Skip to main content

Knowledge Management Model Based Approach to Profiling of Requirements: Case for Information Technologies Security Standards

  • Chapter
  • First Online:
Digital Transformation, Cyber Security and Resilience of Modern Societies

Part of the book series: Studies in Big Data ((SBD,volume 84))

  • 740 Accesses

Abstract

The paper provides analysis of existing knowledge-management models. It justifies the need of integrated model of knowledge management for both industry and academia. It is proposed to build such a model using well-known standards of IT security—Common criteria and methodology for IT security evaluation. The formation of a model of knowledge management is carried out by analyzing the content of the relevant elements of standards and establishing the content of knowledge that determines the forms of relations between them. The architecture of four-factor models is proposed for application towards the formation of knowledge management models in the organization of the information security management system in accordance with the standards of the series ISO/IEC 27000.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 149.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 199.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 199.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. An Introduction to the Business Model for information Security. https://www.isaca.org/Knowledge-Center/Research/Documents/Introduction-to-the-Business-Model-for-Information-Security_res_Eng_0109.pdf. Access date: Dec 2019.

  2. Mejias, R.: An integrative model of information security awareness for assessing information systems security risk. In: Proceedings of the Annual Hawaii International Conference on System Sciences, pp. 3258–3267 (2012)

    Google Scholar 

  3. Princely, I.: Understanding information systems security policy compliance: an integration of the theory of planned behavior and the protection motivation theory. Comput. Secur. 31(1), 83–95 (2012)

    Article  Google Scholar 

  4. ISO/IEC 15408-1:2009: Informational technology—security techniques—evaluation criteria for IT security. Part 1: Introduction and General Model (2009)

    Google Scholar 

  5. ISO/IEC 15408-2:2008: Information technology—security techniques—evaluation criteria for IT security. Part 2: Security Functional Components (2008)

    Google Scholar 

  6. ISO/IEC 15408-3:2008: Informational technology—security techniques—evaluation criteria for IT security. Part 3: Security Assurance Requirement (2008)

    Google Scholar 

  7. ISO/IEC 18045:2008: Information technology—security techniques—methodology for IT security evaluation (2008)

    Google Scholar 

  8. ISO/IEC 27000:2018: Information technology—security techniques—information security management systems—overview and vocabulary (2018)

    Google Scholar 

  9. Alkaffaf, M., Muflih, M., Al-Dalahmeh, M.: An integrated model of knowledge management enablers and organizational creativity: the mediating role of knowledge management processes in social security corporation. Jordan J. Theor. Appl. Inf. Technol. 96(3), 677–700 (2018)

    Google Scholar 

  10. Lawson, S.: Examining the relationship between organizational culture and knowledge management. Doctoral dissertation, Nova Southeastern University (2003). Retrieved from Nova Southeastern University dissertation database. UMI No. 3100959. Access date: Dec 2019

    Google Scholar 

  11. Lee, H.: Choi: knowledge management enablers, process, and organizational performance: an integrative view and empirical examination. J. Manage. Inf. Syst. 20(1), 179–228 (2003)

    Article  Google Scholar 

  12. Shannak, R.O.: Measuring knowledge management performance. Eur. J. Sci. Res. 35(2), 242–253 (2009)

    Google Scholar 

  13. An Introduction to the Business Model for information Security. Printed in the United States of America. https://www.isaca.org/Knowledge-Center/Research/Documents/Introduction-to-the-Business-Model-for-Information-Security_res_Eng_0109.pdf. Access date: Dec 2019

  14. Raudeliūnienė, J., Davidavičienė, V., Jakubavičius, A.: Knowledge management process model. Entrepreneurship Sustain. Issues 5(3), 542–554 (2018). https://doi.org/10.9770/jesi.2018.5.3(10). Access date: Dec 2019

  15. Steinberg, V.E.: Theory and Practice of Multi-dimensional Teaching Technology. National Education, Moscow (2015)

    Google Scholar 

  16. Krogerus, M., Tscheppeler, R.: 50 Erfolgsmodelle. Kleiner Handbuch für strategische Entschheidungen, Kein &Aber, AG Zürich, 200 p (2008)

    Google Scholar 

  17. Dotsenko, S.I.: Theoretical foundations for development of intelligent computer support systems for managing energy saving organizations. Dissertation for doctor of sciences degree 05.13.06, Kharkiv Petro Vasylenko National Technical University of Agriculture, Kharkiv, 369 p (2017)

    Google Scholar 

  18. Shreider, Y.A., Sharov, A.A.: Systems and models, radio and communication. In: Cybernetics, 152 p (1982)

    Google Scholar 

  19. Dotsenko, S.I.: On determining the content of categories of semantic thinking. Energy Comput. Integr. Technol. Agroind. Complex 1(4), 23–27 (2016)

    Google Scholar 

  20. Dotsenko, S.I.: Modeling domain knowledge based on the central pattern of integrative brain activity. Technol. Audit Prod. Reserves 2/2(28), 33–41 (2016)

    Google Scholar 

  21. Popov, E.V.: Expert systems: solving informal tasks in a dialogue with a computer, Moscow. Science 288 p (1987)

    Google Scholar 

  22. Kharchenko, V., Gordieiev, O., Fedoseeva, A.: Profiling of software requirements for the pharmaceutical enterprise manufacturing execution system 2016. In: Applications of Computational Intelligence in Biomedical Technology, pp. 67–92. Springer, Cham (2016)

    Google Scholar 

  23. Gordieiev, O., Kharchenko, V., Vereshchak, K.: Usable security versus secure usability: an assessment of attributes interaction. In: Proceedings of International Conference ICT in Education, Research, and Industrial Applications, ICTERI 2017, pp. 727–740 (2017)

    Google Scholar 

  24. Gordieiev, O., Kharchenko V., Fusani, M.: Evolution of software quality models: green and reliability issues. In: Proceedings of International Conference ICT in Education, Research, and Industrial Applications, ICTERI 2015, pp. 432–445 (2015)

    Google Scholar 

  25. Kharchenko, V., Dotsenko, S., Illiashenko O., Kamenskyi, S.: Integrated cyber safety and security management system: industry 4.0 issue. In: Proceedings of the 10th IEEE Dependable Systems, Services and Technologies Conference, DESSERT 2019, pp. 197–201 (2019)

    Google Scholar 

  26. Dotsenko, S., Illiashenko, O., Kamenskyi, S., Kharchenko, V.: Integrated model of knowledge management for security of information technologies: standards ISO/IEC 15408 and ISO/IEC 18045. Inf. Secur. Int. J. 43(3), 305–317 (2019)

    Google Scholar 

  27. Kharchenko, V., Illiashenko, O., Brezhnev, E., Boyarchuk, A., Golovanevskiy, V.: Security informed safety assessment of industrial FPGA-based systems. In: Proceedings of the Probabilistic Safety Assessment and Management Conference, PSAM 2014 (2014)

    Google Scholar 

  28. Kharchenko, V., Illiashenko, O., Boyarchuk, A., Sklyar, V., Phillips, C.: Emerging curriculum for industry and human applications in internet of things. In: Proceedings of the 2017 IEEE 9th International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, IDAACS 2017, 8095220, pp. 918–922 (2017)

    Google Scholar 

Download references

Acknowledgements

This work was supported by the ECHO project which has received funding from the European Union’s Horizon 2020 research and innovation programme under the grant agreement no 830943.

The authors very appreciated to scientific society of consortium and in particular the staff of Department of Computer Systems, Networks and Cybersecurity of National aerospace university “Kharkiv Aviation Institute” for invaluable inspiration, hardworking and creative analysis during the preparation of this paper.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Oleg Illiashenko .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Dotsenko, S., Illiashenko, O., Budnichenko, I., Kharchenko, V. (2021). Knowledge Management Model Based Approach to Profiling of Requirements: Case for Information Technologies Security Standards. In: Tagarev, T., Atanassov, K.T., Kharchenko, V., Kacprzyk, J. (eds) Digital Transformation, Cyber Security and Resilience of Modern Societies. Studies in Big Data, vol 84. Springer, Cham. https://doi.org/10.1007/978-3-030-65722-2_16

Download citation

Publish with us

Policies and ethics