Cooperative Information Security Knowledge : Content Validation and incentives to contribute
نویسندگان
چکیده
The aim of this work was to examine the attitude of Chief Information Security Officers (CISOs) towards sharing knowledge with other CISOs in general and in particular the potential characteristics of a collaborative security knowledge sharing tool, which would simplify and encourage knowledge sharing. Building on this, this study intended to establish which key features such a knowledge sharing tool should provide in order to be accepted and actually used by security managers and potentially improve business performance. In this regard, content validation and incentives to contribute to such a system have been identified as key issues. They were investigated by interviewing three CISOs regarding the current state of knowledge organisation and sharing. The interviews were then transcribed and analysed using an explorative method. The analysis identified learning from each other as most important incentive for knowledge sharing and authorship as the main factor regarding credibility of contribution. From this it followed that such a sharing tool should demand users to register with the system in order to give credibility to their knowledge. However, since potentially sensitive business data would be shared, users should be given a choice of whom they would like to be able to access their contribution. Furthermore, it became clear that different levels of information detail should be provided for managers and technicians. Finally, the whole system needs to be managed in order to administrate users and maintain security and data integrity. © 2011 Newcastle University. Printed and published by the Newcastle University, Computing Science, Claremont Tower, Claremont Road, Newcastle upon Tyne, NE1 7RU, England. Bibliographical details STAHL, F., PARKIN, S.E., VAN MOORSEL, A. Cooperative Information Security Knowledge: Content Validation and incentives to contribute [By] F. Stahl, S. E. Parkin, A. van Moorsel Newcastle upon Tyne: Newcastle University: Computing Science, 2011. (Newcastle University, Computing Science, Technical Report Series, No. CS-TR-1241)
منابع مشابه
Investigating the underlying factors of the establishment of knowledge management in insurance organizations: case study in Social Security Organization
Background and Aim: Knowledge management is a conscious strategy to acquire knowledge in the right time and to help individuals to share their information to improve organizational performance. This study aims to investigate the factors underlying the establishment of knowledge management in Social Security Organization. Methods: This cross-sectional study conducted in 2017. The statistical pop...
متن کاملTrade and National Security: A Test for Best-Known Hypothesis
National security depends on soft power, the ability of a country to generate and use its economic power and to project its national values. It also depends on long-term factors that contribute to economic growth and increase the total resources base available not only for defense but to provide economic security in the form of income and business opportunities for individuals. The economic iss...
متن کاملExploring the Type of Relationship between Information Security Management and Organizational Culture (Case Study in TAM Iran Khodro Co.)
A culture conducive to information security practice is extremely important for organizations since information has to be critical assets in modern enterprises. Thus for understanding and improving the organizational behavior with regard to information security, enterprises may look into organizational culture and examine how it affects the effectiveness of implementing ISM. This study aims ...
متن کاملExploring the Type of Relationship between Information Security Management and Organizational Culture (Case Study in TAM Iran Khodro Co.)
A culture conducive to information security practice is extremely important for organizations since information has to be critical assets in modern enterprises. Thus for understanding and improving the organizational behavior with regard to information security, enterprises may look into organizational culture and examine how it affects the effectiveness of implementing ISM. This study aims ...
متن کاملDESIGN AND IMPLEMENTATION OF FUZZY EXPERT SYSTEM FOR REAL ESTATE RECOMMENDATION
<span style="color: #000000; font-family: Tahoma, sans-serif; font-size: 13px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: auto; text-align: justify; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px; -webkit-text-stroke-width: 0px; display: inline !important; float: none; backgro...
متن کامل