Information Security and Knowledge Management
DOI:
https://doi.org/10.47941/ejikm.2063Keywords:
Information Security (IS), Knowledge Management (KM), Socio-Technical Systems Theory, Knowledge-Based View (KBV), Cybersecurity AwarenessAbstract
Purpose: The general objective of the study was to analyze information security and knowledge management.
Methodology: The study adopted a desktop research methodology. Desk research refers to secondary data or that which can be collected without fieldwork. Desk research is basically involved in collecting data from existing resources hence it is often considered a low cost technique as compared to field research, as the main cost is involved in executive’s time, telephone charges and directories. Thus, the study relied on already published studies, reports and statistics. This secondary data was easily accessed through the online journals and library.
Findings: The findings reveal that there exists a contextual and methodological gap relating to information security and knowledge management. Preliminary empirical review revealed that integrating IS and KM was crucial for enhancing organizational performance, protecting intellectual assets, and fostering innovation. It emphasized the need for a holistic approach combining technological solutions, robust policies, and a culture of security awareness. The research found that this integration led to significant improvements in operational efficiency and innovation, with continuous evaluation and adaptation being essential. The study highlighted the importance of advanced security technologies, regular updates, and employee training to maintain effective IS and KM practices, ultimately ensuring the secure and effective utilization of knowledge assets for sustainable growth.
Unique Contribution to Theory, Practice and Policy: The Socio-Technical Systems Theory, Knowledge-Based View of the Firm and Information Systems Success Model may be used to anchor future studies on information security and knowledge management. The study provided significant contributions to theory, practice, and policy by integrating various theoretical frameworks and emphasizing the need for a multi-layered approach to IS that includes advanced technology, strong policies, and employee training. It recommended the development of regulatory standards to enforce robust IS practices, the alignment of IS and KM with organizational strategies, and the implementation of continuous improvement programs. Additionally, it highlighted the importance of comprehensive training for employees and fostering a collaborative environment that balances security with innovation.
Downloads
References
Alavi, M., & Leidner, D. E. (2015). Knowledge management and knowledge management systems: Conceptual foundations and research issues. MIS Quarterly, 29(1), 107-136. https://doi.org/10.2307/25148654
Andreeva, T., & Kianto, A. (2012). Does knowledge management really matter? Linking KM practices, competitiveness and economic performance. Journal of Knowledge Management, 16(4), 617-636. https://doi.org/10.1108/13673271211246185
Baxter, G., & Sommerville, I. (2011). Socio-technical systems: From design methods to systems engineering. Interacting with Computers, 23(1), 4-17. https://doi.org/10.1016/j.intcom.2010.07.003
Costa, V., & Monteiro, S. (2016). Knowledge processes, absorptive capacity and innovation: A mediation analysis. Knowledge and Process Management, 23(3), 207-218. https://doi.org/10.1002/kpm.1516
Deloitte. (2018). Global human capital trends 2018: The rise of the social enterprise. Retrieved from https://www2.deloitte.com/global/en/pages/human-capital/articles/introduction-human-capital-trends.html
Deloitte. (2019). The connected worker: Insights and trends in remote working and digital collaboration. Retrieved from https://www2.deloitte.com/content/dam/Deloitte/global/Documents/Technology-Media-Telecommunications/gx-tmt-connected-worker.pdf
DeLone, W. H., & McLean, E. R. (2003). The DeLone and McLean model of information systems success: A ten-year update. Journal of Management Information Systems, 19(4), 9-30. https://doi.org/10.1080/07421222.2003.11045748
Durst, S., & Edvardsson, I. R. (2012). Knowledge management in SMEs: A literature review. Journal of Knowledge Management, 16(6), 879-903. https://doi.org/10.1108/13673271211276173
Grant, R. M. (1996). Toward a knowledge-based theory of the firm. Strategic Management Journal, 17(S2), 109-122. https://doi.org/10.1002/smj.4250171110
Grant, R. M. (2016). The knowledge-based view of the firm: Implications for management practice. Journal of Management Studies, 53(4), 450-470. https://doi.org/10.1111/joms.12139
Hislop, D., Bosua, R., & Helms, R. (2013). Knowledge management in organizations: A critical introduction. Oxford University Press.
IBM Security. (2020). Cost of a data breach report 2020. Retrieved from https://www.ibm.com/security/data-breach
Liu, H., & Wu, J. (2020). Knowledge management and business model innovation in SMEs: A cross-case analysis. Journal of Knowledge Management, 24(4), 761-790. https://doi.org/10.1108/JKM-12-2019-0712
Masa’deh, R., Shannak, R., Maqableh, M., & Tarhini, A. (2017). The impact of knowledge management on job performance in higher education: The case of the University of Jordan. Journal of Enterprise Information Management, 30(2), 244-262. https://doi.org/10.1108/JEIM-09-2015-0087
McAfee. (2020). Cloud adoption and risk report. Retrieved from https://www.mcafee.com/enterprise/en-us/assets/reports/rp-cloud-adoption-risk-report-2020.pdf
Mogale, L., & Sutherland, M. (2019). Knowledge management and organizational performance: A South African perspective. South African Journal of Business Management, 50(1), a1650. https://doi.org/10.4102/sajbm.v50i1.1650
Nonaka, I., & Toyama, R. (2015). The knowledge-creating theory revisited: Knowledge creation as a synthesizing process. In The Essentials of Knowledge Management (pp. 95-110). Palgrave Macmillan, London. https://doi.org/10.1057/9781137552105_6
PwC. (2018). Global economic crime and fraud survey. Retrieved from https://www.pwc.com/gx/en/services/advisory/forensics/economic-crime-survey.html
SANS Institute. (2018). Security awareness report: The rise of security culture. Retrieved from https://www.sans.org/security-awareness-training/reports/security-awareness-report-2018/
Symantec. (2019). Internet security threat report. Retrieved from https://www.symantec.com/content/dam/symantec/docs/reports/istr-24-2019-en.pdf
Von Solms, R., & Van Niekerk, J. (2013). From information security to cyber security. Computers & Security, 38, 97-102. https://doi.org/10.1016/j.cose.2013.04.004
Whitman, M. E., & Mattord, H. J. (2018). Principles of information security. Cengage Learning.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2024 Ellena Ike
This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution (CC-BY) 4.0 License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.