Role of Blockchain in Secure Knowledge Management

Authors

  • Ethan Thomas Gulu University

DOI:

https://doi.org/10.47941/ejikm.2062

Keywords:

Blockchain technology, Knowledge Management, Data Security, Transparency, Distributed Ledger Technology (DLT)

Abstract

Purpose: The general objective of the study was to analyze the role of blockchain in secure knowledge management.

Methodology: The study adopted a desktop research methodology. Desk research refers to secondary data or that which can be collected without fieldwork. Desk research is basically involved in collecting data from existing resources hence it is often considered a low cost technique as compared to field research, as the main cost is involved in executive’s time, telephone charges and directories. Thus, the study relied on already published studies, reports and statistics. This secondary data was easily accessed through the online journals and library.

Findings: The findings reveal that there exists a contextual and methodological gap relating to the role of blockchain in secure knowledge management. Preliminary empirical review revealed that blockchain technology offered significant benefits in enhancing data security, integrity, and transparency across sectors such as healthcare, finance, supply chain, and education. Blockchain's decentralized ledger and cryptographic techniques ensured tamper-proof data storage and improved traceability of knowledge assets. Despite challenges like scalability and regulatory issues, blockchain's potential to streamline operations, foster collaboration, and enhance data interoperability remains pivotal for future innovations in knowledge management practices.

Unique Contribution to Theory, Practice and Policy: The Game Theory, Diffusion of Innovations Theory and Institutional Theory may be used to anchor future studies on the role of blockchain in secure knowledge management. The study made significant contributions across theory, practice, and policy. It advanced theoretical understanding by exploring new models integrating blockchain with distributed ledger technology, enhancing data security and transparency in knowledge sharing. In practice, organizations benefited from streamlined processes through blockchain-based systems for document verification and intellectual property management. Policy recommendations emphasized integrating blockchain into regulatory frameworks to ensure compliance and protect privacy. Organizational integration strategies focused on building internal capabilities and fostering a culture of innovation. Educational initiatives prepared future professionals with blockchain skills, while global collaboration efforts aimed to establish international standards for interoperability and data security. These efforts collectively aimed to maximize blockchain's potential in secure knowledge management.

Downloads

Download data is not yet available.

References

African Union Commission. (2014). Africa Cybersecurity Framework. Retrieved from https://au.int/

African Union Commission. (2019). Africa’s cybersecurity challenges and opportunities. Retrieved from https://au.int/

BBC News. (2020). British Airways fined for data breach affecting 400,000 customers. Retrieved from https://www.bbc.com/news/technology-53603610

Brazilian Presidency. (2020). Lei Geral de Proteção de Dados Pessoais (LGPD). Retrieved from http://www.planalto.gov.br/ccivil_03/_ato2015-2018/2018/lei/L13709.htm

Choo, C. W. (2013). Information management for the intelligent organization: The art of scanning the environment (4th ed.). Information Today, Inc.

CNBC. (2021). Cyberattacks on Brazilian financial institutions surge. Retrieved from https://www.cnbc.com/

Crosby, M., Pattanayak, P., Verma, S., & Kalyanaraman, V. (2016). Blockchain technology: Beyond bitcoin. Applied Innovation, 2(6), 71-81. doi:10.1016/j.apin.2016.04.003

Dinca-Panaitescu, M., Wirtz, J., & Baird, K. (2020). Digitalization, Brexit and cybersecurity: The case of UK financial services. Journal of Information Security and Applications, 54, 102523. doi:10.1016/j.jisa.2020.102523

Government of Japan. (2018). Japan’s cybersecurity strategy. Retrieved from https://www.nisc.go.jp/eng/pdf/csirteng.pdf

Hancock, B. (2019). Intellectual property theft in the digital age. Journal of Intellectual Property Law & Practice, 14(8), 598-611. doi:10.1093/jiplp/jpy059

Information Commissioner's Office. (2021). Data security incident trends. Retrieved from https://ico.org.uk/

Kapar, B., Nnachi, A., & Ango, J. (2020). Strengthening cybersecurity resilience in Africa: Insights from telecommunications sector. Journal of Cybersecurity Research, 5(2), 101-115. doi:10.2139/ssrn.3712719

Kshetri, N. (2020). Blockchain’s roles in strengthening cybersecurity and protecting privacy: An overview. Telecommunications Policy, 44(5), 101937. doi:10.1016/j.telpol.2020.101937

Mettler, M. (2016). Blockchain technology in healthcare: The revolution starts here. IEEE Pulse, 8(3), 35-37. doi:10.1109/MPUL.2016.2535802

Meyer, J. W., & Rowan, B. (1977). Institutionalized organizations: Formal structure as myth and ceremony. American Journal of Sociology, 83(2), 340-363. doi:10.1086/226550

Moghaddasi, H., Safaei, A. S., & Moghaddasi, A. S. (2017). A framework for security risk management in knowledge management systems. Information Systems Frontiers, 19(5), 1093-1110. doi:10.1007/s10796-017-9773-2

Mougayar, W. (2016). The business blockchain: Promise, practice, and application of the next Internet technology. Wiley.

Nakamoto, S. (2008). Bitcoin: A peer-to-peer electronic cash system. Retrieved from https://bitcoin.org/bitcoin.pdf

Narita, T., Ishii, H., & Higashida, T. (2021). Cybersecurity challenges in Japan: The role of advanced technologies and regulatory frameworks. Asian Journal of Law and Society, 8(1), 63-83. doi:10.1017/als.2020.25

Ponemon Institute. (2020). 2020 Cost of a data breach report. Retrieved from https://www.ibm.com/security/data-breach

Ponemon Institute. (2023). 2023 Data breach statistics report. Retrieved from https://www.ponemon.org

Rogers, E. M. (2003). Diffusion of Innovations (5th ed.). Free Press.

Souza, J. M., Cruz, D. C., & Oliveira, J. (2021). Enhancing cybersecurity in Brazilian corporations: Insights from the financial sector. Journal of Business Research, 123, 47-58. doi:10.1016/j.jbusres.2020.06.030

Suga, S., Ishii, H., & Kondo, Y. (2019). Insider threats and supply chain vulnerabilities in Japan: A case study approach. Computers & Security, 85, 55-65. doi:10.1016/j.cose.2019.03.006

Swan, M. (2015). Blockchain: Blueprint for a new economy. O'Reilly Media.

Tapscott, D., & Tapscott, A. (2016). Blockchain revolution: How the technology behind bitcoin is changing money, business, and the world. Portfolio.

von Neumann, J., & Morgenstern, O. (1944). Theory of games and economic behavior (3rd ed.). Princeton University Press.

Downloads

Published

2024-07-12

How to Cite

Thomas, E. (2024). Role of Blockchain in Secure Knowledge Management. European Journal of Information and Knowledge Management, 3(2), 26–37. https://doi.org/10.47941/ejikm.2062

Issue

Section

Articles