Secure Knowledge Management

Secure Knowledge Management

S. Upadhyaya, H. Raghav Rao, G. Padmanabhan
ISBN13: 9781599049335|ISBN10: 1599049333|EISBN13: 9781599049342
DOI: 10.4018/978-1-59904-933-5.ch253
Cite Chapter Cite Chapter

MLA

Upadhyaya, S., et al. "Secure Knowledge Management." Knowledge Management: Concepts, Methodologies, Tools, and Applications, edited by Murray E. Jennex, IGI Global, 2008, pp. 3096-3104. https://doi.org/10.4018/978-1-59904-933-5.ch253

APA

Upadhyaya, S., Rao, H. R., & Padmanabhan, G. (2008). Secure Knowledge Management. In M. Jennex (Ed.), Knowledge Management: Concepts, Methodologies, Tools, and Applications (pp. 3096-3104). IGI Global. https://doi.org/10.4018/978-1-59904-933-5.ch253

Chicago

Upadhyaya, S., H. Raghav Rao, and G. Padmanabhan. "Secure Knowledge Management." In Knowledge Management: Concepts, Methodologies, Tools, and Applications, edited by Murray E. Jennex, 3096-3104. Hershey, PA: IGI Global, 2008. https://doi.org/10.4018/978-1-59904-933-5.ch253

Export Reference

Mendeley
Favorite

Abstract

As the world is getting more and more technology savvy, the collection and distribution of information and knowledge need special attention. Progress has been made on the languages and tools needed for effective knowledge management and on the legal issues concerning the consumption and dissemination of critical knowledge. From a business perspective, a knowledge-management system (KMS) within a firm generally strives to maximize the human-capital utilization and profitability of the firm. However, security is becoming a major issue revolving around KMS; for instance, the KMS must incorporate adequate security features to prevent any unauthorized access or unauthorized dissemination of information. Acquiring the information that one needs to remain competitive while safeguarding the information one already has is a complicated task. Firms must balance the advantages of openness against its inevitable risks, and maximize the efficiency of electronic communication without making it a magnet for intruders. One must integrate offense and defense into a comprehensive strategy, and scholars have suggested that it is time to integrate intelligence and security imperatives with other knowledge-management strategies and processes (Barth, 2001).

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.