Combination of AHP and TOPSIS methods for the ranking of information security controls to overcome its obstructions under fuzzy environment

The organizations utilizing the cloud computing services are required to select suitable Information Security Controls (ISCs) to maintain data security and privacy. Many organizations bought popular products or traditional tools to select ISCs. However, selecting the wrong information security contr...

Full description

Autores:
Tariq, Muhammad Imran
Tayyaba, Shahzadi
Ali Mian, Natash
Sarfraz, Muhammad Shahzad
De-la-Hoz-Franco, Emiro
Butt, Shariq Aziz
Santarcangelo, Vito
Rad, Dana V
Tipo de recurso:
Article of journal
Fecha de publicación:
2020
Institución:
Corporación Universidad de la Costa
Repositorio:
REDICUC - Repositorio CUC
Idioma:
eng
OAI Identifier:
oai:repositorio.cuc.edu.co:11323/7314
Acceso en línea:
https://hdl.handle.net/11323/7314
http://doi.org/10.3233/JIFS-179692
https://repositorio.cuc.edu.co/
Palabra clave:
Information security
Analytical Hierarchy Process
TOPSIS
fuzzy logic
MCDM
MADM
Rights
openAccess
License
Attribution-NonCommercial-NoDerivatives 4.0 International