Integrating IS Security with Knowledge Management: Are We Doing Enough? | IGI Global Scientific Publishing
Reference Hub15
Integrating IS Security with Knowledge Management: Are We Doing Enough?

Integrating IS Security with Knowledge Management: Are We Doing Enough?

Murray Jennex, Alexandra Durcikova
Copyright: © 2014 |Volume: 10 |Issue: 2 |Pages: 12
ISSN: 1548-0666|EISSN: 1548-0658|EISBN13: 9781466655423|DOI: 10.4018/ijkm.2014040101
Cite Article Cite Article

MLA

Jennex, Murray, and Alexandra Durcikova. "Integrating IS Security with Knowledge Management: Are We Doing Enough?." IJKM vol.10, no.2 2014: pp.1-12. https://doi.org/10.4018/ijkm.2014040101

APA

Jennex, M. & Durcikova, A. (2014). Integrating IS Security with Knowledge Management: Are We Doing Enough?. International Journal of Knowledge Management (IJKM), 10(2), 1-12. https://doi.org/10.4018/ijkm.2014040101

Chicago

Jennex, Murray, and Alexandra Durcikova. "Integrating IS Security with Knowledge Management: Are We Doing Enough?," International Journal of Knowledge Management (IJKM) 10, no.2: 1-12. https://doi.org/10.4018/ijkm.2014040101

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Knowledge management focuses on capturing and sharing knowledge. Because of this, KM researchers tend to focus on issues related to knowledge capture, storage, and sharing. However, because knowledge is valuable, it is a target needing to be protected. This paper posits that KM researchers and practitioners also need to think about security and explores how important security skills are to KM practitioners and researchers. A literature review was performed to determine how much attention is paid by KM researchers to knowledge security. Additionally, 50 KM job postings were examined from the spring of 2013 to determine if security skills are considered important by those hiring KM practitioners. Additionally, 38 job postings were examined from the summer of 2014 to determine if required skills changed based on the Target breech. Finally, a survey was prepared for exploring security attitudes of KM practitioners as an area of future research.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global Scientific Publishing bookstore.