مقاله انگلیسی رایگان در مورد یکپارچه سازی AHP-تاپسیس با مجموعه های فازی فیثاغورثی برای تحلیل ریسک اطلاعات – اسپرینگر 2019

 

مشخصات مقاله
ترجمه عنوان مقاله یکپارچه سازی وسیع AHP-تاپسیس با مجموعه های فازی فیثاغورثی برای تجزیه و تحلیل ریسک امنیتی اطلاعات
عنوان انگلیسی مقاله AHP–TOPSIS integration extended with Pythagorean fuzzy sets for information security risk analysis
انتشار مقاله سال 2019
تعداد صفحات مقاله انگلیسی 14 صفحه
هزینه دانلود مقاله انگلیسی رایگان میباشد.
پایگاه داده نشریه اسپرینگر
نوع نگارش مقاله
مقاله پژوهشی (Research Article)
مقاله بیس این مقاله بیس نمیباشد
نمایه (index)  Master journals
نوع مقاله ISI
فرمت مقاله انگلیسی  PDF
شناسه ISSN 2199-4536
مدل مفهومی ندارد
پرسشنامه ندارد
متغیر ندارد
رفرنس دارد
رشته های مرتبط مدیریت و ریاضی
گرایش های مرتبط ریاضی کاربردی، تحقیق در عملیات، مدیریت صنعتی و مدیریت عملکرد، مدیریت منابع اطلاعاتی، مدیریت استراتژیک
نوع ارائه مقاله
ژورنال
مجله  سیستم های پیچیده و هوشمند – Complex & Intelligent Systems
دانشگاه Department of Industrial Engineering, Antalya Bilim University, Antalya, Turkey
کلمات کلیدی تحليل ريسك، امنيت اطلاعات، تصميم گيري چند شاخصه، مجموعه هاي فازي فیثاغورثی، AHP،  تاپسیس، Corrugated cardboard sector
کلمات کلیدی انگلیسی Risk analysis، Information security، Multi attribute decision-making، Pythagorean fuzzy sets، AHP، TOPSIS، Corrugated cardboard sector
شناسه دیجیتال – doi
https://doi.org/10.1007/s40747-018-0087-7
کد محصول E12717
وضعیت ترجمه مقاله  ترجمه آماده این مقاله موجود نمیباشد. میتوانید از طریق دکمه پایین سفارش دهید.
دانلود رایگان مقاله دانلود رایگان مقاله انگلیسی
سفارش ترجمه این مقاله سفارش ترجمه این مقاله

 

فهرست مطالب مقاله:
Abstract

Introduction

Literature review

Methodology

Case study: information security RA for corrugated cardboard sector

Conclusion

References

Abstract

 

بخشی از متن مقاله:

Abstract

Risk analysis (RA) contains several methodologies that object to ensure the protection and safety of occupational stakeholders. Multi attribute decision-making (MADM) is one of the most important RA methodologies that is applied to several areas from manufacturing to information technology.With the widespread use of computer networks and the Internet, information security has become very important. Information security is vital as institutions are mostly dependent on information, technology, and systems. This requires a comprehensive and effective implementation of information security RA. Analytic hierarchy process (AHP) and technique for order preference by similarity to ideal solution (TOPSIS) are commonly used MADM methods and recently used for RA. In this study, a new RA methodology is proposed based on AHP–TOPSIS integration extended with Pythagorean fuzzy sets. AHP strengthened by interval-valued Pythagorean fuzzy numbers is used to weigh risk parameters with expert judgment. Then, TOPSIS with Pythagorean fuzzy numbers is used to prioritize previously identified risks. A comparison of the proposed approach with three approaches (classical RA method, Pythagorean fuzzy VIKOR and Pythagorean fuzzy MOORA) is also provided. To illustrate the feasibility and practicality of the proposed approach, a case study for information security RA in corrugated cardboard sector is executed.

Introduction

Information is a tool that people use to communicate among themselves from the moment they start living together. The nature and type of information technology have changed dramatically over the past decade. Simple and single batch applications are transformed into distributed computing environments including multitasking real-time control, and distributed processing. It is at least as important as the information itself to determine that information is valuable or worthless, or to measure the value carried by it. The most general definition of information security is that our own information is not passed on to anyone else. It is a combination of three main elements called “privacy”, “integrity”, and “accessibility”. Information is protected from unauthorized access which is called privacy. Integrity defined as information that is not altered by unauthorized persons. Information is available when authorized people are needed. Information is reachable and available when authorized people are needed which is called accessibility. If any of these three basic security elements are damaged, a security weakness occurs. Information security RA is essential for any corporate organizational system. It is essential to ensure that controls and expenditures are in full compliance with the risks that the organization is experiencing or experienced before. Organizations’ heavy dependence on information systems necessitates managing risks related to them [1]. One of the most important aspects of information security is technical measures. Given better access control policy models, better tools for system assessment and assurance should be resolved, including better ways to detect cryptographic formal evidence, protocols, approved firewalls, intrusions and malicious codes [2].

دیدگاهتان را بنویسید

نشانی ایمیل شما منتشر نخواهد شد. بخش‌های موردنیاز علامت‌گذاری شده‌اند *

دکمه بازگشت به بالا