Identifying and Ranking Technology-Telecommunications Context of Information Security anagement System in E-Government Using Fuzzy AHP Approach
Subject Areas : Business StrategySana Javid 1 , Nour Mohammad Yaghoubi 2
1 - Department of Management,
College of Management and accounting, Sistan & Baluchistan University, Sistan & Baluchistan, Iran
2 - Department of Management,
College of Management and accounting, Sistan & Baluchistan University, Sistan & Baluchistan, Iran
Keywords:
Abstract :
[1] Aljifri, H. A., Pons, A., and Collins, D. (2003), Global e-commerce: a
framework for understanding and overcoming the trust barrier. Information
Management & Computer Security, 11 (3), 130-138.
[2] Bakari, J. K., Tarimo, C. N., Yngstrom, L., and Magnisson, C. (2005),
State of ICT Security Management in the Institutions of Higher Learning
in Developing Countries: Tanzania Case Study. Computers & Security Proceedings of the Fifth IEEE International Conference on Advanced
Learning Technologies (ICALT 05).
[3] Doherty, N. and Fulford, h. (2003), The application of information security
policies in large UK-based organizations: an exploratory investigation.
Loughborough UNIVERSITY, The Business School, Loughborough
University, Loughborough, Leicestershire LE11 3TU, UK,-
[4] Ebrahim, Z. and Irani, Z. (2005), E-government adoption: architecture
and barriers. Business Process
[5] Gerber, M., von Solms, R., and Overbeek, P. (2001), “Formalizing information
security requirements”. Information Management and Computer
Security, 9 (1), pp. 32-37.
[6] Halliday, S., Badenhorst, K., von Solms, R. (1996), A business approach
to effective information technology risk analysis and management, Information
Management and Computer Security, vol. 4, no. 1, pp. 19-31.
[7] Knapp, K. J., Marshall, T. E., Rainer, R. K., and Ford, F. N. (2006), “Information
Security: Management’s Effect on Culture and Policy”, Information
Management Computer Security, (14:5), pp. 24-36.
[8] Layne K. and Jung w. l. (2001), “Developing fully functional: a four stage
model”. Government information quarterly. vol. 18, pp. 122-136.
[9] Luis Enrique, E. (2000), beyond security planning: towards a model of
security management coping with the security challenges of the humanitarian
work July 2000 Management Journal, 11 (5), 589-611.
[10] Saha, P. (2008), Government e-Service Delivery: Identification of Success
Factors from Citizens’ Perspective. Doctoral thesis Lulea University of
Technology Department of Business Administration and Social Sciences
Division of Industrial Marketing, e-Commerce and Logistics.
[11] Sanghyun, P. and Kyungho, L. (2014), Advanced Approach to Information
Security Management System Model for Industrial Control System. The
Scientific World Journal, Volume, 2014 (2014), Article ID 348305, 13
pages.
[12] UN. (2005), Information Economy Report 2005.
http://www.unctad.org/ecommerce/
[13] Zanjirchi, s. m. (2011), fuzzy hierarchical analysis process.-,Tehran, Publications
Sanei.