Therefore, only authorized individuals must be permitted to execute various operations and functions in an organization. In this paper, secure knowledge management will be discussed, focusing on confidentiality, trust, and privacy. In particular, certain access-control techniques will be investigated, and trust management as well as privacy control for knowledge management will be explored. management is about corporations sharing their resources and expertise, as well as building intellectual capital so that they can increase their competitiveness.
While knowledge-management practices have been around for decades, it is only with advent of the web that knowledge management has emerged as a technology area. Corporations with Intranets promote knowledge management so that the employees can learn about various advances in technology, get corporate information, and find the expertise in the corporation. Furthermore, when experts leave the corporation through retirement or otherwise, it is important to capture their knowledge and practices so that the corporation does not lose the valuable information acquired through many years of hard work .
One of the challenges in knowledge management is maintaining security. Knowledge management includes many technologies such as data mining, multimedia, collaboration, and the web. Therefore, security in web data management, multimedia systems, and collaboration systems all contribute toward securing knowledge-management practices. In addition, one needs to protect the corporation’s assets such as its intellectual property. Trade secrets have to be kept highly confidential so that competitors do not have any access to it.
The Essay on Information Technology Positions Management Knowledge
OCCUPATIONAL STRUCTURE IMPACTS OF INFORMATION TECHNOLOGY " THE COMING OF THE NEW ORGANIZATION " By Peter F. DuckerReading the article "The Coming of the New Organization" by Peter F. Drucker mentioned several major points of how Information Technology has impacted management and re-structured the corporation process on a whole. Information-based organizations have sufficient computing power to ...
This means one needs to enforce some form of access control such as role-based access control (RBAC), credential mechanism, and encryption. To have secure knowledge management, we need to have secure strategies, processes, and metrics. Metrics must include support for security-related information. Processes must include secure operations. Strategies must include security strategies. The creator may specify to whom the knowledge can be transferred when knowledge is created. The manager of the knowledge may enforce additional access-control techniques.
Knowledge sharing and knowledge transfer operations must also enforce access control and security policies. Secure knowledge-management architecture may be built around the corporation’s Intranet. While this paper provides an overview of secure knowledge management, it focuses mainly on confidentiality, trust, and privacy aspects. Section II provides an overview of knowledge management as well as aspects of secure knowledge management. Applying various access-control policies such as RBAC and usage control (UCON) is discussed in Section III. Aspects of trust management and negotiation are discussed in
Section IV. Privacy issues are discussed in Section V. The paper is concluded in Section VI. It should be noted that there are several aspects to secure knowledge management. We discuss confidentiality, trust, and privacy management. Furthermore, for each aspect, several techniques have been proposed. For example, various accesscontrol policies such as read/write policies have been designed and implemented. We will focus on RBAC and UCON as they are emerging as two of the prominent access-control techniques and are natural for use in a corporate environment.
The Term Paper on Coca Cola Knowledge Management
The objective of this paper is to examine the factors that contribute to the success of an enterprise towards future 2020, by taking a specific enterprise of (Coca-cola company / SIA) for analysis. The research peers into long-term trends of the opportunities and challenges that the enterprise might encounter. At the same time consider in detail of the business model and key features of the ...
RBAC is now being enforced in many commercial products and is a widely used standard. Models such as UCON encompass RBAC models and are becoming popular. Trust management and negotiation is inherent to knowledge management. For example, in an organization, a vice president may be authorized to receive the information, but the president may not have sufficient trust in the vice president to share the sensitive information. Finally, privacy is becoming critical for organizational knowledge management and data sharing.
Furthermore, important knowledge-management technologies such as data mining and the semantic web have inferencing capabilities, and as a result, privacy as well as confidentiality may be compromised. Researchers are working on secure knowledge management that complements the ideas we have presented in this paper. As stated in Section I, secure knowledge management consists of secure strategies, processes, and metrics. In addition, security technologies such as the secure semantic web and privacy-preserving data mining are technologies for secure knowledge management.
Security techniques for knowledge management include access control and trust management. Fig. 1 illustrates the various aspects of secure knowledge management. We will describe each component in this section. Security strategies for knowledge management include the policies and procedures that an organization sets in place for secure data and information sharing as well as protecting the intellectual property. Some of the questions that need to be answered include how often should knowledge be collected? How often should the organization conduct audit strategies?
What are the protection measures that need to be enforced for secure knowledge sharing? Secure knowledge-management strategies should be tightly integrated with business strategies. That is, if by enforcing intellectual-property protection the organization is going to be unprofitable, then the organization has to rethink its secure knowledge-management strategy. Secure processes for knowledge management include secure workflow processes as well as secure processes for contracting, purchasing, and order management.
The Term Paper on Management and workbook process
Discuss the management control system in the Patagonia Company. Explain and discuss the nature, context, evolution, elements, processes, strengths, weaknesses/problems of the management control system at Patagonia (including a critical evaluation of the Workbook Process). What makes Patagonia different from many corporate organisations? Everything! Patagonia is a very successful business that has ...
Security has to be incorporated into the business processes for workflow, contracting, and purchasing. For example, only users with certain credentials can carry out various knowledge-management processes. Metrics for secure knowledge management should focus on the impact of security on knowledge-management metrics. Some examples of knowledge-management metrics include the number of documents published, number of conferences attended, or the number of patents obtained. When security is incorporated, then the number of documents published may decrease as some of the documents may be classified.
Organizations should carry out experiments determining the impact of security on the metrics gathered. Security techniques include access control, UCON, trust management, as well as privacy control. These techniques are enforced at all stages of knowledge-management processes. Secure knowledge-management technologies include data mining, the semantic web, as well as technologies for data and information management. The component technologies have to be secure if we are to ensure secure knowledge management. . Fig. 2 illustrates an architecture for secure knowledge management.
The components of the architecture are a secure knowledge-creation manager, secure knowledge representation manager, a secure knowledge manipulation and sustainment manager, and a secure knowledge dissemination and transfer manager. The secure knowledge-creation task includes creating knowledge as well as specifying security policies enforced based on the knowledge. Secure knowledge representation tasks include representing the knowledge as well as policies in a machine-understandable format. Knowledge representation languages such as rules and frames as well as some of the more recent emantic-web languages such as resource descriptive framework (RDF) and ontology languages are appropriate for knowledge and policy representation. Secure knowledge-manipulation tasks include querying and updating the knowledge base. In addition, the knowledge gained has to be sustained as long as possible. Various processes have to be in place to sustain the knowledge securely. Finally, secure knowledge dissemination and transfer task includes disseminating and transferring the knowledge to authorized individuals. This section has provided an overview of the various aspects of secure knowledge management.
The Essay on Work Team Teams Management Include
In 21 st century, many organizations are tend to be decentralized, team and teamwork are become popular terms in management circles, in today! s environment, teams promise to be a cornerstone of progressive management for the foreseeable future. A lot of cases show that more and more organization trying to narrow job titles and encourage employees working together to become a effective and ...