English  |  正體中文  |  简体中文  |  Post-Print筆數 : 27 |  Items with full text/Total items : 110944/141864 (78%)
Visitors : 47923189      Online Users : 1017
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version
    Please use this identifier to cite or link to this item: https://nccur.lib.nccu.edu.tw/handle/140.119/100265


    Title: 模糊群體決策環境下以OWA運算子進行風險分析
    Other Titles: Fuzzy Group Decision Making Using an OWA Operator Applied to Risk Analysis for Information Security Management
    Authors: 羅濟群;王平;趙國銘
    Lo, Chi-Chun;Wang, Ping;Chao, K-M
    Keywords: 風險分析;柔性共識;OWA運算子;BS7799;ISO/IEC13355
    BS7799;ISO/IEC13355;Risk assessment;Soft Consensus;OWA Operator
    Date: 2006-03
    Issue Date: 2016-08-16 15:41:05 (UTC+8)
    Abstract: 傳統的定量風險分析方法著重於危害事件機率的計算,只能適用於歷史資料為可數量化,但風險分析面對網際網路的不斷變化的危害事件,通常無法蒐集充足的數量化資訊提供危害事件機率的估算。本研究採用定性風險分析方法,結合模糊偏好關係,模糊多數(fuzzy majority)理論與OWA運算子作風險值之彙總,以求得資訊資產的風險等級。分析時允許專家運用語意量詞(linguistic quantifier),研析風險項目的重要性及此風險項目發生時所造成損害程度(impact loss degree)的評估,取代傳統的方法對危害事件機率(probability)及損害金額(money loss)的估算。最後舉一網路資料中心(Internet Data Center,IDC)實例說明。本研究擴展Hererra,Chiclana及Kacprzyk等作者發展的群體決策理論至模糊環境的風險分析應用;經研究實證可知,面對不完整及模糊資料與多位專家參與風險決策時,所研提之方法可有效簡化風險分析過程的複雜性與大幅降低群體決策之共識達成所需時間。
    The traditional techniques of quantitative risk analysis determine the solution by the probability distribution function of threats and its impact loss. Since risk assessment process often holds under uncertain situation with incomplete information due to rapid change of advent attack events especially in the Internet. It is hard to accumulate adequate events to precisely estimate the probability of threats and impact losses in some real cases. In this paper, a qualitative risk analysis method is employed to prioritize the risk level of assets through the use of fuzzy preference relation, fuzzy majority concept, and the ordered weighted averaging (OWA) operator. The peoposed mothod allows the experts to express their risk preferences in linguistic quantifiers and explicitly represents the importance (weighting) of risk factor and the corresponding impact loss degree instead of probability of advent events and money loss. Finally, a real case of risk assessment for the Internet Data Center (IDC) is given to illustrate our approach. The proposed method extends the traditional risk analysis using fuzzy multiple-person decision making (MPDM) theory, developed by Hererra, Chiclana, and Kacprzyk, to risk analysis in fuzzy environment. From numerical illustrations, the proposed model can effectively decrease the complexity of the risk analysis and reduce the time required to reach a group consensus when the committee includes the opinions of many decision makers.
    Relation: 資管評論, 14, 1-21
    MIS review
    Data Type: article
    Appears in Collections:[MIS review(資管評論)] 期刊論文

    Files in This Item:

    File Description SizeFormat
    14-1-21.pdf1361KbAdobe PDF2336View/Open


    All items in 政大典藏 are protected by copyright, with all rights reserved.


    社群 sharing

    著作權政策宣告 Copyright Announcement
    1.本網站之數位內容為國立政治大學所收錄之機構典藏,無償提供學術研究與公眾教育等公益性使用,惟仍請適度,合理使用本網站之內容,以尊重著作權人之權益。商業上之利用,則請先取得著作權人之授權。
    The digital content of this website is part of National Chengchi University Institutional Repository. It provides free access to academic research and public education for non-commercial use. Please utilize it in a proper and reasonable manner and respect the rights of copyright owners. For commercial use, please obtain authorization from the copyright owner in advance.

    2.本網站之製作,已盡力防止侵害著作權人之權益,如仍發現本網站之數位內容有侵害著作權人權益情事者,請權利人通知本網站維護人員(nccur@nccu.edu.tw),維護人員將立即採取移除該數位著作等補救措施。
    NCCU Institutional Repository is made to protect the interests of copyright owners. If you believe that any material on the website infringes copyright, please contact our staff(nccur@nccu.edu.tw). We will remove the work from the repository and investigate your claim.
    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback