Trusting Security When Sharing Knowledge?
Pierre-Emmanuel Arduin (),
Bako Rajaonah () and
Káthia Marçal de Oliveira ()
Additional contact information
Pierre-Emmanuel Arduin: DRM - Dauphine Recherches en Management - Université Paris Dauphine-PSL - PSL - Université Paris Sciences et Lettres - CNRS - Centre National de la Recherche Scientifique
Bako Rajaonah: LAMIH - Laboratoire d'Automatique, de Mécanique et d'Informatique industrielles et Humaines - UMR 8201 - CNRS - Centre National de la Recherche Scientifique - UPHF - Université Polytechnique Hauts-de-France - INSA Hauts-De-France - INSA Institut National des Sciences Appliquées Hauts-de-France - INSA - Institut National des Sciences Appliquées
Káthia Marçal de Oliveira: LAMIH - Laboratoire d'Automatique, de Mécanique et d'Informatique industrielles et Humaines - UMR 8201 - CNRS - Centre National de la Recherche Scientifique - UPHF - Université Polytechnique Hauts-de-France - INSA Hauts-De-France - INSA Institut National des Sciences Appliquées Hauts-de-France - INSA - Institut National des Sciences Appliquées
Post-Print from HAL
Abstract:
This chapter tackles knowledge sharing by focusing on security and trust issues. Although trust is recognized as important in security issues, few studies on information systems (ISs) deal with both trust and security. Knowledge sharing relies on sense-giving and sense-reading processes which require, encourage, and even create trust within individuals. We argue that individuals are processors of information and interpret information to create their own tacit knowledge.Recent security reports from organizations have presented that the majority of ISs security threats involve employees within the organizations. Individuals, as well as computers, maybe attacked through social engineering techniques in order to gain their trust. Despite this evidence, most of the work has focused on the control of outsider security threats rather than of insider security threats, particularly when humans are perpetrators.We propose to study insider threats through a trust factor during the knowledge sharing process. Knowledge sharers may induce insider threats for security due to trust-related attitudes and behaviours. The proposition is twofold with interviews and self-report questionnaires to collect information about the trust, and ontologies to categorize such information. The proposition is then discussed, notably in terms of problems and answers leading to study trust in security when sharing knowledge.
Keywords: Tacit knowledge; Trust; Insider threats (search for similar items in EconPapers)
Date: 2020
New Economics Papers: this item is included in nep-soc
Note: View the original document on HAL open archive server: https://hal.science/hal-02953836v1
References: View complete reference list from CitEc
Citations:
Published in Knowledge, People, and Digital Transformation, pp.163-181, 2020, ⟨10.1007/978-3-030-40390-4_11⟩
Downloads: (external link)
https://hal.science/hal-02953836v1/document (application/pdf)
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:hal:journl:hal-02953836
DOI: 10.1007/978-3-030-40390-4_11
Access Statistics for this paper
More papers in Post-Print from HAL
Bibliographic data for series maintained by CCSD ().