Browse > Article

A Study on Optimal Developmental Cost for Quality Factors of Integrated Information Security Systems  

Park, You-Jin (Department of Business Administration, College of Social Sciences, Chung-Ang University)
Choi, Myeong-Gil (Department of Business Administration, College of Social Sciences, Chung-Ang University)
Publication Information
Journal of Korean Society of Industrial and Systems Engineering / v.33, no.3, 2010 , pp. 1-9 More about this Journal
Abstract
To protect information resources, many organizations including private corporate and government employ integrated information security systems which provide the functions of intrusion detection, firewall, and virus vaccine. So, in order to develop a reliable integrated information security system during the development life cycle, the managers in charge of the development of the system must effectively distribute the development resources to the quality factors of an integrated information security system. This study suggests a distribution methodology that minimizes the total cost with satisfying the minimum quality level of an integrated information security system by appropriately assigning development resources to quality factors considered. To achieve this goal, we identify quality factors of an integrated information system and then measure the relative weights among the quality factors using analytic hierarchy process (AHP). The suggested distribution methodology makes it possible to search an optimal solution which minimizes the total cost with satisfying the required quality levels of processes by assigning development resources to quality factors during the development life cycle.
Keywords
Quality Factor; Analytic Hierarchy Process; Integrated Information Security Systems; Genetic Algorithm;
Citations & Related Records
연도 인용수 순위
  • Reference
1 3com, http://www.3com.com/en_US/jump_page/em.
2 Pham, D. T. and Karaboga, D.; Intelligent Optimisation Techniques : Genetic Algorithms, Tabu Search, Simulated Annealing and Neural Networks, Springer, 2000.
3 Pijl, G., Swinkels, G., and Verijdt, J.; ''ISO 9000 versus CMM : Standardization and Certification of IS Development," Information and Management, 32 : 267-274, 1997.   DOI   ScienceOn
4 Satty, T. L.; Decision Making for Leaders : The Analytical Hierarchy Process for Decision in a Complex World, RWS Publications, 1995.
5 Wood, C. and Snow, K.; "IS0 9000 and information, Security, Computer and Security," 14(4) : 287-288, 1995.   DOI   ScienceOn
6 John Leach; "Security Engineering and Security Rol," Computers and Security, 22(6) : 482-486, 2003.   DOI   ScienceOn
7 Y. Lee, J. Lee and Z. Lee; "Integrating Software Lifecycle Process Standards with Security Engineering," Computers and Security, 21(4) : 345-355, 2002.   DOI   ScienceOn
8 Park, Y. J., Montgomery, D., Fowler, J., and Borror, C.; "Cost-Constrained G-efficient Response Surface Designs for Cuboidal Regions," Quality Reliability Engineering International, 22(2) : 121-139, 2006.   DOI   ScienceOn
9 Choi, M. G., Lee, S. Y., and Jung, T. M.; " An Empirical Study of Quality and Cost Balanced Security Engineering," Lecture Notes in Computer Science, 3903 : 379-389, 2006.   DOI
10 Cote, et al.; "The Evolution Path for Industrial Software Quality Evaluation Methods Applying ISO/IEC 9126," Software Quality Journal, 17-39, 2001.
11 Choi, M. G. and Shin, S. M.; "Optimizing Quality Levels and Development Costs for Developing an lntegrated Information Security System," Lecture Notes in Computer Science, 4867 : 359-370, 2007.   DOI
12 Eloff, M. and Solms, S. H., "Information Security Management, Hierarchical Framework for Various Approaches," Computers and Security, 19 : 243-256, 2000.   DOI   ScienceOn
13 Goldberg, D. E.; Genetic AIgorithms in Search Optimization, and Machine Leaming, Addison-Wesley Professional, 1989.
14 ISO/IEC, Software Engineering-Product QualityPartl Quality Model, 2001.
15 Aguaron, J., et al.; "The Geometric Consistency lndex : Approximated Threshold," European Journal of Operation Research, 147 : 137-145, 2003.   DOI   ScienceOn
16 김종기 외; 시스템 보안공학 능력 성숙도 모델 고찰, 정보보호학회지, 11(6) : 2001.
17 국가사이버안전센터; http://www.ncsc.go.kr/the list of certified products.
18 산업기술인터넷방송, http://www.itstv.net/broadlnews listasp?opt = contents&wrd = 보안&page = 2&status = list.