<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE ArticleSet PUBLIC "-//NLM//DTD PubMed 2.7//EN" "https://dtd.nlm.nih.gov/ncbi/pubmed/in/PubMed.dtd">
<ArticleSet>
<Article>
<Journal>
				<PublisherName>Univrsity of Tehran Press</PublisherName>
				<JournalTitle>Industrial Management Journal</JournalTitle>
				<Issn>3115-7386</Issn>
				<Volume>12</Volume>
				<Issue>1</Issue>
				<PubDate PubStatus="epublish">
					<Year>2020</Year>
					<Month>04</Month>
					<Day>20</Day>
				</PubDate>
			</Journal>
<ArticleTitle>A Conceptual Framework for Measuring the Performance of the Information Security Service Supply Chain Based on Meta-synthesize and Fuzzy Delphi Method</ArticleTitle>
<VernacularTitle>ارائه چارچوب مفهومی، برای سنجش عملکرد زنجیره تأمین خدمات امنیت اطلاعات مبتنی بر رویکرد فراترکیب و روش دلفی فازی</VernacularTitle>
			<FirstPage>24</FirstPage>
			<LastPage>46</LastPage>
			<ELocationID EIdType="pii">78096</ELocationID>
			
<ELocationID EIdType="doi">10.22059/imj.2019.283565.1007614</ELocationID>
			
			<Language>EN</Language>
<AuthorList>
<Author>
					<FirstName>Reza</FirstName>
					<LastName>Kalantari</LastName>
<Affiliation>Ph.D. Candidate, Department of Production and Operations Management, Tehran University, Kish International Campus, Kish, Iran.</Affiliation>

</Author>
<Author>
					<FirstName>Ali</FirstName>
					<LastName>Moeini</LastName>
<Affiliation>Prof., Department of Algorithms and Computations, Faculty of Engineering Sciences, College of Engineering Campus, University of Tehran, Tehran, Iran.</Affiliation>

</Author>
<Author>
					<FirstName>Hossein</FirstName>
					<LastName>Safari</LastName>
<Affiliation>Prof., Department of Industrial Management, Faculty of Management, University of Tehran, Tehran, Iran.</Affiliation>

</Author>
<Author>
					<FirstName>ََAbouzar</FirstName>
					<LastName>Arabsorkhi</LastName>
<Affiliation>Assistant Prof., Department of Network and Systems Security Assessment, Reserch Institute for Information and Communication Technology, Tehran, Iran.</Affiliation>

</Author>
</AuthorList>
				<PublicationType>Journal Article</PublicationType>
			<History>
				<PubDate PubStatus="received">
					<Year>2019</Year>
					<Month>06</Month>
					<Day>15</Day>
				</PubDate>
			</History>
		<Abstract>&lt;strong&gt;Objective:&lt;/strong&gt; The purpose of the present study is to identify priority indicators -based on the qualitative analysis of the results of the research carried out- and also to provide a framework for measuring the performance of the information security service supply chain.
&lt;strong&gt;Methods:&lt;/strong&gt; The methodology of this research is essentially descriptive and qualitative and has been carried out in two stages. In the first phase, 133 papers were reviewed, after evaluation, 28 articles were approved. Then, by using the CASP method, finally, 15 articles on the measurement of the performance of the service chain received the minimum score for conducting a qualitative analysis of the content. By reviewing these articles, a conceptual framework for measuring the performance of the service chain was presented in the form of a &quot;logic model&quot;. This model is a tool that illustrates the logic of doing things in the four components of inputs, processes, outputs and outcomes. After verifying the reliability of the results, in the second stage, in order to map the proposed framework into the field of information security services, by referring to ten experts in this field and receiving their views in the three rounds of the Fuzzy Delphi, validation and final modeling of the research was designed.
&lt;strong&gt;Results:&lt;/strong&gt; The evaluation of the performance of the information security service supply chain for 19 indicators and 35 effective sub-indicators, under the logic model, were agreed with the coefficient of coordination of Kendal of 0.742 between experts and specialists.
&lt;strong&gt;Conclusion:&lt;/strong&gt; The review of experts&#039; opinions showed that the sub-indicators of knowledge and skills, the provision of new and up-to-dated security technologies and the confidentiality and security of information make the most important and rate of personnel turnover sub-indicator, assessing the least important in the performance evaluation of the information security services supply chain.</Abstract>
		<ObjectList>
			<Object Type="keyword">
			<Param Name="value">information security</Param>
			</Object>
			<Object Type="keyword">
			<Param Name="value">Fuzzy Delphi</Param>
			</Object>
			<Object Type="keyword">
			<Param Name="value">service supply chain</Param>
			</Object>
			<Object Type="keyword">
			<Param Name="value">Meta-synthesize</Param>
			</Object>
			<Object Type="keyword">
			<Param Name="value">Logic model</Param>
			</Object>
		</ObjectList>
<ArchiveCopySource DocType="pdf">https://imj.ut.ac.ir/article_78096_ad9037e601ec1c4bb0f076afcb7a863a.pdf</ArchiveCopySource>
</Article>
</ArticleSet>
