Skip to content
VuFind
All Fields
Title
Author
Subject
Call Number
ISBN/ISSN
Tag
Find
Advanced
Search
Identifying core control items...
Holdings
Cite this
Export Record
Export to RefWorks
Export to EndNoteWeb
Export to EndNote
Identifying core control items of information security management and improvement strategies by applying fuzzy DEMATEL
Bibliographic Details
Main Authors:
Li-Hsing, Ho
,
Ming-Tsai, Hsu
,
Tieh-Min, Yen
Format:
text
Language:
eng
Published:
Emerald
2015
Subjects:
Information management,Identification,Information security,Organizational decision-making,Fuzzy logic,British standards
Holdings
Description
Similar Items
Staff View
Similar Items
Networks security measures using neuro‐fuzzy agents
by: Nasser S., Abouzakhar, et al.
Published: (2003)
Conflict analysis model and application based on intuitionistic fuzzy number
by: Yong, Liu, et al.
Published: (2014)
An extension of grey target method with multistage fuzzy linguistic evaluation under incomplete weight
by: Hehua, Wang, et al.
Published: (2012)
Information security management (3): the Code of Practice for Information Security Management (BS 7799)
by: Rossouw, von Solms
Published: (1998)
On applying information principles to fuzzy controls
by: Colette, Padet
Published: (1996)
×
Loading...