Design of evaluation items of the security levels for suppliers in the manufacturing industry
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Choi, Y. | - |
dc.contributor.author | Chang, Hang Bae | - |
dc.date.accessioned | 2023-05-16T07:40:36Z | - |
dc.date.available | 2023-05-16T07:40:36Z | - |
dc.date.issued | 2023-07 | - |
dc.identifier.issn | 0920-8542 | - |
dc.identifier.issn | 1573-0484 | - |
dc.identifier.uri | https://scholarworks.bwise.kr/cau/handle/2019.sw.cau/66531 | - |
dc.description.abstract | Owing to the fourth industrial revolution, collaborations between companies and various technologies have become indispensable, particularly in the manufacturing industry. However, technology leakage is likely to occur among cooperative partners where the ratio of small- and medium-sized enterprises is relatively high because of low-security resources. To address this security management problem, we analyzed existing literature and designed a reference model and questions to evaluate security levels reflecting partners’ characteristics to be managed by the manufacturing parent company. We conducted an expert survey to verify the designed model and calculated the weight of each evaluation area. Consequently, we designed a reference model to effectively evaluate, from the perspective of the parent company, partners in manufacturing. We anticipate that the results of this study will assist a parent company in securely sharing data and technologies with partners and being used as a self-diagnosis tool by partners to evaluate its security levels. © 2023, The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature. | - |
dc.format.extent | 36 | - |
dc.language | 영어 | - |
dc.language.iso | ENG | - |
dc.publisher | Springer | - |
dc.title | Design of evaluation items of the security levels for suppliers in the manufacturing industry | - |
dc.type | Article | - |
dc.identifier.doi | 10.1007/s11227-023-05101-w | - |
dc.identifier.bibliographicCitation | Journal of Supercomputing, v.79, no.11, pp 11707 - 11742 | - |
dc.description.isOpenAccess | N | - |
dc.identifier.wosid | 000942672800003 | - |
dc.identifier.scopusid | 2-s2.0-85149196809 | - |
dc.citation.endPage | 11742 | - |
dc.citation.number | 11 | - |
dc.citation.startPage | 11707 | - |
dc.citation.title | Journal of Supercomputing | - |
dc.citation.volume | 79 | - |
dc.type.docType | Article | - |
dc.publisher.location | 네델란드 | - |
dc.subject.keywordAuthor | Manufacturing industry | - |
dc.subject.keywordAuthor | Parent company | - |
dc.subject.keywordAuthor | Partners | - |
dc.subject.keywordAuthor | Security level evaluation | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalResearchArea | Engineering | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Hardware & Architecture | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Theory & Methods | - |
dc.relation.journalWebOfScienceCategory | Engineering, Electrical & Electronic | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
84, Heukseok-ro, Dongjak-gu, Seoul, Republic of Korea (06974)02-820-6194
COPYRIGHT 2019 Chung-Ang University All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.