Reference Hub4
Selecting Adequate Security Mechanisms in E-Business Processes Using Fuzzy TOPSIS

Selecting Adequate Security Mechanisms in E-Business Processes Using Fuzzy TOPSIS

Shahriar Mohammadi, Sina Golara, Nasim Mousavi
Copyright: © 2012 |Volume: 2 |Issue: 1 |Pages: 19
ISSN: 2156-177X|EISSN: 2156-1761|EISBN13: 9781466612150|DOI: 10.4018/ijfsa.2012010103
Cite Article Cite Article

MLA

Mohammadi, Shahriar, et al. "Selecting Adequate Security Mechanisms in E-Business Processes Using Fuzzy TOPSIS." IJFSA vol.2, no.1 2012: pp.35-53. http://doi.org/10.4018/ijfsa.2012010103

APA

Mohammadi, S., Golara, S., & Mousavi, N. (2012). Selecting Adequate Security Mechanisms in E-Business Processes Using Fuzzy TOPSIS. International Journal of Fuzzy System Applications (IJFSA), 2(1), 35-53. http://doi.org/10.4018/ijfsa.2012010103

Chicago

Mohammadi, Shahriar, Sina Golara, and Nasim Mousavi. "Selecting Adequate Security Mechanisms in E-Business Processes Using Fuzzy TOPSIS," International Journal of Fuzzy System Applications (IJFSA) 2, no.1: 35-53. http://doi.org/10.4018/ijfsa.2012010103

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Security mechanisms are substantial to an e-business environment. While many security mechanisms have been developed to secure e-business processes (EBP) and networks, little attention is given to actual process of a systematic decision making. In most cases strongest security level available is selected. In many cases there are low risks and threats associated with the processes and the use of strong security wastes the available resources. In this paper the authors developed a practical multiple criteria decision making model based on the group fuzzy technique for order preference by similarity to ideal solution (GFTOPSIS) for choosing adequate security mechanism for e-business processes and making a trade-off between security and other important factors in the enterprise. Data was acquired from experts and implemented fuzzy approach. The authors differentiated four phases in the EBP. Each phase of the process which has specific security requirements thus we suggested the use of specified security mechanisms for each phase which improves the efficiency of the system.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.