How-Ming Shieh
National Central University
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by How-Ming Shieh.
Information Sciences | 2013
Yu-Ping Ou Yang; How-Ming Shieh; Gwo-Hshiung Tzeng
As companies and organizations have grown to rely on their computer systems and networks, the issue of information security management has become more significant. To maintain their competitiveness, enterprises should safeguard their information and try to eliminate the risk of information being compromised or reduce this risk to an acceptable level. This paper proposes an information security risk-control assessment model that could improve information security for these companies and organizations. We propose an MCDM model combining VIKOR, DEMATEL, and ANP to solve the problem of conflicting criteria that show dependence and feedback. In addition, an empirical application of evaluating the risk controls is used to illustrate the proposed method. The results show that our proposed method can be effective in helping IT managers validate the effectiveness of their risk controls.
International Journal of Information Technology and Decision Making | 2009
Yu-Ping Ou Yang; How-Ming Shieh; Jun Der Leu; Gwo-Hshiung Tzeng
Most multicriteria methods focus on ranking and selecting from a set of alternatives. These methods are usually used to compare all alternatives based on the synthesized scorings within a normalized scale with respect to the same criteria in multicriteria problems. However, the decision makers often simultaneously manage one or several alternatives/projects with conflicting and noncommensurable criteria to reduce the gaps to achieve the aspired grade in practice. They then need to rank the gaps that have not been reduced or improved (the unimproved gaps) for the alternatives/projects or aspects of a project to get the most benefit. Because these compared alternatives/projects do not usually have the same criteria/aspects, traditional methods are unsuitable to deal with them. Thus, this research proposes a new VIKOR method to solve this problem; this new method allows the decision maker to understand these gaps of the projects/aspects and rank them to improve these large gaps in control items to achieve the aspired level. Its concept originates in compromise solutions, in particular the VIKOR method. In addition, this research also provides an example of improving information security risk to demonstrate the suitability of this new method. The results show the effectiveness of the new method.
Knowledge Based Systems | 2010
How-Ming Shieh; Gwo-Hshiung Tzeng
The classical Rough Set Theory (RST) always generates too many rules, making it difficult for decision makers to choose a suitable rule. In this study, we use two processes (pre process and post process) to select suitable rules and to explore the relationship among attributes. In pre process, we propose a pruning process to select suitable rules by setting up a threshold on the support object of decision rules, to thereby solve the problem of too many rules. The post process used the formal concept analysis from these suitable rules to explore the attribute relationship and the most important factors affecting decision making for choosing behaviours of personal investment portfolios. In this study, we explored the main concepts (characteristics) for the conservative portfolio: the stable job, less than 4 working years, and the gender is male; the moderate portfolio: high school education, the monthly salary between NT
European Journal of Operational Research | 2010
How-Ming Shieh; Gwo-Hshiung Tzeng; Shu-Huei Hsieh
30,001 (US
Journal of The Chinese Institute of Industrial Engineers | 2001
How-Ming Shieh; Ming-Der May
1000) and NT
intelligent information systems | 2011
Yu-Ping Ou Yang; How-Ming Shieh; Gwo-Hshiung Tzeng; Leon Yen; Chien-Chung Chan
80,000 (US
RSCTC '08 Proceedings of the 6th International Conference on Rough Sets and Current Trends in Computing | 2008
Yu-Ping Ou Yang; How-Ming Shieh; Gwo-Hshiung Tzeng; Leon Yen; Chien-Chung Chan
2667), the gender is male; and the aggressive portfolio: the monthly salary between NT
Applied Soft Computing | 2011
How-Ming Shieh; Gwo-Hshiung Tzeng
30,001 (US
multiple criteria decision making | 2009
Yu-Ping Ou Yang; How-Ming Shieh; Gwo-Hshiung Tzeng
1000) and NT
Transportation Planning and Technology | 1989
Gwo-Hshiung Tzeng; How-Ming Shieh; Tzay-An Shiau
80,000 (US