{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,21]],"date-time":"2026-01-21T14:17:59Z","timestamp":1769005079123,"version":"3.49.0"},"reference-count":18,"publisher":"World Scientific Pub Co Pte Lt","issue":"02","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int. J. Info. Tech. Dec. Mak."],"published-print":{"date-parts":[[2009,6]]},"abstract":"<jats:p> Most multicriteria methods focus on ranking and selecting from a set of alternatives. These methods are usually used to compare all alternatives based on the synthesized scorings within a normalized scale with respect to the same criteria in multicriteria problems. However, the decision makers often simultaneously manage one or several alternatives\/projects with conflicting and noncommensurable criteria to reduce the gaps to achieve the aspired grade in practice. They then need to rank the gaps that have not been reduced or improved (the unimproved gaps) for the alternatives\/projects or aspects of a project to get the most benefit. Because these compared alternatives\/projects do not usually have the same criteria\/aspects, traditional methods are unsuitable to deal with them. Thus, this research proposes a new VIKOR method to solve this problem; this new method allows the decision maker to understand these gaps of the projects\/aspects and rank them to improve these large gaps in control items to achieve the aspired level. Its concept originates in compromise solutions, in particular the VIKOR method. In addition, this research also provides an example of improving information security risk to demonstrate the suitability of this new method. The results show the effectiveness of the new method. <\/jats:p>","DOI":"10.1142\/s0219622009003375","type":"journal-article","created":{"date-parts":[[2009,7,2]],"date-time":"2009-07-02T07:53:30Z","timestamp":1246521210000},"page":"267-287","source":"Crossref","is-referenced-by-count":100,"title":["A VIKOR-BASED MULTIPLE CRITERIA DECISION METHOD FOR IMPROVING INFORMATION SECURITY RISK"],"prefix":"10.1142","volume":"08","author":[{"given":"YU-PING","family":"OU YANG","sequence":"first","affiliation":[{"name":"Department of Business Administration, National Central University, 300 Chung-da Road, Chung-Li City 320, Taiwan"}]},{"given":"HOW-MING","family":"SHIEH","sequence":"additional","affiliation":[{"name":"Department of Business Administration, National Central University, 300 Chung-da Road, Chung-Li City 320, Taiwan"}]},{"given":"JUN-DER","family":"LEU","sequence":"additional","affiliation":[{"name":"Department of Business Administration, National Central University, 300 Chung-da Road, Chung-Li City 320, Taiwan"}]},{"given":"GWO-HSHIUNG","family":"TZENG","sequence":"additional","affiliation":[{"name":"Department of Business and Entrepreneurial Management, Kainan University, No. 1, Kainan Road, Luchu, Taoyuan 338, Taiwan"},{"name":"Institute of Management of Technology, National Chiao Tung University, 1001 Ta-Hsueh Road, Hsinchu 300, Taiwan"}]}],"member":"219","published-online":{"date-parts":[[2011,11,20]]},"reference":[{"key":"rf1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-46768-4"},{"key":"rf2","doi-asserted-by":"publisher","DOI":"10.1029\/WR016i001p00014"},{"key":"rf3","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2007.07.001"},{"key":"rf4","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.22.6.688"},{"key":"rf5","doi-asserted-by":"publisher","DOI":"10.1142\/S0219622007002320"},{"key":"rf11","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2004.07.004"},{"key":"rf12","doi-asserted-by":"publisher","DOI":"10.1142\/S0219622006002027"},{"key":"rf13","doi-asserted-by":"crossref","unstructured":"N.\u00a0McEvoy and A.\u00a0Whitcombe, InfraSec, LNCS\u00a02437 (2002)\u00a0pp. 88\u2013103, DOI: 10.1007\/3-540-45831-X_7.","DOI":"10.1007\/3-540-45831-X_7"},{"key":"rf17","doi-asserted-by":"publisher","DOI":"10.1111\/1467-8667.00269"},{"key":"rf18","doi-asserted-by":"publisher","DOI":"10.1016\/S0377-2217(03)00020-1"},{"key":"rf19","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejor.2006.01.020"},{"key":"rf20","doi-asserted-by":"publisher","DOI":"10.1142\/S0219622005001775"},{"key":"rf21","doi-asserted-by":"publisher","DOI":"10.1007\/PL00010360"},{"key":"rf22","doi-asserted-by":"publisher","DOI":"10.1016\/S0278-4319(02)00005-1"},{"key":"rf23","doi-asserted-by":"publisher","DOI":"10.1016\/j.enpol.2003.12.014"},{"key":"rf25","doi-asserted-by":"publisher","DOI":"10.1142\/S0219622007002721"},{"key":"rf26","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.19.8.936"},{"key":"rf27","volume-title":"Multiple Criteria Decision Making","author":"Zeleny M.","year":"1982"}],"container-title":["International Journal of Information Technology &amp; Decision Making"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.worldscientific.com\/doi\/pdf\/10.1142\/S0219622009003375","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,7]],"date-time":"2019-08-07T10:22:16Z","timestamp":1565173336000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.worldscientific.com\/doi\/abs\/10.1142\/S0219622009003375"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,6]]},"references-count":18,"journal-issue":{"issue":"02","published-online":{"date-parts":[[2011,11,20]]},"published-print":{"date-parts":[[2009,6]]}},"alternative-id":["10.1142\/S0219622009003375"],"URL":"https:\/\/doi.org\/10.1142\/s0219622009003375","relation":{},"ISSN":["0219-6220","1793-6845"],"issn-type":[{"value":"0219-6220","type":"print"},{"value":"1793-6845","type":"electronic"}],"subject":[],"published":{"date-parts":[[2009,6]]}}}