Mitigating the Risk of Knowledge Leakage in Knowledge Intensive
Organizations: a Mobile Device Perspective
- URL: http://arxiv.org/abs/2308.09229v1
- Date: Fri, 18 Aug 2023 01:22:31 GMT
- Title: Mitigating the Risk of Knowledge Leakage in Knowledge Intensive
Organizations: a Mobile Device Perspective
- Authors: Carlos Andres Agudelo Serna
- Abstract summary: Modern organizations struggle with the protection of sensitive data and organizational knowledge.
Not much is known about strategies to mitigate the risk of knowledge leakage using mobile devices.
- Score: 0.0
- License: http://creativecommons.org/licenses/by-nc-nd/4.0/
- Abstract: In the current knowledge economy, knowledge represents the most strategically
significant resource of organizations. Knowledge-intensive activities advance
innovation and create and sustain economic rent and competitive advantage. In
order to sustain competitive advantage, organizations must protect knowledge
from leakage to third parties, particularly competitors. However, the number
and scale of leakage incidents reported in news media as well as industry
whitepapers suggests that modern organizations struggle with the protection of
sensitive data and organizational knowledge. The increasing use of mobile
devices and technologies by knowledge workers across the organizational
perimeter has dramatically increased the attack surface of organizations, and
the corresponding level of risk exposure. While much of the literature has
focused on technology risks that lead to information leakage, human risks that
lead to knowledge leakage are relatively understudied. Further, not much is
known about strategies to mitigate the risk of knowledge leakage using mobile
devices, especially considering the human aspect. Specifically, this research
study identified three gaps in the current literature (1) lack of in-depth
studies that provide specific strategies for knowledge-intensive organizations
based on their varied risk levels. Most of the analysed studies provide
high-level strategies that are presented in a generalised manner and fail to
identify specific strategies for different organizations and risk levels. (2)
lack of research into management of knowledge in the context of mobile devices.
And (3) lack of research into the tacit dimension of knowledge as the majority
of the literature focuses on formal and informal strategies to protect explicit
(codified) knowledge.
Related papers
- Knowledge Mechanisms in Large Language Models: A Survey and Perspective [88.51320482620679]
This paper reviews knowledge mechanism analysis from a novel taxonomy including knowledge utilization and evolution.
We discuss what knowledge LLMs have learned, the reasons for the fragility of parametric knowledge, and the potential dark knowledge (hypothesis) that will be challenging to address.
arXiv Detail & Related papers (2024-07-22T06:15:59Z) - Untangle the KNOT: Interweaving Conflicting Knowledge and Reasoning Skills in Large Language Models [51.72963030032491]
Knowledge documents for large language models (LLMs) may conflict with the memory of LLMs due to outdated or incorrect knowledge.
We construct a new dataset, dubbed KNOT, for knowledge conflict resolution examination in the form of question answering.
arXiv Detail & Related papers (2024-04-04T16:40:11Z) - Private Knowledge Sharing in Distributed Learning: A Survey [50.51431815732716]
The rise of Artificial Intelligence has revolutionized numerous industries and transformed the way society operates.
It is crucial to utilize information in learning processes that are either distributed or owned by different entities.
Modern data-driven services have been developed to integrate distributed knowledge entities into their outcomes.
arXiv Detail & Related papers (2024-02-08T07:18:23Z) - Beyond Factuality: A Comprehensive Evaluation of Large Language Models
as Knowledge Generators [78.63553017938911]
Large language models (LLMs) outperform information retrieval techniques for downstream knowledge-intensive tasks.
However, community concerns abound regarding the factuality and potential implications of using this uncensored knowledge.
We introduce CONNER, designed to evaluate generated knowledge from six important perspectives.
arXiv Detail & Related papers (2023-10-11T08:22:37Z) - Addressing Knowledge Leakage Risk caused by the use of mobile devices in
Australian Organizations [0.294944680995069]
Information and knowledge leakage has become a significant security risk to Australian organizations.
Each security incident in Australian business cost an average US$$$2.8 million.
Australian organisations spend the second most worldwide (US$$$1.2 million each on average) on investigating and assessing information breaches.
arXiv Detail & Related papers (2023-08-21T13:03:26Z) - Towards a knowledge leakage Mitigation framework for mobile Devices in
knowledge-intensive Organizations [0.294944680995069]
We study knowledge leakage risk (KLR) within the context of mobile devices in knowledge-intensive organizations in Australia.
We present a conceptual framework to explain and categorize the mitigation strategies to combat KLR through the use of mobile devices grounded in the literature.
arXiv Detail & Related papers (2023-08-21T12:54:46Z) - On the Security Risks of Knowledge Graph Reasoning [71.64027889145261]
We systematize the security threats to KGR according to the adversary's objectives, knowledge, and attack vectors.
We present ROAR, a new class of attacks that instantiate a variety of such threats.
We explore potential countermeasures against ROAR, including filtering of potentially poisoning knowledge and training with adversarially augmented queries.
arXiv Detail & Related papers (2023-05-03T18:47:42Z) - Pitfalls in Effective Knowledge Management: Insights from an
International Information Technology Organization [8.847473225998908]
This study aims to identify hindering factors that prevent individuals from effectively sharing and managing knowledge.
Several hindering factors were identified, grouped into personal social topics, organizational social topics, technical topics, environmental topics, and interrelated social and technical topics.
The presented recommendations for mitigating these hindering factors are focused on improving employees' actions, such as offering training and guidelines to follow.
arXiv Detail & Related papers (2023-04-16T09:45:08Z) - Knowledge Management Strategies and Emerging Technologies -- An Overview
Of the Underpinning Concepts [0.0]
Knowledge management plays an increasingly important role in global economic development.
Numerous leading social scientists in this field have asserted that organisational knowledge should be regarded as a strategic asset.
In order to remain relevant in the modern world, organisations should not ignore knowledge management and emerging technologies.
arXiv Detail & Related papers (2022-05-03T14:33:31Z) - Knowledge-Integrated Informed AI for National Security [0.0]
The state of artificial intelligence technology has a rich history that dates back decades and includes two fall-outs before the explosive resurgence of today.
Now, a third category is starting to emerge that leverages both data and knowledge, that some refer to as "informed AI"
This report shares findings from a thorough exploration of AI approaches that exploit data as well as principled and/or practical knowledge.
arXiv Detail & Related papers (2022-02-04T11:51:44Z) - A System for Automated Open-Source Threat Intelligence Gathering and
Management [53.65687495231605]
SecurityKG is a system for automated OSCTI gathering and management.
It uses a combination of AI and NLP techniques to extract high-fidelity knowledge about threat behaviors.
arXiv Detail & Related papers (2021-01-19T18:31:35Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.