Towards a knowledge leakage Mitigation framework for mobile Devices in
knowledge-intensive Organizations
- URL: http://arxiv.org/abs/2308.10689v1
- Date: Mon, 21 Aug 2023 12:54:46 GMT
- Title: Towards a knowledge leakage Mitigation framework for mobile Devices in
knowledge-intensive Organizations
- Authors: Carlos Andres Agudelo Serna, Rachelle Bosua, Atif Ahmad, Sean B.
Maynard
- Abstract summary: We study knowledge leakage risk (KLR) within the context of mobile devices in knowledge-intensive organizations in Australia.
We present a conceptual framework to explain and categorize the mitigation strategies to combat KLR through the use of mobile devices grounded in the literature.
- Score: 0.294944680995069
- License: http://creativecommons.org/licenses/by-nc-sa/4.0/
- Abstract: The use of mobile devices in knowledge-intensive organizations while
effective and cost-efficient also pose a challenging management problem. Often
employees whether deliberately or inadvertently are the cause of knowledge
leakage in organizations and the use of mobile devices further exacerbates it.
This problem is the result of overly focusing on technical controls while
neglecting human factors. Knowledge leakage is a multidimensional problem, and
in this paper, we highlight the different dimensions that constitute it. In
this study, our contributions are threefold. First, we study knowledge leakage
risk (KLR) within the context of mobile devices in knowledge-intensive
organizations in Australia. Second, we present a conceptual framework to
explain and categorize the mitigation strategies to combat KLR through the use
of mobile devices grounded in the literature. And third, we apply the framework
to the findings from interviews with security and knowledge managers. Keywords:
Knowledge Leakage, Knowledge Risk, Knowledge intensive, Mobile device.
Related papers
- Factory Operators' Perspectives on Cognitive Assistants for Knowledge Sharing: Challenges, Risks, and Impact on Work [51.78233291198334]
This study investigates the real-world impact of deploying Cognitive Assistants (CAs) in factories.
Our results indicate that while CAs have the potential to significantly improve efficiency through knowledge sharing, they also introduce concerns around workplace surveillance.
Our findings stress the importance of addressing privacy, knowledge contribution burdens, and tensions between factory operators and their managers.
arXiv Detail & Related papers (2024-09-30T11:08:27Z) - Untangle the KNOT: Interweaving Conflicting Knowledge and Reasoning Skills in Large Language Models [51.72963030032491]
Knowledge documents for large language models (LLMs) may conflict with the memory of LLMs due to outdated or incorrect knowledge.
We construct a new dataset, dubbed KNOT, for knowledge conflict resolution examination in the form of question answering.
arXiv Detail & Related papers (2024-04-04T16:40:11Z) - Beyond Factuality: A Comprehensive Evaluation of Large Language Models
as Knowledge Generators [78.63553017938911]
Large language models (LLMs) outperform information retrieval techniques for downstream knowledge-intensive tasks.
However, community concerns abound regarding the factuality and potential implications of using this uncensored knowledge.
We introduce CONNER, designed to evaluate generated knowledge from six important perspectives.
arXiv Detail & Related papers (2023-10-11T08:22:37Z) - Addressing Knowledge Leakage Risk caused by the use of mobile devices in
Australian Organizations [0.294944680995069]
Information and knowledge leakage has become a significant security risk to Australian organizations.
Each security incident in Australian business cost an average US$$$2.8 million.
Australian organisations spend the second most worldwide (US$$$1.2 million each on average) on investigating and assessing information breaches.
arXiv Detail & Related papers (2023-08-21T13:03:26Z) - Mitigating the Risk of Knowledge Leakage in Knowledge Intensive
Organizations: a Mobile Device Perspective [0.0]
Modern organizations struggle with the protection of sensitive data and organizational knowledge.
Not much is known about strategies to mitigate the risk of knowledge leakage using mobile devices.
arXiv Detail & Related papers (2023-08-18T01:22:31Z) - On the Security Risks of Knowledge Graph Reasoning [71.64027889145261]
We systematize the security threats to KGR according to the adversary's objectives, knowledge, and attack vectors.
We present ROAR, a new class of attacks that instantiate a variety of such threats.
We explore potential countermeasures against ROAR, including filtering of potentially poisoning knowledge and training with adversarially augmented queries.
arXiv Detail & Related papers (2023-05-03T18:47:42Z) - Pitfalls in Effective Knowledge Management: Insights from an
International Information Technology Organization [8.847473225998908]
This study aims to identify hindering factors that prevent individuals from effectively sharing and managing knowledge.
Several hindering factors were identified, grouped into personal social topics, organizational social topics, technical topics, environmental topics, and interrelated social and technical topics.
The presented recommendations for mitigating these hindering factors are focused on improving employees' actions, such as offering training and guidelines to follow.
arXiv Detail & Related papers (2023-04-16T09:45:08Z) - Coarse-to-Careful: Seeking Semantic-related Knowledge for Open-domain
Commonsense Question Answering [12.406729445165857]
It is prevalent to utilize external knowledge to help machine answer questions that need background commonsense.
We propose a semantic-driven knowledge-aware QA framework, which controls the knowledge injection in a coarse-to-careful fashion.
arXiv Detail & Related papers (2021-07-04T10:56:36Z) - Inspect, Understand, Overcome: A Survey of Practical Methods for AI
Safety [54.478842696269304]
The use of deep neural networks (DNNs) in safety-critical applications is challenging due to numerous model-inherent shortcomings.
In recent years, a zoo of state-of-the-art techniques aiming to address these safety concerns has emerged.
Our paper addresses both machine learning experts and safety engineers.
arXiv Detail & Related papers (2021-04-29T09:54:54Z) - A game-theoretic analysis of networked system control for common-pool
resource management using multi-agent reinforcement learning [54.55119659523629]
Multi-agent reinforcement learning has recently shown great promise as an approach to networked system control.
Common-pool resources include arable land, fresh water, wetlands, wildlife, fish stock, forests and the atmosphere.
arXiv Detail & Related papers (2020-10-15T14:12:26Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.