Skip to main content

Knowledge, Knowledge Security, and Meta-knowledge

  • Conference paper
  • 2190 Accesses

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 19))

Abstract

One of very important activities in an Information Security course is the case analysis of information security violations. This paper addresses several aspects of knowledge security violations. The case study describes the type of knowledge that was stolen and the process of knowledge security violations. The meta-knowledge about knowledge security violation is also identified.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. US News Today Cyberthieves stole 1.3 million names, Monster says, 8/24/ (2007), http://www.usatoday.com/tech/news/computersecurity/infotheft/2007-08-23-cyberjobs_N.htm

  2. Booch, G., Rumbaugh, J., Jacobson, I.: The Unified Modeling Language User Guide. Addison Wesley, Reading (1999)

    Book  Google Scholar 

  3. Czejdo, B., Mappus, R., Messa, K.: The Impact of UML Diagrams on Knowledge Modeling, Discovery and Presentations. Journal of Information Technology Impact 3(1), 25–38 (2003)

    Google Scholar 

  4. Czejdo, B., Czejdo, J., Lehman, J., Messa, K.: Graphical Queries for XML Documents and Their Applications for Accessing Knowledge in UML Diagrams. In: Proceedings of the First Symposium on Databases, Data Warehousing and Knowledge Discovery, Baden, Germany, pp. 69–85 (2003)

    Google Scholar 

  5. Czejdo, B., Czejdo, J., Eick, C., Messa, K., Vernace, M.: Rules in UML Class Diagrams. Opportunities of Change. In: Proceedings of the Third International Economic Congress, Sopot, Poland, pp. 289–298 (2003)

    Google Scholar 

  6. Delteil, A., Faron, C.: A Graph-Based Knowledge Representation Language. In: Proceedings of the 15th European Conference on Artificial Intelligence (ECAI), Lyon, France (2002)

    Google Scholar 

  7. Dori, D., Reinhartz-Berger, I., Sturm, A.: OPCAT—A Bimodal CASE Tool for Object-Process Based System Development. In: Proceedings of the IEEE/ACM 5th International Conference on Enterprise Information Systems (ICEIS 2003), Angers, France, pp. 286–291 (2003), www.ObjectProcess.org

  8. Lehrnan, F. (ed.): Semantic Networks in Artificial Intelligence. Pergamon, Oxford (1999)

    Google Scholar 

  9. Mayer, R.E.: Multimedia Learning. Cambridge University Press, New York (2002)

    Google Scholar 

  10. McTear, M.F. (ed.): Understanding Cognitive Science. Ellis Horwood, Chichester (1998)

    Google Scholar 

  11. Novak, J.D., Gowin, D.B.: Learning How to Learn. Cambridge University Press, New York (1984)

    Google Scholar 

  12. Rumbaugh, J., Jacobson, I., Booch, G.: The Unified Modeling Language Reference Manual. Addison-Wesley, Reading (1999)

    Google Scholar 

  13. Rumbaugh, J.: Objects in the Constitution: Enterprise Modeling. Journal of Object Oriented Programming (1993)

    Google Scholar 

  14. Schulte, R., Biguenet, J.: Theories of Translation. The University of Chicago Press, Chicago (1992)

    Google Scholar 

  15. Smith, M.K., McGuinness, D., Volz, R., Welty, C.: Web Ontology Language (OWL) Guide Version 1.0. W3CWorking Draft (2002)

    Google Scholar 

  16. Sowa, J.F.: Conceptual Structures: Information Processing in Mind and Machine. Addison-Wesley, Reading (1984)

    MATH  Google Scholar 

  17. Sowa, I.F.: Knowledge Representation: Logical, Philosophical, and Computational Foundations. Brooks Cole, Pacific Grove (1999)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Miltiadis D. Lytras John M. Carroll Ernesto Damiani Robert D. Tennyson David Avison Gottfried Vossen Patricia Ordonez De Pablos

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Czejdo, B.D., Morzy, T. (2008). Knowledge, Knowledge Security, and Meta-knowledge. In: Lytras, M.D., et al. The Open Knowlege Society. A Computer Science and Information Systems Manifesto. WSKS 2008. Communications in Computer and Information Science, vol 19. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-87783-7_31

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-87783-7_31

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-87782-0

  • Online ISBN: 978-3-540-87783-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics