The industrial security management model for SMBs in smart work
- 333 Downloads
Since organizations have recognized needs for industrial technique leakage prevention, they tend to construct industrial security system causing huge consumption of budget, yet many of them are not affordable to organize industrial security team to operate integrated industrial security management system with consistent investment and maintenance. It is fact that there only occur instant introductions of certain system. In this study, we designed industrial security management model for organizations’ industrial technology leakage prevention which is differentiated from those of large enterprises based on current status of small and medium-sized organizations’ industrial technology leakage. Specifically we analyzed current status and vulnerability of organizations’ industrial technique leakage and we designed industrial technique leakage prevention management system for organizations. Then we applied Delphi method to validate appropriateness of study result. We strongly believe that organizations may estimate an appropriate level of investment on industrial security and develop countermeasures for control by utilizing this study result.
KeywordsIndustrial security Industrial security management system Security management model Small and medium business
Unable to display preview. Download preview PDF.
- BSI. (1999). BS 7799 Part1: Information security management—code of practice for information security management.Google Scholar
- de Oliveira, S., de Oliveira, T. R., & Nogueira, J. M. (2009). A policy based security management architecture for sensor networks. In IFIP/IEEE international symposium on integrated network management.Google Scholar
- ISACA. (2001). Information security governance, guidance for boards of directors and executive management. IT Governance Institute, USA.Google Scholar
- Kong, H.-K., Kim, T.-S., & Kim, J. (2010). An analysis on effects of information security investments: A BSC perspective. Journal of Intelligent Manufacturing. doi: 10.1007/s10845-010-0402-7.
- NIST Technology Administration. (1998). An introduction to computer security: The NIST handbook. NIST, USA.Google Scholar
- Susanto, H., Almunawar, M. N., & Tuan, Y. C. (2011). Information security management system standards: A comparative study of the big five. International Journal of Electrical & Computer Sciences, 11(05).Google Scholar
- Weill P., Vitale M. (2002) What IT infrastructure capabilities are needed to implement e-business models?. MIS Quarterly Executive 1(1): 17–34Google Scholar
- Yin, C., Sun, R., & Shuoben, B. (2009). A model of information security based on office automation. In International joint conference on INC, IMS and IDC.Google Scholar