Mitigating the Risk of Knowledge Leakage in Knowledge Intensive
Organizations: a Mobile Device Perspective
- URL: http://arxiv.org/abs/2308.09229v1
- Date: Fri, 18 Aug 2023 01:22:31 GMT
- Title: Mitigating the Risk of Knowledge Leakage in Knowledge Intensive
Organizations: a Mobile Device Perspective
- Authors: Carlos Andres Agudelo Serna
- Abstract summary: Modern organizations struggle with the protection of sensitive data and organizational knowledge.
Not much is known about strategies to mitigate the risk of knowledge leakage using mobile devices.
- Score: 0.0
- License: http://creativecommons.org/licenses/by-nc-nd/4.0/
- Abstract: In the current knowledge economy, knowledge represents the most strategically
significant resource of organizations. Knowledge-intensive activities advance
innovation and create and sustain economic rent and competitive advantage. In
order to sustain competitive advantage, organizations must protect knowledge
from leakage to third parties, particularly competitors. However, the number
and scale of leakage incidents reported in news media as well as industry
whitepapers suggests that modern organizations struggle with the protection of
sensitive data and organizational knowledge. The increasing use of mobile
devices and technologies by knowledge workers across the organizational
perimeter has dramatically increased the attack surface of organizations, and
the corresponding level of risk exposure. While much of the literature has
focused on technology risks that lead to information leakage, human risks that
lead to knowledge leakage are relatively understudied. Further, not much is
known about strategies to mitigate the risk of knowledge leakage using mobile
devices, especially considering the human aspect. Specifically, this research
study identified three gaps in the current literature (1) lack of in-depth
studies that provide specific strategies for knowledge-intensive organizations
based on their varied risk levels. Most of the analysed studies provide
high-level strategies that are presented in a generalised manner and fail to
identify specific strategies for different organizations and risk levels. (2)
lack of research into management of knowledge in the context of mobile devices.
And (3) lack of research into the tacit dimension of knowledge as the majority
of the literature focuses on formal and informal strategies to protect explicit
(codified) knowledge.
Related papers
- How Do LLMs Acquire New Knowledge? A Knowledge Circuits Perspective on Continual Pre-Training [92.88889953768455]
Large Language Models (LLMs) face a critical gap in understanding how they internalize new knowledge.
We identify computational subgraphs that facilitate knowledge storage and processing.
arXiv Detail & Related papers (2025-02-16T16:55:43Z) - Open Problems in Machine Unlearning for AI Safety [61.43515658834902]
Machine unlearning -- the ability to selectively forget or suppress specific types of knowledge -- has shown promise for privacy and data removal tasks.
In this paper, we identify key limitations that prevent unlearning from serving as a comprehensive solution for AI safety.
arXiv Detail & Related papers (2025-01-09T03:59:10Z) - InfuserKI: Enhancing Large Language Models with Knowledge Graphs via Infuser-Guided Knowledge Integration [58.61492157691623]
Methods for integrating knowledge have been developed, which augment LLMs with domain-specific knowledge graphs through external modules.
Our research focuses on a novel problem: efficiently integrating unknown knowledge into LLMs without unnecessary overlap of known knowledge.
A risk of introducing new knowledge is the potential forgetting of existing knowledge.
arXiv Detail & Related papers (2024-02-18T03:36:26Z) - Private Knowledge Sharing in Distributed Learning: A Survey [50.51431815732716]
The rise of Artificial Intelligence has revolutionized numerous industries and transformed the way society operates.
It is crucial to utilize information in learning processes that are either distributed or owned by different entities.
Modern data-driven services have been developed to integrate distributed knowledge entities into their outcomes.
arXiv Detail & Related papers (2024-02-08T07:18:23Z) - Beyond Factuality: A Comprehensive Evaluation of Large Language Models
as Knowledge Generators [78.63553017938911]
Large language models (LLMs) outperform information retrieval techniques for downstream knowledge-intensive tasks.
However, community concerns abound regarding the factuality and potential implications of using this uncensored knowledge.
We introduce CONNER, designed to evaluate generated knowledge from six important perspectives.
arXiv Detail & Related papers (2023-10-11T08:22:37Z) - Addressing Knowledge Leakage Risk caused by the use of mobile devices in
Australian Organizations [0.294944680995069]
Information and knowledge leakage has become a significant security risk to Australian organizations.
Each security incident in Australian business cost an average US$$$2.8 million.
Australian organisations spend the second most worldwide (US$$$1.2 million each on average) on investigating and assessing information breaches.
arXiv Detail & Related papers (2023-08-21T13:03:26Z) - Towards a knowledge leakage Mitigation framework for mobile Devices in
knowledge-intensive Organizations [0.294944680995069]
We study knowledge leakage risk (KLR) within the context of mobile devices in knowledge-intensive organizations in Australia.
We present a conceptual framework to explain and categorize the mitigation strategies to combat KLR through the use of mobile devices grounded in the literature.
arXiv Detail & Related papers (2023-08-21T12:54:46Z) - On the Security Risks of Knowledge Graph Reasoning [71.64027889145261]
We systematize the security threats to KGR according to the adversary's objectives, knowledge, and attack vectors.
We present ROAR, a new class of attacks that instantiate a variety of such threats.
We explore potential countermeasures against ROAR, including filtering of potentially poisoning knowledge and training with adversarially augmented queries.
arXiv Detail & Related papers (2023-05-03T18:47:42Z) - Pitfalls in Effective Knowledge Management: Insights from an
International Information Technology Organization [8.847473225998908]
This study aims to identify hindering factors that prevent individuals from effectively sharing and managing knowledge.
Several hindering factors were identified, grouped into personal social topics, organizational social topics, technical topics, environmental topics, and interrelated social and technical topics.
The presented recommendations for mitigating these hindering factors are focused on improving employees' actions, such as offering training and guidelines to follow.
arXiv Detail & Related papers (2023-04-16T09:45:08Z) - Knowledge Management Strategies and Emerging Technologies -- An Overview
Of the Underpinning Concepts [0.0]
Knowledge management plays an increasingly important role in global economic development.
Numerous leading social scientists in this field have asserted that organisational knowledge should be regarded as a strategic asset.
In order to remain relevant in the modern world, organisations should not ignore knowledge management and emerging technologies.
arXiv Detail & Related papers (2022-05-03T14:33:31Z) - Knowledge-Integrated Informed AI for National Security [0.0]
The state of artificial intelligence technology has a rich history that dates back decades and includes two fall-outs before the explosive resurgence of today.
Now, a third category is starting to emerge that leverages both data and knowledge, that some refer to as "informed AI"
This report shares findings from a thorough exploration of AI approaches that exploit data as well as principled and/or practical knowledge.
arXiv Detail & Related papers (2022-02-04T11:51:44Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.