مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Persian Verion

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

video

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

sound

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Persian Version

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View:

502
مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Download:

0
مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Cites:

Information Journal Paper

Title

Effects of Cyber Threats in IT Projects Using the Fuzzy Cognitive Mapping Approach

Pages

  41-51

Abstract

 Mismatches in time and cost are among the most important reasons for the failure of Information Technology Projects. But it should be borne in mind that neglecting security issues, especially in projects with the nature of working with data and information, can cause irreparable damage to the project organization. Meanwhile, recognizing the factors that can threaten an IT project in cyberspace, and the impact of each of these factors on the other has great importance. In fact, the project manager can be more effective in preventing these threats by knowing the impact of the criteria. In this research, the main factors that could threaten an IT project in cyberspace are identified. At the next step, some of these threats are eliminated by Friedman test and the 6 threats which remain are more important than others, in expert’ s opinion. Then their weights are calculated by Analytic Hierarchy Process (AHP) approach and eventually their effects on each other are determined by using the Fuzzy Cognitive Mapping (FCM) method. The results show that, lack of appropriate encryption and authentication systems is the most effective, and cyber espionage is the most influenced of these threats.

Cites

  • No record.
  • References

  • No record.
  • Cite

    APA: Copy

    AMIN TAHMASBI, H., & Hemmati Asiabaraki, m.. (2019). Effects of Cyber Threats in IT Projects Using the Fuzzy Cognitive Mapping Approach. JOURNAL OF ELECTRONIC AND CYBER DEFENCE, 7(2 (26) ), 41-51. SID. https://sid.ir/paper/243230/en

    Vancouver: Copy

    AMIN TAHMASBI H., Hemmati Asiabaraki m.. Effects of Cyber Threats in IT Projects Using the Fuzzy Cognitive Mapping Approach. JOURNAL OF ELECTRONIC AND CYBER DEFENCE[Internet]. 2019;7(2 (26) ):41-51. Available from: https://sid.ir/paper/243230/en

    IEEE: Copy

    H. AMIN TAHMASBI, and m. Hemmati Asiabaraki, “Effects of Cyber Threats in IT Projects Using the Fuzzy Cognitive Mapping Approach,” JOURNAL OF ELECTRONIC AND CYBER DEFENCE, vol. 7, no. 2 (26) , pp. 41–51, 2019, [Online]. Available: https://sid.ir/paper/243230/en

    Related Journal Papers

    Related Seminar Papers

  • No record.
  • Related Plans

  • No record.
  • Recommended Workshops






    Move to top
    telegram sharing button
    whatsapp sharing button
    linkedin sharing button
    twitter sharing button
    email sharing button
    email sharing button
    email sharing button
    sharethis sharing button