Internet-based Information, Communication and Collaboration technologies are making it easier for organizations and knowledge workers to collaborate across organizational boundaries. However, it is necessary for organizations to monitor, regulate and build appropriate security mechanisms in collaboration systems to prevent loss of strategic knowledge and competitive advantage. In this paper, we present a risk assessment framework that can help organizations identify valuable knowledge assets exposed through collaboration technologies, and assess the risk of knowledge loss, intellectual property leakage, and the subsequent loss of competitive advantage so that appropriate security mechanism can be designed to prevent such a loss. We present ...
We present an empirically grounded and theoretically informed model for the assessment and mitigatio...
Information technology (IT) organizations are faced with various risks such as strategic, operationa...
Many methodologies exist to assess the security risks associated with unauthorized leakage, modifica...
In a networked environment, it is essential for organizations to share knowledge among themselves if...
Knowledge is the most important asset that a company can have. Thus, it is imperative that this asse...
This paper provides a framework for understanding the different types of interorganizational informa...
Information security risk management (ISRM) is an integral part of the management practice and is an...
Effective management of safety and security risks can help a company to avoid losses. However, creat...
Although emerging organizational knowledge systems, such as social media, are widely researched, rel...
As digitization takes hold in all areas, collaboration within supply chains (SC) is also being disru...
Purpose – Many methodologies exist to assess the security risks associated with unauthorized l...
M. Tech. Business Information Systems Tshwane University of Technology 2011.In the last decade, the ...
Information technology (IT) organizations are faced with various risks such as strategic, operationa...
In today’s business environment, almost all information is captured and stored in electronic form. T...
The purpose of this paper is to introduce a model to manage knowledge security risks in organization...
We present an empirically grounded and theoretically informed model for the assessment and mitigatio...
Information technology (IT) organizations are faced with various risks such as strategic, operationa...
Many methodologies exist to assess the security risks associated with unauthorized leakage, modifica...
In a networked environment, it is essential for organizations to share knowledge among themselves if...
Knowledge is the most important asset that a company can have. Thus, it is imperative that this asse...
This paper provides a framework for understanding the different types of interorganizational informa...
Information security risk management (ISRM) is an integral part of the management practice and is an...
Effective management of safety and security risks can help a company to avoid losses. However, creat...
Although emerging organizational knowledge systems, such as social media, are widely researched, rel...
As digitization takes hold in all areas, collaboration within supply chains (SC) is also being disru...
Purpose – Many methodologies exist to assess the security risks associated with unauthorized l...
M. Tech. Business Information Systems Tshwane University of Technology 2011.In the last decade, the ...
Information technology (IT) organizations are faced with various risks such as strategic, operationa...
In today’s business environment, almost all information is captured and stored in electronic form. T...
The purpose of this paper is to introduce a model to manage knowledge security risks in organization...
We present an empirically grounded and theoretically informed model for the assessment and mitigatio...
Information technology (IT) organizations are faced with various risks such as strategic, operationa...
Many methodologies exist to assess the security risks associated with unauthorized leakage, modifica...