Vol.7, No.3, August 2018.                                                                                                                                                                             ISSN: 2217-8309

                                                                                                                                                                                                                eISSN: 2217-8333

 

TEM Journal

 

TECHNOLOGY, EDUCATION, MANAGEMENT, INFORMATICS

Association for Information Communication Technology Education and Science


The AHP Method Implementation for ERP Software Selection with Regard to the Data Protection Criteria

 

Marcela Malindzakova, Dominik Puskas

 

© 2018 Marcela Malindzakova, published by UIKTEN. This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License. (CC BY-NC-ND 4.0)

 

Citation Information: TEM Journal. Volume 7, Issue 3, Pages 607-611, ISSN 2217-8309, DOI: 10.18421/TEM73-17, August 2018.

 

Received: 10 May 2018
Accepted: 16 July 2018
Published: 27 August 2018

 

Abstract:

 

The area of planning, management and process level assessment in enterprises, whether in small firms or multinationals companies, requires flexible and quality information systems. Within any company the management of the information system plays an important role. Throughout the organization, rapid and accurate transmission of information through information channels is needed, where there is a possibility for the application of basic logistics principles (system approach, coordination, planning, algorithmic thinking, global optimization). The need for information transfer, management as well as information systems is to identify and review criteria to ensure the flexibility and quality of the process level. The aim of this paper is to analyse the criteria for selecting the information system into a production company using the AHP method. In addition to the criteria for choosing an information system, the need to protect proprietary information assets is also required. The protection of information assets involves identifying and analysing risk criteria with a link to security risks for selected processes.

 

Keywords –Data protection, Information strategy, Security of IS, Risk criteria.

 

-----------------------------------------------------------------------------------------------------------

Full text PDF >  

-----------------------------------------------------------------------------------------------------------

 


Copyright © 2012-2018 UIKTEN, All Rights reserved
Copyright licence: All articles are licenced via Creative Commons CC BY-NC-ND 4.0 licence