3 research outputs found

    Why should we investigate knowledge risks incidents? - Lessons from four cases.

    Get PDF
    In a knowledge-based economy, knowledge has become the most important source for competitive advantage. Thus, organizations spend more attention on the protection of knowledge and also research on knowledge protection has gained increasing attention in the past years. However, knowledge protection research mainly focuses on the design of preventive measures and little is published about real incidents or reactive measures. Learning from failure and from incidents is important to improve current practice. This paper reflects on four cases of real knowledge risk incidents. We discuss ways to prevent or delay knowledge spillovers and the importance of knowing the threats in order to prevent them. In addition to preventive measures, we highlight that companies need to have reactive measures in place. Finally, based on our insights we discuss why analyzing incidents in addition to identified threats is important for practice as well as academia

    Formalizing and Integrating User Knowledge into Security Analytics

    Get PDF
    The Internet-of-Things and ubiquitous cyber-physical systems increase the attack surface for cyber-physical attacks. They exploit technical vulnerabilities and human weaknesses to wreak havoc on organizations’ information systems, physical machines, or even humans. Taking a stand against these multi-dimensional attacks requires automated measures to be com- bined with people as their knowledge has proven critical for security analytics. However, there is no uniform understanding of information security knowledge and its integration into security analytics activities. With this work, we structure and formalize the crucial notions of knowledge that we deem essential for holistic security analytics. A corresponding knowledge model is established based on the Incident Detection Lifecycle, which summarizes the security analytics activities. This idea of knowledge-based security analytics highlights a dichotomy in security analytics. Security experts can operate security mechanisms and thus contribute their knowledge. However, security novices often cannot operate security mechanisms and, therefore, cannot make their highly-specialized domain knowledge available for security analytics. This results in several severe knowledge gaps. We present a research prototype that shows how several of these knowledge gaps can be overcome by simplifying the interaction with automated security analytics techniques

    The role of knowledge protection in knowledge management success models

    Get PDF
    The world is technologically advancing every day and innovations are coming up frequently. People only feel interested to know about those innovations which create some buzz in the market - the rest of the innovations lost in the bottomless cave of time. One of the primary reasons for such failure is innovators’ too much interest in protecting information related to the creation itself. Undoubtedly, the security of knowledge is vital for any invention, but being extensively protective, can also hamper the innovation process and keep the innovator in the dark about users’ expectations. Therefore, an innovator needs to determine the boundary of knowledge protection to become successful in commercializing any innovation. Although the present structure of knowledge management is very multifaceted, yet, its correlation with technology transfer is inherently evident. Therefore, the proposed solution will try to find out some theoretical background to establish a connection between knowledge protection and the knowledge management (KM) success model. The answer will try to discover the status of knowledge protection as a success factor of the knowledge management success model. A systematic literature review conducts to identify and evaluate the works of researchers, scholars in this field. The review starts with finding the right keywords to discover appropriate journals. Next, relevant articles need to obtain from those journals. Information applicable to the research topic emerges after reading the relevant journals. After the research, it becomes clear that knowledge protection doesn’t get the importance that the author expects while selecting the topic. Knowledge related success factors get less importance during the finding of knowledge management success factors. There are only three articles that appear during the research, where they acknowledge the security of knowledge. The almost same observation detects in the case of knowledge management success models. Most of the time, knowledge protection has not taken into account while developing these models. Only one model considers knowledge protection and another model indirectly acknowledges the importance of protection. Though the models consider user satisfaction widely, but the access to knowledge for the users and the barrier of getting that knowledge due to knowledge protection overlooks significantly
    corecore