We have witnessed an ever-growing gap between organizational policy and technology. We have also witnessed an ever increasing complexity of decisions regarding the planning and design of IS security. Within this paper, we propose a decision support framework consistent with security and decision theory and develop a model of the decision analysis space suitable for multiple criteria decision making (MCDM). The adoption of MCDM techniques within the context of this model can show inherent trade-offs between alternatives in a security decision, encapsulat...
Decision support systems (DSS) is the part of the information systems (IS) discipline that is focuse...
This chapter presents a decision support system (DSS) for effectively solving the information system...
Types and complexity of information security related vulnerabilities are growing rapidly and present...
As the structure of modern organizations shifts, so correspondingly must the methodologies which und...
With the increasing exposure and vulnerability to cyber attacks, it becomes necessary to develop met...
The traditional notion of information security, rooted in a solidly technical foundation, has within...
The traditional notion of information security, rooted in a solidly technical foundation, has within...
The complex issue of IS security involves organizational factors. Decision making, an important area...
Security is the most serious concern in the digital environment. To provide a sound and firm securit...
Security decision-making is a critical task in tackling security threats affecting a system or proce...
Information security seriously concerns Corporate America but the soaring cost on protecting informa...
Abstract:- As threats for information systems (IS) from information environments (i.e. Internet) bec...
This paper proposes a framework of a decision support system (DSS) for the assessment process of sel...
With the increase in the number and diversity of attacks, a main concern for organizations is to kee...
This paper focuses on data management aspects of computerized decision support systems which use int...
Decision support systems (DSS) is the part of the information systems (IS) discipline that is focuse...
This chapter presents a decision support system (DSS) for effectively solving the information system...
Types and complexity of information security related vulnerabilities are growing rapidly and present...
As the structure of modern organizations shifts, so correspondingly must the methodologies which und...
With the increasing exposure and vulnerability to cyber attacks, it becomes necessary to develop met...
The traditional notion of information security, rooted in a solidly technical foundation, has within...
The traditional notion of information security, rooted in a solidly technical foundation, has within...
The complex issue of IS security involves organizational factors. Decision making, an important area...
Security is the most serious concern in the digital environment. To provide a sound and firm securit...
Security decision-making is a critical task in tackling security threats affecting a system or proce...
Information security seriously concerns Corporate America but the soaring cost on protecting informa...
Abstract:- As threats for information systems (IS) from information environments (i.e. Internet) bec...
This paper proposes a framework of a decision support system (DSS) for the assessment process of sel...
With the increase in the number and diversity of attacks, a main concern for organizations is to kee...
This paper focuses on data management aspects of computerized decision support systems which use int...
Decision support systems (DSS) is the part of the information systems (IS) discipline that is focuse...
This chapter presents a decision support system (DSS) for effectively solving the information system...
Types and complexity of information security related vulnerabilities are growing rapidly and present...