Information Security and Knowledge Management

Authors

  • Ellena Ike University of Lagos

DOI:

https://doi.org/10.47941/ejikm.2063

Keywords:

Information Security (IS), Knowledge Management (KM), Socio-Technical Systems Theory, Knowledge-Based View (KBV), Cybersecurity Awareness

Abstract

Purpose: The general objective of the study was to analyze information security and knowledge management.

Methodology: The study adopted a desktop research methodology. Desk research refers to secondary data or that which can be collected without fieldwork. Desk research is basically involved in collecting data from existing resources hence it is often considered a low cost technique as compared to field research, as the main cost is involved in executive’s time, telephone charges and directories. Thus, the study relied on already published studies, reports and statistics. This secondary data was easily accessed through the online journals and library.

Findings: The findings reveal that there exists a contextual and methodological gap relating to information security and knowledge management. Preliminary empirical review revealed that integrating IS and KM was crucial for enhancing organizational performance, protecting intellectual assets, and fostering innovation. It emphasized the need for a holistic approach combining technological solutions, robust policies, and a culture of security awareness. The research found that this integration led to significant improvements in operational efficiency and innovation, with continuous evaluation and adaptation being essential. The study highlighted the importance of advanced security technologies, regular updates, and employee training to maintain effective IS and KM practices, ultimately ensuring the secure and effective utilization of knowledge assets for sustainable growth.

Unique Contribution to Theory, Practice and Policy: The Socio-Technical Systems Theory, Knowledge-Based View of the Firm and Information Systems Success Model may be used to anchor future studies on information security and knowledge management. The study provided significant contributions to theory, practice, and policy by integrating various theoretical frameworks and emphasizing the need for a multi-layered approach to IS that includes advanced technology, strong policies, and employee training. It recommended the development of regulatory standards to enforce robust IS practices, the alignment of IS and KM with organizational strategies, and the implementation of continuous improvement programs. Additionally, it highlighted the importance of comprehensive training for employees and fostering a collaborative environment that balances security with innovation.

Downloads

Download data is not yet available.

References

Alavi, M., & Leidner, D. E. (2015). Knowledge management and knowledge management systems: Conceptual foundations and research issues. MIS Quarterly, 29(1), 107-136. https://doi.org/10.2307/25148654

Andreeva, T., & Kianto, A. (2012). Does knowledge management really matter? Linking KM practices, competitiveness and economic performance. Journal of Knowledge Management, 16(4), 617-636. https://doi.org/10.1108/13673271211246185

Baxter, G., & Sommerville, I. (2011). Socio-technical systems: From design methods to systems engineering. Interacting with Computers, 23(1), 4-17. https://doi.org/10.1016/j.intcom.2010.07.003

Costa, V., & Monteiro, S. (2016). Knowledge processes, absorptive capacity and innovation: A mediation analysis. Knowledge and Process Management, 23(3), 207-218. https://doi.org/10.1002/kpm.1516

Deloitte. (2018). Global human capital trends 2018: The rise of the social enterprise. Retrieved from https://www2.deloitte.com/global/en/pages/human-capital/articles/introduction-human-capital-trends.html

Deloitte. (2019). The connected worker: Insights and trends in remote working and digital collaboration. Retrieved from https://www2.deloitte.com/content/dam/Deloitte/global/Documents/Technology-Media-Telecommunications/gx-tmt-connected-worker.pdf

DeLone, W. H., & McLean, E. R. (2003). The DeLone and McLean model of information systems success: A ten-year update. Journal of Management Information Systems, 19(4), 9-30. https://doi.org/10.1080/07421222.2003.11045748

Durst, S., & Edvardsson, I. R. (2012). Knowledge management in SMEs: A literature review. Journal of Knowledge Management, 16(6), 879-903. https://doi.org/10.1108/13673271211276173

Grant, R. M. (1996). Toward a knowledge-based theory of the firm. Strategic Management Journal, 17(S2), 109-122. https://doi.org/10.1002/smj.4250171110

Grant, R. M. (2016). The knowledge-based view of the firm: Implications for management practice. Journal of Management Studies, 53(4), 450-470. https://doi.org/10.1111/joms.12139

Hislop, D., Bosua, R., & Helms, R. (2013). Knowledge management in organizations: A critical introduction. Oxford University Press.

IBM Security. (2020). Cost of a data breach report 2020. Retrieved from https://www.ibm.com/security/data-breach

Liu, H., & Wu, J. (2020). Knowledge management and business model innovation in SMEs: A cross-case analysis. Journal of Knowledge Management, 24(4), 761-790. https://doi.org/10.1108/JKM-12-2019-0712

Masa’deh, R., Shannak, R., Maqableh, M., & Tarhini, A. (2017). The impact of knowledge management on job performance in higher education: The case of the University of Jordan. Journal of Enterprise Information Management, 30(2), 244-262. https://doi.org/10.1108/JEIM-09-2015-0087

McAfee. (2020). Cloud adoption and risk report. Retrieved from https://www.mcafee.com/enterprise/en-us/assets/reports/rp-cloud-adoption-risk-report-2020.pdf

Mogale, L., & Sutherland, M. (2019). Knowledge management and organizational performance: A South African perspective. South African Journal of Business Management, 50(1), a1650. https://doi.org/10.4102/sajbm.v50i1.1650

Nonaka, I., & Toyama, R. (2015). The knowledge-creating theory revisited: Knowledge creation as a synthesizing process. In The Essentials of Knowledge Management (pp. 95-110). Palgrave Macmillan, London. https://doi.org/10.1057/9781137552105_6

PwC. (2018). Global economic crime and fraud survey. Retrieved from https://www.pwc.com/gx/en/services/advisory/forensics/economic-crime-survey.html

SANS Institute. (2018). Security awareness report: The rise of security culture. Retrieved from https://www.sans.org/security-awareness-training/reports/security-awareness-report-2018/

Symantec. (2019). Internet security threat report. Retrieved from https://www.symantec.com/content/dam/symantec/docs/reports/istr-24-2019-en.pdf

Von Solms, R., & Van Niekerk, J. (2013). From information security to cyber security. Computers & Security, 38, 97-102. https://doi.org/10.1016/j.cose.2013.04.004

Whitman, M. E., & Mattord, H. J. (2018). Principles of information security. Cengage Learning.

Downloads

Published

2024-07-12

How to Cite

Ike, E. (2024). Information Security and Knowledge Management. European Journal of Information and Knowledge Management, 3(2), 38–50. https://doi.org/10.47941/ejikm.2063

Issue

Section

Articles