Browse > Article
http://dx.doi.org/10.7838/jsebs.2013.18.4.301

A Study on Priorities of the Components of Big Data Information Security Service by AHP  

Biswas, Subrata (Department of Business Administration, Sangmyung University)
Yoo, Jin Ho (Department of Business Administration, Sangmyung University)
Jung, Chul Yong (Department of Business Administration, Sangmyung University)
Publication Information
The Journal of Society for e-Business Studies / v.18, no.4, 2013 , pp. 301-314 More about this Journal
Abstract
The existing computer environment, numerous mobile environments and the internet environment make human life easier through the development of IT technology. With the emergence of the mobile and internet environment, data is getting bigger rapidly. From this environment, we can take advantage of using those data as economic assets for organizations which make dreams come true for the emerging Big Data environment and Big Data security services. Nowadays, Big Data services are increasing. However, these Big Data services about Big Data security is insufficient at present. In terms of Big Data security the number of security by Big Data studies are increasing which creates value for Security by Big Data not Security for Big Data. Accordingly in this paper our research will show how security for Big Data can vitalize Big Data service for organizations. In details, this paper derives the priorities of the components of Big Data Information Security Service by AHP.
Keywords
Big Data; Security Management; Security Elements;
Citations & Related Records
Times Cited By KSCI : 4  (Citation Analysis)
연도 인용수 순위
1 Von Solms, S. H., "Information Security- The fourth wave, Computers and Security," Vol. 25, pp. 165-168, 2006.   DOI   ScienceOn
2 Martins, A. and Eloff, J. H. P., "Information Security Culture, In Security in the information society," Boston : Kluwer Academic Publishers, IFIP/SEC, pp. 203-214, 2002.
3 Oh, N. S., Han, Y. S., Eom, C. W. Oh, K. S., Lee, B. G., "Developing the Assessment Method for Information Security Level," Journal of the Society for e- Business Studies, Vol. 16, No. 2, pp. 159-169, 2011.
4 Lee, H. M., Lim, J. I., "A Study on the Development of Corporate Information Security Level Assessment Models," Korea Institute of Information Security and Cryptology, Vol. 18, No. 5, pp. 161-170, 2011.
5 Lee, Y. K., Kim, S. H., "A Development of Evaluation Indicators for Information Security by means of the Coincidence Analysis," Korea Society of IT Services, Vol. 7, No. 3, pp. 175-198, 2008.
6 Ko, M. H., Kong, H. K., Kim, T. S., "Using a Balanced Scorecard Framework to Evaluate Corporate Information Security Level," Telecommunication Review, Vol. 19, No. 6, pp. 925-935, 2009.
7 ISO/IEC 17799(BS 7799-1), "Information technology, Security techniques, Code of practice for information security," 2005.
8 Eloff, j. H. P. and Eloff, M., "Integrated Information Security Architecture," Computer Fraud and Security, pp. 10-16, 2005.
9 McCarthy, M. P. and Campbell, "Security Transformation," McGraw-Hill : New York, 2001.
10 Tudor, J. K., "Information Security Architec ture-An integrated approach to security in an organization," Boca Raton, FL : Auerbach, 2000.
11 KISA, MSIP, "Korea Information Security Management System Guideline(ISMS)," March, 2013.
12 NISTIR 7628, "Introduction to NISTIR 7628 Guidelines for Smart Grid Cyber Security," sep. 2010.
13 Park, C. S., "Study on Security Considerations in the Cloud Computing," Journal of academia-industrial technology, Vol. 12, No. 3, pp. 1408-1416, 2011.
14 Shin, K. A., Lee. S. J., "Information Security Management System on Cloud Computing Service," Journal of The Korea Institute of Information Security and Cryptology, Vol. 22, No. 1, pp. 155-167, 2012.   과학기술학회마을
15 Jang, E. Y., Kim, H. J., Park, C. S., Kim, J. Y., Lee. J. I., "The study on a threat countermeasure of mobile Cloud services," Journal of The Korea Institute of Information Security and Cryptology, Vol. 21, No. 1, pp. 177-186, 2011.   과학기술학회마을
16 Noh, B. N., Choi, J. G., "Security Technology Research in Cloud Computing Environment," Journal of Security Engineering, Vol. 8, No. 3, pp. 371-383, 2011.
17 National Information Society Agency (NIA), "Big Data era opening a new future," 2013.
18 "CSA Big Data Working Group Releases Top 10 Big Data Security and Privacy Challenges Report," Cloud Security Alliance, 2012.
19 Da Veiga, J. H. P. Eloff, "An Information Security Governance Framework," Information Systems Management, Vol. 24, pp. 361-372, 2007.   DOI   ScienceOn
20 Saaty, T. L. and Luis, G. V., "Diagnosis with Dependent Symptoms : Bayes Theorem and the Analytic Hierarchy Process," Operations Research, Vol. 46, No. 4, pp. 491-502, 1998.   DOI   ScienceOn
21 Kim, H. S., "A Study on the Quantification of Information Security Level," The Korea Society of Management information Systems, Vol. 9, No. 4, pp. 182-201, 1999.   과학기술학회마을   DOI
22 SOPHOS, "New platform and Changing threats," Security Threat Report, 2013.