EconPapers    
Economics at your fingertips  
 

Secure Knowledge Management: Influencing the Development of Human Knowledge Sharing Networks

Sohail Tamaddon, Atif Ahmad and Rachelle Bosua
Additional contact information
Sohail Tamaddon: Accenture/Avanade, Melbourne, Australia
Atif Ahmad: The University of Melbourne, Parkville, Australia
Rachelle Bosua: The University of Melbourne, Parkville, Australia

International Journal of Cyber Warfare and Terrorism (IJCWT), 2015, vol. 5, issue 2, 1-20

Abstract: Human knowledge-sharing networks generate Intellectual Property and Trade Secrets that provide private enterprise with competitive advantages. Although considerable research has focused on increasing the knowledge-sharing outcomes of such networks, there has been comparatively less emphasis on examining the possibility of competitive erosion through knowledge leakage. This paper considers how to mitigate knowledge leakage by influencing the development of human knowledge sharing networks. The authors review the literatures of human knowledge sharing networks as well as information security management in organizations. Based on the literature reviews we identify 12 key factors that influence network development and a security paradigm and associated mechanisms that mitigate knowledge leakage. The authors then identify a range of knowledge protection strategies by applying the security paradigm to the human network development factors. The paper concludes with a discussion on controllability, the extent to which organizations can use each factor to mitigate knowledge leakage.

Date: 2015
References: Add references at CitEc
Citations: Track citations by RSS feed

Downloads: (external link)
http://services.igi-global.com/resolvedoi/resolve. ... 018/IJCWT.2015040101 (application/pdf)

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:igg:jcwt00:v:5:y:2015:i:2:p:1-20

Access Statistics for this article

More articles in International Journal of Cyber Warfare and Terrorism (IJCWT) from IGI Global
Bibliographic data for series maintained by Journal Editor ().

 
Page updated 2019-11-24
Handle: RePEc:igg:jcwt00:v:5:y:2015:i:2:p:1-20