An evaluation and selection problems of OSS-LMS packages

BN Abdullateef, NF Elias, H Mohamed, AA Zaidan… - SpringerPlus, 2016 - Springer
The evaluation and selection of inappropriate open source software in learning
management system (OSS-LMS) packages adversely affect the business processes and …

[HTML][HTML] A systematic literature review on the application of multicriteria decision making methods for information security risk assessment

D Maček, I Magdalenić, NB Ređep - International Journal of Safety and …, 2020 - iieta.org
In today's fast, agile, complex and interconnected business world, one of the main goals and
concerns is to find an efficient and effective way of managing information security risks. So …

Multi-criteria analysis for OS-EMR software selection problem: A comparative study

AA Zaidan, BB Zaidan, M Hussain, A Haiqi… - Decision support …, 2015 - Elsevier
Various software packages offer a large number of customizable features to meet the
specific needs of organizations. Improper selection of a software package may result in …

A comprehensive people, process and technology (PPT) application model for Information Systems (IS) risk management in small/medium enterprises (SME)

MI Javaid, MMW Iqbal - 2017 International Conference on …, 2017 - ieeexplore.ieee.org
With advent of modern era. Information Technology (IT) has turned out to be very critical in
operations, management and growth of an enterprise. Now, Information Systems (IS) are …

Combination of AHP and TOPSIS methods for the ranking of information security controls to overcome its obstructions under fuzzy environment

MI Tariq, S Tayyaba, N Ali Mian… - Journal of Intelligent …, 2020 - content.iospress.com
The organizations utilizing the cloud computing services are required to select suitable
Information Security Controls (ISCs) to maintain data security and privacy. Many …

[PDF][PDF] A survey on security risks in internet of things (IoT) environment

M Ravi - Journal of Computational Science and Intelligent …, 2020 - scholar.archive.org
This analysis reviews the management of vulnerabilities and security risks of Internet of
Things (IoT). This paper provides an overview, which it reveals the recent Internet's growth …

MASISCo—Methodological Approach for the Selection of Information Security Controls

M Diéguez, C Cares, C Cachero, J Hochstetter - Applied Sciences, 2023 - mdpi.com
As cyber-attacks grow worldwide, companies have begun to realize the importance of being
protected against malicious actions that seek to violate their systems and access their …

Mapping the variations for implementing information security controls to their operational research solutions

M Diéguez, J Bustos, C Cares - Information Systems and e-Business …, 2020 - Springer
Abstract Information Security Management is currently guided by process-based standards.
Achieving one or some of these standards means deploying their corresponding set of …

Peer selection in device-to-device communication based on multi-attribute decision making

F ZenAlden, S Hassan, A Habbal - 2020 IEEE International …, 2020 - ieeexplore.ieee.org
The massive number of peers in network with the mobility of peers rises the challenges of
finding the best peer to establish a Device-to-Device (D2D) connection. This paper aims to …

[PDF][PDF] Comparación de dos enfoques cuantitativos para seleccionar controles de seguridad de la información

M Diéguez, C Cares - Revista Ibérica de Sistemas e Tecnologias de …, 2019 - academia.edu
Proporcionar procesos y herramientas sistemáticos para tomar una decisión sobre
inversiones en seguridad en un escenario con restricciones presupuestarias, es de suma …