Abstract
Since organizations have recognized needs for industrial technique leakage prevention, they tend to construct industrial security system causing huge consumption of budget, yet many of them are not affordable to organize industrial security team to operate integrated industrial security management system with consistent investment and maintenance. It is fact that there only occur instant introductions of certain system. In this study, we designed industrial security management model for organizations’ industrial technology leakage prevention which is differentiated from those of large enterprises based on current status of small and medium-sized organizations’ industrial technology leakage. Specifically we analyzed current status and vulnerability of organizations’ industrial technique leakage and we designed industrial technique leakage prevention management system for organizations. Then we applied Delphi method to validate appropriateness of study result. We strongly believe that organizations may estimate an appropriate level of investment on industrial security and develop countermeasures for control by utilizing this study result.
Similar content being viewed by others
References
BSI. (1999). BS 7799 Part1: Information security management—code of practice for information security management.
de Oliveira, S., de Oliveira, T. R., & Nogueira, J. M. (2009). A policy based security management architecture for sensor networks. In IFIP/IEEE international symposium on integrated network management.
Doukidis G. I., Lybereas P., Robert D. G. (1996) Information systems planning in small business: A stages of growth analysis. Journal of Systems and Software Archive 33: 189–201
Eloff M.M., von Solms S.H. (2000) Information security management: An approach to combine process certification and product evaluation. Computers & Security 19(8): 698–709
Gillies A. (2011) Improving the quality of information security management systems with ISO27000. The TQM Journal 23(4): 367–376
ISACA. (2001). Information security governance, guidance for boards of directors and executive management. IT Governance Institute, USA.
Kong, H.-K., Kim, T.-S., & Kim, J. (2010). An analysis on effects of information security investments: A BSC perspective. Journal of Intelligent Manufacturing. doi:10.1007/s10845-010-0402-7.
Levy M., Powell P. (1998) SME flexibility and the role of information systems. Small Business Economics 2: 183–196
Luís Osório A., Barata M. M. (2001) Reliable and secure communications infrastructure for virtual enterprises. Journal of Intelligent Manufacturing 12(2): 171–183
Luo X., Brody R., Seazzu A., Burd S. (2011) Social engineering: The neglected human factor for information security management. Information Resources Management Journal 24(3): 1–8
NIST Technology Administration. (1998). An introduction to computer security: The NIST handbook. NIST, USA.
Siponena M., Willison R. (2009) Information security management standards: Problems and solutions. Information & Management 46(5): 267–270
Susanto, H., Almunawar, M. N., & Tuan, Y. C. (2011). Information security management system standards: A comparative study of the big five. International Journal of Electrical & Computer Sciences, 11(05).
Weill P., Vitale M. (2002) What IT infrastructure capabilities are needed to implement e-business models?. MIS Quarterly Executive 1(1): 17–34
Yin, C., Sun, R., & Shuoben, B. (2009). A model of information security based on office automation. In International joint conference on INC, IMS and IDC.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Kim, Y., Chang, H. The industrial security management model for SMBs in smart work. J Intell Manuf 25, 319–327 (2014). https://doi.org/10.1007/s10845-012-0651-8
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10845-012-0651-8