Novel technologies are quickly reshaping the industrial environment as well as the labor market in what has been called The Fourth Industrial Revolution or Industry 4.0. As digitalization and robotization quickly become industry standards in many fields of manufacturing, businesses, both big and small companies need to quickly adapt their strategies, workforce and operations to this new reality in order to remain competitive and relevant. Being able to adopt and integrate new technologies quickly will make the difference between being a trend setter or a follower in an increasingly more globalized and more digitalized economy. And there are not just the businesses that need to adapt to this rapid change. The workers themselves will be required to master new skills and be able to operate new machines quickly and proficiently or risk being replaced by one in the near future. This paper aims to look at the new, emerging technologies in the industrial sector, their rate of adoption and their impact on workers, production processes and businesses.
News about various information security attacks against companies appears almost every day. The sources of these attacks vary from cyber-criminals who want to steal companies’ data to demand a ransom, to current or former employees who want to create damage to the organization. The best way to defend organizational critical assets is to implement an Information Security Management System that secures all sensitive assets from confidentiality, availability and integrity perspective. An Information Security Management System offers top management a framework for sensitive information flow control. This framework includes with a risk assessment that considers the security threats and vulnerabilities of the company’s assets. Companies usually implement Information Security Management System only after they have a functional quality management system, which brings clarity and optimization to the company’s processes. Current approaches on creation and implementation of effective Information Security Management System are very theoretical and thus difficult to use in practice. The main objective of this paper is to present an Information Security Management System implementation method in the case of a small company by defining the basic steps in achieving a fully functional Information Security Management System. The proposed methodology considers the top management Information Security Management System objectives, organizational context, risks assessment and third parties expectations fulfillment.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2025 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.