Journal of Intelligent Manufacturing

, Volume 25, Issue 2, pp 319–327 | Cite as

The industrial security management model for SMBs in smart work

  • Yanghoon Kim
  • Hangbae Chang


Since organizations have recognized needs for industrial technique leakage prevention, they tend to construct industrial security system causing huge consumption of budget, yet many of them are not affordable to organize industrial security team to operate integrated industrial security management system with consistent investment and maintenance. It is fact that there only occur instant introductions of certain system. In this study, we designed industrial security management model for organizations’ industrial technology leakage prevention which is differentiated from those of large enterprises based on current status of small and medium-sized organizations’ industrial technology leakage. Specifically we analyzed current status and vulnerability of organizations’ industrial technique leakage and we designed industrial technique leakage prevention management system for organizations. Then we applied Delphi method to validate appropriateness of study result. We strongly believe that organizations may estimate an appropriate level of investment on industrial security and develop countermeasures for control by utilizing this study result.


Industrial security Industrial security management system Security management model Small and medium business 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. BSI. (1999). BS 7799 Part1: Information security management—code of practice for information security management.Google Scholar
  2. de Oliveira, S., de Oliveira, T. R., & Nogueira, J. M. (2009). A policy based security management architecture for sensor networks. In IFIP/IEEE international symposium on integrated network management.Google Scholar
  3. Doukidis G. I., Lybereas P., Robert D. G. (1996) Information systems planning in small business: A stages of growth analysis. Journal of Systems and Software Archive 33: 189–201CrossRefGoogle Scholar
  4. Eloff M.M., von Solms S.H. (2000) Information security management: An approach to combine process certification and product evaluation. Computers & Security 19(8): 698–709CrossRefGoogle Scholar
  5. Gillies A. (2011) Improving the quality of information security management systems with ISO27000. The TQM Journal 23(4): 367–376CrossRefGoogle Scholar
  6. ISACA. (2001). Information security governance, guidance for boards of directors and executive management. IT Governance Institute, USA.Google Scholar
  7. Kong, H.-K., Kim, T.-S., & Kim, J. (2010). An analysis on effects of information security investments: A BSC perspective. Journal of Intelligent Manufacturing. doi: 10.1007/s10845-010-0402-7.
  8. Levy M., Powell P. (1998) SME flexibility and the role of information systems. Small Business Economics 2: 183–196CrossRefGoogle Scholar
  9. Luís Osório A., Barata M. M. (2001) Reliable and secure communications infrastructure for virtual enterprises. Journal of Intelligent Manufacturing 12(2): 171–183CrossRefGoogle Scholar
  10. Luo X., Brody R., Seazzu A., Burd S. (2011) Social engineering: The neglected human factor for information security management. Information Resources Management Journal 24(3): 1–8CrossRefGoogle Scholar
  11. NIST Technology Administration. (1998). An introduction to computer security: The NIST handbook. NIST, USA.Google Scholar
  12. Siponena M., Willison R. (2009) Information security management standards: Problems and solutions. Information & Management 46(5): 267–270CrossRefGoogle Scholar
  13. Susanto, H., Almunawar, M. N., & Tuan, Y. C. (2011). Information security management system standards: A comparative study of the big five. International Journal of Electrical & Computer Sciences, 11(05).Google Scholar
  14. Weill P., Vitale M. (2002) What IT infrastructure capabilities are needed to implement e-business models?. MIS Quarterly Executive 1(1): 17–34Google Scholar
  15. Yin, C., Sun, R., & Shuoben, B. (2009). A model of information security based on office automation. In International joint conference on INC, IMS and IDC.Google Scholar

Copyright information

© Springer Science+Business Media, LLC 2012

Authors and Affiliations

  1. 1.Division of Business AdministrationCollege of Business, Sangmyung UniversitySeoulKorea

Personalised recommendations