메뉴 건너뛰기




Volumn , Issue , 2016, Pages 25-30

Security challenges in small-and medium-sized manufacturing enterprises

Author keywords

manufacturing; Security management; SME

Indexed keywords

INDUSTRIAL MANAGEMENT; PERSONAL COMPUTING;

EID: 85010931087     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SIMS.2016.7802895     Document Type: Conference Paper
Times cited : (12)

References (32)
  • 1
  • 2
    • 70349619163 scopus 로고    scopus 로고
    • Industrial wireless sensor networks: Challenges, design principles, technical approaches
    • Oct.
    • V. C. Gungor, C. P. Hancke, "Industrial Wireless Sensor Networks: Challenges, Design Principles, Technical Approaches, " IEEE Trans . Ind. Electron., vol. 56, no. 10, pp.4258-4265, Oct. 2009
    • (2009) IEEE Trans . Ind. Electron. , vol.56 , Issue.10 , pp. 4258-4265
    • Gungor, V.C.1    Hancke, C.P.2
  • 5
    • 85010945188 scopus 로고    scopus 로고
    • Cyberthreat Defense Report, North America Europe [Online] Available
    • Cyberthreat Defense Report, North America, Europe. (2015) CyberEdge Group. [Online]. Available: http://www.cyberedge. com/2015-cdr
    • (2015) Cyber Edge Group
  • 6
    • 84904093397 scopus 로고    scopus 로고
    • Center for Strategic, International Studies, Washington DC [Online]. Available
    • J. Lewis and S. Baker. (2013). The economic impact of cybercrime, cyber espionage. Center for Strategic, International Studies, Washington, DC, 103-117. [Online]. Available: http://csis.orglfiles/publicationl60396rptcybercrime-cost0713jh40.pdf
    • (2013) The Economic Impact of Cybercrime, Cyber Espionage , pp. 103-117
    • Lewis, J.1    Baker, S.2
  • 8
    • 85010982675 scopus 로고    scopus 로고
    • Tivi Jan 22 [Online] Avaiiabie:
    • Tivi. (2016, Jan 22). Sonera paljasti verkkovikansa sy'yn. [Online]. A v ai I ab Ie: http://www.tivi. fi/rss/sonera-palj asti-verkkov ikansa-syyn-6247311
    • (2016) Sonera Paljasti Verkkovikansa sy'Yn
  • 13
    • 85011003287 scopus 로고    scopus 로고
    • National Defense Industrial Association May 5 A White Paper prepared by National Defense Industrial Association's Manufacturing Division, Cyber Division. [Online]. Available
    • National Defense Industrial Association. (2014, May 5). Cybersecurity for Advanced Manufacturing. A White Paper prepared by National Defense Industrial Association's Manufacturing Division, Cyber Division. [Online]. Available: http://www.ndia. orgiPolicy/LegislativeandFederallssuesUpdate/Docume nts/Cyber for Manufacturing-White Paper 5 May 14. pdf
    • (2014) Cybersecurity for Advanced Manufacturing
  • 14
    • 85010941053 scopus 로고    scopus 로고
    • Cyber-attacks on ERP systems. An analysis of the current threat landscape
    • M. Nunez. (2012). "Cyber-attacks on ERP systems. An analysis of the current threat landscape", in Datenschutz und Datensicherheit, Vol. 36(9) pp 653-656.
    • (2012) Datenschutz und Datensicherheit , vol.36 , Issue.9 , pp. 653-656
    • Nunez, M.1
  • 16
    • 84952912469 scopus 로고    scopus 로고
    • Bundesamt fOr Sicherheit in der Informationstechnik (BSI) [Online]. Available
    • Bundesamt fOr Sicherheit in der Informationstechnik (BSI). (2014). Die Lage der IT-Sicherheit in Deutschland 2014. [Online]. Available: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSIIPublikationen ILageberichte/Lagebericht20 14. pdf?-blob=publicationF ile
    • (2014) Die Lage der IT-Sicherheit in Deutschland 2014
  • 20
    • 26044434660 scopus 로고    scopus 로고
    • Achievement assessment for enterprise resource planning (ERP) system implementations based on critical success factors (CSFs)
    • 18 November
    • A. Y.T. Sun, A. Yazdani, J. D. Overend. Achievement assessment for enterprise resource planning (ERP) system implementations based on critical success factors (CSFs). International Journal of Production Economics, Volume 98, Issue 2, 18 November 2005, Pages 189-203.
    • (2005) International Journal of Production Economics , vol.98 , Issue.2 , pp. 189-203
    • Sun, A.Y.T.1    Yazdani, A.2    Overend, J.D.3
  • 21
    • 85010945216 scopus 로고    scopus 로고
    • Dec. 17 [Online]. Available
    • A. Deitze. (2013, Dec. 17) The Challengeso Cintroducing ERP in SMEs. [Online]. Available: http://www.rolandberger.com/medialnewsI20 13-12-17-rbsc-newsChallenges-oCintroducing-ERP in SMEs.html
    • (2013) The Challengeso Cintroducing ERP in SMEs
    • Deitze, A.1
  • 23
    • 84857359642 scopus 로고    scopus 로고
    • Unrealistic optimism on information security management
    • H. S. Rhee, Y. U. Ryu, C. T. Kim. "Unrealistic optimism on information security management, " in Computers & Security, 2012, vol. 31.2, pp. 221-232.
    • (2012) Computers & Security , vol.31 , Issue.2 , pp. 221-232
    • Rhee, H.S.1    Ryu, Y.U.2    Kim, C.T.3
  • 25
    • 84925656546 scopus 로고    scopus 로고
    • Improving the information security culture through monitoring, implementation actions illustrated through a case study
    • A. Da Veiga, N. Martins. "Improving the information security culture through monitoring, implementation actions illustrated through a case study, " in Computers & Security, 201S, vol. 49, 162-176.
    • (2015) Computers & Security , vol.49 , pp. 162-176
    • Da Veiga, A.1    Martins, N.2
  • 30
    • 84945326308 scopus 로고    scopus 로고
    • Kesko [Online] Available
    • Kesko. "Information security policy". [Online]. Available: http://www. kesko.fi/en/company/policies-and-principles/information-securitypolicyl
    • Information Security Policy
  • 31
    • 84945326308 scopus 로고    scopus 로고
    • Harvard University [Online] Available
    • Harvard University, "Information Security Policy". [Online]. Available: http://policy.security.harvard.edul
    • Information Security Policy
  • 32
    • 85010958134 scopus 로고    scopus 로고
    • ISO 27000 Standards
    • ISO 27000 Standards, 2013.
    • (2013)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.