100 research outputs found

    Mitigating the Risk of Knowledge Leakage in Knowledge Intensive Organizations: a Mobile Device Perspective

    Full text link
    In the current knowledge economy, knowledge represents the most strategically significant resource of organizations. Knowledge-intensive activities advance innovation and create and sustain economic rent and competitive advantage. In order to sustain competitive advantage, organizations must protect knowledge from leakage to third parties, particularly competitors. However, the number and scale of leakage incidents reported in news media as well as industry whitepapers suggests that modern organizations struggle with the protection of sensitive data and organizational knowledge. The increasing use of mobile devices and technologies by knowledge workers across the organizational perimeter has dramatically increased the attack surface of organizations, and the corresponding level of risk exposure. While much of the literature has focused on technology risks that lead to information leakage, human risks that lead to knowledge leakage are relatively understudied. Further, not much is known about strategies to mitigate the risk of knowledge leakage using mobile devices, especially considering the human aspect. Specifically, this research study identified three gaps in the current literature (1) lack of in-depth studies that provide specific strategies for knowledge-intensive organizations based on their varied risk levels. Most of the analysed studies provide high-level strategies that are presented in a generalised manner and fail to identify specific strategies for different organizations and risk levels. (2) lack of research into management of knowledge in the context of mobile devices. And (3) lack of research into the tacit dimension of knowledge as the majority of the literature focuses on formal and informal strategies to protect explicit (codified) knowledge.Comment: The University of Melbourne PhD Thesi

    Medición y monitoreo remoto para las magnitudes de ph y conductividad dentro del proceso de tratamiento de aguas residuales en la planta la cimarrona. Prácticas profesionales Crystal S.A.S.

    Get PDF
    Este trabajo se desarrolló en el sector textil, específicamente en el tratamiento de las aguas residuales industriales de la planta la Cimarrona, llevado a cargo por la empresa Crystal S.A.S. Este proyecto se realizó con el objetivo de seleccionar e implementar la adecuada instrumentación industrial para medir y monitorear las magnitudes de pH y conductividad ya que es indispensable tener conocimiento del cambio de dichas variables durante el tratamiento de aguas para no afectar directamente el proceso biológico llevado a cabo. Para implementar este sistema fue necesario tener conocimiento de las diferentes metodologías y tipos de sensores de medición en línea para realizar la debida caracterización del proceso y así determinar los equipos más adecuados a seleccionar, también fue necesario realizar el debido montaje de acuerdo a las recomendaciones del fabricante para garantizar un óptimo funcionamiento de medición. Los resultados finales del proyecto se verán reflejados en el sistema de monitoreo con el que cuenta actualmente la planta de tratamiento y de esta manera facilitar el manejo y control de todas las variables que intervienen en el proceso de tratamiento biológico.Ingeniero Mecatrónicopregrad

    Study of Zero-Knowledge protocols and Elliptic Curve Cryptography and their implementation in Smart Card environments using Java Card

    Full text link
    This paper studies the problem of Zero-Knowledge Protocol (ZKP) and elliptic curve cryptographic implementation in a computationally limited environment, such as, the smart cards, using Java Card. Besides that, it is explained how the zero-knowledge protocol was selected to implement it on a smart card and how the benchmarking was conducted to select this protocol. The paper also shows a theoretical development to implement the ZKP protocol using elliptic curve cryptography. Keywords: Authentication; Zero-knowledge; Cryptography; Elliptic Curve; Java card; Smart cardsComment: 16 pages, in Spanis

    Human rights of children, as strategy teaching to promote the school coexistence in four educational institutions of the city of Florence

    Full text link
    El objetivo la investigación fue proponer una estrategia pedagógica basada en los derechos fundamentales de los niños, que permitiera fortalecer la convivencia escolar en instituciones educativas del municipio de Florencia- Caquetá. Propuesta pedagógica, que se estructuró en tres momentos: diagnóstico, diseño e implementación y su posterior evaluación. Éstos a su vez, fueron desarrollados en el periodo comprendido: II-2014 y I-2016. A nivel metodológico, la investigación se encuentra enmarcada dentro del paradigma socio-critico, en la medida que se contribuyó a la transformación de la realidad social investigada a partir de la reflexión y el empoderamiento de la población focalizada sobre la cotidianidad del entorno escolar, familiar y social.This objective main: propose a strategy pedagogical (based on them rights of them children), that would allow strengthen the coexistence school, in institutions educational of the municipality of Florence-Caquetá. Pedagogical proposal, which was structured in three stages: diagnosis, design and implementation of the proposal, and their subsequent evaluation. These in turn were developed in the period: II-2014 and I-2016. At the methodological level, the research is framed within the paradigm of socio - critical, in the measure that was intended to transform the social reality investigated from reflection and empowerment of the population focusing on the everyday life of the school, family and social environmen

    Addressing Knowledge Leakage Risk caused by the use of mobile devices in Australian Organizations

    Get PDF
    Information and knowledge leakage has become a significant security risk to Australian organizations. Each security incident in Australian business cost an average US2.8million.Furthermore,Australianorganisationsspendthesecondmostworldwide(US2.8 million. Furthermore, Australian organisations spend the second most worldwide (US1.2 million each on average) on investigating and assessing information breaches. The leakage of sensitive organizational information occurs through different avenues, such as social media, cloud computing and mobile devices. In this study, we (1) analyze the knowledge leakage risk (KLR) caused by the use of mobile devices in knowledge-intensive Australian organizations, (2) present a conceptual research model to explain the determinants that influence KLR through the use of mobile devices grounded in the literature, (3) conduct interviews with security and knowledge managers to understand what strategies they use to mitigate KLR caused by the use of mobile devices and (4) use content analysis and the conceptual model to frame the preliminary findings from the interviews

    Estudio de factibilidad para la apropiación tecnológica, dentro del mercado colombiano, de un aerogenerador de 400 w.

    Get PDF
    Este proyecto se desarrolla como trabajo de grado para la carrera Ingeniería de diseño de producto, enmarcándose dentro de las áreas de la ingeniería inversa, desarrollo sostenible y producción. Su objetivo principal es el de estudiar la factibilidad técnica y económica de realizar la apropiación tecnológica de un pequeño aerogenerador de 400 W, para ser utilizado en zonas no interconectadas del país donde las condiciones de viento sean propicias.127 p.Contenido parcial: Variables relacionadas con la energía eólica -- Situación actual de la energía eólica a nivel mundial -- Estado actual y perspectivas de la energía eólica dentro del mercado latinoamericano -- Viabilidad técnica: proceso de ingeniería inversa -- Definición técnica de una turbina eólica

    Towards a knowledge leakage Mitigation framework for mobile Devices in knowledge-intensive Organizations

    Full text link
    The use of mobile devices in knowledge-intensive organizations while effective and cost-efficient also pose a challenging management problem. Often employees whether deliberately or inadvertently are the cause of knowledge leakage in organizations and the use of mobile devices further exacerbates it. This problem is the result of overly focusing on technical controls while neglecting human factors. Knowledge leakage is a multidimensional problem, and in this paper, we highlight the different dimensions that constitute it. In this study, our contributions are threefold. First, we study knowledge leakage risk (KLR) within the context of mobile devices in knowledge-intensive organizations in Australia. Second, we present a conceptual framework to explain and categorize the mitigation strategies to combat KLR through the use of mobile devices grounded in the literature. And third, we apply the framework to the findings from interviews with security and knowledge managers. Keywords: Knowledge Leakage, Knowledge Risk, Knowledge intensive, Mobile device.Comment: 22 pages, ECIS full paper 201

    Addressing Knowledge Leakage Risk caused by the use of mobile devices in Australian Organizations

    Full text link
    Information and knowledge leakage has become a significant security risk to Australian organizations. Each security incident in Australian business cost an average US$\$2.8 million. Furthermore, Australian organisations spend the second most worldwide (US$\$1.2 million each on average) on investigating and assessing information breaches. The leakage of sensitive organizational information occurs through different avenues, such as social media, cloud computing and mobile devices. In this study, we (1) analyze the knowledge leakage risk (KLR) caused by the use of mobile devices in knowledge-intensive Australian organizations, (2) present a conceptual research model to explain the determinants that influence KLR through the use of mobile devices grounded in the literature, (3) conduct interviews with security and knowledge managers to understand what strategies they use to mitigate KLR caused by the use of mobile devices and (4) use content analysis and the conceptual model to frame the preliminary findings from the interviews. Keywords: Knowledge leakage, mobile devices, mobile contexts, knowledge leakage riskComment: Pages 14. arXiv admin note: text overlap with arXiv:1606.0145

    TOWARDS A KNOWLEDGE LEAKAGE MITIGATION FRAMEWORK FOR MOBILE DEVICES IN KNOWLEDGE-INTENSIVE ORGANIZATIONS

    Get PDF
    The use of mobile devices in knowledge-intensive organizations while effective and cost-efficient also pose a challenging management problem. Often employees whether deliberately or inadvertently are the cause of knowledge leakage in organizations and the use of mobile devices further exacerbates it. This problem is the result of overly focusing on technical controls neglecting human factors. Knowledge leakage is a multidimensional problem, and in this paper, we highlight the different dimensions that constitute it. In this study, our contributions are threefold. First, we study knowledge leakage risk (KLR) within the context of mobile devices in knowledge-intensive organizations in Australia. Second, we present a conceptual framework to explain and categorize the mitigation strategies to combat KLR through the use of mobile devices grounded in the literature. And third, we apply the framework to the findings from interviews with security and knowledge managers. Keywords: Knowledge Leakage, Knowledge Risk, Knowledge intensive, Mobile device

    Cómo opera la responsabilidad objetiva en el estatuto del consumidor

    Get PDF
    El Estatuto del Consumidor, regulado en la Ley 1480 de 2011, trae entre sus reformas y garantías la figura de la acción de responsabilidad por daños ocasionados por productos defectuosos, a través de la cual se ha reformado la aplicación y/o utilización de la responsabilidad objetiva y subjetiva, en cuanto a la culpa, que deja de ser uno de los requisitos para su configuración; el hallazgo de la culpa dentro del Estatuto del Consumidor, como figura que podría suplirla o asemejarse,se puede hallar dentro del concepto de seguridad y la ineficiencia del deber de cuidado como uno de los eximentes de responsabilidad.Universidad Libre Seccional Pereira -- Facultad de Derecho, Ciencias Políticas y Sociales -- DerechoThe status of the consumer regulated in Law 1480 of 2011, brings among its reforms and guarantees the figure of the action of liability for damage caused by defective products through which the application and / or use of the responsibility has been reformed objective and subjective as to the guilt that ceases to be one of the requirements for its configuration, finding the blame within the consumer statute as a figure that could suplir the we find the concept of safety and the inefficiency of the duty of care as one of the exempts of responsibility
    corecore