Evaluating information security investments using the analytic hierarchy process

  • Authors:
  • Lawrence D. Bodin;Lawrence A. Gordon;Martin P. Loeb

  • Affiliations:
  • University of Maryland, College Park;University of Maryland, College Park;University of Maryland, College Park

  • Venue:
  • Communications of the ACM - Medical image modeling
  • Year:
  • 2005

Quantified Score

Hi-index 0.00

Visualization

Abstract

In today's information-based economy, organizations must avoid costly information security breaches. Unfortunately, organizations cannot make all of their information 100% secure all of the time. There are economic, as well as technical, impediments that prevent perfect information security. Accordingly, organizations usually prepare an annual fixed (limited) budget for the maintenance and improvement of their information security systems. Two key issues confront the chief information security officer (CISO) of an organization: how to spend this limited information security budget most effectively, and how to make the case to the organization's chief financial officer (CFO) for an increase in funds to further enhance the organization's information security. The primary objective of this article is to show how to use the analytic hierarchy process (AHP) to address these two information security issues.