100 research outputs found
Mitigating the Risk of Knowledge Leakage in Knowledge Intensive Organizations: a Mobile Device Perspective
In the current knowledge economy, knowledge represents the most strategically
significant resource of organizations. Knowledge-intensive activities advance
innovation and create and sustain economic rent and competitive advantage. In
order to sustain competitive advantage, organizations must protect knowledge
from leakage to third parties, particularly competitors. However, the number
and scale of leakage incidents reported in news media as well as industry
whitepapers suggests that modern organizations struggle with the protection of
sensitive data and organizational knowledge. The increasing use of mobile
devices and technologies by knowledge workers across the organizational
perimeter has dramatically increased the attack surface of organizations, and
the corresponding level of risk exposure. While much of the literature has
focused on technology risks that lead to information leakage, human risks that
lead to knowledge leakage are relatively understudied. Further, not much is
known about strategies to mitigate the risk of knowledge leakage using mobile
devices, especially considering the human aspect. Specifically, this research
study identified three gaps in the current literature (1) lack of in-depth
studies that provide specific strategies for knowledge-intensive organizations
based on their varied risk levels. Most of the analysed studies provide
high-level strategies that are presented in a generalised manner and fail to
identify specific strategies for different organizations and risk levels. (2)
lack of research into management of knowledge in the context of mobile devices.
And (3) lack of research into the tacit dimension of knowledge as the majority
of the literature focuses on formal and informal strategies to protect explicit
(codified) knowledge.Comment: The University of Melbourne PhD Thesi
Medición y monitoreo remoto para las magnitudes de ph y conductividad dentro del proceso de tratamiento de aguas residuales en la planta la cimarrona. Prácticas profesionales Crystal S.A.S.
Este trabajo se desarrolló en el sector textil, específicamente en el tratamiento de las aguas residuales industriales de la planta la Cimarrona, llevado a cargo por la empresa Crystal S.A.S. Este proyecto se realizó con el objetivo de seleccionar e implementar la adecuada instrumentación industrial para medir y monitorear las magnitudes de pH y conductividad ya que es indispensable tener conocimiento del cambio de dichas variables durante el tratamiento de aguas para no afectar directamente el proceso biológico llevado a cabo.
Para implementar este sistema fue necesario tener conocimiento de las diferentes metodologías y tipos de sensores de medición en línea para realizar la debida caracterización del proceso y así determinar los equipos más adecuados a seleccionar, también fue necesario realizar el debido montaje de acuerdo a las recomendaciones del fabricante para garantizar un óptimo funcionamiento de medición. Los resultados finales del proyecto se verán reflejados en el sistema de monitoreo con el que cuenta actualmente la planta de tratamiento y de esta manera facilitar el manejo y control de todas las variables que intervienen en el proceso de tratamiento biológico.Ingeniero Mecatrónicopregrad
Study of Zero-Knowledge protocols and Elliptic Curve Cryptography and their implementation in Smart Card environments using Java Card
This paper studies the problem of Zero-Knowledge Protocol (ZKP) and elliptic
curve cryptographic implementation in a computationally limited environment,
such as, the smart cards, using Java Card. Besides that, it is explained how
the zero-knowledge protocol was selected to implement it on a smart card and
how the benchmarking was conducted to select this protocol. The paper also
shows a theoretical development to implement the ZKP protocol using elliptic
curve cryptography. Keywords: Authentication; Zero-knowledge; Cryptography;
Elliptic Curve; Java card; Smart cardsComment: 16 pages, in Spanis
Human rights of children, as strategy teaching to promote the school coexistence in four educational institutions of the city of Florence
El objetivo la investigación fue proponer una estrategia pedagógica basada en los
derechos fundamentales de los niños, que permitiera fortalecer la convivencia
escolar en instituciones educativas del municipio de Florencia- Caquetá. Propuesta
pedagógica, que se estructuró en tres momentos: diagnóstico, diseño e implementación
y su posterior evaluación. Éstos a su vez, fueron desarrollados en el periodo
comprendido: II-2014 y I-2016. A nivel metodológico, la investigación se encuentra
enmarcada dentro del paradigma socio-critico, en la medida que se contribuyó a la
transformación de la realidad social investigada a partir de la reflexión y el
empoderamiento de la población focalizada sobre la cotidianidad del entorno
escolar, familiar y social.This objective main: propose a strategy pedagogical (based on them rights of them
children), that would allow strengthen the coexistence school, in institutions
educational of the municipality of Florence-Caquetá. Pedagogical proposal, which
was structured in three stages: diagnosis, design and implementation of the
proposal, and their subsequent evaluation. These in turn were developed in the
period: II-2014 and I-2016. At the methodological level, the research is framed
within the paradigm of socio - critical, in the measure that was intended to
transform the social reality investigated from reflection and empowerment of the
population focusing on the everyday life of the school, family and social
environmen
Addressing Knowledge Leakage Risk caused by the use of mobile devices in Australian Organizations
Information and knowledge leakage has become a significant security risk to Australian organizations. Each security incident in Australian business cost an average US1.2 million each on average) on investigating and assessing information breaches. The leakage of sensitive organizational information occurs through different avenues, such as social media, cloud computing and mobile devices. In this study, we (1) analyze the knowledge leakage risk (KLR) caused by the use of mobile devices in knowledge-intensive Australian organizations, (2) present a conceptual research model to explain the determinants that influence KLR through the use of mobile devices grounded in the literature, (3) conduct interviews with security and knowledge managers to understand what strategies they use to mitigate KLR caused by the use of mobile devices and (4) use content analysis and the conceptual model to frame the preliminary findings from the interviews
Estudio de factibilidad para la apropiación tecnológica, dentro del mercado colombiano, de un aerogenerador de 400 w.
Este proyecto se desarrolla como trabajo de grado para la carrera Ingeniería de diseño de producto, enmarcándose dentro de las áreas de la ingeniería inversa, desarrollo sostenible y producción. Su objetivo principal es el de estudiar la factibilidad técnica y económica de realizar la apropiación tecnológica de un pequeño aerogenerador de 400 W, para ser utilizado en zonas no interconectadas del país donde las condiciones de viento sean propicias.127 p.Contenido parcial: Variables relacionadas con la energía eólica -- Situación actual de la energía eólica a nivel mundial -- Estado actual y perspectivas de la energía eólica dentro del mercado latinoamericano -- Viabilidad técnica: proceso de ingeniería inversa -- Definición técnica de una turbina eólica
Towards a knowledge leakage Mitigation framework for mobile Devices in knowledge-intensive Organizations
The use of mobile devices in knowledge-intensive organizations while
effective and cost-efficient also pose a challenging management problem. Often
employees whether deliberately or inadvertently are the cause of knowledge
leakage in organizations and the use of mobile devices further exacerbates it.
This problem is the result of overly focusing on technical controls while
neglecting human factors. Knowledge leakage is a multidimensional problem, and
in this paper, we highlight the different dimensions that constitute it. In
this study, our contributions are threefold. First, we study knowledge leakage
risk (KLR) within the context of mobile devices in knowledge-intensive
organizations in Australia. Second, we present a conceptual framework to
explain and categorize the mitigation strategies to combat KLR through the use
of mobile devices grounded in the literature. And third, we apply the framework
to the findings from interviews with security and knowledge managers. Keywords:
Knowledge Leakage, Knowledge Risk, Knowledge intensive, Mobile device.Comment: 22 pages, ECIS full paper 201
Addressing Knowledge Leakage Risk caused by the use of mobile devices in Australian Organizations
Information and knowledge leakage has become a significant security risk to
Australian organizations. Each security incident in Australian business cost an
average US2.8 million. Furthermore, Australian organisations spend the
second most worldwide (US1.2 million each on average) on investigating and
assessing information breaches. The leakage of sensitive organizational
information occurs through different avenues, such as social media, cloud
computing and mobile devices. In this study, we (1) analyze the knowledge
leakage risk (KLR) caused by the use of mobile devices in knowledge-intensive
Australian organizations, (2) present a conceptual research model to explain
the determinants that influence KLR through the use of mobile devices grounded
in the literature, (3) conduct interviews with security and knowledge managers
to understand what strategies they use to mitigate KLR caused by the use of
mobile devices and (4) use content analysis and the conceptual model to frame
the preliminary findings from the interviews. Keywords: Knowledge leakage,
mobile devices, mobile contexts, knowledge leakage riskComment: Pages 14. arXiv admin note: text overlap with arXiv:1606.0145
TOWARDS A KNOWLEDGE LEAKAGE MITIGATION FRAMEWORK FOR MOBILE DEVICES IN KNOWLEDGE-INTENSIVE ORGANIZATIONS
The use of mobile devices in knowledge-intensive organizations while effective and cost-efficient also pose a challenging management problem. Often employees whether deliberately or inadvertently are the cause of knowledge leakage in organizations and the use of mobile devices further exacerbates it. This problem is the result of overly focusing on technical controls neglecting human factors. Knowledge leakage is a multidimensional problem, and in this paper, we highlight the different dimensions that constitute it. In this study, our contributions are threefold. First, we study knowledge leakage risk (KLR) within the context of mobile devices in knowledge-intensive organizations in Australia. Second, we present a conceptual framework to explain and categorize the mitigation strategies to combat KLR through the use of mobile devices grounded in the literature. And third, we apply the framework to the findings from interviews with security and knowledge managers. Keywords: Knowledge Leakage, Knowledge Risk, Knowledge intensive, Mobile device
Cómo opera la responsabilidad objetiva en el estatuto del consumidor
El Estatuto del Consumidor, regulado en la Ley 1480 de 2011, trae entre sus reformas y garantías
la figura de la acción de responsabilidad por daños ocasionados por productos defectuosos, a
través de la cual se ha reformado la aplicación y/o utilización de la responsabilidad objetiva y
subjetiva, en cuanto a la culpa, que deja de ser uno de los requisitos para su configuración; el
hallazgo de la culpa dentro del Estatuto del Consumidor, como figura que podría suplirla o
asemejarse,se puede hallar dentro del concepto de seguridad y la ineficiencia del deber de cuidado
como uno de los eximentes de responsabilidad.Universidad Libre Seccional Pereira -- Facultad de Derecho, Ciencias Políticas y Sociales -- DerechoThe status of the consumer regulated in Law 1480 of 2011, brings among its reforms and
guarantees the figure of the action of liability for damage caused by defective products through
which the application and / or use of the responsibility has been reformed objective and subjective
as to the guilt that ceases to be one of the requirements for its configuration, finding the blame
within the consumer statute as a figure that could suplir the we find the concept of safety and the
inefficiency of the duty of care as one of the exempts of responsibility
- …