[AISWorld] CFP HICSS48 Intellectual Property and KM Security minitrack
MurphJen at aol.com
MurphJen at aol.com
Thu Mar 27 05:37:51 EDT 2014
We have heard and read many times in the last several decades that the
most important asset of an organization is the knowledge of its employees.
While this knowledge can be a target of sophisticated cyber-attacks or fraud,
most likely the leaking of knowledge can happen because of careless
organizational practices, asset misuse, or behavior of employees. Organizations
put in place many technology-based security measures (firewalls, filtering
systems) to guard against attacks, yet it is not that easy to guard against
the human-side of security practices. An organization can have the best
security technology in place, yet a careless employee talking or emailing or
posting on Facebook about the ‘new development’ at the company bypasses all
this security technology with ease. Furthermore, one can find lot of
information about current projects done by a company by searching the web. How
can an organization effectively protect its intellectual property remains an
unanswered question. What type of security and intelligence techniques are
out that that can protect the intellectual property? What are the best ways
to train employees so that they would spot potentially criminal ac tivity,
such as fraud, among employees? Could crowdsourcing be used in this case,
meaning asking employees to vote on a particular issue to determine whether
it represents a potential threat? Could implementation of KMS potentially
cause legal problems because some KM artifacts could be uncovered during
discovery and used as evidence against a company?
This mini-track seeks papers that investigate issues related to security
and protection of intellectual assets and explore how organizations can use
security measures to protect their KM practices. Possible topics include,
but are not limited to:
• Securing intellectual assets;
• Legal concerns when implementing KMS.
• Techniques used to scan employee communication channels (e.g., email,
Facebook, text messages);
• Security strategies within and outside the company boundaries;
• Training employees on potential threats to security breaches;
• Preventative measures to secure KM assets;
• Knowledge loss risk management;
• Impact of immigration and cultural issues on potential KM security
breach;
• Using KM security to mitigate impacts of retirement and worker
transience;
• Measuring risk of knowledge loss due to security breach;
• Security models and architectures for knowledge systems;
• Modeling risk in knowledge systems;
• Tradeoffs in knowledge systems between security and knowledge sharing;
• Technologies for knowledge system security.
Contacts:
Alexandra Durcikova
(primary contact)
Department of MIS
Price College of Business
The University of Oklahoma
Email: alex at ou.edu
Murray E. Jennex
Management Information Systems
San Diego State University
Email: Murphjen at aol.com, mjennex at mail.sdsu.edu
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.aisnet.org/pipermail/aisworld_lists.aisnet.org/attachments/20140327/ce3b85c6/attachment.html>
More information about the AISWorld
mailing list