How to cite this paper
Putra, I., Octavian, A., Susilo, A & Prabowo, A. (2023). A hybrid AHP-TOPSIS for risk analysis in maritime cybersecurity based on 3D models.Decision Science Letters , 12(4), 759-772.
Refrences
Afenyo, M., & Caesar, L. D. (2023). Maritime cybersecurity threats : Gaps and directions for future research. Ocean and Coastal Management, 236(November 2022), 106493. https://doi.org/10.1016/j.ocecoaman.2023.106493
Akter, S., Debnath, B., & Bari, A. B. M. M. (2022). A grey decision-making trial and evaluation laboratory approach for evaluating the disruption risk factors in the Emergency Life-Saving Drugs supply chains. Healthcare Analytics, 2(October), 100120. https://doi.org/10.1016/j.health.2022.100120
Alcaide, J. I., & Llave, R. G. (2020). Critical infrastructures cybersecurity and the maritime sector. Transportation Research Procedia, 45(2019), 547–554. https://doi.org/10.1016/j.trpro.2020.03.058
Amirshenava, S., & Osanloo, M. (2018). Mine closure risk management: An integration of 3D risk model and MCDM techniques. Journal of Cleaner Production, 184, 389–401. https://doi.org/10.1016/j.jclepro.2018.01.186
Ashraf, I., Park, Y., Hur, S., Kim, S. W., Alroobaea, R., Zikria, Y. Bin, & Nosheen, S. (2022). A Survey on Cyber Security Threats in IoT-Enabled Maritime Industry. IEEE Transactions on Intelligent Transportation Systems, 24(2), 2677–2690. https://doi.org/10.1109/TITS.2022.3164678
Biancini, A. (2016). 3PL provider selection by AHP and TOPSIS methodology. Benchmarking: An International Journal.
Bodeau, D. J., Graubart, R., & Fabius-Greene, J. (2010). Improving cyber security and mission assurance via cyber preparedness (cyber prep) levels. Proceedings - SocialCom 2010: 2nd IEEE International Conference on Social Computing, PASSAT 2010: 2nd IEEE International Conference on Privacy, Security, Risk and Trust, 1147–1152. https://doi.org/10.1109/SocialCom.2010.170
Bolbot, V., Theotokatos, G., Boulougouris, E., & Vassalos, D. (2020). A novel cyber-risk assessment method for ship systems. Safety Science, 131. https://doi.org/10.1016/j.ssci.2020.104908
Boutkhoum, O., Hanine, M., Agouti, T., & Tikniouine, A. (2017). A decision-making approach based on fuzzy AHP-TOPSIS methodology for selecting the appropriate cloud solution to manage big data projects. International Journal of System Assurance Engineering and Management, 8(s2), 1237–1253. https://doi.org/10.1007/s13198-017-0592-x
Bueger, C. (2015). What is maritime security? Marine Policy, 53, 159–164. https://doi.org/10.1016/j.marpol.2014.12.005
Bueger, C., & Edmunds, T. (2020). Blue crime: Conceptualising transnational organised crime at sea. Marine Policy, 119(January), 104067. https://doi.org/10.1016/j.marpol.2020.104067
Çalık, A., Çizmecioğlu, S., & Akpınar, A. (2019). An integrated AHP-TOPSIS framework for foreign direct investment in Turkey. Journal of Multi-Criteria Decision Analysis, 26(5–6), 296–307. https://doi.org/10.1002/mcda.1692
Chang, C.-H., Kontovas, C., Yu, Q., & Yang, Z. (2021). Risk assessment of the operations of maritime autonomous surface ships. Reliability Engineering and System Safety, 207. https://doi.org/10.1016/j.ress.2020.107324
Chapsos, I., & Malcolm, J. A. (2017). Maritime security in Indonesia: Towards a comprehensive agenda? Marine Policy, 76(April 2016), 178–184. https://doi.org/10.1016/j.marpol.2016.11.033
Crotty, J., & Daniel, E. (2022). Cyber threat: its origins and consequence and the use of qualitative and quantitative methods in cyber risk assessment. Applied Computing and Informatics. https://doi.org/10.1108/ACI-07-2022-0178
Desiana, R., & Prima, S. C. (2022). Cyber security policy in Indonesian shipping safety. Journal of Maritime Studies and National Integration, 5(2), 109–117. https://doi.org/10.14710/jmsni.v5i2.13673
Erdogan, M., & Kaya, I. (2019). Prioritizing failures by using hybrid multi criteria decision making methodology with a real case application. Sustainable Cities and Society, 45(2019), 117–130. https://doi.org/10.1016/j.scs.2018.10.027
Erstad, E., Ostnes, R., & Lund, M. S. (2021). An operational approach to maritime cyber resilience. TransNav, 15(1), 27–34. https://doi.org/10.12716/1001.15.01.01
Ganin, A. A., Quach, P., Panwar, M., Collier, Z. A., Keisler, J. M., Marchese, D., & Linkov, I. (2017). Multicriteria Decision Framework for Cybersecurity Risk Assessment and Management. Risk Analysis, 9. https://doi.org/10.1111/risa.12891
Ghelani, D. (2022). Cyber security, cyber threats, implications and future perspectives: A Review. American Journal of Science, Engineering and Technology, 3(6), 12–19. https://doi.org/10.11648/j.XXXX.2022XXXX.XX
Gunes, B., Kayisoglu, G., & Bolat, P. (2021). Cyber security risk assessment for seaports: A case study of a container port. Computers and Security, 103. https://doi.org/10.1016/j.cose.2021.102196
Hareide, O. S., Josok, O., Lund, M. S., Ostnes, R., & Helkala, K. (2018). Enhancing Navigator Competence by Demonstrating Maritime Cyber Security. Journal of Navigation, 71(5), 1025–1039. https://doi.org/10.1017/S0373463318000164
Haugli, M., Soldal, M., Larsen, M. H., Lund, M. S., & Bjørneseth, F. B. (2022). A model of factors influencing deck officers’ cyber risk perception in offshore operations. Maritime Transport Research, 3(March). https://doi.org/10.1016/j.martra.2022.100065
Hwang, C. L., & Yoon, K. (1981). Multiple attribute decision making: Methods and applications. Springer-Verlag. https://doi.org/10.1007/978-3-642-48318-9
Jiang, M., Liu, Y., Lu, J., Qu, Z., & Yang, Z. (2023). Risk assessment of maritime supply chains within the context of the Maritime Silk Road. Ocean and Coastal Management, 231(September 2022), 106380. https://doi.org/10.1016/j.ocecoaman.2022.106380
Kanwal, K., Shi, W., Kontovas, C., Yang, Z., & Chang, C. H. (2022). Maritime cybersecurity: are onboard systems ready? Maritime Policy and Management, 00(00), 1–19. https://doi.org/10.1080/03088839.2022.2124464
Kechagias, E. P., Chatzistelios, G., & Papadopoulos, G. A. (2022). Digital transformation of the maritime industry : A cybersecurity systemic approach. International Journal of Critical Infrastructure Protection, 37(September 2021), 100526. https://doi.org/10.1016/j.ijcip.2022.100526
Kure, H. I., Islam, S., & Razzaque, M. A. (2018). An integrated cyber security risk management approach for a cyber-physical system. Applied Sciences (Switzerland), 8(6). https://doi.org/10.3390/app8060898
Larsen, M. H., & Lund, M. S. (2021). Cyber Risk Perception in the Maritime Domain : A Systematic Literature Review. IEEE Access, 9, 144895–144905. https://doi.org/10.1109/ACCESS.2021.3122433
Lykou, G., Anagnostopoulou, A., & Gritzalis, D. (2019). Smart airport cybersecurity: Threat mitigation and cyber resilience controls. Sensors (Switzerland), 19(1). https://doi.org/10.3390/s19010019
Malatji, M., Marnewick, A. L., & Von Solms, S. (2022). Cybersecurity capabilities for critical infrastructure resilience. Information and Computer Security, 30(2), 255–279. https://doi.org/10.1108/ICS-06-2021-0091
Marnani, C. S., Rumambi, F. J., & Simatupang, H. (2021). Analysis Of Connectivity Indonesia’s Maritime Global Axis Policy With One World One Belt Road China Christine Sri Marnani, Freddy Johanes Rumambi, Haposan Simatupang. Journal Online of Indonesian Defense University, 1(11).
Marzouk, M., & Sabbah, M. (2021). AHP-TOPSIS social sustainability approach for selecting supplier in construction supply chain. Cleaner Environmental Systems, 2(March), 100034. https://doi.org/10.1016/j.cesys.2021.100034
Menon, R. R., & Ravi, V. (2022). Using AHP-TOPSIS methodologies in the selection of sustainable suppliers in an electronics supply chain. Cleaner Materials, 5(February), 100130. https://doi.org/10.1016/j.clema.2022.100130
Mursitama, T. N., & Ying, Y. (2021). Indonesia’s Perception and Strategy toward China’s OBOR Expansion: Hedging with Balancing. Chinese Economy, 54(1), 35–47. https://doi.org/10.1080/10971475.2020.1809816
Noor, M. M. (2022). Addressing cyber security vulnerabilities and initiatives in Malaysia maritime industry. Journal of Maritime Research, 19(3), 89–95. https://www.scopus.com/inward/record.uri?eid=2-s2.0-85144189714&partnerID=40&md5=e37a6a47013e55b704eb6b5789595f7d
Octavian, A., Widjayanto, J., Putra, I. N., Susilo, A. K., & Suharyo, O. S. (2020). Risk analysis of islamic state (Is) network development in southeast asia based on 3d matrix. International Journal of Operations and Quantitative Management, 26(2), 195–223. https://doi.org/10.46970/2020.26.3.3
Park, C., Kontovas, C., Yang, Z., & Chang, C.-H. (2023). A BN driven FMEA approach to assess maritime cybersecurity risks. Ocean and Coastal Management, 235. https://doi.org/10.1016/j.ocecoaman.2023.106480
Park, Changki, Shi, W., Zhang, W., Kontovas, C., & Chang, C. H. (2019). Cybersecurity in the maritime industry: A literature review. 20th Commemorative Annual General Assembly, AGA 2019 - Proceedings of the International Association of Maritime Universities Conference, IAMUC 2019, 79–86.
Progoulakis, I., Rohmeyer, P., & Nikitakos, N. (2021). Cyber physical systems security for maritime assets. Journal of Marine Science and Engineering, 9(12). https://doi.org/10.3390/jmse9121384
Putra, R. D., Supartono, & Deni, D. A. R. (2018). Ancaman Siber dalam Persfektif Pertahanan Negara (Studi Kasus Sistem Pertahanan Semesta). Jurnal Prodi Perang Asimetris, 4(2), 99–120.
Rios Insua, D., Couce-Vieira, A., Rubio, J. A., Pieters, W., Labunets, K., & G. Rasines, D. (2021). An Adversarial Risk Analysis Framework for Cybersecurity. Risk Analysis, 41(1), 16–36. https://doi.org/10.1111/risa.13331
Roege, P. E., Collier, Z. A., Chevardin, V., Chouinard, P., Florin, M. V., Lambert, J. H., Nielsen, K., Nogal, M., & Todorovic, B. (2017). Bridging the gap from cyber security to resilience. In NATO Science for Peace and Security Series C: Environmental Security (Vol. PartF1). https://doi.org/10.1007/978-94-024-1123-2_14
Saaty, T. L. (2008). Decision making with the analytic hierarchy process. International Journal of Services Sciences, 1(1), 83–98. https://doi.org/10.1108/JMTM-03-2014-0020
Saini, S., & Singh, D. (2022). Reckoning with the barriers to Lean implementation in Northern Indian SMEs using the AHP-TOPSIS approach. Journal of Science and Technology Policy Management, 13(3), 683–712. https://doi.org/10.1108/JSTPM-02-2020-0032
Sharma, M., & Sehrawat, R. (2020). A hybrid multi-criteria decision-making method for cloud adoption: Evidence from the healthcare sector. Technology in Society, 61(April), 101258. https://doi.org/10.1016/j.techsoc.2020.101258
Singh, P. K., & Sarkar, P. (2019). A framework based on fuzzy AHP-TOPSIS for prioritizing solutions to overcome the barriers in the implementation of ecodesign practices in SMEs. International Journal of Sustainable Development and World Ecology, 26(6), 506–521. https://doi.org/10.1080/13504509.2019.1605547
Solangi, Y. A., Tan, Q., Mirjat, N. H., Valasai, G. Das, Khan, M. W. A., & Ikram, M. (2019). An integrated Delphi-AHP and fuzzy TOPSIS approach toward ranking and selection of renewable energy resources in Pakistan. Processes, 7(2), 1–31. https://doi.org/10.3390/pr7020118
Subagyo, A. (2018). Sinergi Dalam Menghadapi Ancaman Cyber Warfare. Jurnal Pertahanan & Bela Negara, 5(1), 89–108. https://doi.org/10.33172/jpbh.v5i1.350
Susilo, A. K., Ciptomulyono, U., Putra, I. N., Ahmadi, & Suharyo, O. S. (2019). Navy development strategy to encounter threat of national maritime security using SWOT-fuzzy multi criteria decision making (F-MCDM). Journal of Maritime Research, 16(1), 3–16.
Tissir, N., El Kafhali, S., & Aboutabit, N. (2021). Cybersecurity management in cloud computing: semantic literature review and conceptual framework proposal. Journal of Reliable Intelligent Environments, 7(2), 69–84. https://doi.org/10.1007/s40860-020-00115-0
Tseng, Y. P., Huang, Y. C., Li, M. S., & Jiang, Y. Z. (2022). Selecting Key Resilience Indicators for Indigenous Community Using Fuzzy Delphi Method. Sustainability (Switzerland), 14(4), 1–19. https://doi.org/10.3390/su14042018
Valis, D., & Koucky, M. (2009). Selected overview of risk assessment techniques. Problemy Eksploatacji, 4, 19–32.
Yoo, Y., & Park, H. S. H.-S. H. S. (2021). Qualitative risk assessment of cybersecurity and development of vulnerability enhancement plans in consideration of digitalized ship. Journal of Marine Science and Engineering, 9(6). https://doi.org/10.3390/jmse9060565
Akter, S., Debnath, B., & Bari, A. B. M. M. (2022). A grey decision-making trial and evaluation laboratory approach for evaluating the disruption risk factors in the Emergency Life-Saving Drugs supply chains. Healthcare Analytics, 2(October), 100120. https://doi.org/10.1016/j.health.2022.100120
Alcaide, J. I., & Llave, R. G. (2020). Critical infrastructures cybersecurity and the maritime sector. Transportation Research Procedia, 45(2019), 547–554. https://doi.org/10.1016/j.trpro.2020.03.058
Amirshenava, S., & Osanloo, M. (2018). Mine closure risk management: An integration of 3D risk model and MCDM techniques. Journal of Cleaner Production, 184, 389–401. https://doi.org/10.1016/j.jclepro.2018.01.186
Ashraf, I., Park, Y., Hur, S., Kim, S. W., Alroobaea, R., Zikria, Y. Bin, & Nosheen, S. (2022). A Survey on Cyber Security Threats in IoT-Enabled Maritime Industry. IEEE Transactions on Intelligent Transportation Systems, 24(2), 2677–2690. https://doi.org/10.1109/TITS.2022.3164678
Biancini, A. (2016). 3PL provider selection by AHP and TOPSIS methodology. Benchmarking: An International Journal.
Bodeau, D. J., Graubart, R., & Fabius-Greene, J. (2010). Improving cyber security and mission assurance via cyber preparedness (cyber prep) levels. Proceedings - SocialCom 2010: 2nd IEEE International Conference on Social Computing, PASSAT 2010: 2nd IEEE International Conference on Privacy, Security, Risk and Trust, 1147–1152. https://doi.org/10.1109/SocialCom.2010.170
Bolbot, V., Theotokatos, G., Boulougouris, E., & Vassalos, D. (2020). A novel cyber-risk assessment method for ship systems. Safety Science, 131. https://doi.org/10.1016/j.ssci.2020.104908
Boutkhoum, O., Hanine, M., Agouti, T., & Tikniouine, A. (2017). A decision-making approach based on fuzzy AHP-TOPSIS methodology for selecting the appropriate cloud solution to manage big data projects. International Journal of System Assurance Engineering and Management, 8(s2), 1237–1253. https://doi.org/10.1007/s13198-017-0592-x
Bueger, C. (2015). What is maritime security? Marine Policy, 53, 159–164. https://doi.org/10.1016/j.marpol.2014.12.005
Bueger, C., & Edmunds, T. (2020). Blue crime: Conceptualising transnational organised crime at sea. Marine Policy, 119(January), 104067. https://doi.org/10.1016/j.marpol.2020.104067
Çalık, A., Çizmecioğlu, S., & Akpınar, A. (2019). An integrated AHP-TOPSIS framework for foreign direct investment in Turkey. Journal of Multi-Criteria Decision Analysis, 26(5–6), 296–307. https://doi.org/10.1002/mcda.1692
Chang, C.-H., Kontovas, C., Yu, Q., & Yang, Z. (2021). Risk assessment of the operations of maritime autonomous surface ships. Reliability Engineering and System Safety, 207. https://doi.org/10.1016/j.ress.2020.107324
Chapsos, I., & Malcolm, J. A. (2017). Maritime security in Indonesia: Towards a comprehensive agenda? Marine Policy, 76(April 2016), 178–184. https://doi.org/10.1016/j.marpol.2016.11.033
Crotty, J., & Daniel, E. (2022). Cyber threat: its origins and consequence and the use of qualitative and quantitative methods in cyber risk assessment. Applied Computing and Informatics. https://doi.org/10.1108/ACI-07-2022-0178
Desiana, R., & Prima, S. C. (2022). Cyber security policy in Indonesian shipping safety. Journal of Maritime Studies and National Integration, 5(2), 109–117. https://doi.org/10.14710/jmsni.v5i2.13673
Erdogan, M., & Kaya, I. (2019). Prioritizing failures by using hybrid multi criteria decision making methodology with a real case application. Sustainable Cities and Society, 45(2019), 117–130. https://doi.org/10.1016/j.scs.2018.10.027
Erstad, E., Ostnes, R., & Lund, M. S. (2021). An operational approach to maritime cyber resilience. TransNav, 15(1), 27–34. https://doi.org/10.12716/1001.15.01.01
Ganin, A. A., Quach, P., Panwar, M., Collier, Z. A., Keisler, J. M., Marchese, D., & Linkov, I. (2017). Multicriteria Decision Framework for Cybersecurity Risk Assessment and Management. Risk Analysis, 9. https://doi.org/10.1111/risa.12891
Ghelani, D. (2022). Cyber security, cyber threats, implications and future perspectives: A Review. American Journal of Science, Engineering and Technology, 3(6), 12–19. https://doi.org/10.11648/j.XXXX.2022XXXX.XX
Gunes, B., Kayisoglu, G., & Bolat, P. (2021). Cyber security risk assessment for seaports: A case study of a container port. Computers and Security, 103. https://doi.org/10.1016/j.cose.2021.102196
Hareide, O. S., Josok, O., Lund, M. S., Ostnes, R., & Helkala, K. (2018). Enhancing Navigator Competence by Demonstrating Maritime Cyber Security. Journal of Navigation, 71(5), 1025–1039. https://doi.org/10.1017/S0373463318000164
Haugli, M., Soldal, M., Larsen, M. H., Lund, M. S., & Bjørneseth, F. B. (2022). A model of factors influencing deck officers’ cyber risk perception in offshore operations. Maritime Transport Research, 3(March). https://doi.org/10.1016/j.martra.2022.100065
Hwang, C. L., & Yoon, K. (1981). Multiple attribute decision making: Methods and applications. Springer-Verlag. https://doi.org/10.1007/978-3-642-48318-9
Jiang, M., Liu, Y., Lu, J., Qu, Z., & Yang, Z. (2023). Risk assessment of maritime supply chains within the context of the Maritime Silk Road. Ocean and Coastal Management, 231(September 2022), 106380. https://doi.org/10.1016/j.ocecoaman.2022.106380
Kanwal, K., Shi, W., Kontovas, C., Yang, Z., & Chang, C. H. (2022). Maritime cybersecurity: are onboard systems ready? Maritime Policy and Management, 00(00), 1–19. https://doi.org/10.1080/03088839.2022.2124464
Kechagias, E. P., Chatzistelios, G., & Papadopoulos, G. A. (2022). Digital transformation of the maritime industry : A cybersecurity systemic approach. International Journal of Critical Infrastructure Protection, 37(September 2021), 100526. https://doi.org/10.1016/j.ijcip.2022.100526
Kure, H. I., Islam, S., & Razzaque, M. A. (2018). An integrated cyber security risk management approach for a cyber-physical system. Applied Sciences (Switzerland), 8(6). https://doi.org/10.3390/app8060898
Larsen, M. H., & Lund, M. S. (2021). Cyber Risk Perception in the Maritime Domain : A Systematic Literature Review. IEEE Access, 9, 144895–144905. https://doi.org/10.1109/ACCESS.2021.3122433
Lykou, G., Anagnostopoulou, A., & Gritzalis, D. (2019). Smart airport cybersecurity: Threat mitigation and cyber resilience controls. Sensors (Switzerland), 19(1). https://doi.org/10.3390/s19010019
Malatji, M., Marnewick, A. L., & Von Solms, S. (2022). Cybersecurity capabilities for critical infrastructure resilience. Information and Computer Security, 30(2), 255–279. https://doi.org/10.1108/ICS-06-2021-0091
Marnani, C. S., Rumambi, F. J., & Simatupang, H. (2021). Analysis Of Connectivity Indonesia’s Maritime Global Axis Policy With One World One Belt Road China Christine Sri Marnani, Freddy Johanes Rumambi, Haposan Simatupang. Journal Online of Indonesian Defense University, 1(11).
Marzouk, M., & Sabbah, M. (2021). AHP-TOPSIS social sustainability approach for selecting supplier in construction supply chain. Cleaner Environmental Systems, 2(March), 100034. https://doi.org/10.1016/j.cesys.2021.100034
Menon, R. R., & Ravi, V. (2022). Using AHP-TOPSIS methodologies in the selection of sustainable suppliers in an electronics supply chain. Cleaner Materials, 5(February), 100130. https://doi.org/10.1016/j.clema.2022.100130
Mursitama, T. N., & Ying, Y. (2021). Indonesia’s Perception and Strategy toward China’s OBOR Expansion: Hedging with Balancing. Chinese Economy, 54(1), 35–47. https://doi.org/10.1080/10971475.2020.1809816
Noor, M. M. (2022). Addressing cyber security vulnerabilities and initiatives in Malaysia maritime industry. Journal of Maritime Research, 19(3), 89–95. https://www.scopus.com/inward/record.uri?eid=2-s2.0-85144189714&partnerID=40&md5=e37a6a47013e55b704eb6b5789595f7d
Octavian, A., Widjayanto, J., Putra, I. N., Susilo, A. K., & Suharyo, O. S. (2020). Risk analysis of islamic state (Is) network development in southeast asia based on 3d matrix. International Journal of Operations and Quantitative Management, 26(2), 195–223. https://doi.org/10.46970/2020.26.3.3
Park, C., Kontovas, C., Yang, Z., & Chang, C.-H. (2023). A BN driven FMEA approach to assess maritime cybersecurity risks. Ocean and Coastal Management, 235. https://doi.org/10.1016/j.ocecoaman.2023.106480
Park, Changki, Shi, W., Zhang, W., Kontovas, C., & Chang, C. H. (2019). Cybersecurity in the maritime industry: A literature review. 20th Commemorative Annual General Assembly, AGA 2019 - Proceedings of the International Association of Maritime Universities Conference, IAMUC 2019, 79–86.
Progoulakis, I., Rohmeyer, P., & Nikitakos, N. (2021). Cyber physical systems security for maritime assets. Journal of Marine Science and Engineering, 9(12). https://doi.org/10.3390/jmse9121384
Putra, R. D., Supartono, & Deni, D. A. R. (2018). Ancaman Siber dalam Persfektif Pertahanan Negara (Studi Kasus Sistem Pertahanan Semesta). Jurnal Prodi Perang Asimetris, 4(2), 99–120.
Rios Insua, D., Couce-Vieira, A., Rubio, J. A., Pieters, W., Labunets, K., & G. Rasines, D. (2021). An Adversarial Risk Analysis Framework for Cybersecurity. Risk Analysis, 41(1), 16–36. https://doi.org/10.1111/risa.13331
Roege, P. E., Collier, Z. A., Chevardin, V., Chouinard, P., Florin, M. V., Lambert, J. H., Nielsen, K., Nogal, M., & Todorovic, B. (2017). Bridging the gap from cyber security to resilience. In NATO Science for Peace and Security Series C: Environmental Security (Vol. PartF1). https://doi.org/10.1007/978-94-024-1123-2_14
Saaty, T. L. (2008). Decision making with the analytic hierarchy process. International Journal of Services Sciences, 1(1), 83–98. https://doi.org/10.1108/JMTM-03-2014-0020
Saini, S., & Singh, D. (2022). Reckoning with the barriers to Lean implementation in Northern Indian SMEs using the AHP-TOPSIS approach. Journal of Science and Technology Policy Management, 13(3), 683–712. https://doi.org/10.1108/JSTPM-02-2020-0032
Sharma, M., & Sehrawat, R. (2020). A hybrid multi-criteria decision-making method for cloud adoption: Evidence from the healthcare sector. Technology in Society, 61(April), 101258. https://doi.org/10.1016/j.techsoc.2020.101258
Singh, P. K., & Sarkar, P. (2019). A framework based on fuzzy AHP-TOPSIS for prioritizing solutions to overcome the barriers in the implementation of ecodesign practices in SMEs. International Journal of Sustainable Development and World Ecology, 26(6), 506–521. https://doi.org/10.1080/13504509.2019.1605547
Solangi, Y. A., Tan, Q., Mirjat, N. H., Valasai, G. Das, Khan, M. W. A., & Ikram, M. (2019). An integrated Delphi-AHP and fuzzy TOPSIS approach toward ranking and selection of renewable energy resources in Pakistan. Processes, 7(2), 1–31. https://doi.org/10.3390/pr7020118
Subagyo, A. (2018). Sinergi Dalam Menghadapi Ancaman Cyber Warfare. Jurnal Pertahanan & Bela Negara, 5(1), 89–108. https://doi.org/10.33172/jpbh.v5i1.350
Susilo, A. K., Ciptomulyono, U., Putra, I. N., Ahmadi, & Suharyo, O. S. (2019). Navy development strategy to encounter threat of national maritime security using SWOT-fuzzy multi criteria decision making (F-MCDM). Journal of Maritime Research, 16(1), 3–16.
Tissir, N., El Kafhali, S., & Aboutabit, N. (2021). Cybersecurity management in cloud computing: semantic literature review and conceptual framework proposal. Journal of Reliable Intelligent Environments, 7(2), 69–84. https://doi.org/10.1007/s40860-020-00115-0
Tseng, Y. P., Huang, Y. C., Li, M. S., & Jiang, Y. Z. (2022). Selecting Key Resilience Indicators for Indigenous Community Using Fuzzy Delphi Method. Sustainability (Switzerland), 14(4), 1–19. https://doi.org/10.3390/su14042018
Valis, D., & Koucky, M. (2009). Selected overview of risk assessment techniques. Problemy Eksploatacji, 4, 19–32.
Yoo, Y., & Park, H. S. H.-S. H. S. (2021). Qualitative risk assessment of cybersecurity and development of vulnerability enhancement plans in consideration of digitalized ship. Journal of Marine Science and Engineering, 9(6). https://doi.org/10.3390/jmse9060565