Introduction to KM and Security: Protecting Intellectual Property Minitrack
نویسندگان
چکیده
We have heard and read many times in the last several decades that the most important asset of an organization is the knowledge of its employees. To allow an easy access to knowledge, organizations are implementing Knowledge Repositories. While this type of automation made it easy to store and distribute knowledge, it also made it easy to move knowledge outside the boundaries of a company. Organizations put in place many technology-based security measures (firewalls, filtering systems), yet they shouldn’t overlook the human-side of security practices. An organization can have the best security technology in place, yet a careless employee talking or emailing or posting on Facebook about the ‘new development’ at the company bypasses all this security technology with ease.
منابع مشابه
Introduction to Confidentiality, Integrity, and Availability of Knowledge and Data Minitrack
During the five years of existence of this minitrack, we have published fourteen papers that focus on the intersection of knowledge management and organizational or individual security. Ilvonen, Jusilla, Kärkkäinen, and Paivarint (2015), Ilvonen, Alnne, Helander, and Vayrunen (2016), and Sarigianni, Thallmann, and Manhart (2016) focus on how to protect shared knowledge either within the organiz...
متن کاملبررسی ایجاد بستر مناسب حمایت از طب سنتی در نظام حقوق مالکیت فکری
In recent decades, the protection of traditional medicine under the intellectual property system has been the subject of many efforts that was made by international community and especially less developed countries which are rich in this field. Since this knowledge has the unique characteristics and other current legal systems of intellectual property can not protect all aspects of it, the worl...
متن کاملمدیریت دیجیتالی حقوق مالکیت ادبی و هنری
With the emergence and development of ICT especially the Internet, intellectual property law have been facing new challenges. Electronic tools and other new ICTs have provided new and unique opportunities for humanity to produce and duplicate works; however, they have also increased the potential of the breach of authors' rights which is not comparable to the tools used in the few past decades....
متن کاملSolving Today's Design Security Concerns
www.xilinx.com 1 © 2010 Xilinx, Inc. XILINX, the Xilinx logo, Virtex, Spartan, ISE, and other designated brands included herein are trademarks of Xilinx in the United States and other countries. All other trademarks are the property of their respective owners. While design security is often thought of in terms of protecting intellectual property (IP), the potential losses extend beyond just the...
متن کاملTRIPs-Plus Treaties and Strengthening Protection of Pharmaceutical Inventions
After concluding TRIPs agreement, the sphere of negotiation in respect of protecting new kinds of intellectual property rights especially pharmaceutical inventions transferred to bilateral and regional arrangements. TRIPs agreement has some flexibility to attract all countries. Industrialized countries believed that multilateral agreements protections based especially in regard of pharmaceutica...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2013