Preventing Social Engineering and Espionage in Collaborative Knowledge Management Systems (KMSs)

نویسندگان

  • Shawn Oluwafemi Ogunseye
  • Olusegun Folorunso
  • Jeff Zhang
چکیده

Insider attack and espionage on computer-based information is a major problem for business organizations and governments. Knowledge Management Systems (KMSs) are not exempt from this threat. Prior research presented the Congenial Access Control Model (CAC), a relationship-based access control model, as a better access control method for KMS because it reduces the adverse effect of stringent security measures on the usability of KMSs. However, the CAC model, like other models, e.g., Role Based Access Control (RBAC), Time-Based Access Control (TBAC), and History Based Access Control (HBAC), does not provide adequate protection against privilege abuse by authorized users that can lead to industrial espionage. In this paper, the authors provide an Espionage Prevention Model (EP) that uses Semantic web-based annotations on knowledge assets to store relevant information and compares it to the FriendOf-A-Friend (FOAF) data of the potential recipient of the resource. It can serve as an additional layer to previous access control models, preferably the Congenial Access Control (CAC) model. DOI: 10.4018/978-1-4666-2053-7.ch008

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Conceptual Framework & Architecture for Agent-Oriented Knowledge Management Supported E-Learning Systems

In this era of information, traditional practices, technologies, skills, and knowledge are becoming obsolete at a much faster pace than ever before. This makes lifelong learning a necessity for everyone. An e-learning system is a promising solution to the demand for a flexible means of delivering knowledge to educate a large number of people over a vast area. Knowledge management systems (KMSs)...

متن کامل

Conceptual Framework and Architecture for Agent-Oriented Knowledge Management Supported E-Learning Systems

abstract In this era of information, traditional practices, technologies, skills, and knowledge are becoming obsolete at a much faster pace than ever before. This makes lifelong learning a necessity for everyone. An e-learning system is a promising solution to the demand for a flexible means of delivering knowledge to educate a large number of people over a vast area. Knowledge management syste...

متن کامل

knowledge production through collaborative management research

Recently, literature around the theme of collaborative management research has grown considerably. According to the definition of collaborative management research, two components are connected to each other in this context; managers of organizations and academic researchers. In literature, many authors claim that the relationship between these two components could lead to significant advantage...

متن کامل

The Role of Organisational Culture on Knowledge Sharing by Using Knowledge Management Systems in MNCs

Knowledge is important in organisations and knowledge cannot be effective unless they are shared. Therefore, Knowledge Management Systems (KMSs) are used in organisations to share, utilise, and integrate knowledge. Organisational culture (OC) is an important factor and needs to be considered in Knowledge Sharing (KS) because, although it can foster sharing and collaboration, it must be handled ...

متن کامل

The Role of Malware in Reported Cyber Espionage: A Review of the Impact and Mechanism

The recent emergence of the targeted use of malware in cyber espionage versus industry requires a systematic review for better understanding of its impact and mechanism. This paper proposes a basic taxonomy to document major cyber espionage incidents, describing and comparing their impacts (geographic or political targets, origins and motivations) and their mechanisms (dropper, propagation, typ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IJEA

دوره 3  شماره 

صفحات  -

تاریخ انتشار 2011