Evaluating information security investments using the analytic hierarchy process.
Lawrence BodinLawrence A. GordonMartin P. LoebPublished in: Commun. ACM (2005)
Keyphrases
- information security
- countermeasures
- information systems
- intrusion detection
- security issues
- smart card
- computer security
- information security management
- network security
- information assurance
- information technology
- security requirements
- risk assessment
- iso iec
- e government
- privacy concerns
- smart grid
- design theory
- security level
- pairwise comparison
- cyber defense
- sensitive data
- risk analysis
- technical issues
- data envelopment analysis
- intrusion detection system
- text classification
- decision makers
- active learning
- data protection
- pairwise
- learning algorithm
- machine learning
- real world