• Feb 07, 2023 News!JACN will adopt Article-by-Article Work Flow. The benefit of article-by-article workflow is that a delay with one article may not delay the entire issue. Once a paper steps into production, it will be published online soon.   [Click]
  • May 30, 2022 News!JACN Vol.10, No.1 has been published with online version.   [Click]
  • Dec 24, 2021 News!Volume 9 No 1 has been indexed by EI (inspec)!   [Click]
General Information
    • ISSN: 1793-8244 (Print)
    • Abbreviated Title:  J. Adv. Comput. Netw.
    • Frequency: Semiyearly
    • DOI: 10.18178/JACN
    • Editor-in-Chief: Professor Haklin Kimm
    • Executive Editor: Ms. Cherry Chan
    • Abstracting/ Indexing: EBSCO, ProQuest, and Google Scholar.
    • E-mail: jacn@ejournal.net
Editor-in-chief
Professor Haklin Kimm
East Stroudsburg University, USA
I'm happy to take on the position of editor in chief of JACN. We encourage authors to submit papers on all aspects of computer networks.

JACN 2015 Vol.3(4): 320-325 ISSN: 1793-8244
DOI: 10.18178/JACN.2015.3.4.190

Finding the Weakest Link in the Interdependent Security Chain Using the Analytic Hierarchy Process

Chongxia Pan, Weijun Zhong, and Shue Mei

Abstract—With the rapid development of network finance and electronic commerce, the network and information security problems are more complex and prominent, and economics of information security has also become a hot research topic. This paper uses AHP (analytic hierarchy process) method to find the weakest link in the interdependent security chain. And the result can help information security investment decision-making. This paper firstly introduces research background including current research situations about interdependent security and the weakest link in network security. Then it introduces problems about the information system security in corporations’ security chain, finally modeling the AHP method to find the weakest link in interdependent security chain and gives a conclusion at last.

Index Terms—Information security economics, AHP, the weakest link, interdependent security.

The authors are with Southeast University, Nanjing, China (e-mail: panchongxia@163. com, zhongweijun@seu.edu.cn, meishue@seu.edu.cn).

[PDF]

Cite:Chongxia Pan, Weijun Zhong, and Shue Mei , "Finding the Weakest Link in the Interdependent Security Chain Using the Analytic Hierarchy Process," Journal of Advances in Computer Networks vol. 3, no. 3, pp. 320-325, 2015.

Copyright © 2008-2024. Journal of Advances in Computer Networks.  All rights reserved.
E-mail: jacn@ejournal.net