运筹与管理 ›› 2014, Vol. 23 ›› Issue (1): 151-156.

• 应用研究 • 上一篇    下一篇

组织内部员工信息安全胜任评价模型

柳玉鹏, 曲世友   

  1. 哈尔滨工业大学(威海) 经济管理学院,山东 威海 264209
  • 收稿日期:2012-12-09 出版日期:2014-01-25
  • 作者简介:柳玉鹏(1981-),男,山东龙口人,博士,讲师,主要研究方向为决策理论与方法、组织理论;曲世友(1969-),男,黑龙江哈尔滨人,博士,教授,博士生导师,主要研究方向为技术管理理论与方法、区域技术转移与扩散理论。
  • 基金资助:
    国家自然科学基金(71103048)教育部人文社科基金(12YJC630131)哈尔滨工业大学校基金(HIT(WH)X201102)山东省社会科学规划研究项目(12DGLJ13)

Information Security Competency Evaluation Model for Internal Staff

LIU Yu-peng, QU Shi-you   

  1. Economy and Management School of Harbin Institute of Technology, Weihai 264209, China
  • Received:2012-12-09 Online:2014-01-25

摘要: 针对内部员工信息安全胜任评价这一重要问题,在分析内部信息攻击行为的特点及全面总结胜任特征相关研究成果的基础上,构建了内部员工信息安全胜任特征评价指标体系,在此基础上提出了组织内部员工信息安全胜任特征评价模型。模型基于安全风险防范思想,将评价环节分为两个环节,综合考虑了决策者制定决策偏好和候选员工的个性优势,更实际地反映了候选员工间的差别。最后通过案例分析验证了该评价模型的有效性和实用性。

关键词: 运筹学, 胜任评价模型, 多准则妥协解排序法, 信息安全, 个性优势, 组织内部员工

Abstract: In recent years, more and more evidence shows that the security of information systems and information management within the organization is a major security risk. Therefore, it is particularly urgent and important that internal staff shall be evaluated and a staff competenly information security responsibility is found to eliminate internal attack behaviours of employees and ensure the security of information systems and information management. Consequently information security competency evaluation for internal staff is an important issue. Under the analysis of the characteristics of the aggressive behavior from internal staff and a comprehensive summary of the competency research, internal staff information security competency evaluation index system is built. On this base, organization internal staff information security competency evaluation model is proposed. Based on safety and risk prevention thinking, the model divides the evaluation into two stages and takes into account the personality advantage of the decision makers in decision- making preferences and individuality advantage, which more realistically reflects the difference between the team members. Finally, the effectiveness and practicality of the evaluation model is verified through case analysis.

Key words: operations research, competency evaluation, VIKOR, information security, individuality advantage, internal staff

中图分类号: