Uneingeschränkter Zugang

Considerations Regarding the Inclusion of Cybersecurity in Knowledge Management


Zitieren

[1] Craigen D., Diakun-Thibault N., Purse R. Defining Cybersecurity. Technol. Innov. Manag. Rev. October 2014; 4(10):13-21. Search in Google Scholar

[2] Klimburg A.(ed). National Cyber Security Framework Manual. Tallin: NATO CCDCOE Publication; 2012. Search in Google Scholar

[3] Tisdale S.M. Cybersecurity: Challenges from a systems, complexity, knowledge management and business intelligence perspective. IIS. 2015; 16(3):191-198. Search in Google Scholar

[4] Mittal Y.K., Roy S., Saxena M. Role of Knowledge Management in Enhancing Information Security. IJCSI. November 2010; 7(6):320-324. Search in Google Scholar

[5] Kingston J. Artificial Intelligence, Knowledge Management and Human Vulnerability. In: Griffiths P., editor. European Conference on the Impact of Artificial Intelligence and Robotics. Oxford: EM-Normandie Business School; 2019. 198-204. Search in Google Scholar

[6] Grimm M., Anderl R. Intellectual Property Protection and Secure Knowledge Management in Collaborative Systems Engineering. Procedia Comput. Sci. December 2013; 16:571-580. Search in Google Scholar

[7] Wen S.-F. An Empirical Study on Security Knowledge Sharing and Learning in Open Source Software Communities [Internet]. 1 October 2018 [6 February 2021]. Available from: https://www.mdpi.com/2073-431X/7/4/49.10.3390/computers7040049 Search in Google Scholar

[8] Bertino E., Khan L.R., Sandhu R., Thuraisingham B. Secure Knowledge Management: Confidentiality, Trust, and Privacy. IEEE Trans. Syst. Man Cybern. A Syst. Hum. May 2006; 36(3):429-438. Search in Google Scholar

[9] Belsis P., Kokolakis S., Kiounouzis E. Information systems security from a knowledge management perspective, Inform. Manag. Comput. Secur. July 2005; 13(3):189-202. Search in Google Scholar

[10] Nazaridoust M., Bidgoli B. M., & Rezaeenoor J. Providing a Triangular Model for Gap Analysis. Case Study: Iran Khodro Company. IJCSI. January 2013; 10(1):627-638. Search in Google Scholar

[11] Nonaka I. The Knowledge-Creating Company. Harvard Business Review. July-August 2007. 162-170. Search in Google Scholar

[12] Badea-Mihalcea A. People and Machines: Dealing with Human Factor in Cyber-Security. In: Mihai I.C., Ciuchi C., Petrica G., Considerations on Challenges and Future Directions in Cybersecurity. Romanian Association for Information Security Assurance; 2019; 143-154. Search in Google Scholar

[13] Hepp A., Friemel T., & Breiter A. Digital traces in context. Int. J. Commun. January 2018; 12:439-449. Search in Google Scholar

[14] Becerra-Fernandez I. and Sabherwal R. Knowledge Management: Systems and Processes. New York: M.E. Sharpe; 2014.10.4324/9781315715117 Search in Google Scholar

[15] Malik M., Patel T. Database Security – Attacks and Control Methods. IJIST. March 2016; 6(1):175-183. Search in Google Scholar

[16] Tworek K., Walecka-Jankowska K., Zgrzywa-Ziemak A. IT Reliability and Innovation in SMEs: Empirical Research. J. Manag. Bus. Adm. Cent. Eur. June 2019; 27(2):83-96. Search in Google Scholar