Abstract
One of very important activities in an Information Security course is the case analysis of information security violations. This paper addresses several aspects of knowledge security violations. The case study describes the type of knowledge that was stolen and the process of knowledge security violations. The meta-knowledge about knowledge security violation is also identified.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
US News Today Cyberthieves stole 1.3 million names, Monster says, 8/24/ (2007), http://www.usatoday.com/tech/news/computersecurity/infotheft/2007-08-23-cyberjobs_N.htm
Booch, G., Rumbaugh, J., Jacobson, I.: The Unified Modeling Language User Guide. Addison Wesley, Reading (1999)
Czejdo, B., Mappus, R., Messa, K.: The Impact of UML Diagrams on Knowledge Modeling, Discovery and Presentations. Journal of Information Technology Impact 3(1), 25–38 (2003)
Czejdo, B., Czejdo, J., Lehman, J., Messa, K.: Graphical Queries for XML Documents and Their Applications for Accessing Knowledge in UML Diagrams. In: Proceedings of the First Symposium on Databases, Data Warehousing and Knowledge Discovery, Baden, Germany, pp. 69–85 (2003)
Czejdo, B., Czejdo, J., Eick, C., Messa, K., Vernace, M.: Rules in UML Class Diagrams. Opportunities of Change. In: Proceedings of the Third International Economic Congress, Sopot, Poland, pp. 289–298 (2003)
Delteil, A., Faron, C.: A Graph-Based Knowledge Representation Language. In: Proceedings of the 15th European Conference on Artificial Intelligence (ECAI), Lyon, France (2002)
Dori, D., Reinhartz-Berger, I., Sturm, A.: OPCAT—A Bimodal CASE Tool for Object-Process Based System Development. In: Proceedings of the IEEE/ACM 5th International Conference on Enterprise Information Systems (ICEIS 2003), Angers, France, pp. 286–291 (2003), www.ObjectProcess.org
Lehrnan, F. (ed.): Semantic Networks in Artificial Intelligence. Pergamon, Oxford (1999)
Mayer, R.E.: Multimedia Learning. Cambridge University Press, New York (2002)
McTear, M.F. (ed.): Understanding Cognitive Science. Ellis Horwood, Chichester (1998)
Novak, J.D., Gowin, D.B.: Learning How to Learn. Cambridge University Press, New York (1984)
Rumbaugh, J., Jacobson, I., Booch, G.: The Unified Modeling Language Reference Manual. Addison-Wesley, Reading (1999)
Rumbaugh, J.: Objects in the Constitution: Enterprise Modeling. Journal of Object Oriented Programming (1993)
Schulte, R., Biguenet, J.: Theories of Translation. The University of Chicago Press, Chicago (1992)
Smith, M.K., McGuinness, D., Volz, R., Welty, C.: Web Ontology Language (OWL) Guide Version 1.0. W3CWorking Draft (2002)
Sowa, J.F.: Conceptual Structures: Information Processing in Mind and Machine. Addison-Wesley, Reading (1984)
Sowa, I.F.: Knowledge Representation: Logical, Philosophical, and Computational Foundations. Brooks Cole, Pacific Grove (1999)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2008 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Czejdo, B.D., Morzy, T. (2008). Knowledge, Knowledge Security, and Meta-knowledge. In: Lytras, M.D., et al. The Open Knowlege Society. A Computer Science and Information Systems Manifesto. WSKS 2008. Communications in Computer and Information Science, vol 19. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-87783-7_31
Download citation
DOI: https://doi.org/10.1007/978-3-540-87783-7_31
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-87782-0
Online ISBN: 978-3-540-87783-7
eBook Packages: Computer ScienceComputer Science (R0)