Proceedings of the 50th Hawaii International Conference on System Sciences (2017) 2017
DOI: 10.24251/hicss.2017.658
|View full text |Cite
|
Sign up to set email alerts
|

Mitigating the Threat of Lost Knowledge within Information Technology Departments

Abstract: Experienced information technology professionals leaving an organization creates a risk of losing crucia l knowledge. To mitigate this risk, an organization mu st identify key knowledge holders and develop a plan to transfer their knowledge before these employees leave the organization. This research develops the Knowledge Loss Assessment to identify employees with critical knowledge about important knowledge/skill areas within the IT department. We implemented the Knowledge Loss Assessment within an informati… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
2
2

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(1 citation statement)
references
References 24 publications
0
1
0
Order By: Relevance
“…Risk assessment processes enable organizations to manage their risks by identifying, categorizing, and prioritizing these risks. Whilst risk management usually concerns insurable physical assets, there are several papers describing the risk of knowledge loss in organizations, for instance Aggestam et al (2010), Martins and Martins (2011), as well as Shumaker, Ward, Petter, and Riley (2017). More narrowly focused research includes Agudelo-Serna, Bosuea, Ahmed, and Maynard (2018), who considered ways to mitigate knowledge leakage by mobile devices.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Risk assessment processes enable organizations to manage their risks by identifying, categorizing, and prioritizing these risks. Whilst risk management usually concerns insurable physical assets, there are several papers describing the risk of knowledge loss in organizations, for instance Aggestam et al (2010), Martins and Martins (2011), as well as Shumaker, Ward, Petter, and Riley (2017). More narrowly focused research includes Agudelo-Serna, Bosuea, Ahmed, and Maynard (2018), who considered ways to mitigate knowledge leakage by mobile devices.…”
Section: Literature Reviewmentioning
confidence: 99%