{"title":"利用层次分析法寻找相互依赖的安全链中的最薄弱环节","authors":"Chongxia Pan, Weijun Zhong, Shue Mei","doi":"10.18178/JACN.2015.3.4.190","DOIUrl":null,"url":null,"abstract":"with the rapid development of network finance and electronic commerce, the network and information security problems are more complex and prominent, and economics of information security has also become a hot research topic. This paper uses AHP (analytic hierarchy process) method to find the weakest link in the interdependent security chain. And the result can help information security investment decision-making. This paper firstly introduces research background including current research situations about interdependent security and the weakest link in network security. Then it introduces problems about the information system security in corporations’ security chain, finally modeling the AHP method to find the weakest link in interdependent security chain and gives a conclusion at last.","PeriodicalId":232851,"journal":{"name":"Journal of Advances in Computer Networks","volume":"136 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Finding the Weakest Link in the Interdependent Security Chain Using the Analytic Hierarchy Process\",\"authors\":\"Chongxia Pan, Weijun Zhong, Shue Mei\",\"doi\":\"10.18178/JACN.2015.3.4.190\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"with the rapid development of network finance and electronic commerce, the network and information security problems are more complex and prominent, and economics of information security has also become a hot research topic. This paper uses AHP (analytic hierarchy process) method to find the weakest link in the interdependent security chain. And the result can help information security investment decision-making. This paper firstly introduces research background including current research situations about interdependent security and the weakest link in network security. Then it introduces problems about the information system security in corporations’ security chain, finally modeling the AHP method to find the weakest link in interdependent security chain and gives a conclusion at last.\",\"PeriodicalId\":232851,\"journal\":{\"name\":\"Journal of Advances in Computer Networks\",\"volume\":\"136 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1900-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Journal of Advances in Computer Networks\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.18178/JACN.2015.3.4.190\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Advances in Computer Networks","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.18178/JACN.2015.3.4.190","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Finding the Weakest Link in the Interdependent Security Chain Using the Analytic Hierarchy Process
with the rapid development of network finance and electronic commerce, the network and information security problems are more complex and prominent, and economics of information security has also become a hot research topic. This paper uses AHP (analytic hierarchy process) method to find the weakest link in the interdependent security chain. And the result can help information security investment decision-making. This paper firstly introduces research background including current research situations about interdependent security and the weakest link in network security. Then it introduces problems about the information system security in corporations’ security chain, finally modeling the AHP method to find the weakest link in interdependent security chain and gives a conclusion at last.