[AISWorld] Cfp HICSS 2013 KM and Security: Protecting Intellectual Property

MurphJen at aol.com MurphJen at aol.com
Tue May 15 04:39:33 EDT 2012


 
 
CALL FOR  PAPERS 
HICSS 2013 : 46th Hawaii  International Conference on System Sciences 
Maui, Hawaii, January  7-10, 2013 
TRACK: Knowledge Systems 
MINI-TRACK: KM and Security: Protecting Intellectual  Property 
The most important asset of an  organization is the knowledge of its 
employees. To allow easy access to  knowledge, organizations are implementing 
Knowledge Repositories. While this  type of automation makes it easy to store 
and distribute knowledge, it also  makes it easy to move knowledge outside the 
boundaries of a company.  Organizations put in place many technology-based 
security measures (firewalls,  filtering systems), yet they shouldn’t 
overlook the human-side of security  practices. An organization can have the best 
security technology in place, yet a  careless employee talking or emailing 
or posting on Facebook about the ‘new  development’ at the company bypasses 
all this security technology with ease.   
Furthermore, one can find lot  of information about current projects done 
by a company by searching the web.  How an organization can effectively 
protect its intellectual property remains an  answered question.  What type of 
security and intelligence techniques can  be used to protect intellectual 
property? What are the best ways to train  employees so that they could spot 
potentially criminal activity among employees?  Could crowdsourcing be used to 
determine whether something represents a  potential threat?  
This mini-track seeks papers  that investigate issues related to security 
and protection of intellectual  assets and explore how organizations can use 
security measures to protect their  KM practices.  Possible topics include, 
but are not limited  to: 
·         Securing intellectual  assets; 
·         Security strategies within  and outside the company boundaries; 
·         Training employees on  potential threats to security breaches; 
·         Preventative measures to  secure KM assets; 
·         Knowledge loss risk  management; 
·         Impact of immigration and  cultural issues on potential KM 
security breach;  
·         Using KM security to mitigate  impacts of retirement and worker 
transience; 
·         Measuring risk of knowledge  loss due to security breach; 
Mini-track  chairs: 
Alexandra  Durcikova (primary  contact) 
Department of  MIS 
Eller College of  Management 
The University of  Arizona 
Tucson, AZ,  USA 
Phone:  520-621-3927 
Email:  alex at eller.arizona.edu 
Murray E.  Jennex 
Information and Decision  Science 
San Diego State  University 
San Diego, CA,  USA 
Phone: (760)  966-0548 
Email: Murphjen at aol.com,   _mjennex at mail.sdsu.edu_ 
(mailto:mjennex at mail.sdsu.edu)  
Submission Procedure:   
Follow Author Instructions on  the conference web site.  
_http://www.hicss.hawaii.edu/hicss_46/apahome46.htm_ 
(http://www.hicss.hawaii.edu/hicss_46/apahome46.htm)    
Important  Dates: 
·         June 15, 2012: Deadline for  paper submission 
·         August 15, 2012: Authors will  be notified of acceptances 
·         September 15, 2012: For  accepted papers, camera ready copy  due


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.aisnet.org/pipermail/aisworld_lists.aisnet.org/attachments/20120515/015fbe37/attachment.html>


More information about the AISWorld mailing list