Reference Hub4
Preventing Social Engineering and Espionage in Collaborative Knowledge Management Systems (KMSs)

Preventing Social Engineering and Espionage in Collaborative Knowledge Management Systems (KMSs)

Oluwafemi S. Ogunseye, Olusegun Folorunso, Jeff Zhang
Copyright: © 2011 |Volume: 3 |Issue: 4 |Pages: 8
ISSN: 1937-9633|EISSN: 1937-9641|EISBN13: 9781613506684|DOI: 10.4018/jea.2011100104
Cite Article Cite Article

MLA

Ogunseye, Oluwafemi S., et al. "Preventing Social Engineering and Espionage in Collaborative Knowledge Management Systems (KMSs)." IJEA vol.3, no.4 2011: pp.44-51. http://doi.org/10.4018/jea.2011100104

APA

Ogunseye, O. S., Folorunso, O., & Zhang, J. (2011). Preventing Social Engineering and Espionage in Collaborative Knowledge Management Systems (KMSs). International Journal of E-Adoption (IJEA), 3(4), 44-51. http://doi.org/10.4018/jea.2011100104

Chicago

Ogunseye, Oluwafemi S., Olusegun Folorunso, and Jeff Zhang. "Preventing Social Engineering and Espionage in Collaborative Knowledge Management Systems (KMSs)," International Journal of E-Adoption (IJEA) 3, no.4: 44-51. http://doi.org/10.4018/jea.2011100104

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Insider attack and espionage on computer-based information is a major problem for business organizations and governments. Knowledge Management Systems (KMSs) are not exempt from this threat. Prior research presented the Congenial Access Control Model (CAC), a relationship-based access control model, as a better access control method for KMS because it reduces the adverse effect of stringent security measures on the usability of KMSs. However, the CAC model, like other models, e.g., Role Based Access Control (RBAC), Time-Based Access Control (TBAC), and History Based Access Control (HBAC), does not provide adequate protection against privilege abuse by authorized users that can lead to industrial espionage. In this paper, the authors provide an Espionage Prevention Model (EP) that uses Semantic web-based annotations on knowledge assets to store relevant information and compares it to the Friend-Of-A-Friend (FOAF) data of the potential recipient of the resource. It can serve as an additional layer to previous access control models, preferably the Congenial Access Control (CAC) model.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.