The manufacturing industry plays an important role in the economy and society. In traditional environment, the manufacturing industry is at a standstill or even in recession in the United States [1]. Thus, it is crucial to identify new drivers to boost the manufacturing industry. In recent years, the development of Internet of Things (IoT) has brought a great opportunity as well as a challenge for modern manufacturing enterprises. The application of IoT in manufacturing industry not only brings economic benefits for manufacturing enterprises, but also promotes the upstream and downstream industries. Unfortunately, the employment of the wireless transmission technologies in the IoT environment also introduces significant information security issues.
Bitte loggen Sie sich ein, um Zugang zu diesem Inhalt zu erhalten
Bi, Z., Xu, L.D., Wang, C.: Internet of things for enterprise systems of modern manufacturing. IEEE Trans. Ind. Inform.
10, 1537–1546 (2014)
CrossRef
2.
Houyou, A.M., Huth, H.P., Kloukinas, C., Trsek, H., Rotondi, D.: Agile manufacturing: general challenges and an IoT@Work perspective. In: Proceedings of 2012 I.E. 17th International Conference on Emerging Technologies & Factory Automation, pp. 1–7 (2012)
Anderson, R.: Why information security is hard—an economic perspective. In: Proceedings of the 17th Annual Computer Security Applications Conference (ACSAC’01), IEEE, pp. 358–365 (2001)
5.
Anderson, R., Moore, T.: The economics of information security. Science.
314, 610–613 (2006)
CrossRef
6.
Gordon, L., Loeb, M.: The economics of information security investment. ACM Trans. Inf. Syst. Secur.
5, 438–457 (2002)
CrossRef
7.
Shirtz, D., Elovici, Y.: Optimizing investment decisions in selecting information security remedies. Inf. Manag. Comput. Secur.
19, 95–112 (2011)
CrossRef
8.
Huang, C.D., Behara, R.S.: Economics of information security investment in the case of concurrent heterogeneous attacks with budget constraints. Int. J. Prod. Econ.
141, 255–268 (2013)
CrossRef
9.
Wu, Y., Feng, G., Wang, N., Liang, H.: Game of information security investment: impact of attack types and network vulnerability. Expert Syst. Appl.
42, 6132–6146 (2015)
CrossRef
10.
Kong, H.K., Kim, T.S., Kim, J.: An analysis on effects of information security investments: a BSC perspective. J. Intell. Manuf.
23, 941–953 (2012)
CrossRef
11.
Khouzani, M.H.R., Sen, S., Shroff, N.B.: An Economic Analysis of Regulating Security Investments in the Internet, 2013 Proceedings IEEE INFOCOM, pp. 818–826 (2013)
12.
Huang, C.D., Hu, Q., Behara, R.S.: An economic analysis of the optimal information security investment in the case of a risk-averse firm. Int. J. Prod. Econ.
114, 793–804 (2008)
CrossRef
13.
Bojanc, R., Jerman-Blažič, B.: An economic modelling approach to information security risk management. Int. J. Inf. Manag.
28, 413–422 (2008)
CrossRef
14.
Bojanc, R., Jerman-Blažič, B., Tekavčič, M.: Managing the investment in information security technology by use of a quantitative modeling. Inf. Process. Manag.
48, 1031–1052 (2012)
CrossRef
15.
Lelarge, M.: Coordination in network security games: a monotone comparative statics approach. IEEE J. Sel. Areas Commun.
30, 2210–2219 (2012)
CrossRef
16.
Chai, S., Kim, M., Rao, H.R.: Firms’ information security investment decisions: stock market evidence of investors’ behavior. Decis. Support. Syst.
50, 651–661 (2011)
CrossRef
17.
Bandyopadhyay, T., Jacob, V., Raghunathan, S.: Information security in networked supply chains: impact of network vulnerability and supply chain integration on incentives to invest. Inf. Technol. Manag.
11, 7–23 (2010)
CrossRef
18.
Eisenga, A., Jones, T.L., Rodriguez, W.: Investing in IT security: how to determine the maximum threshold. Int. J. Inf. Secur. Priv.
6, 75–87 (2012)
CrossRef
19.
Huang, C.D., Behara, R.S., Goo, J.: Optimal information security investment in a healthcare information exchange: an economic analysis. Decis. Support. Syst.
61, 1–11 (2014)
CrossRef
20.
Lee, Y.J., Kauffman, R.J., Sougstad, R.: Profit-maximizing firm investments in customer information security. Decis. Support. Syst.
51, 904–920 (2011)
CrossRef
21.
Wang, S., Chen, J., Stirpe, P.A., Hong, T.: Risk-neutral evaluation of information security investment on data centers. J. Intell. Inf. Syst.
36, 329–345 (2011)
CrossRef
22.
Gordon, L.A., Loeb, M.P., Lucyshyn, W.: Sharing information on computer systems security: an economic analysis. J. Account. Public Policy.
22, 461–485 (2003)
CrossRef
23.
Gal-Or, E., Ghose, A.: The economic incentives for sharing security information. Inf. Syst. Res.
16, 186–208 (2005)
CrossRef
24.
Hausken, K.: Information sharing among firms and cyber attacks. J. Account. Public Policy.
26, 639–688 (2007)
CrossRef
25.
Liu, D., Ji, Y., Mookerjee, V.: Knowledge sharing and investment decisions in information security. Decis. Support. Syst.
52, 95–107 (2011)
CrossRef
26.
Gao, X., Zhong, W., Mei, S.: A game-theoretic analysis of information sharing and security investment for complementary firms. J. Oper. Res. Soc.
65, 1682–1691 (2014)
CrossRef
27.
Gao, X., Zhong, W., Mei, S.: Security investment and information sharing under an alternative security breach probability function. Inf. Syst. Front.
17, 423–438 (2015)
CrossRef
Die B2B-Firmensuche für Industrie und Wirtschaft: Kostenfrei in Firmenprofilen nach Lieferanten, Herstellern, Dienstleistern und Händlern recherchieren.
Das Management des Digitalisierungsprozesses ist eine drängende Herausforderung für fast jedes Unternehmen. Ausgehend von drei aufeinander aufbauenden empirischen Untersuchungen lesen Sie hier, welche generellen Themenfelder und konkreten Aufgaben sich dem Management im Rahmen dieses Prozesses stellen. Erfahren Sie hier, warum das Management der digitalen Transformation als separates Konzept zum Informationsmanagement zu betrachten und so auch organisatorisch separiert zu implementieren ist. Jetzt gratis downloaden!