IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Establishing the Business Value of Network Security Using Analytical Hierarchical Process

Establishing the Business Value of Network Security Using Analytical Hierarchical Process
View Sample PDF
Author(s): Susan J. Chinburg (Oklahoma State University, USA), Ramesh Sharda (Oklahoma State University, USA)and Mark Weiser (Oklahoma State University, USA)
Copyright: 2003
Pages: 17
Source title: Creating Business Value with Information Technology: Challenges and Solutions
Source Author(s)/Editor(s): Namchul Shin (Pace University, USA)
DOI: 10.4018/978-1-59140-038-7.ch009

Purchase

View Establishing the Business Value of Network Security Using Analytical Hierarchical Process on the publisher's website for pricing and purchasing information.

Abstract

Information technology (IT) has become a critical functionality for business today. Choosing the appropriate network security that will protect IT functions and meet business needs can be a bewildering but necessary process. The problem is deciding what and how much to do. The objective of this paper is to propose a new process that will facilitate the mapping of network security to the business’s priorities using well-known classification schemes and decision support systems. Establishing a relationship between such diverse functions requires that the two areas be described in terms that can be related. Network security is described in terms of services and mechanisms that provide the functionality using the Open System Interconnection (OSI) Security Architecture classification. Business value and activities are described using Michael Porter’s business value chain. First, the classification schemes for each area are subjectively related to establish an initial functionality/business value relationship. Second, a decision support tool called analytic hierarchy process (AHP) is used to establish an analytical and more objective relationship between the two classification schemes. The result of this work is a prioritized list of security services related to business needs instead of just being driven by technological criteria. An example that illustrates this concept is described in the paper. To the best of the authors knowledge, this is the first application of using AHP in the decision-making process of choosing network security in relationship to business needs.

Related Content

Vincent Lennard Kraus. © 2023. 32 pages.
Tlou Maggie Masenya. © 2023. 16 pages.
Arzu Tufan, Gurkan Tuna. © 2023. 30 pages.
Wasswa Shafik. © 2023. 19 pages.
Calvin Nobles, Sharon L. Burton, Darrell Norman Burrell. © 2023. 23 pages.
Darrell Norman Burrell, Calvin Nobles, Austin Cusak, Laura Ann Jones, Jorja B. Wright, Horace C. Mingo, Jennifer Ferreras-Perez, Katrina Khanta, Philip Shen, Kevin Richardson. © 2023. 16 pages.
Jorja B. Wright, Darrell Norman Burrell. © 2023. 12 pages.
Body Bottom