Consensus ranking - An ICT security awareness case study

被引:17
|
作者
Kruger, H. A. [1 ]
Kearney, W. D. [1 ]
机构
[1] NW Univ, Sch Comp Stat & Math Sci, ZA-2520 Potchefstroom, South Africa
基金
新加坡国家研究基金会;
关键词
Information security awareness; Consensus ranking; Assignment problem; Maximize agreement heuristic; Decision making;
D O I
10.1016/j.cose.2008.07.001
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
There are many disciplines where the problem of consensus ranking plays a vital role. Decision-makers are frequently asked to express their preferences for a group of objects, e.g. new projects, new products, candidates in an election, etc. The basic problem then becomes one of combining the individual rankings into a group choice or consensus ranking. The objective of this paper is to report on the application of two management science methodologies to the problem of identifying the most important areas to be included in an Information Communications Technology (ICT) security awareness program. The first methodology is based on the concept of minimizing the distance (disagreement) between individual rankings, while the second one employs a heuristic approach. A real-world case study from the mining industry is presented to illustrate the methods. (c) 2008 Elsevier Ltd. All rights reserved.
引用
收藏
页码:254 / 259
页数:6
相关论文
共 50 条
  • [1] USERS' AWARENESS OF AND PERCEPTION ON INFORMATION SECURITY ISSUES: A CASE STUDY OF KULLIYYAH OF ICT POSTGRADUATE STUDENTS
    Hamid, Habiba
    Zeki, Akram M.
    [J]. 3RD INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER SCIENCE APPLICATIONS AND TECHNOLOGIES ACSAT 2014, 2014, : 139 - 144
  • [2] The Security Awareness Paradox: A Case Study
    Tariq, Muhammad Adnan
    Brynielsson, Joel
    Artman, Henrik
    [J]. 2014 PROCEEDINGS OF THE IEEE/ACM INTERNATIONAL CONFERENCE ON ADVANCES IN SOCIAL NETWORKS ANALYSIS AND MINING (ASONAM 2014), 2014, : 704 - 711
  • [3] Empirical study on ICT system's users' risky behavior and security awareness
    Solic, K.
    Velki, T.
    Galba, T.
    [J]. 2015 8TH INTERNATIONAL CONVENTION ON INFORMATION AND COMMUNICATION TECHNOLOGY, ELECTRONICS AND MICROELECTRONICS (MIPRO), 2015, : 1356 - 1359
  • [4] The Need of Awareness in Cyber Security with a Case Study
    Jidiga, Goverdhan Reddy
    Sammulal, P.
    [J]. 2013 FOURTH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATIONS AND NETWORKING TECHNOLOGIES (ICCCNT), 2013,
  • [5] PRIORITY RANKING AND CONSENSUS FORMATION - THE CASE OF TIES
    ARMSTRONG, RD
    COOK, WD
    SEIFORD, LM
    [J]. MANAGEMENT SCIENCE, 1982, 28 (06) : 638 - 645
  • [6] Security Awareness Level of Smartphone Users: An Exploratory Case Study
    Koyuncu, Murat
    Pusatli, Tolga
    [J]. MOBILE INFORMATION SYSTEMS, 2019, 2019
  • [7] Value-focused assessment of ICT security awareness in an academic environment
    Drevin, L.
    Kruger, H. A.
    Steyn, T.
    [J]. COMPUTERS & SECURITY, 2007, 26 (01) : 36 - 43
  • [8] A Dynamic Cyber Security Situational Awareness Framework for Healthcare ICT Infrastructures
    Islam, Shareeful
    Papastergiou, Spyridon
    Mouratidis, Haralambos
    [J]. 25TH PAN-HELLENIC CONFERENCE ON INFORMATICS WITH INTERNATIONAL PARTICIPATION (PCI2021), 2021, : 334 - 339
  • [9] ICT USER AND USAGE CHARACTERISTICS AND E-MAIL SECURITY AWARENESS
    Bostan, Atila
    Akman, Ibrahim
    [J]. 2013 INTERNATIONAL CONFERENCE ON ELECTRONICS, COMPUTER AND COMPUTATION (ICECCO), 2013, : 277 - 280
  • [10] Data Security Awareness and Proper Handling of ICT Equipment of Employees: An Assessment
    Ayuyang, Dorothy M.
    [J]. INTELLIGENT COMPUTING, VOL 3, 2022, 508 : 682 - 692