簡易檢索 / 詳目顯示

研究生: 周旺瑩
Wang-Ying Chou
論文名稱: AHP 和 TOPSIS 方法在選擇隱私控制措施的應用 -以臺灣金融機構為例
The application of AHP and TOPSIS methods in privacy control selection - An Empirical Study of Financial Institution in Taiwan
指導教授: 陳正綱
Cheng-Kang Chen
口試委員: 陳正綱
Cheng-Kang Chen
欒斌
Pin Luarn
葉穎蓉
Ying-Jung Yeh
學位類別: 碩士
Master
系所名稱: 管理學院 - 資訊管理系
Department of Information Management
論文出版年: 2021
畢業學年度: 109
語文別: 中文
論文頁數: 129
中文關鍵詞: 金融技術個人身分識別資訊資通訊技術隱私資訊管理系統隱私控制措施多標準決策模糊邏輯層級分析法逼近理想解排序法
外文關鍵詞: FinTech, PII, ICT, PIMS, Privacy controls, MCDM, Fuzzy logic, AHP, TOPSIS
相關次數: 點閱:307下載:8
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 近年來資訊科技創新而演變出新型態的商業模式,特別是金融技術的發展,為提供所服務的客戶科技新體驗,勢必對個人身分識別資訊控制者或處理者的既有作業程序及資料保護風險造成影響。傳統金融機構面臨Fintech帶來的挑戰,在組織資訊治理的議題上,資料保護與隱私風險將一併被受到重視。因此,為確保新興科技所使用的資通訊技術系統或服務具有資料與隱私保護的能力,金融機構將持續關注在設計與規劃適當的隱私控制措施。
    自從歐盟通過「歐盟資料保護一般規則」以來,隱私風險專注在符合隱私和資料保護法律,包括規範跨境傳輸個人身分識別資訊到隱私法律不完善的國家/地區外,卻較少研究針對個人資料檔案安全維護措施的選擇與策略。在臺灣的金融機構並不是沒有現有準則或指引可以依循:BS 10012在安全議題上,透過安全評鑑確認適當安全措施/控制;ISO/IEC 27701也可以延伸ISO/IEC 27002資訊安全控制措施,提供隱私資訊管理系統特定要求的實作指引及其他資訊。如果組織選擇了不適當的隱私控制措施,並且沒有考慮隱私框架中不同的期望或要求,可能導致其所保有的個人資料檔案被竊取、竄改、毀損、滅失或洩漏,結果造成客戶流失、財務損失、甚至傷害聲譽。
    本研究利用多標準決策、層級分析法及逼近理想解排序法,以幫助金融機構確定隱私保護的最佳對策或控制措施優先順序及選擇。此外,我們透過數值案例分析臺灣金融機構逐步利用這方法,對隱私控制措施進行優先排序的情況。


    In recent years, information technology innovation has continued to evolve new business models, especially in the development of Financial Technology (Fin-Tech). For the roles of Personally Identifiable Information (PII) controller or processor, providing new technological experience to the customers is bound to have an impact on the existed operating procedures and data protection risks of organization. Therefore, financial institutions will pay attention to design and plan appropriate privacy controls in order to ensure that the Information and Communication Technology (ICT) systems or services used by emerging technologies have the ability to protect data and privacy.
    Since the European Union (EU) adopted the General Data Protection Regulation (GDPR), privacy risks have focused on compliance with privacy and data protection laws including, for example, regulating cross-border transfer of PII to countries/regions with imperfect privacy laws. However, less of the research subjects were the selection and strategy of PII security measures or controls. In Taiwan, it is not without existing standards or guidelines to follow for financial institutions: In the section of the BS 10012 on security issues, security assessments establish whether existing security controls are adequate; ISO/IEC 27701 is the extension of ISO 27002 guidelines, which provides Privacy Information Management System (PIMS) specific control objectives, controls and additional information. If the organization choose inappropriate privacy controls and measures and fail to consider different expectations or requirements in the privacy framework, this may lead the personal data held by the organization being stolen, altered, damaged, destroyed or disclosed, resulting in customer churn, property loss and even damage reputation.
    This study focuses on utilized the methodologies of the Multi Criteria Decision Making (MCDM), Analytic Hierarchy Process (AHP) and Technique for Order of Preference by Similarity to Ideal Solution (TOPSIS) to help the financial institutions in the prioritization and selection of the best countermeasures or controls. Furthermore, numerical analysis discusses the step by step utilization of the method in Taiwan’s financial institutions for the prioritization of countermeasures or controls in data protection and privacy management.

    目錄 摘要 I ABSTRACT II 誌謝 IV 目錄 V 圖目錄 VII 表目錄 VIII 第壹章、緒論 1 第一節 研究背景與動機 2 第二節 研究目的與重要性 4 第三節 研究架構 6 第貳章、文獻探討 7 第一節 資料保護與隱私的相關標準/指引 7 第二節 多準則決策 15 第三節 模糊層級分析法 17 第四節 逼近理想解排序法 19 第參章、研究方法 20 第一節 識別隱私控制解決方案準則、次準則的要素 21 第二節 模糊AHP 26 第三節 TOPSIS 33 第肆章、研究分析與結果 36 第一節 模糊AHP計算各準則權重 36 第二節 模糊TOPSIS方法評估備選方案 45 第伍章、結論與建議 52 第一節 研究結論 52 第二節 理論貢獻 55 第三節 實務意涵與未來展望 56 參考文獻 57 附錄 62 附錄一 FUZZY AHP專家問卷 62 附錄二 FUZZY TOPSIS問卷 91

    1.Adler, M. and Ziglio, E., (1996), ”Gazing into the Oracle: The Delphi Method and its Application to Social Policy and Public Health”, Jessica Kingsley Publishers.
    2.Almeida, L. and Respı ́cio, A., (2018), “Decision Support for Selecting information Security Controls”, Journal of Decision Systems 27, 173–180.
    3.Al-Safwani, N., Hassan, S. and Katuk, N., (2014), “A Multiple Attribute Decision Making for Improving Information Security Control Assessment”, International Journal of Computer Applications 89, 19–24.
    4.Anwar, M. and Gill, A., (2020), "Developing an Integrated ISO 27701 and GDPR based Information Privacy Compliance Requirements Model", ACIS 2020 Proceedings 20.
    5.Asia-Pacific Economic Cooperation (APEC), (2005), “APEC Information Privacy Principles”, APEC Privacy Framework, 16-40.
    6.Bagher Javanbarg, M., Scawthorn, C., Kiyono, J. and Shahbodaghkhan, B., (2012), “Fuzzy AHP-based Multicriteria Decision Making Systems Using Particle Swarm Optimization”, Expert Systems with Applications 39, 960-966.
    7.Barabanov, A., Markov, A. and Tsirlov, V., (2018), “Information Security Controls Against Cross-Site Request Forgery Attacks on Software Applications of Automated Systems”, IOP Publishing, 042034.
    8.Barnard, L. and Von Solms, R., (2000), “A Formalized Approach to the Effective Selection and Evaluation of Information Security Controls”, Computers & Security 19, 185–194.
    9.Buckley, J. J., (1985), “Fuzzy Hierarchical Analysis”, Fuzzy Sets and Systems 17(3), 233-247.
    10.Chang, D. Y. (1996), “Applications of the extent analysis method on fuzzy AHP”, European Journal of Operational Research 95, 649-55.
    11.De Haes, S. and Van Grembergen, W., (2020), “COBIT as a Framework for Enterprise Governance of IT”, Enterprise Governance of Information Technology, 125-162.
    12.Dorfleitner, G. and Hornuf, L., (2019), “FinTech and Data Privacy in Germany: An Empirical Analysis with Policy Recommendations”, Springer International Publishing.
    13.European Parliament and Council of the European Union, (1995), “European Directive 95/46/EC”, https://europa.eu/.
    14.European Parliament and Council of the European Union, (2016), “General Data Protection Regulation (EU) 2016/679”, https://europa.eu/.
    15.Financial Supervisory Commission R.O.C. (Taiwan), (2016), “Regulations Governing the Financial Supervisory Commission's Security Measures Plan for Personal Information Files at Private Agencies”, https://law.moj.gov.tw/.
    16.Hwang, C. L. and Yoon, K., (1981), “Multiple Attribute Decision Making Methods and Applications”, Springer-Verlag, New York.
    17.Imran Tariq, M., Tayyaba, S., Ali Mian, N., Shahzad Sarfraz, M., De-la-Hoz-Franco, E., Shariq Aziz Butt, Santarcangelo, V. and Rad, D. V., (2020), “Combination of AHP and TOPSIS Methods for the Ranking of Information Security Controls to Overcome its Obstructions under Fuzzy Environment”, Journal of Intelligent & Fuzzy Systems 38, 6075–6088.
    18.International Organization for Standardization (ISO) and International Electrotechnical Commission (IEC), (2011), “ISO/IEC 29100: Information Technology — Security techniques — Privacy Framework”, https://www.iso.org/.
    19.International Organization for Standardization (ISO) and International Electrotechnical Commission (IEC), (2013), “ISO/IEC 27001: Information Technology — Security techniques — Information Security Management Systems — Requirements”, https://www.iso.org/.
    20.International Organization for Standardization (ISO) and International Electrotechnical Commission (IEC), (2013), “ISO/IEC 27002: Information Technology — Security Techniques — Code of Practice for Information Security Management”, https://www.iso.org/.
    21.International Organization for Standardization (ISO) and International Electrotechnical Commission (IEC), (2015), “ISO/IEC 27017: Information Technology — Security Techniques — Code of Practice for Information Security Controls based on ISO/IEC 27002 for Cloud Services”, https://www.iso.org/.
    22.International Organization for Standardization (ISO) and International Electrotechnical Commission (IEC), (2019), “ISO/IEC 27018: Information Technology — Security Techniques — Code of Practice for Protection of Personally Identifiable Information (PII) in public Clouds Acting as PII Processors”, https://www.iso.org/.
    23.International Organization for Standardization (ISO) and International Electrotechnical Commission (IEC), (2019), “ISO/IEC 27701: Security Techniques — Extension to ISO/IEC 27001 and ISO/IEC 27002 for Privacy Information Management — Requirements and Guidelines”, https://www.iso.org/.
    24.International Organization for Standardization (ISO) and International Electrotechnical Commission (IEC), (2021), “ISO/IEC Directives, Part 1 Procedures for the Technical Work: Consolidated ISO SupplementㅡProcedures Specific to ISO”, https://www.iso.org/.
    25.Junior, F. R. L., Osiro, L. and Carpinetti, L.C.R., (2014), “A Comparison between Fuzzy AHP and Fuzzy TOPSIS Methods to Supplier Selection”, Applied Soft Computing 21, 194–209.
    26.Khajouei, H., Kazemi, M. and Moosavirad, S. H., (2017), “Ranking Information Security Controls by Using Fuzzy Analytic Hierarchy Process”, Information Systems and E-Business Management 15, 1–19.
    27.Khalif, K., Naim, K. M., Gegov, A., Bakar, A. and Syafadhli, A., (2017), “Hybrid Fuzzy MCDM Model for Z-numbers Using Intuitive Vectorial Centroid”, Journal of Intelligent & Fuzzy Systems 33, 791–805.
    28.Lin, H. F., (2013), “Determining the Relative Importance of Mobile Banking Quality Factors”, Computer Standards & Interfaces 35(2), 195-204.
    29.Llanso ́, T., (2012), “CIAM: A Data-driven Approach for Selecting and Prioritizing Security Controls”, IEEE, 1–8.
    30.Lv, J. J., Zhou, Y. S. and Wang, Y.Z., (2011), “A Multi-criteria Evaluation Method of Information Security Controls”, 2011 Fourth International Joint Conference on Computational Sciences and Optimization, 190–194.
    31.McCandless, D. and Evans, T., (March 2021), “World’s Biggest Data Breaches & Hacks”, https://informationisbeautiful.net/visualizations/worlds-biggest-data-breaches-hacks/.
    32.Natarajan, T., Balasubramanian, S. A. and Manickavasagam, S., (2010), “Customer’s Choice amongst Self Service Technology (SST) Channels in Retail Banking: A Study Using Analytical Hierarchy Process (AHP)”, Journal of Internet Banking and Commerce 15(2), 1-16.
    33.National Development Council of the Executive Yuan, R.O.C., (2016), “Personal Data Protection Act”, https://law.moj.gov.tw/.
    34.National Development Council of the Executive Yuan, R.O.C., (2016), “Enforcement Rules of the Personal Data Protection Act”, https://law.moj.gov.tw/.
    35.Organization for Economic Cooperation and Development (OECD), (2013), “Recommendation of the Council concerning Guidelines governing the Protection of Privacy and Transborder Flows of Personal Data”, The OECD Privacy Framework, 11-17.
    36.Otero, A.R., Tejay, G., Otero, L. D. and Ruiz-Torres, A. J., (2012), “A Fuzzy Logic-based Information Security Control Assessment for Organizations”, IEEE, 1–6.
    37.Phan, K. and Daim, T., (2011), “Exploring Technology Acceptance for Mobile Services”, Journal of Industrial Engineering and Management 4(2), 339-360.
    38.Rees Safari, M. and Jiang, Q., (2018), “The Theory and Practice of IT Governance Maturity and Strategies Alignment: Evidence from Banking Industry”, Journal of Global Information Management 26(2), 127-146.
    39.Ribeiro, J. and Gomes, R., (2009), “IT Governance Using COBIT Implemented in A High Public Educational Institution: a Case Study”, Computing and Computational Intelligence, 41-52.
    40.Saaty, T. L., (1980), “The Analytic Hierarchy Process”, McGraw-Hill, New York.
    41.Saaty T. L. and Kearns, K. P., (1985), “Analytic Planning: The Organization of Systems”, Pergamon Press, UK.
    42.Saaty, T. L., (1988), “What is the Analytic Hierarchy Process?”, Mathematical Models for Decision Support, Springer, 109–121.
    43.Saaty, T. L., (1990), “Decision Making For Leaders-the Analytic Hierarchy Process for Decisions in a Complex World”, RWS Publications.
    44.The British Standards Institution (BSI), (2017), “BS 10012: Data Protection. Specification for A Personal Information Management System”, https://www.bsigroup.com/.
    45.Van Laarhoven, P. J. M. and Pedrycz, W., (1983), “A Fuzzy Extension of Saaty's Priority Theory”, Fuzzy Sets and Systems 11(1–3), 229-241
    46.Wang, T. C. and Lee, H. D., (2009), “Developing a Fuzzy TOPSIS Approach Based on Subjective Weights and Objective Weights”, Expert Systems with Applications 36(5), 8980-8985.
    47.Wind, Y. and Saaty, T. L., (1980), “Marketing Applications of the Analytic Hierarchy Process”, Management Science 26(7), 641-658.
    48.Yong, D., (2006), “Plant Location Selection Based on Fuzzy TOPSIS”, The International Journal of Advanced Manufacturing Technology 28, 839–844.
    49.Yoon, K. P. and Hwang, C. L., (1985), “Manufacturing plant location analysis by multiple attribute decision making: Part I single-plant strategy”, International Journal of Production Research 23(2), 345-359.
    50.Yoon, K. P. and Hwang, C. L., (1995), “Multiple Attribute Decision Making: An Introduction”, Quantitative Applications in the Social Sciences 104.
    51.Zadeh, L. A., (1965), “Fuzzy sets”, Information and Control 8, 338-353.
    52.Zadeh, L. A., (1975), “Fuzzy Logic and Approximate Reasoning”, Synthese 30, 407-428.
    53.Zimmermann, H. J., (1991), “Fuzzy Set Theory and Its Applications”, Springer, Dordrecht.

    無法下載圖示
    全文公開日期 2024/09/09 (校外網路)
    全文公開日期 2024/09/09 (國家圖書館:臺灣博碩士論文系統)
    QR CODE