[AISWorld] Cfp HICSS 2013 KM and Security: Protecting Intellectual Property
MurphJen at aol.com
MurphJen at aol.com
Tue May 15 04:39:33 EDT 2012
CALL FOR PAPERS
HICSS 2013 : 46th Hawaii International Conference on System Sciences
Maui, Hawaii, January 7-10, 2013
TRACK: Knowledge Systems
MINI-TRACK: KM and Security: Protecting Intellectual Property
The most important asset of an organization is the knowledge of its
employees. To allow easy access to knowledge, organizations are implementing
Knowledge Repositories. While this type of automation makes it easy to store
and distribute knowledge, it also makes it easy to move knowledge outside the
boundaries of a company. Organizations put in place many technology-based
security measures (firewalls, filtering systems), yet they shouldn’t
overlook the human-side of security practices. An organization can have the best
security technology in place, yet a careless employee talking or emailing
or posting on Facebook about the ‘new development’ at the company bypasses
all this security technology with ease.
Furthermore, one can find lot of information about current projects done
by a company by searching the web. How an organization can effectively
protect its intellectual property remains an answered question. What type of
security and intelligence techniques can be used to protect intellectual
property? What are the best ways to train employees so that they could spot
potentially criminal activity among employees? Could crowdsourcing be used to
determine whether something represents a potential threat?
This mini-track seeks papers that investigate issues related to security
and protection of intellectual assets and explore how organizations can use
security measures to protect their KM practices. Possible topics include,
but are not limited to:
· Securing intellectual assets;
· Security strategies within and outside the company boundaries;
· Training employees on potential threats to security breaches;
· Preventative measures to secure KM assets;
· Knowledge loss risk management;
· Impact of immigration and cultural issues on potential KM
security breach;
· Using KM security to mitigate impacts of retirement and worker
transience;
· Measuring risk of knowledge loss due to security breach;
Mini-track chairs:
Alexandra Durcikova (primary contact)
Department of MIS
Eller College of Management
The University of Arizona
Tucson, AZ, USA
Phone: 520-621-3927
Email: alex at eller.arizona.edu
Murray E. Jennex
Information and Decision Science
San Diego State University
San Diego, CA, USA
Phone: (760) 966-0548
Email: Murphjen at aol.com, _mjennex at mail.sdsu.edu_
(mailto:mjennex at mail.sdsu.edu)
Submission Procedure:
Follow Author Instructions on the conference web site.
_http://www.hicss.hawaii.edu/hicss_46/apahome46.htm_
(http://www.hicss.hawaii.edu/hicss_46/apahome46.htm)
Important Dates:
· June 15, 2012: Deadline for paper submission
· August 15, 2012: Authors will be notified of acceptances
· September 15, 2012: For accepted papers, camera ready copy due
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.aisnet.org/pipermail/aisworld_lists.aisnet.org/attachments/20120515/015fbe37/attachment.html>
More information about the AISWorld
mailing list