The Application of AHP to Evaluate Information Security Policy Decision Making

Syamsuddin, Irfan (2009) The Application of AHP to Evaluate Information Security Policy Decision Making. International Journal of Simulation: Systems, Science and Technology, 10 (5).

[thumbnail of J011_ORIGINAL PAPER_IJSSST 2009_The_Application_of_AHP_to_Evaluate__Information_Security.pdf] Text
J011_ORIGINAL PAPER_IJSSST 2009_The_Application_of_AHP_to_Evaluate__Information_Security.pdf

Download (87kB)
[thumbnail of J011_REVIEW PROCESS_IJSSST 2009_The_Application_of_AHP_to_Evaluate__Information_Security.pdf] Text
J011_REVIEW PROCESS_IJSSST 2009_The_Application_of_AHP_to_Evaluate__Information_Security.pdf

Download (39kB)
[thumbnail of J011_SIMILARITY CHECK_IJSSST 2009_The_Application_of_AHP_to_Evaluate__Information_Security.pdf] Text
J011_SIMILARITY CHECK_IJSSST 2009_The_Application_of_AHP_to_Evaluate__Information_Security.pdf

Download (1MB)


This paper examines the application of AHP in evaluating information security policy decision making with respect to
Indonesian e-government systems. We suggest a new model based on four aspects of information security (management,
technology, economy and culture) and three information securitycomponents (confidentiality, integrity and availability). AHP
methodology was applied to analyze the decision making process.It is found that management and technology were the dominant
aspects of information security, while availability was the main concern of information security elements for e-government
information systems.

Item Type: Article
Subjects: Q Science > QA Mathematics > QA75 Electronic computers. Computer science
Divisions: Jurusan Teknik Elektro > D4 Teknik Komputer dan Jaringan
Depositing User: Unnamed user with username 197312202000031008
Date Deposited: 10 Apr 2023 14:23
Last Modified: 10 Apr 2023 14:23

Actions (login required)

View Item
View Item