Addressing Knowledge Leakage Risk caused by the use of mobile devices in
Australian Organizations
- URL: http://arxiv.org/abs/2308.10920v1
- Date: Mon, 21 Aug 2023 13:03:26 GMT
- Title: Addressing Knowledge Leakage Risk caused by the use of mobile devices in
Australian Organizations
- Authors: Carlos Andres Agudelo Serna, Rachelle Bosua, Sean B. Maynard, Atif
Ahmad
- Abstract summary: Information and knowledge leakage has become a significant security risk to Australian organizations.
Each security incident in Australian business cost an average US$$$2.8 million.
Australian organisations spend the second most worldwide (US$$$1.2 million each on average) on investigating and assessing information breaches.
- Score: 0.294944680995069
- License: http://creativecommons.org/licenses/by-nc-sa/4.0/
- Abstract: Information and knowledge leakage has become a significant security risk to
Australian organizations. Each security incident in Australian business cost an
average US$\$$2.8 million. Furthermore, Australian organisations spend the
second most worldwide (US$\$$1.2 million each on average) on investigating and
assessing information breaches. The leakage of sensitive organizational
information occurs through different avenues, such as social media, cloud
computing and mobile devices. In this study, we (1) analyze the knowledge
leakage risk (KLR) caused by the use of mobile devices in knowledge-intensive
Australian organizations, (2) present a conceptual research model to explain
the determinants that influence KLR through the use of mobile devices grounded
in the literature, (3) conduct interviews with security and knowledge managers
to understand what strategies they use to mitigate KLR caused by the use of
mobile devices and (4) use content analysis and the conceptual model to frame
the preliminary findings from the interviews. Keywords: Knowledge leakage,
mobile devices, mobile contexts, knowledge leakage risk
Related papers
- InfoLossQA: Characterizing and Recovering Information Loss in Text Simplification [60.10193972862099]
This work proposes a framework to characterize and recover simplification-induced information loss in form of question-and-answer pairs.
QA pairs are designed to help readers deepen their knowledge of a text.
arXiv Detail & Related papers (2024-01-29T19:00:01Z) - LOCALINTEL: Generating Organizational Threat Intelligence from Global
and Local Cyber Knowledge [10.151042468807402]
Security Operations Center analysts gather threat reports from openly accessible global threat databases and customize them manually to suit a particular organization's needs.
Analysts undertake a labor intensive task utilizing these global and local knowledge databases to manually create organization's unique threat response and mitigation strategies.
We present LOCALINTEL, a novel automated knowledge contextualization system that retrieves threat reports from the global threat repositories and uses its local knowledge database to contextualize them for a specific organization.
arXiv Detail & Related papers (2024-01-18T15:00:01Z) - Beyond Factuality: A Comprehensive Evaluation of Large Language Models
as Knowledge Generators [78.63553017938911]
Large language models (LLMs) outperform information retrieval techniques for downstream knowledge-intensive tasks.
However, community concerns abound regarding the factuality and potential implications of using this uncensored knowledge.
We introduce CONNER, designed to evaluate generated knowledge from six important perspectives.
arXiv Detail & Related papers (2023-10-11T08:22:37Z) - Towards a knowledge leakage Mitigation framework for mobile Devices in
knowledge-intensive Organizations [0.294944680995069]
We study knowledge leakage risk (KLR) within the context of mobile devices in knowledge-intensive organizations in Australia.
We present a conceptual framework to explain and categorize the mitigation strategies to combat KLR through the use of mobile devices grounded in the literature.
arXiv Detail & Related papers (2023-08-21T12:54:46Z) - Mitigating the Risk of Knowledge Leakage in Knowledge Intensive
Organizations: a Mobile Device Perspective [0.0]
Modern organizations struggle with the protection of sensitive data and organizational knowledge.
Not much is known about strategies to mitigate the risk of knowledge leakage using mobile devices.
arXiv Detail & Related papers (2023-08-18T01:22:31Z) - On the Security Risks of Knowledge Graph Reasoning [71.64027889145261]
We systematize the security threats to KGR according to the adversary's objectives, knowledge, and attack vectors.
We present ROAR, a new class of attacks that instantiate a variety of such threats.
We explore potential countermeasures against ROAR, including filtering of potentially poisoning knowledge and training with adversarially augmented queries.
arXiv Detail & Related papers (2023-05-03T18:47:42Z) - Foveate, Attribute, and Rationalize: Towards Physically Safe and
Trustworthy AI [76.28956947107372]
Covertly unsafe text is an area of particular interest, as such text may arise from everyday scenarios and are challenging to detect as harmful.
We propose FARM, a novel framework leveraging external knowledge for trustworthy rationale generation in the context of safety.
Our experiments show that FARM obtains state-of-the-art results on the SafeText dataset, showing absolute improvement in safety classification accuracy by 5.9%.
arXiv Detail & Related papers (2022-12-19T17:51:47Z) - Mining Root Cause Knowledge from Cloud Service Incident Investigations
for AIOps [71.12026848664753]
Root Cause Analysis (RCA) of any service-disrupting incident is one of the most critical as well as complex tasks in IT processes.
In this work, we present ICA and the downstream Incident Search and Retrieval based RCA pipeline, built at Salesforce.
arXiv Detail & Related papers (2022-04-21T02:33:34Z) - BYOD Security: A Study of Human Dimensions [0.0]
The prevalence and maturity of Bring Your Own Device security along with subsequent frameworks and security mechanisms in Australian organisations is a growing phenomenon.
The aim of this paper is to discover, through a study conducted using a survey questionnaire instrument, how employees practice and perceive the BYOD security mechanisms deployed by Australian businesses.
arXiv Detail & Related papers (2022-02-23T13:31:54Z) - Attacking Open-domain Question Answering by Injecting Misinformation [116.25434773461465]
We study the risk of misinformation to Question Answering (QA) models by investigating the sensitivity of open-domain QA models to misinformation documents.
Experiments show that QA models are vulnerable to even small amounts of evidence contamination brought by misinformation.
We discuss the necessity of building a misinformation-aware QA system that integrates question-answering and misinformation detection.
arXiv Detail & Related papers (2021-10-15T01:55:18Z) - Leaking Sensitive Financial Accounting Data in Plain Sight using Deep
Autoencoder Neural Networks [1.9659095632676094]
We introduce a real-world threat model' designed to leak sensitive accounting data.
We show that a deep steganographic process, constituted by three neural networks, can be trained to hide such data in unobtrusive day-to-day' images.
arXiv Detail & Related papers (2020-12-13T17:29:53Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.