Knowledge is the most important asset that a company can have. Thus, it is imperative that this asset is safeguarded just like generic information assets. However, knowledge management (KM) and knowledge systems are different than traditional information systems with different threats and different operational requirements. Risk assessment is the corner stone to security. This paper discusses risk assessment. frameworks and builds on a KM/knowledge system specific risk assessment framework with a step-by-step guideline for managers as well as a generic KM/knowledge system specific threat assessment
This conceptual paper aims to identify, present, and analyze potential knowledge risks organizations...
Many methodologies exist to assess the security risks associated with unauthorized leakage, modifica...
The data collection process for risk assessment highly depends on the security experience of securit...
Knowledge is the most important asset that a company can have. Thus, it is imperative that this asse...
Purpose – Many methodologies exist to assess the security risks associated with unauthorized l...
This paper helps us to understand the emerging concept of knowledge management by exploring the rela...
Risk management and knowledge management have so far been studied almost independently. The evolutio...
Today, organizations are surrounded by a volatile environment, which may change at any time and can ...
This paper examines the information systems literature field from the viewpoint of knowledge securit...
Knowledge is regarded as a critical source of sustainable competitive advantage. However, knowledge ...
The purpose of this paper is to introduce a model to manage knowledge security risks in organization...
Organizations face a variety of challenges daily that sometimes make their operations risky. It is v...
Although emerging organizational knowledge systems, such as social media, are widely researched, rel...
Many methodologies exist to assess the security risks associated with unauthorized leakage, modifica...
Organizations face a variety of challenges daily that sometimes make their operations risky. It is v...
This conceptual paper aims to identify, present, and analyze potential knowledge risks organizations...
Many methodologies exist to assess the security risks associated with unauthorized leakage, modifica...
The data collection process for risk assessment highly depends on the security experience of securit...
Knowledge is the most important asset that a company can have. Thus, it is imperative that this asse...
Purpose – Many methodologies exist to assess the security risks associated with unauthorized l...
This paper helps us to understand the emerging concept of knowledge management by exploring the rela...
Risk management and knowledge management have so far been studied almost independently. The evolutio...
Today, organizations are surrounded by a volatile environment, which may change at any time and can ...
This paper examines the information systems literature field from the viewpoint of knowledge securit...
Knowledge is regarded as a critical source of sustainable competitive advantage. However, knowledge ...
The purpose of this paper is to introduce a model to manage knowledge security risks in organization...
Organizations face a variety of challenges daily that sometimes make their operations risky. It is v...
Although emerging organizational knowledge systems, such as social media, are widely researched, rel...
Many methodologies exist to assess the security risks associated with unauthorized leakage, modifica...
Organizations face a variety of challenges daily that sometimes make their operations risky. It is v...
This conceptual paper aims to identify, present, and analyze potential knowledge risks organizations...
Many methodologies exist to assess the security risks associated with unauthorized leakage, modifica...
The data collection process for risk assessment highly depends on the security experience of securit...