1. How to submit my research paper? What’s the process of publication of my paper?
The journal receives submitted manuscripts via email only. Please submit your research paper in .doc or .pdf format to the submission email: jait@etpub.com.
2.Can I submit an abstract?
The journal publishes full research papers. So only full paper submission should be considered for possible publication. Papers with insufficient content may be rejected as well, make sure your paper is sufficient enough to be published...[Read More]

The Application Research of Information Security Risk Assessment Model Based on AHP Method

Meng Meng and Enping Liu
Institute of Scientific and Technical Information, CATAS, Danzhou Hainan, China
Abstract—Information security risk assessment involves four basic elements, including information assets themselves, vulnerabilities of information assets, facing threats of information assets and possible risks of information assets. A key problem of risk assessment is the distribution of the weights among risk factors. Here we put forward the weight of risk factors which is calculated by using Analytic Hierarchy Process (AHP), obtain the weight of risk factors, sort in accordance with weight of risk factors, intuitively grasp the harm degree of various risks, and screen out the weights relatively larger risk factors for risk management. Our approach provides the scientific basis for information security risk management decisions.

Index Terms—analytic hierarchy process, information security, risk assessment

Cite: Meng Meng and Enping Liu, "The Application Research of Information Security Risk Assessment Model Based on AHP Method," Vol. 6, No. 4, pp. 201-206, November, 2015. doi: 10.12720/jait.6.4.201-206
Copyright © 2013-2016 Journal of Advances in Information Technology, All Rights Reserved
E-mail: jait@etpub.com