Human knowledge-sharing networks generate Intellectual Property and Trade Secrets that provide private enterprise with competitive advantages. Although considerable research has focused on increasing the knowledge-sharing outcomes of such networks, there has been comparatively less emphasis on examining the possibility of competitive erosion through knowledge leakage. This paper considers how to mitigate knowledge leakage by influencing the development of human knowledge sharing networks. The authors review the literatures of human knowledge sharing networks as well as information security management in organizations. Based on the literature reviews we identify 12 key factors that influence network development and a security paradigm and as...
Knowledge resources are the source of competitive advantages for organizations, unless we have apt s...
Information security risk management (ISRM) is an integral part of the management practice and is an...
Drawing on the extant literature on information security and neo-institutional theory, we develop an...
Knowledge sharing is a vital business strategy that creates value for an organisation. It also leads...
© 2019 Hibah Ahmed AltukruniKnowledge leakage poses a critical risk to the competitiveness advantage...
Organisations need networks to leverage external knowledge, particularly for SMEs with their limited...
As a strategic resource, knowledge must be shared across organizational structures in order to incre...
Knowledge management enhances the value of a corporation by identifying the assets and expertise as ...
As a strategic resource, knowledge must be shared across organizational structures in order to incre...
A critical objective of knowledge-intensive organizations is to prevent erosion of their competitive...
A critical objective of knowledge-intensive organizations is to prevent erosion of their competitive...
In a networked global economy, cyber security threats have accelerated at an enormous rate. The secu...
Security of Information plays an important role in the progress of any organization. This research f...
Information security has always been an important requirement for the business. Such assets can be b...
It is crucial for knowledge to be shared in the information security domain. In effect, sharing ensu...
Knowledge resources are the source of competitive advantages for organizations, unless we have apt s...
Information security risk management (ISRM) is an integral part of the management practice and is an...
Drawing on the extant literature on information security and neo-institutional theory, we develop an...
Knowledge sharing is a vital business strategy that creates value for an organisation. It also leads...
© 2019 Hibah Ahmed AltukruniKnowledge leakage poses a critical risk to the competitiveness advantage...
Organisations need networks to leverage external knowledge, particularly for SMEs with their limited...
As a strategic resource, knowledge must be shared across organizational structures in order to incre...
Knowledge management enhances the value of a corporation by identifying the assets and expertise as ...
As a strategic resource, knowledge must be shared across organizational structures in order to incre...
A critical objective of knowledge-intensive organizations is to prevent erosion of their competitive...
A critical objective of knowledge-intensive organizations is to prevent erosion of their competitive...
In a networked global economy, cyber security threats have accelerated at an enormous rate. The secu...
Security of Information plays an important role in the progress of any organization. This research f...
Information security has always been an important requirement for the business. Such assets can be b...
It is crucial for knowledge to be shared in the information security domain. In effect, sharing ensu...
Knowledge resources are the source of competitive advantages for organizations, unless we have apt s...
Information security risk management (ISRM) is an integral part of the management practice and is an...
Drawing on the extant literature on information security and neo-institutional theory, we develop an...