Browse > Article
http://dx.doi.org/10.13089/JKIISC.2010.20.6.261

A Study on Threat factors of Information Security in Social Network Service by Analytic Hierarchy Process  

Sung, Ki-Hoon (University of Science and Technology)
Kong, Hee-Kyung (Electronics and Telecommunications Research Institute)
Kim, Tae-Han (Electronics and Telecommunications Research Institute)
Abstract
As the usage of social network service(SNS) increases recently, great attention has been shown to the information security in SNS. However, there has been little investment in SNS environment for security while preferential investment to attract subscribers has been made so far. Moreover, there is still a lack of confidence for investment effect and an absence of framework to analyze the threat factors of information security in SNS. In this paper, we propose to model for decision-making standard of SNS information security investment by the AHP. The result shows that 'service image' is the most important criterion for the decision of SNS information security. It also shows that 'Profile-squatting and reputation slander through ID thefts' and 'Corporate espionage' are important threat factors in SNS information security.
Keywords
Social Network Service; Information Security Investment; Threat Factor; AHP;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 D.M. Boyd and N.B. Ellison, "Social Network Sites : Definition, History, and Scholarship," Journal of Computer-Mediated Communication, vol. 13, no. 1, pp.210-230, Dec. 2007.   DOI
2 K.J. Soo Hoo, How much is enough? A Risk-Management Approach to Computer Security, Stanford University, 2000.
3 L.A. Gordon and M.P. Loeb, "The Economics of Information Security Investment," ACM Transactions on Information and System Security, vol. 5, no. 4, pp.438-457, Nov. 2002.   DOI
4 C. Blatchford, "Information Security Controls - Are They Cost-effective," Computer Audit Journal, vol 3, pp.11-19. 1995.
5 A. Davis, "Return on Security Investment- Proving It's Worth It," Network Security, vol 2, pp.8-10, Nov. 2005.
6 H. Cavusoglu, B. Mishra and S. Raghunathan, "A Model for Evaluating IT Security Investments," Communications of the ACM, vol 47, no. 7, pp.87-92, Jul.. 2004.   DOI   ScienceOn
7 NIST, An Introduction to Computer Security, NIST Special Publication 800-12, 1996.
8 Vincent C.S. Lee, "A Fuzzy Multi-criteria Decision Model for Information System Security Investment," LNCS 2690, pp.436-441, Mar. 2003.
9 L.D. Bodin, L.A. Gordon and M.P. Loeb, "Evaluating Information Security Investments Using the Analytic Hierarchy Process," Communications of the ACM, vol 48, pp.79-83, Feb. 2005.
10 조찬식, "정보사회에서의 정보보안에 관한 연구," 한국문헌정보학회지, 34(1), pp.155-180, 2000년 3월.
11 ENISA, Security Issues and Recommendations for Online Social Networks, ENISA Position Paper No.1, Oct. 2007.
12 이기식, "인터넷시대 사이버보안의 인식양태 및 정책대안," 한국공공관리학보, 22(4), pp.99-127, 2008년 12월.
13 Martin Olausson, The People's Revolutio n: Implications of Web 2.0 and Social Media Applications, Strategy Analytics, Report, Dec. 2007.
14 한국인터넷진흥원, 인터넷이용자의 SNS이용실태조사, 연구보고서, 2009년 7월.
15 comScore, The comScore Data Passport - First Half 2010, Data Passport, Feb. 2010.
16 Compete, http://siteanalytics.compete. com
17 eMarketer, http://www.emarketer.com /blog/index.php/future-social-media/
18 T.L. Saaty, The Analytic Hierarchy Process, McGraw Hill, New York, 1980.
19 T.L. Saaty, "How to Make a Decision: The Analytic Hierarchy Process," European Journal of Operation Research, vol. 48, pp.9-26, 1990.   DOI   ScienceOn
20 공희경, 전효정, 김태성, "AHP를 이용한 정보보호 투자 의사결정에 대한 연구," Journal of Information Technology Applications & Management, 15(1), pp.139-152, 2008년 4월.   과학기술학회마을
21 T.L. Saaty and G.V. Luis, "Diagnosis with Dependent Symptoms: Bayes Theorem and the Analytic Hierarchy Process," Operations Research, vol 46, no. 4, pp.491-502, 1998.   DOI   ScienceOn