Comparisons of Bitcoin Cryptosystem with Other Common Internet Transaction Systems by AHP Technique
Journal Title: Journal of Information and Organizational Sciences - Year 2017, Vol 41, Issue 1
Abstract
This paper describes proposed methodology for evaluation of critical systems and prioritization of critical risks and assets identified in highly secured information systems. For different types of information assets or security environments it is necessary to apply different techniques and methods for their prioritization and evaluation. In this article, VECTOR matrix method for prioritization of critical assets and critical risks is explained and integrated into AHP (Analytic Hierarchy Process) technique as a set of fixed criteria for evaluation of defined alternatives. Bitcoin cryptocurrency was compared and evaluated along with other common Internet transaction systems by information security professionals according to defined VECTOR criteria. Also, the newly proposed hybrid AHP model is presented with potential case studies for future research. This article tries to discover security posture of Bitcoin cryptocurrency in the context of information security risks related to the existing most common online payment systems like e-banking, m-banking, and e-commerce.
Authors and Affiliations
Davor Maček, Dino Alagić
Emotion-Based Content Personalization in Social Networks
Personalization is the process of customizing social network pages of users according to their needs and personal interests. It can also be used for filtering unwanted information from an individual's page received from...
Merkle-Damgård Construction Method and Alternatives: A Review
Cryptographic hash function is an important cryptographic tool in the field of information security. Design of most widely used hash functions such as MD5 and SHA-1 is based on the iterations of compression function by M...
Performance Measurement of Complex Event Platforms
The aim of this paper is to find and compare existing solutions of complex event processing platforms (CEP). CEP platforms generally serve for processing and/or predicting of high frequency data. We intend to use CEP pla...
Comparison of DPSK and RZ-DPSK Modulations in Optical Channel with Speed of 10 Gbps
This article is devoted to the problematic of error rate and modulations in optical communication. Optic waveguide shows insufficiencies in high speed transfers manifested by corrupted transfer. Although modern technolog...
Utilization of Discrete Event Simulation in Business Processes Management Projects: a Literature Review
Discrete event simulation (DES) software is often used in business process management (BPM) projects, in order to support modeling, change and automatization of process modeling. However, the current research lacks syste...