Fig. 1. Proposed NCSPS evaluation model.
Fig. 2. AHP evaluation model in in Expert Choice
Fig. 3. The Questionnaire in Expert Choice
Fig. 4. Four main criteria in Expert Choice
Fig. 5. Prioritization of alternatives w.r.t. Homeland Defense
Fig. 6. Prioritization of alternatives w.r.t. Economic Well Being
Table 1. Global weight Value
References
- S. T. K. Myo & G. H. Hwang. (2017). Effect of Mobile Devices on the Use Intention and Use of Mobile Banking Service in Myanmar. Journal of Digital Convergence, 15(6), 71-82. https://doi.org/10.14400/JDC.2017.15.6.71
- K. Makili-Aliyev & Rehman. (2013). A. Cyber-Security Objective: Azerbaijan in the Digitalized World. SAM Review, 5-27.
- CERT.az(2017). About us. Retrieved from Cyber Security Center. DOI : https://www.cert.az/en/about-us
- H. J. Mun, Y. C. Hwang, & H. Y Kim. (2015). Countermeasure for Prevention and Detection against Attacks to SMB Information System - A Survey. Journal of IT Convergence Society for SMB, 5(2), 1-6.
- K. B. Kim & J. Y. Yun(2015). Comparison and Analysis on Mobile Payment in terms of Security : Survey. Journal of IT Convergence Society for SMB, 5(3), 15-20.
- I. Syamsuddin & J. Hwang. (2008). The Application of AHP to Evaluate Information Security Policy Decision Making. IJSSST, 10(4), 46-50.
- UMUC. (n.d.). Cyber Security Primer. DOI : http://www.umuc.edu/cybersecurity/about/cybersecurity-basics.cfm#
- K. K. Seo(2016). Analysis of use intention of mobile cloud service using a convergence technology acceptance model. Journal of Digital Convergence, 14(12), 105-110. https://doi.org/10.14400/JDC.2016.14.12.105
- S. H. Kim & J. S. Han. (2014). Smart Cold-Chain Monitoring Automation System Architecture based on Internet of Things. Journal of digital convergence, 12(12), 351-356. https://doi.org/10.14400/JDC.2014.12.12.351
- J. H. Cho &, H. J. Lee(2018). A Study on the Real-time Cyber Attack Intrusion Detection Method. Journal of the Korea Convergence Society, 9(7), 55-62. https://doi.org/10.15207/JKCS.2018.9.7.055
- S. H. Hong & J. A. Yu(2018). Ransomware attack analysis and countermeasures of defensive aspects. Journal of Convergence for Information Technology, 8(1), 139-145. https://doi.org/10.14801/JAITC.2018.8.2.139
- R. Filipek. (2007). Information security becomes a business priority. Internal Auditor, 64(1), 18.
- N. Orujova. (2014). Information Society Strategy to be implemented in two stages.. DOI : https://www.azernews.az/business/65843.html
- C. H. Yoon & G. D. Choi. (2014). The Effects of National Culture on Ethical Decision-Making in the Internet Context : An Exploratory Analysis. Journal of digital convergence, 12(12), 23-36. https://doi.org/10.14400/JDC.2014.12.12.23
- F. Wamala. (2011). The ITU National Cybersecurity Strategy Guide. ITU.
- S. H. Lee & D. W. Lee. (2014). A Study on Internet of Things in IT Convergence Period. Journal of digital convergence. 12(7), 267-272. https://doi.org/10.14400/JDC.2014.12.7.267
- L. Aliyeva. (2018). Developing An Effective National Cyber Security Strategy For The Republic of Azerbaijan. Master Thesis, Soongsil University, Seoul.
- ISACA. (2015). State of Cybersecurity : Implications for 2015. CyberSecurity Nexus, 22.
- L. S Kim. (2015). Convergence of Information Technology and Corporate Strategy. Journal of the Korea Convergence Society, 6(6), 17-26. https://doi.org/10.15207/JKCS.2015.6.6.017
- OECD(2012). Non-governmental Perspectives on a New Generation of National Cybersecurity Strategies. OECD Digital Econmy Papers, 212.
- L. S. Kim. (2015). Convergence of Information Technology and Corporate Strategy. Journal of the Korea Convergence Society, 6(6), 17-26. https://doi.org/10.15207/JKCS.2015.6.6.017
- Z. Yunos, R. S. A. Hamid & M. Ahmad. (2016). Development of a cyber security awareness strategy using focus group discussion. SAI Computing Conference (SAI), 1063-1067.
- L. Saaty. (1990). The Analytic Hierarchy Process, RWS Publications, Pittsburgh, PA.
- F. Zahedi. (1986). The analytic hierarchy process-a survey of the method and its applications. Interfaces, 16(4), 96-108. https://doi.org/10.1287/inte.16.4.96
- H. T. Choi. (2018). Analysis of policy priorities for strengthening the capacity of local public officials. Journal of the Korea Convergence Society, 9(11), 345-351. https://doi.org/10.15207/JKCS.2018.9.11.345
- C. J. Yoon, C. G. Hwang, H. G. Kwon & M. Y. Won. (2018). Study on Political Factors for Innovating Textile and Fashion Industry in Northern Gyeonggi Province. Journal of Convergence for Information Technology, 8(1), 253-263. https://doi.org/10.22156/CS4SMB.2018.8.1.253
- H. F. Ernest, T. L. Saaty, A. Mary & W Rozann. (1983). Expert Choice - Decision Support Software, McLean, VA,
- B. C. Kim. (2015). A Internet of Things(IoT) based exploration robot design for remote control and monitoring. Journal of digital convergence, 13(1), 185-190. https://doi.org/10.14400/JDC.2015.13.1.185