Evaluation of E-Commerce Security using Shannon Entropy & Dempster-Shafer (DS) theory
The purpose of this study is to develop a method and a structure which enable us to evaluate security in e-commerce in different companies by various experts. In this study, Shannon entropy was placed along with Dempster- Shafer theory so that the ultimate level of security could be measured. Consid...
Main Authors: | , |
---|---|
Format: | Article |
Language: | fas |
Published: |
University of Tehran
2016-03-01
|
Series: | Journal of Information Technology Management |
Subjects: | |
Online Access: | https://jitm.ut.ac.ir/article_55715_e563b9e867511ee2531610b140a95628.pdf |
id |
doaj-a3994a4dd7bf43a99881512d260a377e |
---|---|
record_format |
Article |
spelling |
doaj-a3994a4dd7bf43a99881512d260a377e2020-11-24T21:15:43ZfasUniversity of TehranJournal of Information Technology Management 2008-58932423-50592016-03-01817710010.22059/jitm.2016.5571555715Evaluation of E-Commerce Security using Shannon Entropy & Dempster-Shafer (DS) theoryMaryam Hajmalek0Ahmad Tavakoli1MSc., In Business Administration International Marketing, Department of Economics and Business Administration, Ferdowsi University of Mashhad (FUM), IranAssistant Prof., Faculty of Management Department, Ferdowsi University of Mashhad, Iran.The purpose of this study is to develop a method and a structure which enable us to evaluate security in e-commerce in different companies by various experts. In this study, Shannon entropy was placed along with Dempster- Shafer theory so that the ultimate level of security could be measured. Considering the fact that in the present study collecting data is based on the decision of a team of experts, data collection procedures were conducted in two phases; in the first phase, data related to determining the weight of measures were collected and in the second phase, the data about the security level of criteria were collected through interview and using a decision team in four commercial companies in Mashhad who were willing to cooperate. Then, the importance of security measures in relation to each other, security level of each measure and the overall level of security in this commercial company were determined. The final results showed that the overall level of security for the three companies is high and one is medium.https://jitm.ut.ac.ir/article_55715_e563b9e867511ee2531610b140a95628.pdfDempster–Shafere-commerceSecurityShannon-entropy |
collection |
DOAJ |
language |
fas |
format |
Article |
sources |
DOAJ |
author |
Maryam Hajmalek Ahmad Tavakoli |
spellingShingle |
Maryam Hajmalek Ahmad Tavakoli Evaluation of E-Commerce Security using Shannon Entropy & Dempster-Shafer (DS) theory Journal of Information Technology Management Dempster–Shafer e-commerce Security Shannon-entropy |
author_facet |
Maryam Hajmalek Ahmad Tavakoli |
author_sort |
Maryam Hajmalek |
title |
Evaluation of E-Commerce Security using Shannon Entropy & Dempster-Shafer (DS) theory |
title_short |
Evaluation of E-Commerce Security using Shannon Entropy & Dempster-Shafer (DS) theory |
title_full |
Evaluation of E-Commerce Security using Shannon Entropy & Dempster-Shafer (DS) theory |
title_fullStr |
Evaluation of E-Commerce Security using Shannon Entropy & Dempster-Shafer (DS) theory |
title_full_unstemmed |
Evaluation of E-Commerce Security using Shannon Entropy & Dempster-Shafer (DS) theory |
title_sort |
evaluation of e-commerce security using shannon entropy & dempster-shafer (ds) theory |
publisher |
University of Tehran |
series |
Journal of Information Technology Management |
issn |
2008-5893 2423-5059 |
publishDate |
2016-03-01 |
description |
The purpose of this study is to develop a method and a structure which enable us to evaluate security in e-commerce in different companies by various experts. In this study, Shannon entropy was placed along with Dempster- Shafer theory so that the ultimate level of security could be measured. Considering the fact that in the present study collecting data is based on the decision of a team of experts, data collection procedures were conducted in two phases; in the first phase, data related to determining the weight of measures were collected and in the second phase, the data about the security level of criteria were collected through interview and using a decision team in four commercial companies in Mashhad who were willing to cooperate. Then, the importance of security measures in relation to each other, security level of each measure and the overall level of security in this commercial company were determined. The final results showed that the overall level of security for the three companies is high and one is medium. |
topic |
Dempster–Shafer e-commerce Security Shannon-entropy |
url |
https://jitm.ut.ac.ir/article_55715_e563b9e867511ee2531610b140a95628.pdf |
work_keys_str_mv |
AT maryamhajmalek evaluationofecommercesecurityusingshannonentropydempstershaferdstheory AT ahmadtavakoli evaluationofecommercesecurityusingshannonentropydempstershaferdstheory |
_version_ |
1716744336280911873 |