Skip to main content
Log in

The industrial security management model for SMBs in smart work

  • Published:
Journal of Intelligent Manufacturing Aims and scope Submit manuscript

Abstract

Since organizations have recognized needs for industrial technique leakage prevention, they tend to construct industrial security system causing huge consumption of budget, yet many of them are not affordable to organize industrial security team to operate integrated industrial security management system with consistent investment and maintenance. It is fact that there only occur instant introductions of certain system. In this study, we designed industrial security management model for organizations’ industrial technology leakage prevention which is differentiated from those of large enterprises based on current status of small and medium-sized organizations’ industrial technology leakage. Specifically we analyzed current status and vulnerability of organizations’ industrial technique leakage and we designed industrial technique leakage prevention management system for organizations. Then we applied Delphi method to validate appropriateness of study result. We strongly believe that organizations may estimate an appropriate level of investment on industrial security and develop countermeasures for control by utilizing this study result.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Similar content being viewed by others

References

  • BSI. (1999). BS 7799 Part1: Information security management—code of practice for information security management.

  • de Oliveira, S., de Oliveira, T. R., & Nogueira, J. M. (2009). A policy based security management architecture for sensor networks. In IFIP/IEEE international symposium on integrated network management.

  • Doukidis G. I., Lybereas P., Robert D. G. (1996) Information systems planning in small business: A stages of growth analysis. Journal of Systems and Software Archive 33: 189–201

    Article  Google Scholar 

  • Eloff M.M., von Solms S.H. (2000) Information security management: An approach to combine process certification and product evaluation. Computers & Security 19(8): 698–709

    Article  Google Scholar 

  • Gillies A. (2011) Improving the quality of information security management systems with ISO27000. The TQM Journal 23(4): 367–376

    Article  Google Scholar 

  • ISACA. (2001). Information security governance, guidance for boards of directors and executive management. IT Governance Institute, USA.

  • Kong, H.-K., Kim, T.-S., & Kim, J. (2010). An analysis on effects of information security investments: A BSC perspective. Journal of Intelligent Manufacturing. doi:10.1007/s10845-010-0402-7.

  • Levy M., Powell P. (1998) SME flexibility and the role of information systems. Small Business Economics 2: 183–196

    Article  Google Scholar 

  • Luís Osório A., Barata M. M. (2001) Reliable and secure communications infrastructure for virtual enterprises. Journal of Intelligent Manufacturing 12(2): 171–183

    Article  Google Scholar 

  • Luo X., Brody R., Seazzu A., Burd S. (2011) Social engineering: The neglected human factor for information security management. Information Resources Management Journal 24(3): 1–8

    Article  Google Scholar 

  • NIST Technology Administration. (1998). An introduction to computer security: The NIST handbook. NIST, USA.

  • Siponena M., Willison R. (2009) Information security management standards: Problems and solutions. Information & Management 46(5): 267–270

    Article  Google Scholar 

  • Susanto, H., Almunawar, M. N., & Tuan, Y. C. (2011). Information security management system standards: A comparative study of the big five. International Journal of Electrical & Computer Sciences, 11(05).

  • Weill P., Vitale M. (2002) What IT infrastructure capabilities are needed to implement e-business models?. MIS Quarterly Executive 1(1): 17–34

    Google Scholar 

  • Yin, C., Sun, R., & Shuoben, B. (2009). A model of information security based on office automation. In International joint conference on INC, IMS and IDC.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hangbae Chang.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Kim, Y., Chang, H. The industrial security management model for SMBs in smart work. J Intell Manuf 25, 319–327 (2014). https://doi.org/10.1007/s10845-012-0651-8

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10845-012-0651-8

Keywords

Navigation