Picture of server farm and IT infrastructure

Where technology & law meet: Open Access research on data security & its regulation ...

Strathprints makes available Open Access scholarly outputs exploring both the technical aspects of computer security, but also the regulation of existing or emerging technologies. A research specialism of the Department of Computer & Information Sciences (CIS) is computer security. Researchers explore issues surrounding web intrusion detection techniques, malware characteristics, textual steganography and trusted systems. Digital forensics and cyber crime are also a focus.

Meanwhile, the School of Law and its Centre for Internet Law & Policy undertake studies on Internet governance. An important component of this work is consideration of privacy and data protection questions and the increasing focus on cybercrime and 'cyberterrorism'.

Explore the Open Access research by CIS on computer security or the School of Law's work on law, technology and regulation. Or explore all of Strathclyde's Open Access research...

Interactive multicriteria methods in portfolio decision analysis

Argyris, Nikolaos and Figueira, José Rui and Morton, Alec (2011) Interactive multicriteria methods in portfolio decision analysis. In: Portfolio Decision Analysis. Springer-Verlag, 9781441999429, pp. 107-130.

Full text not available in this repository. Request a copy from the Strathclyde author


Decision Analysis is a constructive, learning process. This is particularly true of Portfolio Decision Analysis (PDA) where the number of elicitation judgements is typically very large and the alternatives under consideration are a combinatorial set and so cannot be listed and examined explicitly. Consequently, PDA is to some extent an interactive process. In this chapter we discuss what form that interactivity might take, discussing first of all how the process of asking for judgements should be staged and managed, and secondly what assumptions should be made about the substantive value models which the analyst assumes. To make the discussion concrete, we present two interactive procedures based on extended dominance concepts which assume linear additive and concave piecewise-linear additive value functions, respectively.