Abstract
Security is an important topic, but is it important for Knowledge Management (KM)? To date, little mainstream KM research is coming through with a security focus. This paper asks why, and proposes that security be integrated into KM success models. The Jennex and Olfman (International Journal of Knowledge Management 2(3):51–68, 2006) KM success model is used to illustrate how security, specifically risk management, and the National Security Telecommunications and Information System Security Committee (NSTISSC) security model can be applied to KM management support and governance and KM Strategy. Finally, two case studies are provided that illustrate the application of risk management through governance to KM.
Article PDF
Similar content being viewed by others
References
Amidon, D. M., & Macnamara, D. (2003). The 7 C’s of knowledge leadership: Innovating our future. In C. W. Holsapple (Ed.) Handbook on knowledge management, 1: Knowledge matters (pp. 539–551). Berlin: Springer-Verlag.
Becerra-Fernandez, I., & Sabherwal, R. (2001). Organizational knowledge management: A contingency perspective. Journal of Management Information Systems, 18(1), 23–55.
Chase, R. L. (2004). Asian most admired knowledge enterprises—Executive summary. Bedford, UK: Teleos—The KNOW Network.
Churchman, C. W. (1979). The systems approach (revised and updated). New York: Dell Publishing.
Colarik, A. M. (2006). Cyber terrorism: Political and economic implications. Hershey, PA, USA: Idea Group Publishing.
Davenport, D. I., & Holsapple, C. W. (2006). Social capital knowledge. In D. G. Schwartz (Ed.) Encyclopedia of knowledge management (pp. 809–817). Hershey, PA: Idea Group Reference.
Davenport, T. H., & Prusak, L. (1998). Working knowledge. Boston, MA: Harvard Business School Press.
DeLone, W. H., & McLean, E. R. (1992). Information systems success: The quest for the dependent variable. Information Systems Research, 3, 60–95.
DeLone, W. H., & McLean, E. R. (2003). The DeLone and McLean Model of information systems success: A ten-year update. Journal of Management Information Systems, 19(4), 9–30.
Eisenhardt, K. M. (1989). Building theories from case study research. The Academy of Management Review, 14(4), 532–550.
Gold, A. H., Malhotra, A., & Segars, A. H. (2001). Knowledge management: An organizational capabilities perspective. Journal of Management Information Systems, 18(1), 185–214.
Gordon, L. A., Loeb, M. P., Lucyshyn, W., & Richardson, R. (2006). CSI/FBI computer crime and security survey. Computer Security Institute, retrieved on June 1, 2007 from http://i.cmpnet.com/gocsi/db_area/pdfs/fbi/FBI2006.pdf.
Grimes, J. G. (2007). Harnessing information for military operations, intelligence and business. Military Information Technology, 11(1), 21–26.
Hansen, M. T., Nohria, N., & Tierney, T. (1999). What’s your strategy for managing knowledge. Harvard Business Review, 77(2), 106–116.
Holsapple, C. W., & Joshi, K. D. (2002a). Knowledge management: A threefold framework. The Information Society, 18, 47–64.
Holsapple, C. W., & Joshi, K. D. (2002b). Knowledge manipulation activities: Results of a Delphi Study. Information & Management, 39, 477–490.
Jennex, M. E. (2005a). Knowledge management systems. International Journal of Knowledge Management, 1(2), i–iv.
Jennex, M. E. (2005b). What is knowledge management. International Journal of Knowledge Management, 1(4), i–iv.
Jennex, M. E. (2006). Why we can’t return to the moon: The need for knowledge management. International Journal of Knowledge Management, 2(1), i–iv.
Jennex, M. E. (2007). Knowledge management and security: A call for research. International Journal of Knowledge Management, 3(1), i–iv.
Jennex, M. E., & Addo, T. B. A. (2005). Knowledge management strategy issues. Proceedings of the 2005 Information Resource Management Resource Conference.
Jennex, M. E., & Olfman, L. (2001). Development recommendations for knowledge management/organizational memory systems. In M. K. Sein, B. E. Munkvold, T. U. Orvik, W. Wojtkowski, W. G. Wojtkowski, S. Wrycza, & J. Zupancic (Eds.) Contemporary trends in IS development (pp. 209–222). Norwell, MA: Kluwer.
Jennex, M. E., & Olfman, L. (2005). Assessing knowledge management success. International Journal of Knowledge Management, 1(2), 33–49.
Jennex, M. E., & Olfman, L. (2006). A model of knowledge management success. International Journal of Knowledge Management, 2(3), 51–68.
Jennex, M. E., Smolnik, S., & Croasdell, D. (2007). Knowledge management success. International Journal of Knowledge Management, 3, (2), i–vi.
Lincoln, Y. S., & Guba, E. G. (1985). Naturalistic inquiry. Beverly Hills, Calif.: Sage Publications.
Lindsey, K. (2002). Measuring knowledge management effectiveness: A task-contingent organizational capabilities perspective (pp. 2085–2090). Eighth Americas Conference on Information Systems.
Maule, R. W. (2006). Military knowledge management. In D. G. Schwartz (Ed.) Encyclopedia of Knowledge Management (pp. 627–634). Hershey, PA: Idea Group Reference.
Nissen, M., & Jennex, M. E. (2005). Knowledge as a multidimensional concept: A call for action. International Journal of Knowledge Management, 1(3), i–v.
Nonaka, I. (1991). The knowledge-creating company. Harvard Business Review, November–December, 96–104.
Nonaka, I., & Takeuchi, H. (1995). The knowledge-creating company—How Japanese companies create the dynamics of innovation. Oxford: Oxford University Press.
NSTISSC (1994). National Training Standard For Information Systems Security (INFOSEC) Professionals, NSTISSI No. 4011. National Security Telecommunications and Information Systems Security Committee. Retrieved from http://niatec.info/pdf/4011.pdf on March 1, 2006.
Oxbrow, N. (2003). Second CKO summit for the public sector. London: TFPL.
Oxbrow, N. (2004). ‘Sticky’ knowledge strategies CKO summit 2004. London: TFPL.
Polanyi, M. (1967). The tacit dimension. London: Routledge.
Probst, G., Raub, S., & Romhardt, K. (2000). Managing knowledge: Building blocks for success. Chichester: Wiley.
Schoenberger, E. (1991). The corporate interview as a research method in economic geography. Professional Geographer, 43(2), 180–189.
Sherif, K., & Sherif, S. A. (2006). Think social capital before you think knowledge transfer. International Journal of Knowledge Management, 2(3), 21–32.
Smolnik, S., Kremer, S., & Kolbe, L. (2005). Continuum of context explication: Knowledge discovery through process-oriented portals. International Journal of Knowledge Management, 1(1), 27–46.
Standards Australia (2000). AS/NZS ISO 9000:2000 Quality management systems—Fundamentals and vocabulary (3rd ed.). Sydney: Standards Australia, Standards New Zealand & International Organization for Standardization.
Standards Australia (2001). HB 275–2001 Knowledge management: A framework for succeeding in the knowledge era. Sydney: Standards Australia International Limited.
Standards Australia (2004). AS/NZS 4360:2004 Risk management (3rd ed.). Sydney: Standards Australia & Standards New Zealand.
Upadhyaya, S., Rao, H. R., & Padmanabhan, G. (2006). Secure knowledge management. In D. G. Schwartz (Ed.) Encyclopedia of knowledge management (pp. 795–801). Hershey, PA: Idea Group Reference.
Wah, C. Y., Menkhoff, T., Loh, B., & Evers, H. D. (2007). Social capital and knowledge sharing in knowledge-based organizations: An empirical study. International Journal of Knowledge Management, 3(1), 29–48.
Walsh, J. P., & Ungson, G. R. (1991). Organizational memory. Academy of Management Review, 16(1), 57–91.
Wilson, R. L., Rosen, P. A., & Al-Ahmadi, M. S. (2006). Secure knowledge discovery in databases. In D. G. Schwartz (Ed.) Encyclopedia of knowledge management (pp. 787–794). Hershey, PA: Idea Group Reference.
Yin, R. K. (1994). Case study research: Design and methods (2nd ed.). Newbury Park, CA: Sage Publications.
Zyngier, S. (2006). Knowledge management governance. In D. G. Schwartz (Ed.) Encyclopedia of knowledge management (pp. 373–380). Hershey, PA: Idea Group Reference.
Zyngier, S., & Burstein, F. (2004). Knowledge management strategies: Leaders and leadership. In H. Linger, et al. (Ed.)‘Constructing the infrastructure for the knowledge economy; methods and tools, theory and structure’ Proceedings of the 12th. International Conference on Information Systems and Development (ISD'03) (pp. 405–416). Melbourne: Kluwer Academic.
Zyngier, S., Burstein, F., & McKay, J. (2006). The Role of knowledge management governance in the implementation of strategy. 39th Hawaii International Conference on System Sciences, HICSS, IEEE Computer Society.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Jennex, M.E., Zyngier, S. Security as a contributor to knowledge management success. Inf Syst Front 9, 493–504 (2007). https://doi.org/10.1007/s10796-007-9053-4
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10796-007-9053-4