• Sep 17, 2018 News!Welcome to 2019 4th International Conference on Information and Network Technologies (ICINT 2019), which will be held in Kyoto, Japan during May 25-27, 2019.   [Click]
  • Jul 04, 2018 News!JACN Vol.6, No.1 has been published with online version.   [Click]
  • May 22, 2018 News!JACN has been included in EBSCO database.
General Information
    • ISSN: 1793-8244
    • Frequency: Semiyearly
    • DOI: 10.18178/JACN
    • Editor-in-Chief: Dr. Ka Wai Gary Wong
    • Executive Editor: Ms. Nina Lee
    • Abstracting/ Indexing: EI (INSPEC, IET),  Electronic Journals Library, Ulrich's Periodicals Directory, EBSCO, ProQuest, and Google Scholar.
    • E-mail: jacn@ejournal.net
Editor-in-chief
Dr. Ka Wai Gary Wong
Division of Information and Technology Studies, Faculty of Education, The University of Hong Kong.
It's a honor to serve as the editor-in-chief of JACN. I'll work together with the editors and reviewers to help the journal progress
JACN 2015 Vol.3(4): 320-325 ISSN: 1793-8244
DOI: 10.18178/JACN.2015.3.4.190

Finding the Weakest Link in the Interdependent Security Chain Using the Analytic Hierarchy Process

Chongxia Pan, Weijun Zhong, and Shue Mei
Abstract—With the rapid development of network finance and electronic commerce, the network and information security problems are more complex and prominent, and economics of information security has also become a hot research topic. This paper uses AHP (analytic hierarchy process) method to find the weakest link in the interdependent security chain. And the result can help information security investment decision-making. This paper firstly introduces research background including current research situations about interdependent security and the weakest link in network security. Then it introduces problems about the information system security in corporations’ security chain, finally modeling the AHP method to find the weakest link in interdependent security chain and gives a conclusion at last.

Index Terms—Information security economics, AHP, the weakest link, interdependent security.

The authors are with Southeast University, Nanjing, China (e-mail: panchongxia@163. com, zhongweijun@seu.edu.cn, meishue@seu.edu.cn).

[PDF]

Cite:Chongxia Pan, Weijun Zhong, and Shue Mei , "Finding the Weakest Link in the Interdependent Security Chain Using the Analytic Hierarchy Process," Journal of Advances in Computer Networks vol. 3, no. 3, pp. 320-325, 2015.

Copyright © 2008-2018. Journal of Advances in Computer Networks.  All rights reserved.
E-mail: jacn@ejournal.net