Information systems planning in small business: a stages of growth analysis
Journal of Systems and Software - Special issue on information systems development: enhanced best papers from the fourth international conference, Bled, Slovenia, September 1994
Information security management standards: Problems and solutions
Information and Management
A Model of Information Security Based on Office Automation
NCM '09 Proceedings of the 2009 Fifth International Joint Conference on INC, IMS and IDC
A policy based security management architecture for sensor networks
IM'09 Proceedings of the 11th IFIP/IEEE international conference on Symposium on Integrated Network Management
An analysis on effects of information security investments: a BSC perspective
Journal of Intelligent Manufacturing
Social Engineering: The Neglected Human Factor for Information Security Management
Information Resources Management Journal
Hi-index | 0.00 |
Since organizations have recognized needs for industrial technique leakage prevention, they tend to construct industrial security system causing huge consumption of budget, yet many of them are not affordable to organize industrial security team to operate integrated industrial security management system with consistent investment and maintenance. It is fact that there only occur instant introductions of certain system. In this study, we designed industrial security management model for organizations' industrial technology leakage prevention which is differentiated from those of large enterprises based on current status of small and medium-sized organizations' industrial technology leakage. Specifically we analyzed current status and vulnerability of organizations' industrial technique leakage and we designed industrial technique leakage prevention management system for organizations. Then we applied Delphi method to validate appropriateness of study result. We strongly believe that organizations may estimate an appropriate level of investment on industrial security and develop countermeasures for control by utilizing this study result.