The necessity of (re)considering the three main faces of security mentioned in the title of the paper derives from the accumulation of the importance of the knowledge circulating in organizations, with the existence of numerous dangers and threats that target this knowledge, focusing on people as depositaries and users of knowledge. After a general presentation of the knowledge workers characteristics that can be analyzed as potential risks from the point of view of the confidentiality, integrity and accessibility of knowledge, the paper suggests some solutions that spin around the idea, that is, knowledge security is a human problem and not a technical one, and therefore it should be treated as such. The paper is mainly addressed to the ma...
As the health care industry enters the era of knowledge management it must place security at the fou...
In today’s competitive environments, the effective use of knowledge assets and resources helps compa...
Many methodologies exist to assess the security risks associated with unauthorized leakage, modifica...
The necessity of (re)considering the three main faces of security mentioned in the title of the pape...
Knowledge management enhances the value of a corporation by identifying the assets and expertise as ...
The necessity of considering the three main faces of informational security mentioned in the title o...
The security of knowledge is of extreme importance to any organisation, as organizations are increas...
Security of Knowledge is of extreme importance for any organization. The organizations across the w...
Security of Information plays an important role in the progress of any organization. This research f...
Knowledge sharing has been identified as a major focus area for knowledge management. Efforts are ma...
Security awareness is very essential in securing intellectual property, in particular internal corpo...
Most firms use secrecy to protect their knowledge from potential imitators. However, the theoretical...
Today, wealth and growth are, to a rapidly growing extent, driven by investment in and governing of ...
This paper proposes a simple framework to examine organizational methods of knowledge protection. Th...
Purpose – Many methodologies exist to assess the security risks associated with unauthorized l...
As the health care industry enters the era of knowledge management it must place security at the fou...
In today’s competitive environments, the effective use of knowledge assets and resources helps compa...
Many methodologies exist to assess the security risks associated with unauthorized leakage, modifica...
The necessity of (re)considering the three main faces of security mentioned in the title of the pape...
Knowledge management enhances the value of a corporation by identifying the assets and expertise as ...
The necessity of considering the three main faces of informational security mentioned in the title o...
The security of knowledge is of extreme importance to any organisation, as organizations are increas...
Security of Knowledge is of extreme importance for any organization. The organizations across the w...
Security of Information plays an important role in the progress of any organization. This research f...
Knowledge sharing has been identified as a major focus area for knowledge management. Efforts are ma...
Security awareness is very essential in securing intellectual property, in particular internal corpo...
Most firms use secrecy to protect their knowledge from potential imitators. However, the theoretical...
Today, wealth and growth are, to a rapidly growing extent, driven by investment in and governing of ...
This paper proposes a simple framework to examine organizational methods of knowledge protection. Th...
Purpose – Many methodologies exist to assess the security risks associated with unauthorized l...
As the health care industry enters the era of knowledge management it must place security at the fou...
In today’s competitive environments, the effective use of knowledge assets and resources helps compa...
Many methodologies exist to assess the security risks associated with unauthorized leakage, modifica...