SlideShare a Scribd company logo
1 of 18
(MC²)²: A GenericDecision-Making Framework anditsApplicationtoCloud Computing Michael Menzel1, Marten Schönherr2, Jens Nimis1, Stefan Tai31FZI Karslruhe, 2T-Labs Berlin, 3KIT Karslruhe
“Which IT infrastructure?“ iscomplex Existingapproachesonlyconsidercostaspects! Operationsresearch: Ngwenyama/Bryson[1] proposetransactioncosts Cloudspecific Armbrust2:cpuhourcostsofcloud vs. Datacenter Cloudspecific Walker3: netpresentvalueofleasingorbuying CPU Considering also non-costfactorsrequiresextensionofexistingapproaches => multi-criteriadecision-making (MCDM): Multi-criteriadecision-makingaloneisnot sufficient !=> 	supportandcustomizationof multi-criteriadecision-making in a framework Motivation of (MC²)² [1] Ngwenyama, O. & Bryson, N. (1999), 'Making the information systems outsourcing decision: A transaction cost approach to analyzing outsourcing decision problems', European Journal of Operational Research 115(2), 351-367.  [2] Armbrust, M.; Fox, A.; Griffith, R.; Joseph, A.; Katz, R.; Konwinski, A.; Lee, G.; Patterson, D.; Rabkin, A.; Stoica, I. & others (2009), 'Abovetheclouds: A berkeleyviewofcloudcomputing', EECS Department, University ofCalifornia, Berkeley, Tech. Rep. UCB/EECS-2009-28. [3] Walker, E. (2009), 'The Real Cost of a CPU Hour', Computer 42, 35-41.
(MC²)² Framework
Processdescribedby (MC²)² ,[object Object]
Useinformationresourcesto find alternatives, criteria, andrequirements
Choose an appropriate multi-criteriadecision-makingmethod
Configuremethodby e.g. definingweights, dependenciesofcriteria
ApplyMethod,[object Object]
Summary:  New CRM softwareforExamChoccompany Mustbecostefficient Mustbeverysecure Loadprofileknown (roughly) Support green IT Example – scenario The scenario of this example shall address the widely articulated IT infrastructure decision-making problem. Consider a chocolate producing company called ―ExamChoc‖, which needs to make an IT infrastructure decision on the deployment of a new Customer Relationship Management (CRM) software system. After a long analysis by the company’s chair it is decided that the solution has to be cost efficient and very secure at the same time. The chair based the decision on the current economic situation the organization has to cope with and on the company’s regulations that require a high security level for customer data.  Due to the nature of ExamChoc’s business the usage statistics of the CRM software are forecasted to be very seasonally varying. Also, the software will not be in use between 6 pm and 8 am as very strict policies for working hours are set upon the employees.  Additionally, the company cares about its corporate responsibility strongly and, thus, is supporting green IT approaches whenever possible.
A1. In-housedatacenterinstallation A2. 3rd-party provider A3. IaaSprovider Example – alternatives
C1. Security & Reliability C1.1. Data safety level of the infrastructure  C1.2. Reliability of the infrastructure  C1.3. Data security level in the infrastructure  C1.4. Security level of data transmissions from and to the infrastructure  C2. Benefits C2.1. Number of resources available  C2.2. Green IT: power consumption during usage  C3. CloudTCOcriteria C3.1. Uptime costs for dynamic usage  C3.2. Costsforsecurity C3.3. Initial upfrontcosts C3.4. Administration costs C3.5. Costs for internet connection  C3.6. Research costs for hardware  Example – criteria
R1. Trustworthiness of the provider  R2. Green IT: minimum power consumption per hour per server  Example - requirements
Wechoose: ANP – Analytic Network Process Supports complexcriteriadependencies Considers qualitative criteria Results on absolute scale (0-1) in othercasesothermethodsmight fit better MAUT Promethée … Example – choose multi-criteriadecision-makingmethod
Example – configure multi-criteriadecision-makingmethod
Example – evaluationmethod
Requirementsfulfilledby in-house, IaaS Apply ANP Pairwisecomparisonsof in-house, IaaSregardingcriteria Calculateresultsforcriterianetworks Applyindices Example – evaluationmethod
Example – evaluationmethod
Example - results ANP results: Indices formulas: Indices results:

More Related Content

What's hot

sumerian_datacenter-consolidation-white_paper
sumerian_datacenter-consolidation-white_papersumerian_datacenter-consolidation-white_paper
sumerian_datacenter-consolidation-white_paper
Kelly Moscrop
 
Outlier detection for high dimensional data
Outlier detection for high dimensional dataOutlier detection for high dimensional data
Outlier detection for high dimensional data
Parag Tamhane
 

What's hot (9)

REDUCING THE COGNITIVE LOAD ON ANALYSTS THROUGH HAMMING DISTANCE BASED ALERT ...
REDUCING THE COGNITIVE LOAD ON ANALYSTS THROUGH HAMMING DISTANCE BASED ALERT ...REDUCING THE COGNITIVE LOAD ON ANALYSTS THROUGH HAMMING DISTANCE BASED ALERT ...
REDUCING THE COGNITIVE LOAD ON ANALYSTS THROUGH HAMMING DISTANCE BASED ALERT ...
 
Aa31163168
Aa31163168Aa31163168
Aa31163168
 
Recapitulation Workshop Cloud Reliability Resilience 2016
Recapitulation Workshop Cloud Reliability Resilience 2016Recapitulation Workshop Cloud Reliability Resilience 2016
Recapitulation Workshop Cloud Reliability Resilience 2016
 
IRJET- Error Reduction in Data Prediction using Least Square Regression Method
IRJET- Error Reduction in Data Prediction using Least Square Regression MethodIRJET- Error Reduction in Data Prediction using Least Square Regression Method
IRJET- Error Reduction in Data Prediction using Least Square Regression Method
 
sumerian_datacenter-consolidation-white_paper
sumerian_datacenter-consolidation-white_papersumerian_datacenter-consolidation-white_paper
sumerian_datacenter-consolidation-white_paper
 
Grid computing 12
Grid computing 12Grid computing 12
Grid computing 12
 
I1803035762
I1803035762I1803035762
I1803035762
 
Outlier detection for high dimensional data
Outlier detection for high dimensional dataOutlier detection for high dimensional data
Outlier detection for high dimensional data
 
Big Data For Flight Delay Report
Big Data For Flight Delay ReportBig Data For Flight Delay Report
Big Data For Flight Delay Report
 

Similar to (MC²)²: A Generic Decision-Making Framework and its Application to Cloud Computing

Protection of data using linear programming and fhe technique in cloud computing
Protection of data using linear programming and fhe technique in cloud computingProtection of data using linear programming and fhe technique in cloud computing
Protection of data using linear programming and fhe technique in cloud computing
IAEME Publication
 
Maintaining Secure Cloud by Continuous Auditing
Maintaining Secure Cloud by Continuous AuditingMaintaining Secure Cloud by Continuous Auditing
Maintaining Secure Cloud by Continuous Auditing
ijtsrd
 
Secure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorizationSecure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorization
IAEME Publication
 
Secure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorizationSecure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorization
IAEME Publication
 
Models in the Cloud
Models in the CloudModels in the Cloud
Models in the Cloud
SimulationX
 
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud ComputingDistributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
AIRCC Publishing Corporation
 
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
AIRCC Publishing Corporation
 
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
ijcsit
 
MajorProject_AnilSharma
MajorProject_AnilSharmaMajorProject_AnilSharma
MajorProject_AnilSharma
Anil Sharma
 

Similar to (MC²)²: A Generic Decision-Making Framework and its Application to Cloud Computing (20)

Protection of data using linear programming and fhe technique in cloud computing
Protection of data using linear programming and fhe technique in cloud computingProtection of data using linear programming and fhe technique in cloud computing
Protection of data using linear programming and fhe technique in cloud computing
 
Analysis of Cloud Computing Security Concerns and Methodologies
Analysis of Cloud Computing Security Concerns and MethodologiesAnalysis of Cloud Computing Security Concerns and Methodologies
Analysis of Cloud Computing Security Concerns and Methodologies
 
Maintaining Secure Cloud by Continuous Auditing
Maintaining Secure Cloud by Continuous AuditingMaintaining Secure Cloud by Continuous Auditing
Maintaining Secure Cloud by Continuous Auditing
 
Best Practices for Microsoft-Based Plant Software Address Reliability, Cost, ...
Best Practices for Microsoft-Based Plant Software Address Reliability, Cost, ...Best Practices for Microsoft-Based Plant Software Address Reliability, Cost, ...
Best Practices for Microsoft-Based Plant Software Address Reliability, Cost, ...
 
IRJET- SAAS Attacks Defense Mechanisms and Digital Forensic
IRJET-  	  SAAS Attacks Defense Mechanisms and Digital ForensicIRJET-  	  SAAS Attacks Defense Mechanisms and Digital Forensic
IRJET- SAAS Attacks Defense Mechanisms and Digital Forensic
 
Top Cited Papers - International Journal of Network Security & Its Applicatio...
Top Cited Papers - International Journal of Network Security & Its Applicatio...Top Cited Papers - International Journal of Network Security & Its Applicatio...
Top Cited Papers - International Journal of Network Security & Its Applicatio...
 
A Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
A Trusted TPA Model, to Improve Security & Reliability for Cloud StorageA Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
A Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
 
Secure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorizationSecure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorization
 
Secure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorizationSecure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorization
 
Evaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing EnvironmentsEvaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing Environments
 
Models in the Cloud
Models in the CloudModels in the Cloud
Models in the Cloud
 
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
 
Cloud Computing Task Scheduling Algorithm Based on Modified Genetic Algorithm
Cloud Computing Task Scheduling Algorithm Based on Modified Genetic AlgorithmCloud Computing Task Scheduling Algorithm Based on Modified Genetic Algorithm
Cloud Computing Task Scheduling Algorithm Based on Modified Genetic Algorithm
 
Top Cited Papers - International Journal of Network Security & Its Applicatio...
Top Cited Papers - International Journal of Network Security & Its Applicatio...Top Cited Papers - International Journal of Network Security & Its Applicatio...
Top Cited Papers - International Journal of Network Security & Its Applicatio...
 
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud ComputingDistributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
 
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
 
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
 
MajorProject_AnilSharma
MajorProject_AnilSharmaMajorProject_AnilSharma
MajorProject_AnilSharma
 
Network performance - skilled craft to hard science
Network performance - skilled craft to hard scienceNetwork performance - skilled craft to hard science
Network performance - skilled craft to hard science
 
What is Edge Computing and Why does it matter in IoT?
What is Edge Computing and Why does it matter in IoT?What is Edge Computing and Why does it matter in IoT?
What is Edge Computing and Why does it matter in IoT?
 

Recently uploaded

Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
FIDO Alliance
 
Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for Success
UXDXConf
 

Recently uploaded (20)

Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджера
 
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
 
TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024
 
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
 
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoft
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 Warsaw
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
 
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The InsideCollecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
 
Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for Success
 
Using IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandUsing IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & Ireland
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
 
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform Engineering
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptx
 
Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024
 

(MC²)²: A Generic Decision-Making Framework and its Application to Cloud Computing

  • 1. (MC²)²: A GenericDecision-Making Framework anditsApplicationtoCloud Computing Michael Menzel1, Marten Schönherr2, Jens Nimis1, Stefan Tai31FZI Karslruhe, 2T-Labs Berlin, 3KIT Karslruhe
  • 2. “Which IT infrastructure?“ iscomplex Existingapproachesonlyconsidercostaspects! Operationsresearch: Ngwenyama/Bryson[1] proposetransactioncosts Cloudspecific Armbrust2:cpuhourcostsofcloud vs. Datacenter Cloudspecific Walker3: netpresentvalueofleasingorbuying CPU Considering also non-costfactorsrequiresextensionofexistingapproaches => multi-criteriadecision-making (MCDM): Multi-criteriadecision-makingaloneisnot sufficient !=> supportandcustomizationof multi-criteriadecision-making in a framework Motivation of (MC²)² [1] Ngwenyama, O. & Bryson, N. (1999), 'Making the information systems outsourcing decision: A transaction cost approach to analyzing outsourcing decision problems', European Journal of Operational Research 115(2), 351-367. [2] Armbrust, M.; Fox, A.; Griffith, R.; Joseph, A.; Katz, R.; Konwinski, A.; Lee, G.; Patterson, D.; Rabkin, A.; Stoica, I. & others (2009), 'Abovetheclouds: A berkeleyviewofcloudcomputing', EECS Department, University ofCalifornia, Berkeley, Tech. Rep. UCB/EECS-2009-28. [3] Walker, E. (2009), 'The Real Cost of a CPU Hour', Computer 42, 35-41.
  • 4.
  • 6. Choose an appropriate multi-criteriadecision-makingmethod
  • 8.
  • 9. Summary: New CRM softwareforExamChoccompany Mustbecostefficient Mustbeverysecure Loadprofileknown (roughly) Support green IT Example – scenario The scenario of this example shall address the widely articulated IT infrastructure decision-making problem. Consider a chocolate producing company called ―ExamChoc‖, which needs to make an IT infrastructure decision on the deployment of a new Customer Relationship Management (CRM) software system. After a long analysis by the company’s chair it is decided that the solution has to be cost efficient and very secure at the same time. The chair based the decision on the current economic situation the organization has to cope with and on the company’s regulations that require a high security level for customer data. Due to the nature of ExamChoc’s business the usage statistics of the CRM software are forecasted to be very seasonally varying. Also, the software will not be in use between 6 pm and 8 am as very strict policies for working hours are set upon the employees. Additionally, the company cares about its corporate responsibility strongly and, thus, is supporting green IT approaches whenever possible.
  • 10. A1. In-housedatacenterinstallation A2. 3rd-party provider A3. IaaSprovider Example – alternatives
  • 11. C1. Security & Reliability C1.1. Data safety level of the infrastructure C1.2. Reliability of the infrastructure C1.3. Data security level in the infrastructure C1.4. Security level of data transmissions from and to the infrastructure C2. Benefits C2.1. Number of resources available C2.2. Green IT: power consumption during usage C3. CloudTCOcriteria C3.1. Uptime costs for dynamic usage C3.2. Costsforsecurity C3.3. Initial upfrontcosts C3.4. Administration costs C3.5. Costs for internet connection C3.6. Research costs for hardware Example – criteria
  • 12. R1. Trustworthiness of the provider R2. Green IT: minimum power consumption per hour per server Example - requirements
  • 13. Wechoose: ANP – Analytic Network Process Supports complexcriteriadependencies Considers qualitative criteria Results on absolute scale (0-1) in othercasesothermethodsmight fit better MAUT Promethée … Example – choose multi-criteriadecision-makingmethod
  • 14. Example – configure multi-criteriadecision-makingmethod
  • 16. Requirementsfulfilledby in-house, IaaS Apply ANP Pairwisecomparisonsof in-house, IaaSregardingcriteria Calculateresultsforcriterianetworks Applyindices Example – evaluationmethod
  • 18. Example - results ANP results: Indices formulas: Indices results:
  • 19. A3. IaaS > A1. in-house But, bybenefitsonly: A1 > A3 ! Bycosts: A3 < A1 (smallermeansbetter) Example – results – ctd. IaaS
  • 20. (MC²)² canbeimprovedandextended in manyaspects: More IT supportwithintheframework List ofsuitableinformationsystemsthatcansupportthedefinitionof alternatives, criteria, andrequirements Prototype of a systemthatoffers (MC²)² decisionmakingandintegrationwithinformationresources Inclusionofsensitivityanalysisandgroupdecisionaspects Support withthechoiceof MCDM methods … Future work
  • 23.
  • 24. Apply MCDM method on theappropriate alternatives usingdefinedcriteria (+ weights, dependencies)
  • 25.
  • 26. To find alternatives, criteria, requirements, and MCDM method Expert searchandsurveycreationsystems Internal knowledgeordatabaseswith Experiencesfromearlierevaluations Guidelinedocumentsofdepartments Collaborationsystems Data miningtools Literature … Toexternalizeyourexperiencesmadeduringtheuseoftheframework Useofinformationresources…
  • 27. Qualitative vs. Quantitative (non-measurable vs. measurable) Scalesofmeasurement Rules toconsider Completeness and Exhaustiveness Mutually exclusive items only Restrict to criteria of highest degree of importance Examples: Criteria
  • 28. Constraintsfor alternatives A minimumormaximumvalue Examples: Requirements
  • 29. Manymethodsavailable* Outranking: ELECTRE, PROMETHEE TOPSIS, AHP/ANP Bayesian Analysis MAUT, SMART … Chooseoneandconsider Not everymethodresults in a value Not everymethodfitsyourneedsto model criteriadependencies Not everymethodsupports qualitative (non-measurable) criteria well Multi-criteriadecision-makingmethod * Yoon and Hwang (1995), ‘Multi Attribute Decision Making: An Introduction‘, Sage University Paper series on Quantitative Applications in theSocialSciences. Keun Tae Cho (2003), ‘Multicriteria Decision Methods: An Attempt To Evaluate and Unify’, Mathematicaland Computer Modelling. Fülöp (2004), ‘Introduction to Decision Making Methods’, Paper developed for the BDEI-3 Workshop, The Evergreen State College.