Role of Blockchain in Secure Knowledge Management
DOI:
https://doi.org/10.47941/ejikm.2062Keywords:
Blockchain technology, Knowledge Management, Data Security, Transparency, Distributed Ledger Technology (DLT)Abstract
Purpose: The general objective of the study was to analyze the role of blockchain in secure knowledge management.
Methodology: The study adopted a desktop research methodology. Desk research refers to secondary data or that which can be collected without fieldwork. Desk research is basically involved in collecting data from existing resources hence it is often considered a low cost technique as compared to field research, as the main cost is involved in executive’s time, telephone charges and directories. Thus, the study relied on already published studies, reports and statistics. This secondary data was easily accessed through the online journals and library.
Findings: The findings reveal that there exists a contextual and methodological gap relating to the role of blockchain in secure knowledge management. Preliminary empirical review revealed that blockchain technology offered significant benefits in enhancing data security, integrity, and transparency across sectors such as healthcare, finance, supply chain, and education. Blockchain's decentralized ledger and cryptographic techniques ensured tamper-proof data storage and improved traceability of knowledge assets. Despite challenges like scalability and regulatory issues, blockchain's potential to streamline operations, foster collaboration, and enhance data interoperability remains pivotal for future innovations in knowledge management practices.
Unique Contribution to Theory, Practice and Policy: The Game Theory, Diffusion of Innovations Theory and Institutional Theory may be used to anchor future studies on the role of blockchain in secure knowledge management. The study made significant contributions across theory, practice, and policy. It advanced theoretical understanding by exploring new models integrating blockchain with distributed ledger technology, enhancing data security and transparency in knowledge sharing. In practice, organizations benefited from streamlined processes through blockchain-based systems for document verification and intellectual property management. Policy recommendations emphasized integrating blockchain into regulatory frameworks to ensure compliance and protect privacy. Organizational integration strategies focused on building internal capabilities and fostering a culture of innovation. Educational initiatives prepared future professionals with blockchain skills, while global collaboration efforts aimed to establish international standards for interoperability and data security. These efforts collectively aimed to maximize blockchain's potential in secure knowledge management.
Downloads
References
African Union Commission. (2014). Africa Cybersecurity Framework. Retrieved from https://au.int/
African Union Commission. (2019). Africa’s cybersecurity challenges and opportunities. Retrieved from https://au.int/
BBC News. (2020). British Airways fined for data breach affecting 400,000 customers. Retrieved from https://www.bbc.com/news/technology-53603610
Brazilian Presidency. (2020). Lei Geral de Proteção de Dados Pessoais (LGPD). Retrieved from http://www.planalto.gov.br/ccivil_03/_ato2015-2018/2018/lei/L13709.htm
Choo, C. W. (2013). Information management for the intelligent organization: The art of scanning the environment (4th ed.). Information Today, Inc.
CNBC. (2021). Cyberattacks on Brazilian financial institutions surge. Retrieved from https://www.cnbc.com/
Crosby, M., Pattanayak, P., Verma, S., & Kalyanaraman, V. (2016). Blockchain technology: Beyond bitcoin. Applied Innovation, 2(6), 71-81. doi:10.1016/j.apin.2016.04.003
Dinca-Panaitescu, M., Wirtz, J., & Baird, K. (2020). Digitalization, Brexit and cybersecurity: The case of UK financial services. Journal of Information Security and Applications, 54, 102523. doi:10.1016/j.jisa.2020.102523
Government of Japan. (2018). Japan’s cybersecurity strategy. Retrieved from https://www.nisc.go.jp/eng/pdf/csirteng.pdf
Hancock, B. (2019). Intellectual property theft in the digital age. Journal of Intellectual Property Law & Practice, 14(8), 598-611. doi:10.1093/jiplp/jpy059
Information Commissioner's Office. (2021). Data security incident trends. Retrieved from https://ico.org.uk/
Kapar, B., Nnachi, A., & Ango, J. (2020). Strengthening cybersecurity resilience in Africa: Insights from telecommunications sector. Journal of Cybersecurity Research, 5(2), 101-115. doi:10.2139/ssrn.3712719
Kshetri, N. (2020). Blockchain’s roles in strengthening cybersecurity and protecting privacy: An overview. Telecommunications Policy, 44(5), 101937. doi:10.1016/j.telpol.2020.101937
Mettler, M. (2016). Blockchain technology in healthcare: The revolution starts here. IEEE Pulse, 8(3), 35-37. doi:10.1109/MPUL.2016.2535802
Meyer, J. W., & Rowan, B. (1977). Institutionalized organizations: Formal structure as myth and ceremony. American Journal of Sociology, 83(2), 340-363. doi:10.1086/226550
Moghaddasi, H., Safaei, A. S., & Moghaddasi, A. S. (2017). A framework for security risk management in knowledge management systems. Information Systems Frontiers, 19(5), 1093-1110. doi:10.1007/s10796-017-9773-2
Mougayar, W. (2016). The business blockchain: Promise, practice, and application of the next Internet technology. Wiley.
Nakamoto, S. (2008). Bitcoin: A peer-to-peer electronic cash system. Retrieved from https://bitcoin.org/bitcoin.pdf
Narita, T., Ishii, H., & Higashida, T. (2021). Cybersecurity challenges in Japan: The role of advanced technologies and regulatory frameworks. Asian Journal of Law and Society, 8(1), 63-83. doi:10.1017/als.2020.25
Ponemon Institute. (2020). 2020 Cost of a data breach report. Retrieved from https://www.ibm.com/security/data-breach
Ponemon Institute. (2023). 2023 Data breach statistics report. Retrieved from https://www.ponemon.org
Rogers, E. M. (2003). Diffusion of Innovations (5th ed.). Free Press.
Souza, J. M., Cruz, D. C., & Oliveira, J. (2021). Enhancing cybersecurity in Brazilian corporations: Insights from the financial sector. Journal of Business Research, 123, 47-58. doi:10.1016/j.jbusres.2020.06.030
Suga, S., Ishii, H., & Kondo, Y. (2019). Insider threats and supply chain vulnerabilities in Japan: A case study approach. Computers & Security, 85, 55-65. doi:10.1016/j.cose.2019.03.006
Swan, M. (2015). Blockchain: Blueprint for a new economy. O'Reilly Media.
Tapscott, D., & Tapscott, A. (2016). Blockchain revolution: How the technology behind bitcoin is changing money, business, and the world. Portfolio.
von Neumann, J., & Morgenstern, O. (1944). Theory of games and economic behavior (3rd ed.). Princeton University Press.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2024 Ethan Thomas
This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution (CC-BY) 4.0 License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.