2019
DOI: 10.4018/ijkm.2019010103
|View full text |Cite
|
Sign up to set email alerts
|

Integrating Knowledge Management into Information Security

Abstract: Repeated information security (InfoSec) incidents have harmed the confidence of people on enterprises' InfoSec capability. While most organisations adopt control frameworks such as ISO27001 and COBIT, the role and contribution of knowledge management on InfoSec was inadequately considered. The authors integrated the concepts of knowledge-centric information security and IT Governance (ITG) into an ITG-driven knowledge framework (ITGKF) for reinforcing InfoSec maturity and auditability of enterprises. The autho… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0
4

Year Published

2019
2019
2022
2022

Publication Types

Select...
6

Relationship

1
5

Authors

Journals

citations
Cited by 17 publications
(14 citation statements)
references
References 46 publications
0
8
0
4
Order By: Relevance
“…Dari masing-masing variabel memiliki indikator atau pertanyaan menyangkut survei penelitian pada anggota organisasi dengan catatan menyesuaikan hasil wawancara dengan pihak manajemen. Indikator pertanyaan kuesioner bersumber dari penelitian oleh [2], [11], [13], [14], [15], [16], [17], dan beberapa indikator untuk pengembangan penelitian.…”
Section: Penyusunan Instrumenunclassified
“…Dari masing-masing variabel memiliki indikator atau pertanyaan menyangkut survei penelitian pada anggota organisasi dengan catatan menyesuaikan hasil wawancara dengan pihak manajemen. Indikator pertanyaan kuesioner bersumber dari penelitian oleh [2], [11], [13], [14], [15], [16], [17], dan beberapa indikator untuk pengembangan penelitian.…”
Section: Penyusunan Instrumenunclassified
“…It is expected to have a promising positive influence on ISM and the effectiveness of best practices’ transfer. KM systems can be used to capture and store best practices’ knowledge (Hislop et al , 2018; Au and Fung, 2019) so that it is accessible by security practitioners to assist them in making rational decisions and in their day-to-day operations (Mittal et al , 2010).…”
Section: Background and Related Studiesmentioning
confidence: 99%
“…For instance, Alhogail and Berri (2012) presented a knowledge architecture to capture the security-related knowledge of handling security incidents and make it available to be shared across the organization, to minimize the dependency on security expert personnel. Au and Fung (2019) have proposed InfoSec audit model to promote knowledge-centric information security. Studies that focus on presenting information security knowledge through ontology, such as study by Belsis et al (2005) that modeled the security knowledge in an organization through three structured layers, namely, policy, guidelines and measures. Feledi et al (2013) presented a Web portal for sharing information security knowledge.…”
Section: Background and Related Studiesmentioning
confidence: 99%
See 1 more Smart Citation
“…Trust management plays an important role to provide reliable data merging [33]. It also helps to eliminate the risk of user privacy [34] and information security [35]. In this section, a literature survey has been conducted on the existing trust management mechanisms.…”
Section: Literature Reviewmentioning
confidence: 99%