Secure Knowledge Management: Influencing the Development of Human Knowledge Sharing Networks

Secure Knowledge Management: Influencing the Development of Human Knowledge Sharing Networks

Sohail Tamaddon, Atif Ahmad, Rachelle Bosua
Copyright: © 2015 |Volume: 5 |Issue: 2 |Pages: 20
ISSN: 1947-3435|EISSN: 1947-3443|EISBN13: 9781466678927|DOI: 10.4018/IJCWT.2015040101
Cite Article Cite Article

MLA

Tamaddon, Sohail, et al. "Secure Knowledge Management: Influencing the Development of Human Knowledge Sharing Networks." IJCWT vol.5, no.2 2015: pp.1-20. http://doi.org/10.4018/IJCWT.2015040101

APA

Tamaddon, S., Ahmad, A., & Bosua, R. (2015). Secure Knowledge Management: Influencing the Development of Human Knowledge Sharing Networks. International Journal of Cyber Warfare and Terrorism (IJCWT), 5(2), 1-20. http://doi.org/10.4018/IJCWT.2015040101

Chicago

Tamaddon, Sohail, Atif Ahmad, and Rachelle Bosua. "Secure Knowledge Management: Influencing the Development of Human Knowledge Sharing Networks," International Journal of Cyber Warfare and Terrorism (IJCWT) 5, no.2: 1-20. http://doi.org/10.4018/IJCWT.2015040101

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Human knowledge-sharing networks generate Intellectual Property and Trade Secrets that provide private enterprise with competitive advantages. Although considerable research has focused on increasing the knowledge-sharing outcomes of such networks, there has been comparatively less emphasis on examining the possibility of competitive erosion through knowledge leakage. This paper considers how to mitigate knowledge leakage by influencing the development of human knowledge sharing networks. The authors review the literatures of human knowledge sharing networks as well as information security management in organizations. Based on the literature reviews we identify 12 key factors that influence network development and a security paradigm and associated mechanisms that mitigate knowledge leakage. The authors then identify a range of knowledge protection strategies by applying the security paradigm to the human network development factors. The paper concludes with a discussion on controllability, the extent to which organizations can use each factor to mitigate knowledge leakage.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.