Skip to main content

Advertisement

Log in

A study on security strategy in ICT convergence environment

  • Published:
The Journal of Supercomputing Aims and scope Submit manuscript

Abstract

In the knowledge and information society, the value of utilizing ICT technology in companies is being newly interpreted upon the convergence of business and information technology of companies. Accordingly, companies are ensuring corporate competitiveness by improving product productivity and reducing the consumption of human/physical resources through the change of strategic management environment using ICT technology. On the other hand, companies’ core information is being leaked outside of company from the convergence with ICT technology and its scale is increasing each year. Accordingly, the need for improving the level of security according to companies’ informatization level is increasing. However, studies are lacking on the composition of security strategy in suitable forms according to the scale of company and level of retaining resources. Accordingly, this study examined the security advancement steps to verify the present condition of companies’ security and design security strategy from a macroscopic perspective by improving the level of security according to the scale of company and present condition of resources.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

References

  1. Wang J, Zeng F, Guo Z (2012) The evaluation of enterprise informatization risk based on the unascertained method original research article. Phys Proc 25:492–498

    Article  Google Scholar 

  2. Petukhova SP (2011) Information technologies as a basis for the modernization of Russian intellectual resources. Stud Russ Econ Dev 22(4):375–383

    Article  Google Scholar 

  3. Ya A, Bystryakov VV, Mizintseva (2011) Innovation informatization for state financial control bodies. Sci Tech Inf Process 38(2):69–77

    Article  Google Scholar 

  4. Zhang JF, Wu ZJ, Feng PF, Yu DW (2011) Evaluation systems and methods of enterprise informatization and its application original research article. Expert Syst Appl 1(7):8938–8948

    Article  Google Scholar 

  5. Qin L, Wu H (2012) Risk identification and conduction model for financial institution IT outsourcing in China. Inf Technol Manag 13(4):429–443

    Article  Google Scholar 

  6. Liua P, Zhang X (2011) Investigation into evaluation of agriculture informatization level based on two-tuple. Tech Econ Dev Econ 17(1):74–86

    Article  Google Scholar 

  7. Mizintseva MF, Kushchev MV (2007) A comparative analysis of methods for estimating informatization efficiency in regional economic systems. Sci Tech Inf Process 34(3):131–138

    Article  Google Scholar 

  8. Wang X, Chen Y, Liu Z (2008) Component-based software developing method for group companies management information system. Wuhan Univ J Nat Sci 13(1):37–44

    Article  Google Scholar 

  9. Lybaert N (1998) The information use in a SME: its importance and some elements of influence. Small Bus Econ 10(2):171–191

    Article  Google Scholar 

  10. Van Caneghem T, Van Campenhout G (2012) Quantity and quality of information and SME financial structure. Small Bus Econ 39(2):341–358

    Article  Google Scholar 

  11. Lu JW, Beamish PW (2006) SME internationalization and performance: growth vs. profitability. J Int Entrep 4(1):27–48

    Article  Google Scholar 

  12. Smolarski J, Kut C (2011) The impact of venture capital financing method on SME performance and internationalization. Int Entrep Manag J 7(1):39–55

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hangbae Chang.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Lee, CM., Chang, H. A study on security strategy in ICT convergence environment. J Supercomput 70, 211–223 (2014). https://doi.org/10.1007/s11227-014-1194-x

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11227-014-1194-x

Keywords