Title: An integrated approach to the optimal selection of security tools using analytic hierarchy process and goal programming

Authors: Hoai-Vu Nguyen, Sangmun Shin, Yongsun Choi

Addresses: Department of Systems Management and Engineering, Inje University, 607 Obang-dong, Gimhae, Gyeongnam, 621-749, South Korea. ' Department of Systems Management and Engineering, Inje University, 607 Obang-dong, Gimhae, Gyeongnam, 621-749, South Korea. ' Department of Systems Management and Engineering, Inje University, 607 Obang-dong, Gimhae, Gyeongnam, 621-749, South Korea

Abstract: The internet and local area networks, which are growing rapidly, have witnessed an increase in malicious threads. Therefore, the deployment of security tools is necessary for protecting organisations from external attacks on their information systems, preventing information losses and ensuring secure communication. To this end, the primary objective of this paper is to propose an enhanced methodology for supporting the decision maker in selecting the appropriate security tools for information systems in organisations. First, we construct a security criteria hierarchy as the decision criteria. Then, based on the criteria, we compute the competitiveness score of each security tool and the relative weights among different types of security tools utilising an analytic hierarchy process (AHP). Finally, in order to incorporate a trade-off between all the competitiveness aspects associated with the security tools and costs, a prioritising/weighting mixed integer goal programming (GP) model or a combination of mixed integer GP and weighted-sum model to determine the optimal solutions for the security tools is employed.

Keywords: security systems; security tools; multi-objective; optimisation; security criteria; goal programming; analytical hierarchy process; AHP; multicriteria decision making; MCDM; weighted sum; security management; information systems; information security; secure communications.

DOI: 10.1504/IJTM.2011.039313

International Journal of Technology Management, 2011 Vol.54 No.2/3, pp.229 - 251

Published online: 06 Apr 2013 *

Full-text access for editors Full-text access for subscribers Purchase this article Comment on this article