Have a personal or library account? Click to login
Considerations Regarding the Inclusion of Cybersecurity in Knowledge Management Cover

Considerations Regarding the Inclusion of Cybersecurity in Knowledge Management

Open Access
|Jul 2021

References

  1. [1] Craigen D., Diakun-Thibault N., Purse R. Defining Cybersecurity. Technol. Innov. Manag. Rev. October 2014; 4(10):13-21.
  2. [2] Klimburg A.(ed). National Cyber Security Framework Manual. Tallin: NATO CCDCOE Publication; 2012.
  3. [3] Tisdale S.M. Cybersecurity: Challenges from a systems, complexity, knowledge management and business intelligence perspective. IIS. 2015; 16(3):191-198.
  4. [4] Mittal Y.K., Roy S., Saxena M. Role of Knowledge Management in Enhancing Information Security. IJCSI. November 2010; 7(6):320-324.
  5. [5] Kingston J. Artificial Intelligence, Knowledge Management and Human Vulnerability. In: Griffiths P., editor. European Conference on the Impact of Artificial Intelligence and Robotics. Oxford: EM-Normandie Business School; 2019. 198-204.
  6. [6] Grimm M., Anderl R. Intellectual Property Protection and Secure Knowledge Management in Collaborative Systems Engineering. Procedia Comput. Sci. December 2013; 16:571-580.
  7. [7] Wen S.-F. An Empirical Study on Security Knowledge Sharing and Learning in Open Source Software Communities [Internet]. 1 October 2018 [6 February 2021]. Available from: https://www.mdpi.com/2073-431X/7/4/49.10.3390/computers7040049
  8. [8] Bertino E., Khan L.R., Sandhu R., Thuraisingham B. Secure Knowledge Management: Confidentiality, Trust, and Privacy. IEEE Trans. Syst. Man Cybern. A Syst. Hum. May 2006; 36(3):429-438.
  9. [9] Belsis P., Kokolakis S., Kiounouzis E. Information systems security from a knowledge management perspective, Inform. Manag. Comput. Secur. July 2005; 13(3):189-202.
  10. [10] Nazaridoust M., Bidgoli B. M., & Rezaeenoor J. Providing a Triangular Model for Gap Analysis. Case Study: Iran Khodro Company. IJCSI. January 2013; 10(1):627-638.
  11. [11] Nonaka I. The Knowledge-Creating Company. Harvard Business Review. July-August 2007. 162-170.
  12. [12] Badea-Mihalcea A. People and Machines: Dealing with Human Factor in Cyber-Security. In: Mihai I.C., Ciuchi C., Petrica G., Considerations on Challenges and Future Directions in Cybersecurity. Romanian Association for Information Security Assurance; 2019; 143-154.
  13. [13] Hepp A., Friemel T., & Breiter A. Digital traces in context. Int. J. Commun. January 2018; 12:439-449.
  14. [14] Becerra-Fernandez I. and Sabherwal R. Knowledge Management: Systems and Processes. New York: M.E. Sharpe; 2014.10.4324/9781315715117
  15. [15] Malik M., Patel T. Database Security – Attacks and Control Methods. IJIST. March 2016; 6(1):175-183.
  16. [16] Tworek K., Walecka-Jankowska K., Zgrzywa-Ziemak A. IT Reliability and Innovation in SMEs: Empirical Research. J. Manag. Bus. Adm. Cent. Eur. June 2019; 27(2):83-96.
Language: English
Page range: 231 - 236
Published on: Jul 12, 2021
In partnership with: Paradigm Publishing Services
Publication frequency: 3 issues per year

© 2021 Andrei Șandor, Gabriela Tonţ, published by Nicolae Balcescu Land Forces Academy
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License.