scholarly journals Relationship between Organizational Characteristics and Information Security Knowledge Management Implementation

2014 ◽  
Vol 123 ◽  
pp. 433-443 ◽  
Author(s):  
Abd Rahman Said ◽  
Haslinda Abdullah ◽  
Jegak Uli ◽  
Zainal Abidin Mohamed
2016 ◽  
Vol 10 (2) ◽  
pp. 123
Author(s):  
Abozar Solat Rafiee ◽  
Akbar Alem Tabriz ◽  
Mohammadreza Babaei

Nowadays competitive advantage maintenance and organizational survival are not possible with no knowledge management. Due to the fact that the main components of the organizational knowledge transfer are human resources and this force only can produce and share knowledge content in the context of a safe system.  Therefore, the implementation of the information security and safety principles observance by the personnel are essential in knowledge management. Among these factors, organizational characteristics can be an affecting factor in the implementation of information security in knowledge management. In this study, the role of organizational characteristics on the implementation of the information security in organization's knowledge management with a focus on safety behavior of the staff in the Ministry of Communications and Information Technology and its subsidiaries, is investigated. The study type is applied research and the method is descriptive method which its population consists of senior managers and experts in the Ministry of Communications and Information Technology and its subsidiary companies. The sample size of 253 people has been set. A questionnaire was used to measure the research variables. Regression analysis was used to investigate the relationships between variables and AMOS software was used in this study. The results showed a significant relationship between organizational characteristics with safety behavior and also safety behavior with information security implementation in knowledge management. The organizational characteristics significantly are associated with the implementation of information security in knowledge management.


Author(s):  
Nasim Talebi ◽  
Emmanuel Ayaburi ◽  
Suhail Chakravarty

Driven by the difficulty in achieving complete security with technical tools, business investigators are looking into organizational and behavioral issues that could help make systems more secure. This chapter looks at the security of systems from the organizational perspective. Specifically, this study attempts to identify if different organizations have different predisposition to particular type(s) of security threat sources. Using publicly available security breach data from a privacy rights clearinghouse to investigate which organizational characteristics predisposes an institution to an external or internal threat source, it was concluded that as size of organization and the number of its valuable documents increase by one unit, the organization's probability of suffering an internal attacks decrease. Furthermore, when executive members have a business degree rather than information-security-related degrees, the likelihood of suffering an internal attack increases. Also, the probability of an organization suffering an internal or external attack is not based on its industry type.


VINE ◽  
2014 ◽  
Vol 44 (3) ◽  
pp. 375-393 ◽  
Author(s):  
Mohsen Shafiei Nikabadi

Purpose – The main aim of this study is to provide a framework for technology-based factors for knowledge management in supply chain. Design/methodology/approach – This is an applied research and has been done as a survey in Iran Khodro and Saipa Company as the largest companies in automotive industry of Iran. In this study, 206 experts participated. Reliability methods were Cronbach’s alfa, and validity tests were content and construction analyses. In response to one main question and three sub-questions in this research, first and second confirmative factor analysis were used. Findings – In this research, after a literature review, a comprehensive framework with three factors is presented. These factors are information technology (IT) tools, information systems integration and information security management. The findings indicate that the first framework in supply chain of the automotive industry has a good fitness and perfect validity. Second, in this framework, factors have also been considered based on importance. The technique of factor analysis was given the highest importance to the information systems integration. Then, IT tools and, ultimately, information security management are considered. In addition, findings indicate that information systems integration has the highest correlation with IT tools. Originality/value – The main innovation aspect of the research is to present a comprehensive framework for technology-based factors and indices for knowledge management in supply chain. In this paper, in addition to presenting a grouping for IT tools for knowledge management processes in supply chain, key indices for information systems integration and information security management are also referred.


2019 ◽  
Vol 15 (1) ◽  
pp. 37-52 ◽  
Author(s):  
Cheuk Hang Au ◽  
Walter S. L. Fung

Repeated information security (InfoSec) incidents have harmed the confidence of people on enterprises' InfoSec capability. While most organisations adopt control frameworks such as ISO27001 and COBIT, the role and contribution of knowledge management on InfoSec was inadequately considered. The authors integrated the concepts of knowledge-centric information security and IT Governance (ITG) into an ITG-driven knowledge framework (ITGKF) for reinforcing InfoSec maturity and auditability of enterprises. The authors also tried to assess whether ITG can embrace proper knowledge circulation within the InfoSec community. The authors confirmed the positive influence of IT governance on knowledge-centric information security (KCIS) and information security maturity and audit result (ISMAR), the positive influence of KCIS on ISMAR, and the mediating role of KCIS between ITG and ISMAR. These indicated the significance of KM in InfoSec area. Based on the findings, they proposed possible changes of integrating KM in different InfoSec practices and audit standard.


Sign in / Sign up

Export Citation Format

Share Document