Access Restriction

Author Gordon, Lawrence A. ♦ Loeb, Martin P. ♦ Bodin, Lawrence D.
Source ACM Digital Library
Content type Text
Publisher Association for Computing Machinery (ACM)
File Format PDF ♦ HTM / HTML
Language English
Abstract In today's information-based economy, organizations must avoid costly information security breaches. Unfortunately, organizations cannot make all of their information 100% secure all of the time. There are economic, as well as technical, impediments that prevent perfect information security. Accordingly, organizations usually prepare an annual fixed (limited) budget for the maintenance and improvement of their information security systems. Two key issues confront the chief information security officer (CISO) of an organization: how to spend this limited information security budget most effectively, and how to make the case to the organization's chief financial officer (CFO) for an increase in funds to further enhance the organization's information security. The primary objective of this article is to show how to use the analytic hierarchy process (AHP) to address these two information security issues.
Description Affiliation: University of Maryland, College Park (Bodin, Lawrence D.; Gordon, Lawrence A.; Loeb, Martin P.)
Age Range 18 to 22 years ♦ above 22 year
Educational Use Research
Education Level UG and PG
Learning Resource Type Article
Publisher Date 2005-08-01
Publisher Place New York
Journal Communications of the ACM (CACM)
Volume Number 48
Issue Number 2
Page Count 6
Starting Page 78
Ending Page 83

Open content in new tab

   Open content in new tab
Source: ACM Digital Library