Skip to main content

The Security Management Model for Small Organization in Intelligence All-Things Environment

  • Conference paper
  • First Online:
IT Convergence and Services

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 107))

Abstract

Since organizations have recognized needs for industrial technique leakage prevention, they tend to construct information security system causing huge consumption of budget, yet many of them are not affordable to organize information security team to operate integrated information security management system with consistent investment and maintenance. It is fact that there only occur instant introductions of certain system. In this study, we designed information security management system for organizations’ industrial technology leakage prevention which is differentiated from those of large enterprises based on current status of small and medium-sized organizations’ industrial technology leakage. Specifically we analyzed current status and vulnerability of organizations’ industrial technique leakage and we designed industrial technique leakage prevention management system for organizations. Then we applied Delphi method to validate appropriateness of study result. We strongly believe that organizations may estimate an appropriate level of investment on information security and develop countermeasures for control by utilizing this study result.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Weill P, Vitale M (2002) What IT infrastructure capabilities are needed to implement e-business models? MIS Q Executive 1(1):17–34

    Google Scholar 

  2. BSI (1999) BS 7799 Part1: information security management—code of practice for information security management

    Google Scholar 

  3. Doukidis GI, Lybereas P, Galliers RD (1996) Information systems planning in small business: a stages of growth analysis. J Syst Softw Arch 33

    Google Scholar 

  4. Eloff MM, von Solms SH (2000) Information security management: an approach to combine process certification and product evaluation. Comput Secur 19

    Google Scholar 

  5. NIST Technology Administration (1998) An introduction to computer security: the NIST handbook. NIST, USA

    Google Scholar 

  6. ISACA (2001) Information security governance, guidance for boards of directors and executive management. IT Governance Institute

    Google Scholar 

  7. Levy M, Powell P (1998) SME flexibility and the role of information systems. Small Bus Econ 2

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hangbae Chang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer Science+Business Media B.V.

About this paper

Cite this paper

Chang, H., Kang, J., Na, Y. (2011). The Security Management Model for Small Organization in Intelligence All-Things Environment. In: Park, J., Arabnia, H., Chang, HB., Shon, T. (eds) IT Convergence and Services. Lecture Notes in Electrical Engineering, vol 107. Springer, Dordrecht. https://doi.org/10.1007/978-94-007-2598-0_7

Download citation

  • DOI: https://doi.org/10.1007/978-94-007-2598-0_7

  • Published:

  • Publisher Name: Springer, Dordrecht

  • Print ISBN: 978-94-007-2597-3

  • Online ISBN: 978-94-007-2598-0

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics