Skip to Main Content
Notice of Violation of IEEE Publication Principles
"Application of AHP to Support Information Security Decision Making in Case of Indian e-government Systems"
by Mayur Gaihole, Nilay Khere
in the 2011 3rd International Conference on Electronics Computer Technology (ICECT), Vol. 3, 2011, pp. 150 – 153.
After careful and considered review of the content and authorship of this paper by a duly constituted expert committee, this paper has been found to be in violation of IEEE's Publication Principles.
This paper contains significant portions of original text from the paper cited below. The original text was copied with insufficient attribution (including appropriate references to the original author(s) and/or paper title) and without permission.
Due to the nature of this violation, reasonable effort should be made to remove all past references to this paper, and future references should be made to the following article:
"Information Security Policy Decision Making: An Analytic Hierarchy Process Approach"
by Junseok Hwang, Irfan Syamsuddin
in the 2009 Third Asia International Conference on Modeling & Simulation, 2009, 158 – 163.
This paper examines the application of AHP in evaluating information security policy decision making with respect to Indian e-government systems. We suggest a new model based on four aspects of information security (management, technology, economy and culture) and three information security components (confidentiality, integrity and availability). AHP methodology was applied to analyze the decision making process. It is found that management and technology were the dominant aspects of information security, while availability was the main concern of information security elements for e-government information systems.