تعداد نشریات | 418 |
تعداد شمارهها | 9,997 |
تعداد مقالات | 83,560 |
تعداد مشاهده مقاله | 77,801,185 |
تعداد دریافت فایل اصل مقاله | 54,843,842 |
Identifying and Ranking Technology-Telecommunications Context of Information Security anagement System in E-Government Using Fuzzy AHP Approach | ||
Journal of System Management | ||
مقاله 1، دوره 2، شماره 2، تیر 2016، صفحه 1-14 | ||
نوع مقاله: Research Paper | ||
نویسندگان | ||
Sana Javid* ؛ Nour Mohammad Yaghoubi | ||
Department of Management, College of Management and accounting, Sistan & Baluchistan University, Sistan & Baluchistan, Iran | ||
چکیده | ||
In recent years, many security threats have entered into the organizations’ information and changed the organizational performance resulting in their exorbitant costs. This question is of particular importance about government agencies that use information and Internet systems. This issue enabled the top managers of organizations to implement a security system and minimize these costs. Using Information Security management system is considered as a tool to promote information security and information systems. According to research conducted, four contexts of legal, technical communication, organizational-managerial, and cultural and social have been detected in the effective establishment of information security management system in electronic government. The aim of the present study is to identify and rank the subcriteria of technical- communications for the effective establishment of information security management system in electronic government. For this purpose, by reviewing the literature, a list of important criteria was developed and the sub-criteria of technical-communications for the effective establishment of information security management system were identified and classified into six general areas by conducting interviews with experts and completing a questionnaire. Then a census and paired comparison questionnaire of experts were carried out and the criteria were weighted and ranked with the analysis of data through fuzzy AHP approach. | ||
کلیدواژهها | ||
E-government؛ Information security management system؛ technical-telecommunications context؛ Fuzzy AHP | ||
مراجع | ||
[1] Aljifri, H. A., Pons, A., and Collins, D. (2003), Global e-commerce: a framework for understanding and overcoming the trust barrier. Information Management & Computer Security, 11 (3), 130-138. [2] Bakari, J. K., Tarimo, C. N., Yngstrom, L., and Magnisson, C. (2005), State of ICT Security Management in the Institutions of Higher Learning in Developing Countries: Tanzania Case Study. Computers & Security Proceedings of the Fifth IEEE International Conference on Advanced Learning Technologies (ICALT 05). [3] Doherty, N. and Fulford, h. (2003), The application of information security policies in large UK-based organizations: an exploratory investigation. Loughborough UNIVERSITY, The Business School, Loughborough University, Loughborough, Leicestershire LE11 3TU, UK,- [4] Ebrahim, Z. and Irani, Z. (2005), E-government adoption: architecture and barriers. Business Process [5] Gerber, M., von Solms, R., and Overbeek, P. (2001), “Formalizing information security requirements”. Information Management and Computer Security, 9 (1), pp. 32-37. [6] Halliday, S., Badenhorst, K., von Solms, R. (1996), A business approach to effective information technology risk analysis and management, Information Management and Computer Security, vol. 4, no. 1, pp. 19-31. [7] Knapp, K. J., Marshall, T. E., Rainer, R. K., and Ford, F. N. (2006), “Information Security: Management’s Effect on Culture and Policy”, Information Management Computer Security, (14:5), pp. 24-36. [8] Layne K. and Jung w. l. (2001), “Developing fully functional: a four stage model”. Government information quarterly. vol. 18, pp. 122-136. [9] Luis Enrique, E. (2000), beyond security planning: towards a model of security management coping with the security challenges of the humanitarian work July 2000 Management Journal, 11 (5), 589-611. [10] Saha, P. (2008), Government e-Service Delivery: Identification of Success Factors from Citizens’ Perspective. Doctoral thesis Lulea University of Technology Department of Business Administration and Social Sciences Division of Industrial Marketing, e-Commerce and Logistics. [11] Sanghyun, P. and Kyungho, L. (2014), Advanced Approach to Information Security Management System Model for Industrial Control System. The Scientific World Journal, Volume, 2014 (2014), Article ID 348305, 13 pages. [12] UN. (2005), Information Economy Report 2005. http://www.unctad.org/ecommerce/ [13] Zanjirchi, s. m. (2011), fuzzy hierarchical analysis process.-,Tehran, Publications Sanei. | ||
آمار تعداد مشاهده مقاله: 731 تعداد دریافت فایل اصل مقاله: 448 |