Application of fuzzy set theory to evaluate the rate of aggregative risk in information security
Organizations use different types of information system to reach their goals. Decision makers are required to allocate a security budget and treatment strategy based on the risk priority of information systems. Each of the information systems has different components or assets. However, there is dif...
Saved in:
Main Authors: | Tamjidyamcholo, Alireza, Yamchello, Hamed Tamjid, Baba, Mohd Sapiyan, Gholipour, Rahmatollah |
---|---|
Format: | Conference or Workshop Item |
Language: | English |
Published: |
IEEE
2013
|
Online Access: | http://psasir.upm.edu.my/id/eprint/44940/1/Application%20of%20fuzzy%20set%20theory%20to%20evaluate%20the%20rate%20of%20aggregative%20risk%20in%20information%20security.pdf http://psasir.upm.edu.my/id/eprint/44940/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Information security professional perceptions of knowledge-sharing intention in virtual communities under social cognitive theory
by: Tamjidyamcholo, Alireza, et al.
Published: (2013) -
Prioritizing lean manufacturing practices in small to medium enterprises by applying TOPSIS in fuzzy environment
by: Yamchello, Hamed Tamjid, et al.
Published: (2014) -
A review of the critical success factors in the adoption of lean production system by small and medium sized enterprises
by: Yamchello, Hamed Tamjid, et al.
Published: (2014) -
Evaluation model for knowledge sharing in information security professional virtual community / Alireza Tamjidyamcholo
by: Tamjidyamcholo, Alireza
Published: (2014) -
Fuzzy set theory
by: Khan, Imran Moez, et al.
Published: (2011)