Identifying and Ranking Technology-Telecommunications Context of Information Security anagement System in E-Government Using Fuzzy AHP Approach
الموضوعات :Sana Javid 1 , Nour Mohammad Yaghoubi 2
1 - Department of Management,
College of Management and accounting, Sistan & Baluchistan University, Sistan & Baluchistan, Iran
2 - Department of Management,
College of Management and accounting, Sistan & Baluchistan University, Sistan & Baluchistan, Iran
الکلمات المفتاحية: Fuzzy AHP, E-government, Information security management system, technical-telecommunications context,
ملخص المقالة :
In recent years, many security threats have entered into the organizations’ information and changed the organizational performance resulting in their exorbitant costs. This question is of particular importanceabout government agencies that use information and Internet systems. This issue enabled the top managers of organizations to implement a security system and minimize these costs. Using Information Security management system is considered as a tool to promote information security and information systems. According to research conducted, four contexts of legal, technical communication, organizational-managerial, and cultural and social have been detected in the effective establishment of information security management system in electronic government. The aim of the present study is to identify and rank the subcriteria of technical- communications for the effective establishment of information security management system in electronic government. For this purpose, by reviewing the literature, a list of important criteria wasdeveloped and the sub-criteria of technical-communications for the effective establishment of information security management system were identified and classified into six general areas by conducting interviews with experts and completing a questionnaire. Then a census and paired comparison questionnaire of experts were carried out and the criteria were weighted and ranked with the analysis of data through fuzzy AHP approach.
[1] Aljifri, H. A., Pons, A., and Collins, D. (2003), Global e-commerce: a
framework for understanding and overcoming the trust barrier. Information
Management & Computer Security, 11 (3), 130-138.
[2] Bakari, J. K., Tarimo, C. N., Yngstrom, L., and Magnisson, C. (2005),
State of ICT Security Management in the Institutions of Higher Learning
in Developing Countries: Tanzania Case Study. Computers & Security Proceedings of the Fifth IEEE International Conference on Advanced
Learning Technologies (ICALT 05).
[3] Doherty, N. and Fulford, h. (2003), The application of information security
policies in large UK-based organizations: an exploratory investigation.
Loughborough UNIVERSITY, The Business School, Loughborough
University, Loughborough, Leicestershire LE11 3TU, UK,-
[4] Ebrahim, Z. and Irani, Z. (2005), E-government adoption: architecture
and barriers. Business Process
[5] Gerber, M., von Solms, R., and Overbeek, P. (2001), “Formalizing information
security requirements”. Information Management and Computer
Security, 9 (1), pp. 32-37.
[6] Halliday, S., Badenhorst, K., von Solms, R. (1996), A business approach
to effective information technology risk analysis and management, Information
Management and Computer Security, vol. 4, no. 1, pp. 19-31.
[7] Knapp, K. J., Marshall, T. E., Rainer, R. K., and Ford, F. N. (2006), “Information
Security: Management’s Effect on Culture and Policy”, Information
Management Computer Security, (14:5), pp. 24-36.
[8] Layne K. and Jung w. l. (2001), “Developing fully functional: a four stage
model”. Government information quarterly. vol. 18, pp. 122-136.
[9] Luis Enrique, E. (2000), beyond security planning: towards a model of
security management coping with the security challenges of the humanitarian
work July 2000 Management Journal, 11 (5), 589-611.
[10] Saha, P. (2008), Government e-Service Delivery: Identification of Success
Factors from Citizens’ Perspective. Doctoral thesis Lulea University of
Technology Department of Business Administration and Social Sciences
Division of Industrial Marketing, e-Commerce and Logistics.
[11] Sanghyun, P. and Kyungho, L. (2014), Advanced Approach to Information
Security Management System Model for Industrial Control System. The
Scientific World Journal, Volume, 2014 (2014), Article ID 348305, 13
pages.
[12] UN. (2005), Information Economy Report 2005.
http://www.unctad.org/ecommerce/
[13] Zanjirchi, s. m. (2011), fuzzy hierarchical analysis process.-,Tehran, Publications
Sanei.