ChapterPDF Available

The challenges of enforcing cybercrime laws in the age of E-governance: A literature review

Authors:
Emerging Trends in Computer Science and
ItsApplication
Dr. Anurag Tiwari
Anurag Tiwari is an Associate Professor and Head of the Department of Computer Science
and Engineering at BBD National Institute of Technology and Management, Lucknow. A Sen-
ior IEEE Member, he has over 11 years of academic experience and has led the department to
NBA accreditation in 2023. He holds a Ph in Computer Science, multiple MTech degrees, and
has authored several research publications. With multiple patents and consultancy projects to
his credit, his research interests include machine learning and optimization techniques.
Dr. Manuj Darbari
Manuj Darbari, Senior Member IEEE (USA) and Chartered Engineer (India), is a visionary
leader in Computer Science and Engineering, specializing in AI, Cloud Computing, and IoT.
With a track record of pioneering research, patents, and numerous PhD supervisions, he is
recognized for driving innovation and excellence. Currently a Professor at BBDITM Lucknow,
Dr. Darbari has made signicant contributions to cutting-edge technologies and has served as
a convener and reviewer for leading global conferences. His editorial expertise ensures that
the conference proceedings reect the highest standards and capture the forefront of emerging
research trends.
Emerging Trends in Computer Science and
ItsApplication
Proceedings of the International Conference on Advances in
Emerging Trends in Computer Applications (ICAETC-2023)
December 21–22, 2023, Lucknow, India
Edited by
Anurag Tiwari
Manuj Darbari
Boca Raton London New York
CRC Press is an imprint of the
Taylor & Francis Group, an informa business
First edition published 2024
by CRC Press
4 Park Square, Milton Park, Abingdon, Oxon, OX14 4RN
and by CRC Press
2385 NW Executive Center Drive, Suite 320, Boca Raton FL 33431
© 2024 selection and editorial matter, Anurag Tiwari and Manuj Darbari; individual chapters, the
contributors
CRC Press is an imprint of Informa UK Limited
The right of Anurag Tiwari and Manuj Darbari to be identied as the authors of the editorial
material, and of the authors for their individual chapters, has been asserted in accordance with
sections 77 and 78 of the Copyright, Designs and Patents Act 1988.
All rights reserved. No part of this book may be reprinted or reproduced or utilised in any form
or by any electronic, mechanical, or other means, now known or hereafter invented, including
photocopying and recording, or in any information storage or retrieval system, without permission in
writing from the publishers.
For permission to photocopy or use material electronically from this work, access
www.copyright.com or contact the Copyright Clearance Center, Inc. (CCC), 222 Rosewood Drive,
Danvers, MA 01923, 978-750-8400. For works that are not available on CCC please contact
mpkbookspermissions@tandf.co.uk
Trademark notice: Product or corporate names may be trademarks or registered trademarks, and are
used only for identication and explanation without intent to infringe.
British Library Cataloguing-in-Publication Data
A catalogue record for this book is available from the British Library
ISBN: 9781032999005 (hbk)
ISBN: 9781032999012 (pbk)
ISBN: 9781003606635 (ebk)
DOI: 10.1201/9781003606635
Typeset in Sabon LT Std
by HBK Digital
DOI: 10.1201/9781003606635-38
38 The challenges of enforcing cybercrime
laws in the age of E-governance:
Aliterature review
Manuj Darbaria, Naseem Ahmedb, and Abhishek Kumar Singhc
Faculty of Law, Integral University, Lucknow, India
Abstract: E-governance and cybercrime legislation are contrasted in this study. The gap might impair cyber-
crime investigations and prosecutions by law enforcement. Breaking this gap is difcult due to cybercrime’s
rapid expansion, worldwide nature, lack of resources, and evidence collection. The paper advises new cyber-
crime laws, international cooperation, training and resources, and awareness to close the e-governance and
cybercrime legislation gap. Weighing e-governance and legal gaps with decision science. The study claims deci-
sion science can protect government websites and data from hackers. The research shows a huge e-governance
and cybercrime law gap that must be lled. The idea calls for a law enforcement cybercrime unit and technology.
Keywords: e-governance, cybercrime, law gap, awareness, risk assessment, mitigation strategies
1. Introduction
The rapid growth of e-governance has created sev-
eral challenges for law enforcement agencies. These
agencies are often ill-equipped to deal with cyber-
crime, which is a rapidly evolving threat. As a result,
there is a growing gap between e-governance and
cybercrime law [1].
E-governance refers to the use of information and
communication technologies (ICTs) to deliver gov-
ernment services to citizens, businesses, and other
stakeholders [2]. It has become increasingly impor-
tant in recent years, as governments have sought to
improve efciency, transparency, and accountability.
Cybercrime can range from simple hacking to
sophisticated fraud and identity theft. Cybercrime is
a major problem, with the estimated cost of cyber-
crime to the global economy reaching $6 trillion in
2021.
The e-governance and cybercrime law [3] gap
refers to the mismatch between the laws that Gov-
ern e-governance and the laws that are used to pros-
ecute cybercrime.
Challenges in Addressing the E-governance and
Cybercrime Law Gap.
There are a number of challenges in addressing
the e-governance and cybercrime law gap. These
challenges include:
The rapid evolution of cybercrime: Cybercrime
[4] is a rapidly evolving threat, and new types of
cybercrime are constantly emerging. This makes
it difcult for law enforcement agencies to keep
up with the latest trends.
The challenges of gathering evidence: Cyber-
crime evidence can be difcult to gather and
preserve. This is because cybercrime often leaves
no physical traces, and the evidence can be eas-
ily deleted or tampered with.
1.1. Ways to address the e-governance
and cybercrime law gap
There are a number of ways to address the e-gov-
ernance and cybercrime law gap. These include:
Improving international cooperation: Govern-
ments need to improve international coopera-
tion to combat cybercrime. This includes sharing
information and resources, and developing
amanujuma@student.iul.ac.in; bamdnaseem@iul.ac.in; cabhiksingh@iul.ac.in
The challenges of enforcing cybercrime laws in the age of E-governance: Aliterature review 243
these documents should be published. This could
lead to confusion and uncertainty about how these
documents should be interpreted.
Section 10: The provision on the establishment
of an electronic signature board is not clear about
the powers and functions of the board. This could
lead to a lack of coordination and oversight in the
regulation of electronic signatures in India.
Section 10A: The provision on the establishment
of a cyber appellate tribunal is not clear about the
jurisdiction of the tribunal. This could lead to delays
and inefciencies in the appeal process for cyber-
crime cases.
These are just some of the section-wise lacunae
in the IT Act that encompass e-governance. These
lacunae need to be addressed in order to ensure that
the legal framework for e-governance is effective
and comprehensive.
In addition to the above, here are some other
specic lacunae in the IT Act:
There is no specic provision for the protection
of critical infrastructure from cyber attacks.
There is no specic provision for the regulation
of articial intelligence and machine learning
technologies.
There is no specic provision for the investiga-
tion and prosecution of cybercrime cases involv-
ing foreign elements.
These are just some of the specic lacunae in the
IT Act.
The Aadhaar data breach: In 2018, it was
revealed that the personal data of over 1.1 bil-
lion Aadhaar cardholders had been leaked.
The Cosmos Bank cyberattack: In 2018, hack-
ers stole over Rs. 94 crores from Cosmos Bank
in Pune. The hackers used a phishing attack to
gain access to the bank’s systems. The cyber-
attack highlighted the vulnerability of India’s
banking sector to cyber attacks.
The Telangana cyberattack: In 2021, hack-
ers attacked the government of Telangana’s IT
infrastructure. The attack caused a major dis-
ruption to government services, including the
state’s e-governance portal. The cyberattack
highlighted the vulnerability of India’s govern-
ment infrastructure to cyber attacks.
The cyber attack on the All India Institute
of Medical Sciences: In June 2023, hackers
attacked the All India Institute of Medical Sci-
ences (AIIMS) in Delhi[8]. The attack caused a
major disruption to the hospital’s operations.
common standards for investigating and pros-
ecuting cybercrime cases.
Investing in cybercrime training and resources:
Law enforcement agencies need to invest in
cybercrime training and resources. This will
help them to keep up with the latest cybercrime
trends and to effectively investigate and pros-
ecute cybercrime cases.
Raising awareness of cybercrime: Govern-
ments[5] and businesses need to raise awareness
of cybercrime among citizens and businesses.
This will help to reduce the number of victims
of cybercrime.
1.2. Laws and regulations under
preview of e-governance
In IT Act, we have laws and regulations that gov-
ern e-governance in India [6]. These include the
following:
The National E-Governance Plan (NeGP): The
NeGP is a roadmap for the development of
e-governance in India. It was launched in 2006
and aims to make all government services avail-
able online by 2020.
The e-Procurement Act, 2017: The e-Procure-
ment Act provides a framework for the elec-
tronic procurement of goods and services by
government agencies.
The Data Protection Bill, 2019: The Data Pro-
tection Bill is a proposed law regulates the col-
lection, storage, and use of personal data.
IT Act-2000[7]
Section 4: The denition of “electronic” is too
broad and could be interpreted to include any
form of data that is stored or transmitted elec-
tronically. This could make it difcult to deter-
mine whether a particular piece of data is an
electronic record or not.
Section 5: The denition of “digital signature” is
also too broad and could be interpreted to include
any type of electronic signature. This could make it
difcult to determine whether a particular signature
is a valid digital signature or not.
Section 6: The provision on the admissibility of
electronic records in evidence is not clear about how
these records should be authenticated. This could
make it difcult for electronic records to be admit-
ted as evidence in court.
Section 8: The provision on the publication of
rules, regulations, and other ofcial documents in
electronic form does not specify the format in which
244 Emerging Trends in Computer Science and Its Application
each objective. The policy or regulation that
minimizes the deviations from the goals is the
most preferred.
Analytic hierarchy process (AHP)[13], [14]:
This method is a more complex MCDM tech-
nique that uses a hierarchy of criteria to evaluate
policies or regulations. The policy or regulation
that has the highest overall score is the most
preferred.
Suppose we are considering two policies to
address the problem of cybercrime in e-governance.
The rst policy is to invest in new security tech-
nologies, such as rewalls and intrusion detec-
tion systems.
The second policy is to strengthen the legal
framework for cybercrime, such as by increas-
ing the penalties for cybercrime.
The objectives that we want to achieve are to
reduce the incidence of cybercrime and to improve
the security of e-governance systems. We can assign
weights to these objectives to reect their relative
importance to us. For example, we may decide that
reducing the incidence of cybercrime is more impor-
tant than improving the security of e-governance
systems [15].
We can then use the weighted sum method to
calculate a score for each policy [16]. The policy
with the highest score is the most preferred.
For example, suppose we assign the following
weights to the objectives:
Reduce the incidence of cybercrime: 0.7
Improve the security of e-governance systems:
0.3
Then, we can calculate the score for each policy
as follows:
Policy 1: (0.7)(0.8) + (0.3)(0.5) = 0.66
Policy 2: (0.7)(0.6) + (0.3)(0.9) = 0.72
In this case, policy 2 is the most preferred policy,
as it has a higher score than policy 1.
This is just a simple example of how MCDM
techniques can be used to manage the trade-offs
between the objectives of e-governance and law
gaps. The specic MCDM technique that is used
will depend on the specic situation.
4. Conclusion
The e-governance and cybercrime law gap is a serious
problem that needs to be addressed. There are a num-
ber of ways to address this gap, including developing
new laws and regulations, improving international
The cyberattack highlighted the vulnerability of
India’s healthcare sector to cyber attacks
3. Mathematical foundation of
Cyber GAP
The current GAP in E-Governance security Law
can be improved by using the concept of Decision
Science which predicts how to overcome from the
above situation. Suppose we want to predict the
likelihood of a cyber-attack on a government web-
site. We can use data analytics to identify patterns
in past cyber-attacks on government websites. We
can also develop risk assessments to quantify the
likelihood and impact of cyber-attacks on govern-
ment websites. This information can then be used
to develop mitigation strategies for cyber-attacks on
government websites.
By using decision science, we can make informed
decisions about how to improve the security of
government
Mathematically, a multiple-criteria design prob-
lem[9], [10] is formulated using decision space:
where is the feasible set and is the decision variable
vector of size.
The criteria would be the various objectives that
we want to achieve, such as improving efciency,
transparency, and accountability.
We can use decision science to help us man-
age the trade-offs between these objectives. For
example, we can use multi-criteria decision mak-
ing (MCDM) techniques [11] to identify the most
preferred policy or regulation. MCDM techniques
allow us to consider multiple objectives simultane-
ously and to identify the solution that best satises
our needs.
Here are some of the MCDM techniques that
can be used to manage the trade-offs between the
objectives of e-governance and law gaps:
Weighted sum method: This method assigns
weights to each objective and then sums the
weighted values of the objectives to obtain a
single score for each policy or regulation. The
policy or regulation with the highest score is the
most preferred.
Goal programming [12]: This method allows us
to specify minimum and maximum values for
The challenges of enforcing cybercrime laws in the age of E-governance: Aliterature review 245
[6] S. Kethineni, Cybercrime in India: Laws, Regula-
tions, and Enforcement Mechanisms, in The Pal-
grave Handbook of International Cybercrime and
Cyberdeviance, T. J. Holt and A. M. Bossler, Eds.,
Cham: Springer International Publishing, 2020, pp.
305–326. doi: 10.1007/978-3-319-78440-3_7.
[7] Government of India, Gazette of India: Indian IT
Act 2000 (Registered NO. DL-33004/2000). Jun.
2000. Accessed: Nov. 10, 2023. [Online]. Available:
https://eprocure.gov.in/cppp/rulesandprocs/kbadqk-
dlcswfjdelrquehwuxcfmijmuixngudufgbuubgubfug-
bububjxcgfvsbdihbgfGhdfgFHytyhRtMjk4NzY=
[8] D. Kumar, AIIMS Delhi hit by fresh cyberattack
for second time in a year, mint. Accessed: Nov. 10,
2023. [Online]. Available: https://www.livemint.
com/news/india/aiims-delhi-hit-by-fresh-cyberat-
tacks-details-here-11686061994629.html
[9] T. Entani, Different Types of Decision Criteria in
a Decision Problem, in Integrated Uncertainty
in Knowledge Modelling and Decision Mak-
ing, vol. 14375, V.-N. Huynh, B. Le, K. Honda,
M. Inuiguchi, and Y. Kohda, Eds., in Lecture
Notes in Computer Science, vol. 14375. Cham:
Springer Nature Switzerland, 2023, pp. 85–96. doi:
10.1007/978-3-031-46775-2_8.
[10] A. Zagaria and A. Zennaro, A close look at sociality
in DSM criteria, Soc Psychiatry Psychiatr Epidemiol,
Nov. 2023, doi: 10.1007/s00127-023-02568-z.
[11] H. Taherdoost and M. Madanchian, Multi-Criteria
Decision Making (MCDM) Methods and Con-
cepts, Encyclopedia, vol. 3, no. 1, pp. 77–87, Jan.
2023, doi: 10.3390/encyclopedia3010006.
[12] B. Liu and X. Chen, Uncertain Multiobjective Pro-
gramming and Uncertain Goal Programming, J.
Uncertain. Anal. Appl., vol. 3, no. 1, p. 10, Dec.
2015, doi: 10.1186/s40467-015-0036-6.
[13] O. Bozorg-Haddad, H. Loáiciga, and B. Zolghadr-
Asli, A Handbook on Multi-Attribute Deci-
sion-Making Methods, 1st ed. Wiley, 2021. doi:
10.1002/9781119563501.
[14] O. Cooper, The Magic Of The Analytic Hierarchy
Process (AHP), IJAHP, vol. 9, no. 3, Dec. 2017, doi:
10.13033/ijahp.v9i3.519.
[15] M. A. K. Harahap, K. Kraugusteeliana, S. A. Pra-
mono, O. Z. Jian, and A. M. Almaududi Ausat, “The
role of information technology in improving urban
governance,” jmp, vol. 12, no. 1, pp. 371–379, May
2023, doi: 10.33395/jmp.v12i1.12405.
[16] H. Guo and N. J. Dorans, Using Weighted Sum
Scores to Close the Gap Between DIF Practice and
Theory, J Educational Measurement, vol. 57, no. 4,
pp. 484–510, Dec. 2020, doi: 10.1111/jedm.12258.
cooperation, investing in cybercrime training and
resources, and raising awareness of cybercrime. By
taking these steps, we can help to make the internet a
safer place for everyone.
In addition to the above, here are some other
specic ways to address the e-governance and cyber-
crime law gap:
Creating a dedicated cybercrime unit within law
enforcement agencies: This will help to ensure
that there are dedicated resources and expertise
available to investigate and prosecute cyber-
crime cases.
Using technology to combat cybercrime: Law
enforcement agencies can use technology, such
as data analytics and articial intelligence, to
help them to investigate and prosecute cyber-
crime cases.
Working with the private sector: Law enforce-
ment agencies can work with the private sector
to share information and resources to combat
cybercrime.
Educating the public about cybercrime: This
will help to reduce the number of victims of
cybercrime.
References
[1] T. Ahmad, R. Aljafari, and V. Venkatesh, The Gov-
ernment of Jamaica’s electronic procurement sys-
tem: experiences and lessons learned, INTR, vol.
29, no. 6, pp. 1571–1588, Dec. 2019, doi: 10.1108/
INTR-02-2019-0044.
[2] [M. Åkesson, P. Skålén, and B. Edvardsson, E-gov-
ernment and service orientation: gaps between
theory and practice, International Journal of Public
Sector Management, vol. 21, no. 1, pp. 74–92, Jan.
2008, doi: 10.1108/09513550810846122.
[3] G. Edwards, Cybercrime Investigators Handbook,
1st ed. Wiley, 2019. doi: 10.1002/9781119596318.
[4] S. Gordon and R. Ford, On the denition and
classication of cybercrime, J Comput Virol, vol.
2, no. 1, pp. 13–20, Aug. 2006, doi: 10.1007/
s11416-006-0015-z.
[5] S. Y. Lee, J. M. Díaz-Puente, and S. Martin, The
Contribution of Open Government to Prosperity of
Society, International Journal of Public Administra-
tion, vol. 42, no. 2, pp. 144–157, Jan. 2019, doi:
10.1080/01900692.2017.1405446.
ResearchGate has not been able to resolve any citations for this publication.
Article
Full-text available
Purpose The importance of sociality in psychology and psychotherapy is quite undisputed; however, this construct risks being underestimated in psychiatric nosography. The aim of the review was to assess the relevance of sociality in DSM 5 criteria. Method Sociality-laden criteria of 192 selected DSM categories have been identified through a textual grid. Second, the criteria have been classified into 6 categories, i.e., (1) Affiliation and Attachment (AA), (2) Social Communication (SC), (3) Perception and Understanding of Others (PUO), (4) Culture, (5) Clinical Significance Criterion (CSC) (6), and No Specific Construct (NSC). Results 13% of all mental disorders mention AA in their criteria. 8.8% of all mental disorders mention SC; 8.8% of all mental disorders mention PUO in their criteria. 15% of all mental disorders mention culture in their criteria (exclusively ex negativo though). 40% of mental disorders mention non-specific sociality (NSC) in their criteria. CSC is mentioned in 85% of mental disorders. Personality disorders have the highest “concentration” of sociality mentions throughout the DSM categories. Conclusions The overall results suggest that DSM criteria offer a confused account of sociality. We believe that the descriptive approach is the underlying reason. We suggest that in the long run a theory-laden approach to sociality, informed by evolutionary insights about motivations, could be of help.
Article
Full-text available
The rapid development of information technology has a significant impact on various fields of human life, including urban governance. In the context of urban governance, information technology can be used to improve efficiency, transparency, and community participation in the decision-making process that has an impact on the quality of life of city residents. The purpose of this research is to explain the role of information technology in improving urban governance because it is important in the context of increasingly complex urban development and requires appropriate and efficient decision-making. The focus of this research is qualitative. Methods for gathering information included paying close attention and taking detailed notes, with subsequent analysis including data reduction, visualisation, and inference. The study arrived at the conclusion that the role of information technology in improving urban governance is crucial and requires special attention from the government and relevant stakeholders. By improving access and quality of information technology services, enhancing digital literacy and information technology skills, increasing community participation in urban governance, and improving data security and privacy, the application of information technology in urban governance can become more effective and efficient in improving urban governance.
Article
Full-text available
Multi-criteria decision-making (MCDM) is one of the main decision-making problems which aims to determine the best alternative by considering more than one criterion in the selection process. MCDM has manifold tools and methods that can be applied in different fields from finance to engineering design. This entry aims to provide a survey on the MCDM concept, its applications, main categories, and different methods. The final section provides manifold information and statistics on the published works in the MCDM fields. Some of the main methods are also listed in this section.
Book
Full-text available
A Handbook on Multi-Attribute Decision-Making Methods describes multi-attribute decision-making (MADM) methods and provides step-by-step guidelines for applying them. The authors describe the most important MADM methods and provide an assessment of their performance in solving problems across disciplines. After offering an overview of decision-making and its fundamental concepts, this book covers 20 leading MADM methods and contains an appendix on weight assignment methods. Chapters are arranged with optimal learning in mind, so you can easily engage with the content found in each chapter. Dedicated readers may go through the entire book to gain a deep understanding of MADM methods and their theoretical foundation, and others may choose to review only specific chapters. Each standalone chapter contains a brief description of prerequisite materials, methods, and mathematical concepts needed to cover its content, so you will not face any difficulty understanding single chapters. Each chapter: * Describes, step-by-step, a specific MADM method, or in some cases a family of methods * Contains a thorough literature review for each MADM method, supported with numerous examples of the method's implementation in various fields *Provides a detailed yet concise description of each method's theoretical foundation * Maps each method's philosophical basis to its corresponding mathematical framework * Demonstrates how to implement each MADM method to real-world problems in a variety of disciplines In MADM methods, stakeholders' objectives are expressible through a set of often conflicting criteria, making this family of decision-making approaches relevant to a wide range of situations. A Handbook on Multi-Attribute Decision-Making Methods compiles and explains the most important methodologies in a clear and systematic manner, perfect for students and professionals whose work involves operations research and decision making.
Article
Full-text available
Purpose Realizing value from information and communication technology (ICT) in procurement in developing countries is complex due to diverse stakeholders and intertwined procurement processes. The purpose of this paper is to examine the experience of the Government of Jamaica in leveraging ICTs as an intervention to transform its procurement operations and combat corruption. Design/methodology/approach The study examines conversations with employees in the Government of Jamaica to understand key milestones in its procurement history. Based on the view that the intervention context is an ecosystem where multiple and inconsistent views of the e-procurement system evolve over time, the study analyzes milestones to reveal key actions that contributed either to the initial success of or introduced challenges to the e-procurement system. Findings The findings suggest that inducing positive sentiments about the intervention through transparency will overcome a long history of negative sentiments about the initiatives of government bodies in general. Furthermore, positive sentiments may not be directly related to the e-procurement system. Research limitations/implications The study offers important insights that government bodies in similar contexts can apply to guide initiatives for transforming procurement operations. For instance, training should emphasize not only the technical aspects of the system from the perspective of different stakeholders but also their job descriptions. Future research may examine other initiatives in developing countries to compare the role of sentiments over time. Originality/value The study adopts a unique approach to understand the experience of a developing country in harnessing ICTs to transform procurement operations.
Article
Full-text available
The study finds that open government does not only have effect on economic prosperity, but on social capital and environment through the mechanisms of Rule of Law and Control of Corruption. The role of Rule of Law and Control of Corruption are emphasized in this study, because of their significance in mediating open government and prosperity. Unless mechanisms like regulation formulation, law enforcement and control of corruption are not put into practice; open government itself will not be a driving force to a prosperous society.
Chapter
In a decision problem, there are various types of decision criteria. Some criteria are quantitative, represented by objective numerical data, and others are qualitative, represented by subjective linguistic data given by a decision maker. Moreover, a decision maker has the ideal and negative ideal in her mind regarding some criteria even if she cannot afford them now. However, she has yet to specialize in some criteria and accepts the alternatives positively. The conventional methods were proposed under the conditions of their indigenous types of criteria. Hence, other types of criteria than the specific ones are ignored or forced to be transformed into the type by some additional tasks. Our approach considers quantitative and qualitative criteria and the ideal and negative alternatives if there are in a decision maker’s mind. We propose the models to obtain local evaluations of alternatives under each type of criterion. The processes are built to normalization as a premise since the local evaluations under all criteria are aggregated into overall evaluations.
Article
We make a distinction between the operational practice of using an observed score to assess differential item functioning (DIF) and the concept of departure from measurement invariance (DMI) that conditions on a latent variable. DMI and DIF indices of effect sizes, based on the Mantel‐Haenszel test of common odds ratio, converge under restricted conditions if a simple sum score is used as the matching or conditioning variable in a DIF analysis. Based on theoretical results, we demonstrate analytically that matching on a weighted sum score can significantly reduce the difference between DIF and DMI measures over what can be achieved with a simple sum score. We also examine the utility of binning methods that could facilitate potential operational use of DIF with weighted sum scores. A real data application was included to show this feasibility.
Article
Dr. Thomas Saaty developed the Analytic Hierarchy Process (AHP) with the underlying goal of making it simple and accessible to the lay user. In Saaty’s own words, the AHP is based on how “ordinary people process information” and “express the strength of their judgments” (Saaty, 1994, p. 37). Because he was successful in developing the AHP in accordance with these goals, when decision makers use the AHP their experience can feel magical as they find pairwise comparisons natural and can relate to the final priorities. Careful investigation of the axioms, theorems, and proofs shows that the AHP is more than just magic and provides scientific justification of the highest order. Five important components of the AHP and some background into the history of its development are summarized and highlighted from Saaty’s article, “How to Make a Decision: the Analytic Hierarchy Process” (Saaty, 1994). https://doi.org/10.13033/ijahp.v9i3.519