Curriculum design and evaluation for e-commerce security education using AHP

Cited 1 time in webofscience Cited 0 time in scopus
  • Hit : 967
  • Download : 43
DC FieldValueLanguage
dc.contributor.authorKim, Hko
dc.contributor.authorHan, Yko
dc.contributor.authorChoi, Mko
dc.contributor.authorKim, Sehunko
dc.date.accessioned2007-11-20T06:06:35Z-
dc.date.available2007-11-20T06:06:35Z-
dc.date.created2012-02-06-
dc.date.created2012-02-06-
dc.date.issued2007-03-
dc.identifier.citationIEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, v.E90D, pp.668 - 675-
dc.identifier.issn0916-8532-
dc.identifier.urihttp://hdl.handle.net/10203/2052-
dc.description.abstractDue to the exponentially increasing threat of cyber attacks, many e-commerce organizations around the world have begun to recognize the importance of information security. When considering the importance of security in e-commerce, we need to train e-commerce security experts who can help ensure the reliable deployment of e-commerce. The purpose of this research is to design and evaluate an e-commerce security curriculum useful in training e-commerce security experts. In this paper, we use a phase of the Delphi method and the Analytic Hierarchy Process (AHP) method. To validate our results, we divide the respondents into two groups and compare the survey results.-
dc.description.sponsorshipThis research was supported by the MIC (Ministry of Information and Communication), Korea, under the ITRC (Information Technology Research Center) support program supervised by the IITA (Institute of Information Technology Assessment).en
dc.languageEnglish-
dc.language.isoen_USen
dc.publisherIEICE-INST ELECTRONICS INFORMATION COMMUNICATIONS ENG-
dc.titleCurriculum design and evaluation for e-commerce security education using AHP-
dc.typeArticle-
dc.identifier.wosid000245194600006-
dc.identifier.scopusid2-s2.0-33947135863-
dc.type.rimsART-
dc.citation.volumeE90D-
dc.citation.beginningpage668-
dc.citation.endingpage675-
dc.citation.publicationnameIEICE TRANSACTIONS ON INFORMATION AND SYSTEMS-
dc.identifier.doi10.1093/ietisy/e90-d.3.668-
dc.embargo.liftdate9999-12-31-
dc.embargo.terms9999-12-31-
dc.contributor.localauthorKim, Sehun-
dc.contributor.nonIdAuthorKim, H-
dc.contributor.nonIdAuthorHan, Y-
dc.contributor.nonIdAuthorChoi, M-
dc.type.journalArticleArticle-
dc.subject.keywordAuthore-commerce security education-
dc.subject.keywordAuthorcurriculum design-
dc.subject.keywordAuthorAHP method-
dc.subject.keywordAuthorDelphi method-
Appears in Collection
IE-Journal Papers(저널논문)
Files in This Item
This item is cited by other documents in WoS
⊙ Detail Information in WoSⓡ Click to see webofscience_button
⊙ Cited 1 items in WoS Click to see citing articles in records_button

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0