Combination of AHP and TOPSIS methods for the ranking of information security controls to overcome its obstructions under fuzzy environment
The organizations utilizing the cloud computing services are required to select suitable Information Security Controls (ISCs) to maintain data security and privacy. Many organizations bought popular products or traditional tools to select ISCs. However, selecting the wrong information security contr...
- Autores:
-
Tariq, Muhammad Imran
Tayyaba, Shahzadi
Ali Mian, Natash
Sarfraz, Muhammad Shahzad
De-la-Hoz-Franco, Emiro
Butt, Shariq Aziz
Santarcangelo, Vito
Rad, Dana V
- Tipo de recurso:
- Article of journal
- Fecha de publicación:
- 2020
- Institución:
- Corporación Universidad de la Costa
- Repositorio:
- REDICUC - Repositorio CUC
- Idioma:
- eng
- OAI Identifier:
- oai:repositorio.cuc.edu.co:11323/7314
- Acceso en línea:
- https://hdl.handle.net/11323/7314
http://doi.org/10.3233/JIFS-179692
https://repositorio.cuc.edu.co/
- Palabra clave:
- Information security
Analytical Hierarchy Process
TOPSIS
fuzzy logic
MCDM
MADM
- Rights
- openAccess
- License
- Attribution-NonCommercial-NoDerivatives 4.0 International