期刊文献+

基于AHP-PROMETHEEII的外包信息系统脆弱性评价模型 被引量:7

An Evaluation Model for Outsourcing Information Systems Vulnerability based on AHP and PROMETHEEII
下载PDF
导出
摘要 针对外包信息系统脆弱性评价问题,从技术脆弱性和管理脆弱性两个方面建立信息系统脆弱性评价指标体系。在对比分析层次分析方法和偏好顺序结构评估方法的基础上,提出一种基于层次分析方法和偏好顺序结构评估方法相结合的外包信息系统脆弱性评价方法。用层次分析方法确定外包信息系统脆弱性评价问题的层次结构和指标权重,用偏好顺序结构评估方法对候选外包信息系统脆弱性进行最终的评价,并进行灵敏度分析。最后结合案例分析说明该方法的有效性。 Outsourcing information systems vulnerability evaluation is an important issue in the outsourcing decision process.The paper develops an assessment index system for outsourcing information systems vulnerability from views of technology and management.Basing on the comparative analysis of analytic hierarchy process(AHP) and PROMETHEEII,an outsourcing information systems vulnerability evaluation approach combined AHP with PROMETHEEII is proposed.AHP is used to analyze the structure of the outsourcing information systems vulnerability evaluation problem and determine weights for the evaluation criteria,PROMETHEEII method is used for final ranking,together with change of the weights performing a sensitivity analysis.Finally,a case is given to illustrate the validity of the proposed method.
出处 《管理工程学报》 CSSCI 北大核心 2010年第2期94-99,共6页 Journal of Industrial Engineering and Engineering Management
基金 国家自然科学基金资助项目(70902033) 辽宁省博士启动基金资助项目(20081093)
关键词 信息系统外包 信息安全 脆弱性 层次分析方法 偏好顺序结构评估方法 IT outsourcing information security vulnerability AHP PROMETHEEII
  • 相关文献

参考文献16

  • 1Wang Jianjun,Yang Deli.Using a hybrid multicriterial decision aid method for information systems outsoureing[J].Computers&Operations Research,2007,34(12):3691-3700. 被引量:1
  • 2王建军,杨德礼.资源外包决策的系统分析模型[J].管理学报,2008,5(1):59-63. 被引量:3
  • 3Wang Jianjun,Li Zhengkui,Huang Hao.A decision model for information systems outsoureing:Using a muhieriteria method[J].Journal of Service Science and Management,2006,1(1):1-9. 被引量:1
  • 4Lacity MC,Willcock L.An empirical investigation of information system sourcing practice,lesson form the experience[J].MISQuarterly,1998,22(3):363-406. 被引量:1
  • 5陈正清.谈谈政府和大中型企业"IT外包"问题.2006政府机关及大中型企业IT外包发展论坛[EB/OL].http://www.ciipc.org.cn/waibao/neirong.asp?id=106.2008-6-21. 被引量:1
  • 6冯登国,张阳,张玉清.信息安全风险评估综述[J].通信学报,2004,25(7):10-18. 被引量:308
  • 7Lee JN,Han HS,Seo YW.Analyzing the impact of a firm's capability on outsourcing:A process perspective[J].Information&Management,2008,45(1):31-42. 被引量:1
  • 8樊治平,王岩.信息技术外包决策的对策分析方法[J].管理工程学报,2002,16(3):5-8. 被引量:21
  • 9Farn KJ,Lin Sk,Fung ARW.A study on information security management system evaluation--Assets,threat and vulnerability[J].Computer Standards&Interfaces,2004,26(6):501-513. 被引量:1
  • 10Manzuik S,Pfeil K,Gold A.Sumgress network security assessment[M].MA:syngress Publishing Inc.,2006.45-62. 被引量:1

二级参考文献33

共引文献614

同被引文献56

引证文献7

二级引证文献39

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部