<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML xmlns:o = "urn:schemas-microsoft-com:office:office"><HEAD>
<META content="text/html; charset=UTF-8" http-equiv=Content-Type>
<META name=GENERATOR content="MSHTML 11.00.9600.17105"></HEAD>
<BODY id=role_body style="FONT-SIZE: 10pt; FONT-FAMILY: Arial; COLOR: #000000"
bottomMargin=7 leftMargin=7 rightMargin=7 topMargin=7><FONT id=role_document
color=#000000 size=2 face=Arial>
<DIV><FONT style="BACKGROUND-COLOR: transparent" color=#000000 size=2
face=Arial><FONT color=#000000 size=2 face=Arial><SPAN
style='FONT-SIZE: 10pt; FONT-FAMILY: "Times New Roman","serif"'>We have heard
and read many times in the last several decades that the most important asset of
an organization is the knowledge of its employees. While this knowledge can be a
target of sophisticated cyber-attacks or fraud, most likely the leaking of
knowledge can happen because of careless organizational practices, asset misuse,
or behavior of employees. Organizations put in place many technology-based
security measures (firewalls, filtering systems) to guard against attacks, yet
it is not that easy to guard against the human-side of security practices. An
organization can have the best security technology in place, yet a careless
employee talking or emailing or posting on Facebook about the ‘new development’
at the company bypasses all this security technology with ease.<SPAN
style="mso-spacerun: yes"> </SPAN>Furthermore, one can find lot of
information about current projects done by a company by searching the web. How
can an organization effectively protect its intellectual property remains an
unanswered question. What type of security and intelligence techniques are out
that that can protect the intellectual property? What are the best ways to train
employees so that they would spot potentially criminal ac tivity, such as fraud,
among employees? Could crowdsourcing be used in this case, meaning asking
employees to vote on a particular issue to determine whether it represents a
potential threat? Could implementation of KMS potentially cause legal problems
because some KM artifacts could be uncovered during discovery and used as
evidence against a company?<o:p></o:p></SPAN></DIV>
<DIV>
<BLOCKQUOTE
style="PADDING-LEFT: 5px; MARGIN-LEFT: 5px; BORDER-LEFT: blue 2px solid">
<DIV>
<P class=MsoNormal style="MARGIN: 0in 0in 0pt; LINE-HEIGHT: normal"><SPAN
style='FONT-SIZE: 10pt; FONT-FAMILY: "Times New Roman","serif"'><o:p> </o:p></SPAN></P>
<P class=MsoNormal style="MARGIN: 0in 0in 0pt; LINE-HEIGHT: normal"><SPAN
style='FONT-SIZE: 10pt; FONT-FAMILY: "Times New Roman","serif"'>This
mini-track seeks papers that investigate issues related to security and
protection of intellectual assets and explore how organizations can use
security measures to protect their KM practices. Possible topics include, but
are not limited to:<o:p></o:p></SPAN></P>
<P class=MsoNormal style="MARGIN: 0in 0in 0pt; LINE-HEIGHT: normal"><SPAN
style='FONT-SIZE: 10pt; FONT-FAMILY: "Times New Roman","serif"'><o:p> </o:p></SPAN></P>
<P class=MsoNormal style="MARGIN: 0in 0in 0pt; LINE-HEIGHT: normal"><SPAN
style='FONT-SIZE: 10pt; FONT-FAMILY: "Times New Roman","serif"'>• Securing
intellectual assets;<o:p></o:p></SPAN></P>
<P class=MsoNormal style="MARGIN: 0in 0in 0pt; LINE-HEIGHT: normal"><SPAN
style='FONT-SIZE: 10pt; FONT-FAMILY: "Times New Roman","serif"'>• Legal
concerns when implementing KMS.<o:p></o:p></SPAN></P>
<P class=MsoNormal style="MARGIN: 0in 0in 0pt; LINE-HEIGHT: normal"><SPAN
style='FONT-SIZE: 10pt; FONT-FAMILY: "Times New Roman","serif"'>• Techniques
used to scan employee communication channels (e.g., email, Facebook, text
messages);<o:p></o:p></SPAN></P>
<P class=MsoNormal style="MARGIN: 0in 0in 0pt; LINE-HEIGHT: normal"><SPAN
style='FONT-SIZE: 10pt; FONT-FAMILY: "Times New Roman","serif"'>• Security
strategies within and outside the company boundaries;<o:p></o:p></SPAN></P>
<P class=MsoNormal style="MARGIN: 0in 0in 0pt; LINE-HEIGHT: normal"><SPAN
style='FONT-SIZE: 10pt; FONT-FAMILY: "Times New Roman","serif"'>• Training
employees on potential threats to security breaches;<o:p></o:p></SPAN></P>
<P class=MsoNormal style="MARGIN: 0in 0in 0pt; LINE-HEIGHT: normal"><SPAN
style='FONT-SIZE: 10pt; FONT-FAMILY: "Times New Roman","serif"'>• Preventative
measures to secure KM assets;<o:p></o:p></SPAN></P>
<P class=MsoNormal style="MARGIN: 0in 0in 0pt; LINE-HEIGHT: normal"><SPAN
style='FONT-SIZE: 10pt; FONT-FAMILY: "Times New Roman","serif"'>• Knowledge
loss risk management;<o:p></o:p></SPAN></P>
<P class=MsoNormal style="MARGIN: 0in 0in 0pt; LINE-HEIGHT: normal"><SPAN
style='FONT-SIZE: 10pt; FONT-FAMILY: "Times New Roman","serif"'>• Impact of
immigration and cultural issues on potential KM security
breach;<o:p></o:p></SPAN></P>
<P class=MsoNormal style="MARGIN: 0in 0in 0pt; LINE-HEIGHT: normal"><SPAN
style='FONT-SIZE: 10pt; FONT-FAMILY: "Times New Roman","serif"'>• Using KM
security to mitigate impacts of retirement and worker
transience;<o:p></o:p></SPAN></P>
<P class=MsoNormal style="MARGIN: 0in 0in 0pt; LINE-HEIGHT: normal"><SPAN
style='FONT-SIZE: 10pt; FONT-FAMILY: "Times New Roman","serif"'>• Measuring
risk of knowledge loss due to security breach;<o:p></o:p></SPAN></P>
<P class=MsoNormal style="MARGIN: 0in 0in 0pt; LINE-HEIGHT: normal"><SPAN
style='FONT-SIZE: 10pt; FONT-FAMILY: "Times New Roman","serif"'>• Security
models and architectures for knowledge systems;<o:p></o:p></SPAN></P>
<P class=MsoNormal style="MARGIN: 0in 0in 0pt; LINE-HEIGHT: normal"><SPAN
style='FONT-SIZE: 10pt; FONT-FAMILY: "Times New Roman","serif"'>• Modeling
risk in knowledge systems;<o:p></o:p></SPAN></P>
<P class=MsoNormal style="MARGIN: 0in 0in 0pt; LINE-HEIGHT: normal"><SPAN
style='FONT-SIZE: 10pt; FONT-FAMILY: "Times New Roman","serif"'>• Tradeoffs in
knowledge systems between security and knowledge
sharing;<o:p></o:p></SPAN></P>
<P class=MsoNormal style="MARGIN: 0in 0in 0pt; LINE-HEIGHT: normal"><SPAN
style='FONT-SIZE: 10pt; FONT-FAMILY: "Times New Roman","serif"'>• Technologies
for knowledge system security.<o:p></o:p></SPAN></P>
<P class=MsoNormal style="MARGIN: 0in 0in 0pt; LINE-HEIGHT: normal"><SPAN
style='FONT-SIZE: 10pt; FONT-FAMILY: "Times New Roman","serif"'><o:p> </o:p></SPAN></P>
<P class=MsoNormal style="MARGIN: 0in 0in 0pt; LINE-HEIGHT: normal"><SPAN
style='FONT-SIZE: 10pt; FONT-FAMILY: "Times New Roman","serif"'>Contacts:<o:p></o:p></SPAN></P>
<P class=MsoNormal style="MARGIN: 0in 0in 0pt; LINE-HEIGHT: normal"><SPAN
style='FONT-SIZE: 10pt; FONT-FAMILY: "Times New Roman","serif"'><o:p> </o:p></SPAN></P>
<P class=MsoNormal style="MARGIN: 0in 0in 0pt; LINE-HEIGHT: normal"><SPAN
style='FONT-SIZE: 10pt; FONT-FAMILY: "Times New Roman","serif"'>Alexandra
Durcikova<o:p></o:p></SPAN></P>
<P class=MsoNormal style="MARGIN: 0in 0in 0pt; LINE-HEIGHT: normal"><SPAN
style='FONT-SIZE: 10pt; FONT-FAMILY: "Times New Roman","serif"'>(primary
contact)<o:p></o:p></SPAN></P>
<P class=MsoNormal style="MARGIN: 0in 0in 0pt; LINE-HEIGHT: normal"><SPAN
style='FONT-SIZE: 10pt; FONT-FAMILY: "Times New Roman","serif"'>Department of
MIS<o:p></o:p></SPAN></P>
<P class=MsoNormal style="MARGIN: 0in 0in 0pt; LINE-HEIGHT: normal"><SPAN
style='FONT-SIZE: 10pt; FONT-FAMILY: "Times New Roman","serif"'>Price College
of Business<o:p></o:p></SPAN></P>
<P class=MsoNormal style="MARGIN: 0in 0in 0pt; LINE-HEIGHT: normal"><SPAN
style='FONT-SIZE: 10pt; FONT-FAMILY: "Times New Roman","serif"'>The University
of Oklahoma<o:p></o:p></SPAN></P>
<P class=MsoNormal style="MARGIN: 0in 0in 0pt; LINE-HEIGHT: normal"><SPAN
style='FONT-SIZE: 10pt; FONT-FAMILY: "Times New Roman","serif"'>Email:
alex@ou.edu<o:p></o:p></SPAN></P>
<P class=MsoNormal style="MARGIN: 0in 0in 0pt; LINE-HEIGHT: normal"><SPAN
style='FONT-SIZE: 10pt; FONT-FAMILY: "Times New Roman","serif"'><o:p> </o:p></SPAN></P>
<P class=MsoNormal style="MARGIN: 0in 0in 0pt; LINE-HEIGHT: normal"><SPAN
style='FONT-SIZE: 10pt; FONT-FAMILY: "Times New Roman","serif"'>Murray E.
Jennex<o:p></o:p></SPAN></P>
<P class=MsoNormal style="MARGIN: 0in 0in 0pt; LINE-HEIGHT: normal"><SPAN
style='FONT-SIZE: 10pt; FONT-FAMILY: "Times New Roman","serif"'>Management
Information Systems<o:p></o:p></SPAN></P>
<P class=MsoNormal style="MARGIN: 0in 0in 0pt; LINE-HEIGHT: normal"><SPAN
style='FONT-SIZE: 10pt; FONT-FAMILY: "Times New Roman","serif"'>San Diego
State University<o:p></o:p></SPAN></P>
<P class=MsoNormal style="MARGIN: 0in 0in 0pt; LINE-HEIGHT: normal"><SPAN
style='FONT-SIZE: 10pt; FONT-FAMILY: "Times New Roman","serif"'>Email:
Murphjen@aol.com,
mjennex@mail.sdsu.edu</SPAN><o:p></o:p></P></DIV></FONT><BR><BR>_______________________________________________<BR>AISWorld
mailing
list<BR>AISWorld@lists.aisnet.org</FONT></BLOCKQUOTE></DIV></FONT></BODY></HTML>