SlideShare une entreprise Scribd logo
1  sur  10
Télécharger pour lire hors ligne
Use of knowledge
Management in
Information Security
By
Dr. Mahmood Hussain Shah
Lancashire Business School
University of Central Lancashire
Knowledge Management
Is the process of
• Creating Knowledge
• Storing Knowledge
• Processing Knowledge
• Sharing Knowledge
Knowledge Management and
Information Security
• Managing information securely has become a big
challenge for the companies throughout the globe.
• Organizations must be capable enough to handle and
manage information securely and safely
• Information is one of the most important assets for the
business organisations in today’s advanced world.
• Knowledge Management plays vital role in the field of
information security.
Involvement of the users and other stakeholders in:
Management of information security relies on the involvement of the users and other
stakeholders in:
• Security analysis
• Information security infrastructure design
• And the implementation of Information Security Systems.
However, most stakeholders lack the required knowledge of information
security issues that would allow them to play an important role in knowledge
management and its uses.
Two Ongoing Research Projects in
role of Knowledge Management in
Information Security
• 1. Investigation of Knowledge Transfer Process
to Prevent Identity Theft inside the
Organisation (Units within an organization)
• 2. Investigation of Knowledge Sharing Process
to Prevent Identity Theft with external
Organisations (i.e. Competitors, Partners)
Research Methods
The qualitative research methods using three case studies for
each project are being conducted to explore the validity of
factors identified in the framework.
Data collection methods and sources
• Semi-Structured Interviews (10 to 15)
• Analysis of internal documents of the organisation (memos, survey
reports of the organisation and their website)
• Investigation of secondary sources such as news items and
electronic media.
Findings to date
• Staff working within organisations are unaware about knowledge sharing of;
 Information security risks
 Prevention practice
• There is no environment of knowledge sharing for information security .
• An educational environment is needed to enhance the knowledge of staff for
information security knowledge sharing.
• Needs develop the culture of knowledge sharing by facilitating trust
• Needs to enhance trust level among individuals and between departments.
• Develop a system for knowledge transfer
Existing Practices of Knowledge
Sharing in the Companies
 Inductions to new comers
 Emails for updating employees
 Use e-learning system for updates of available trainings
 Policy documents
 Share knowledge within departments
 Meetings of managers and staff
Existing Barriers for Sharing the
Knowledge
• Lack of focus on enhancing e information security knowledge of employees
• Very basic trainings in induction (Use of existing system, use databases and
create spreadsheets)
• Lack of trainings for information security and security departments
• Almost no knowledge sharing among individuals or departments
• No job rotation for enhancing knowledge of employees
• Sensitivity of customers knowledge going to its rivals (loss of competitive
advantage)
• Lack of trust among the organisations and need of formal agreements for
proper collaboration
• Legal and ethical barriers in sharing of information
Recommendations
Company need to;
• Develop employees’ education programmes to enhance awareness
• Develop knowledge sharing systems
• Job rotation
• Increase the trust level between individuals and departments (incentives?)
• Develop a trusting and collaborative culture
• Frameworks for internal and external knowledge sharing (industry wide and
beyond)
• Seek clarity in dealing with legal and ethical issues and embed them in training

Contenu connexe

Tendances

Best Practices for Managing E-Resources in Academic Libraries
Best Practices for Managing E-Resources in Academic LibrariesBest Practices for Managing E-Resources in Academic Libraries
Best Practices for Managing E-Resources in Academic LibrariesAwadhesh Singh Gautam
 
งานนำเสนอนวัตกรรมบทที่ 6
งานนำเสนอนวัตกรรมบทที่ 6งานนำเสนอนวัตกรรมบทที่ 6
งานนำเสนอนวัตกรรมบทที่ 6Le Yuan Siriamatatham
 
Information architecture
Information architectureInformation architecture
Information architectureDougalMcLachlan
 
Aug 2012 NACADA Tech Talk #1: Trends
Aug 2012 NACADA Tech Talk #1: TrendsAug 2012 NACADA Tech Talk #1: Trends
Aug 2012 NACADA Tech Talk #1: Trendsjjoslin
 
Florentina Petillo Social Media Training Plan Presentation_week 2
Florentina Petillo Social Media Training Plan Presentation_week 2Florentina Petillo Social Media Training Plan Presentation_week 2
Florentina Petillo Social Media Training Plan Presentation_week 2Florentina Petillo, RDCS, FASE
 
Some Thoughts on Learning Analytics and Educational Data Mining
Some Thoughts on Learning Analytics and Educational Data MiningSome Thoughts on Learning Analytics and Educational Data Mining
Some Thoughts on Learning Analytics and Educational Data MiningMark Brown
 
Recapitulating the development initiatives of a robust information security s...
Recapitulating the development initiatives of a robust information security s...Recapitulating the development initiatives of a robust information security s...
Recapitulating the development initiatives of a robust information security s...IOSR Journals
 
ICT (Information Communication and technology) in education
ICT (Information Communication and technology) in educationICT (Information Communication and technology) in education
ICT (Information Communication and technology) in educationPallaviSharma346
 
Applying wikis to managing knowledge
Applying wikis to managing knowledgeApplying wikis to managing knowledge
Applying wikis to managing knowledgeMiia Kosonen
 
Knowledge management
Knowledge managementKnowledge management
Knowledge managementAmna Warraich
 
Meeting the RDM challenge - exercise - Jisc Digital Festival 2014
Meeting the RDM challenge - exercise - Jisc Digital Festival 2014Meeting the RDM challenge - exercise - Jisc Digital Festival 2014
Meeting the RDM challenge - exercise - Jisc Digital Festival 2014Jisc
 

Tendances (16)

Elements of km
Elements of kmElements of km
Elements of km
 
Best Practices for Managing E-Resources in Academic Libraries
Best Practices for Managing E-Resources in Academic LibrariesBest Practices for Managing E-Resources in Academic Libraries
Best Practices for Managing E-Resources in Academic Libraries
 
งานนำเสนอนวัตกรรมบทที่ 6
งานนำเสนอนวัตกรรมบทที่ 6งานนำเสนอนวัตกรรมบทที่ 6
งานนำเสนอนวัตกรรมบทที่ 6
 
Information architecture
Information architectureInformation architecture
Information architecture
 
Aug 2012 NACADA Tech Talk #1: Trends
Aug 2012 NACADA Tech Talk #1: TrendsAug 2012 NACADA Tech Talk #1: Trends
Aug 2012 NACADA Tech Talk #1: Trends
 
Florentina Petillo Social Media Training Plan Presentation_week 2
Florentina Petillo Social Media Training Plan Presentation_week 2Florentina Petillo Social Media Training Plan Presentation_week 2
Florentina Petillo Social Media Training Plan Presentation_week 2
 
Some Thoughts on Learning Analytics and Educational Data Mining
Some Thoughts on Learning Analytics and Educational Data MiningSome Thoughts on Learning Analytics and Educational Data Mining
Some Thoughts on Learning Analytics and Educational Data Mining
 
Recapitulating the development initiatives of a robust information security s...
Recapitulating the development initiatives of a robust information security s...Recapitulating the development initiatives of a robust information security s...
Recapitulating the development initiatives of a robust information security s...
 
ICT (Information Communication and technology) in education
ICT (Information Communication and technology) in educationICT (Information Communication and technology) in education
ICT (Information Communication and technology) in education
 
Applying wikis to managing knowledge
Applying wikis to managing knowledgeApplying wikis to managing knowledge
Applying wikis to managing knowledge
 
Ict ppt
Ict pptIct ppt
Ict ppt
 
Ict assignment
Ict assignmentIct assignment
Ict assignment
 
Knowledge management
Knowledge managementKnowledge management
Knowledge management
 
Meeting the RDM challenge - exercise - Jisc Digital Festival 2014
Meeting the RDM challenge - exercise - Jisc Digital Festival 2014Meeting the RDM challenge - exercise - Jisc Digital Festival 2014
Meeting the RDM challenge - exercise - Jisc Digital Festival 2014
 
Santu 2
Santu 2Santu 2
Santu 2
 
Shareefsab
ShareefsabShareefsab
Shareefsab
 

En vedette (14)

10 break lunch risk
10 break lunch risk10 break lunch risk
10 break lunch risk
 
9 m 2011 results
9 m 2011 results9 m 2011 results
9 m 2011 results
 
12 callminer chris thomas
12 callminer chris thomas12 callminer chris thomas
12 callminer chris thomas
 
Reciclaje Del Papel
Reciclaje Del PapelReciclaje Del Papel
Reciclaje Del Papel
 
Datos donwlink 5_mb
Datos donwlink 5_mbDatos donwlink 5_mb
Datos donwlink 5_mb
 
2015 Training Calendar
2015 Training Calendar2015 Training Calendar
2015 Training Calendar
 
5 victoria stubbs risk
5 victoria stubbs risk5 victoria stubbs risk
5 victoria stubbs risk
 
Aisxinis epistoles
Aisxinis epistolesAisxinis epistoles
Aisxinis epistoles
 
Reciclaje Del Papel
Reciclaje Del PapelReciclaje Del Papel
Reciclaje Del Papel
 
กิจกรรมที่ 2 ประเภทของโครงงานคอมพิวเตอร์
กิจกรรมที่ 2 ประเภทของโครงงานคอมพิวเตอร์กิจกรรมที่ 2 ประเภทของโครงงานคอมพิวเตอร์
กิจกรรมที่ 2 ประเภทของโครงงานคอมพิวเตอร์
 
Električno polje 12
Električno polje 12Električno polje 12
Električno polje 12
 
Nastavna sredstva fizike elektrostatika-2012
Nastavna sredstva fizike elektrostatika-2012Nastavna sredstva fizike elektrostatika-2012
Nastavna sredstva fizike elektrostatika-2012
 
130409 culture trend
130409 culture trend130409 culture trend
130409 culture trend
 
PMI Portland Michael Nir The Agile PMO
PMI Portland Michael Nir The Agile PMOPMI Portland Michael Nir The Agile PMO
PMI Portland Michael Nir The Agile PMO
 

Similaire à 9 mahmood shah risk 4 3

Lecture 2- Knowledge Managment .pptx
Lecture 2- Knowledge Managment .pptxLecture 2- Knowledge Managment .pptx
Lecture 2- Knowledge Managment .pptxRoshanKC10
 
Knowledge Transfer and sharing information Technology
Knowledge Transfer and sharing information TechnologyKnowledge Transfer and sharing information Technology
Knowledge Transfer and sharing information Technologyshibanibose2
 
knowledge management
knowledge managementknowledge management
knowledge managementhairimidah
 
Exeter university ig manager presentation [1]
Exeter university ig manager presentation [1]Exeter university ig manager presentation [1]
Exeter university ig manager presentation [1]Martin Lawrence
 
Knowledge Management for Technology Transfer Organizations: A Key to Sustaina...
Knowledge Management for Technology Transfer Organizations: A Key to Sustaina...Knowledge Management for Technology Transfer Organizations: A Key to Sustaina...
Knowledge Management for Technology Transfer Organizations: A Key to Sustaina...Professor Jon Cavicchi, UNH School of Law
 
Knowledge Management Overview
Knowledge Management OverviewKnowledge Management Overview
Knowledge Management OverviewRahul Sudame
 
Lessons from the front line: Next generation knowledge management using socia...
Lessons from the front line: Next generation knowledge management using socia...Lessons from the front line: Next generation knowledge management using socia...
Lessons from the front line: Next generation knowledge management using socia...Velrada
 
Knowlege Management introduction Chapter 1
Knowlege Management introduction Chapter 1Knowlege Management introduction Chapter 1
Knowlege Management introduction Chapter 1Nainaawan1
 
project managmnet
project managmnetproject managmnet
project managmnetdarshan942
 
Security Architecture
Security ArchitectureSecurity Architecture
Security ArchitecturePriyank Hada
 
Information security fasit-cait-20150129_v04
Information security fasit-cait-20150129_v04Information security fasit-cait-20150129_v04
Information security fasit-cait-20150129_v04kevin_donovan
 
Introduction to Information Management.pptx
Introduction to Information Management.pptxIntroduction to Information Management.pptx
Introduction to Information Management.pptxRodolfoIII2
 
Uel information strategy development implementation v2-ac
Uel information strategy development  implementation v2-acUel information strategy development  implementation v2-ac
Uel information strategy development implementation v2-acGurdish Sandhu
 
Researching Data Privacy in eLearning
Researching Data Privacy in eLearningResearching Data Privacy in eLearning
Researching Data Privacy in eLearningMalinka Ivanova
 
Researching Data Privacy in eLearning
Researching Data Privacy in eLearningResearching Data Privacy in eLearning
Researching Data Privacy in eLearningGabriela Grosseck
 
Strategic Knowledge Management
Strategic Knowledge ManagementStrategic Knowledge Management
Strategic Knowledge ManagementApoorva Rashmi
 

Similaire à 9 mahmood shah risk 4 3 (20)

Information management
Information managementInformation management
Information management
 
MIS_Ch_5(1).pptx
MIS_Ch_5(1).pptxMIS_Ch_5(1).pptx
MIS_Ch_5(1).pptx
 
Lecture 2- Knowledge Managment .pptx
Lecture 2- Knowledge Managment .pptxLecture 2- Knowledge Managment .pptx
Lecture 2- Knowledge Managment .pptx
 
Knowledge Transfer and sharing information Technology
Knowledge Transfer and sharing information TechnologyKnowledge Transfer and sharing information Technology
Knowledge Transfer and sharing information Technology
 
knowledge management
knowledge managementknowledge management
knowledge management
 
Exeter university ig manager presentation [1]
Exeter university ig manager presentation [1]Exeter university ig manager presentation [1]
Exeter university ig manager presentation [1]
 
Knowledge Management for Technology Transfer Organizations: A Key to Sustaina...
Knowledge Management for Technology Transfer Organizations: A Key to Sustaina...Knowledge Management for Technology Transfer Organizations: A Key to Sustaina...
Knowledge Management for Technology Transfer Organizations: A Key to Sustaina...
 
Knowledge Management Overview
Knowledge Management OverviewKnowledge Management Overview
Knowledge Management Overview
 
Lessons from the front line: Next generation knowledge management using socia...
Lessons from the front line: Next generation knowledge management using socia...Lessons from the front line: Next generation knowledge management using socia...
Lessons from the front line: Next generation knowledge management using socia...
 
Knowlege Management introduction Chapter 1
Knowlege Management introduction Chapter 1Knowlege Management introduction Chapter 1
Knowlege Management introduction Chapter 1
 
project managmnet
project managmnetproject managmnet
project managmnet
 
Privacy Engineering in the Wild
Privacy Engineering in the WildPrivacy Engineering in the Wild
Privacy Engineering in the Wild
 
Security Architecture
Security ArchitectureSecurity Architecture
Security Architecture
 
Information security fasit-cait-20150129_v04
Information security fasit-cait-20150129_v04Information security fasit-cait-20150129_v04
Information security fasit-cait-20150129_v04
 
Introduction to Information Management.pptx
Introduction to Information Management.pptxIntroduction to Information Management.pptx
Introduction to Information Management.pptx
 
Chapter 11 managing knowledge MIS
Chapter 11 managing knowledge MISChapter 11 managing knowledge MIS
Chapter 11 managing knowledge MIS
 
Uel information strategy development implementation v2-ac
Uel information strategy development  implementation v2-acUel information strategy development  implementation v2-ac
Uel information strategy development implementation v2-ac
 
Researching Data Privacy in eLearning
Researching Data Privacy in eLearningResearching Data Privacy in eLearning
Researching Data Privacy in eLearning
 
Researching Data Privacy in eLearning
Researching Data Privacy in eLearningResearching Data Privacy in eLearning
Researching Data Privacy in eLearning
 
Strategic Knowledge Management
Strategic Knowledge ManagementStrategic Knowledge Management
Strategic Knowledge Management
 

Plus de CCR-interactive

8 rajib chakravorty risk
8 rajib chakravorty risk8 rajib chakravorty risk
8 rajib chakravorty riskCCR-interactive
 
4 break lunch risk copy 2
4 break lunch risk copy 24 break lunch risk copy 2
4 break lunch risk copy 2CCR-interactive
 
2 andrew barnett risk (4 3)
2 andrew barnett risk (4 3)2 andrew barnett risk (4 3)
2 andrew barnett risk (4 3)CCR-interactive
 
1 chair sean hegarty - risk
1 chair   sean hegarty - risk1 chair   sean hegarty - risk
1 chair sean hegarty - riskCCR-interactive
 
19 chair martin leyshon - legal
19 chair   martin leyshon - legal19 chair   martin leyshon - legal
19 chair martin leyshon - legalCCR-interactive
 
18 stuart hopewell legal
18 stuart hopewell legal18 stuart hopewell legal
18 stuart hopewell legalCCR-interactive
 
17 alessia frisina legal
17 alessia frisina legal17 alessia frisina legal
17 alessia frisina legalCCR-interactive
 
16 break lunch legal issues & enforcement
16 break lunch legal issues & enforcement16 break lunch legal issues & enforcement
16 break lunch legal issues & enforcementCCR-interactive
 
15 moon beever pritti amin legal
15 moon beever pritti amin legal15 moon beever pritti amin legal
15 moon beever pritti amin legalCCR-interactive
 
13 scott and co william cameron legal
13 scott and co william cameron legal13 scott and co william cameron legal
13 scott and co william cameron legalCCR-interactive
 
11 break lunch legal issues & enforcement copy
11 break lunch legal issues & enforcement copy11 break lunch legal issues & enforcement copy
11 break lunch legal issues & enforcement copyCCR-interactive
 
9 equita michael brient legal
9 equita michael brient legal9 equita michael brient legal
9 equita michael brient legalCCR-interactive
 
8 mark watson gandy legal
8 mark watson gandy legal8 mark watson gandy legal
8 mark watson gandy legalCCR-interactive
 

Plus de CCR-interactive (20)

12 mark button risk
12 mark button risk12 mark button risk
12 mark button risk
 
8 rajib chakravorty risk
8 rajib chakravorty risk8 rajib chakravorty risk
8 rajib chakravorty risk
 
7 break lunch risk
7 break lunch risk7 break lunch risk
7 break lunch risk
 
6 panel session
6 panel session6 panel session
6 panel session
 
4 break lunch risk copy 2
4 break lunch risk copy 24 break lunch risk copy 2
4 break lunch risk copy 2
 
3 sedjwick joseph risk
3 sedjwick joseph risk3 sedjwick joseph risk
3 sedjwick joseph risk
 
2 andrew barnett risk (4 3)
2 andrew barnett risk (4 3)2 andrew barnett risk (4 3)
2 andrew barnett risk (4 3)
 
1 chair sean hegarty - risk
1 chair   sean hegarty - risk1 chair   sean hegarty - risk
1 chair sean hegarty - risk
 
19 chair martin leyshon - legal
19 chair   martin leyshon - legal19 chair   martin leyshon - legal
19 chair martin leyshon - legal
 
18 stuart hopewell legal
18 stuart hopewell legal18 stuart hopewell legal
18 stuart hopewell legal
 
17 alessia frisina legal
17 alessia frisina legal17 alessia frisina legal
17 alessia frisina legal
 
16 break lunch legal issues & enforcement
16 break lunch legal issues & enforcement16 break lunch legal issues & enforcement
16 break lunch legal issues & enforcement
 
15 moon beever pritti amin legal
15 moon beever pritti amin legal15 moon beever pritti amin legal
15 moon beever pritti amin legal
 
14 sue chapple legal
14 sue chapple legal14 sue chapple legal
14 sue chapple legal
 
13 scott and co william cameron legal
13 scott and co william cameron legal13 scott and co william cameron legal
13 scott and co william cameron legal
 
12 brian lewis legal
12 brian lewis legal12 brian lewis legal
12 brian lewis legal
 
11 break lunch legal issues & enforcement copy
11 break lunch legal issues & enforcement copy11 break lunch legal issues & enforcement copy
11 break lunch legal issues & enforcement copy
 
10 panel session
10 panel session10 panel session
10 panel session
 
9 equita michael brient legal
9 equita michael brient legal9 equita michael brient legal
9 equita michael brient legal
 
8 mark watson gandy legal
8 mark watson gandy legal8 mark watson gandy legal
8 mark watson gandy legal
 

Dernier

Trauma Training Service for First Responders
Trauma Training Service for First RespondersTrauma Training Service for First Responders
Trauma Training Service for First RespondersBPOQe
 
Personal Brand Exploration Presentation Eric Bonilla
Personal Brand Exploration Presentation Eric BonillaPersonal Brand Exploration Presentation Eric Bonilla
Personal Brand Exploration Presentation Eric BonillaEricBonilla13
 
Upgrade Your Banking Experience with Advanced Core Banking Applications
Upgrade Your Banking Experience with Advanced Core Banking ApplicationsUpgrade Your Banking Experience with Advanced Core Banking Applications
Upgrade Your Banking Experience with Advanced Core Banking ApplicationsIntellect Design Arena Ltd
 
Cracking the ‘Business Process Outsourcing’ Code Main.pptx
Cracking the ‘Business Process Outsourcing’ Code Main.pptxCracking the ‘Business Process Outsourcing’ Code Main.pptx
Cracking the ‘Business Process Outsourcing’ Code Main.pptxWorkforce Group
 
Data skills for Agile Teams- Killing story points
Data skills for Agile Teams- Killing story pointsData skills for Agile Teams- Killing story points
Data skills for Agile Teams- Killing story pointsyasinnathani
 
Borderless Access - Global Panel book-unlock 2024
Borderless Access - Global Panel book-unlock 2024Borderless Access - Global Panel book-unlock 2024
Borderless Access - Global Panel book-unlock 2024Borderless Access
 
Live-Streaming in the Music Industry Webinar
Live-Streaming in the Music Industry WebinarLive-Streaming in the Music Industry Webinar
Live-Streaming in the Music Industry WebinarNathanielSchmuck
 
Talent Management research intelligence_13 paradigm shifts_20 March 2024.pdf
Talent Management research intelligence_13 paradigm shifts_20 March 2024.pdfTalent Management research intelligence_13 paradigm shifts_20 March 2024.pdf
Talent Management research intelligence_13 paradigm shifts_20 March 2024.pdfCharles Cotter, PhD
 
HELENE HECKROTTE'S PROFESSIONAL PORTFOLIO.pptx
HELENE HECKROTTE'S PROFESSIONAL PORTFOLIO.pptxHELENE HECKROTTE'S PROFESSIONAL PORTFOLIO.pptx
HELENE HECKROTTE'S PROFESSIONAL PORTFOLIO.pptxHelene Heckrotte
 
Building Your Personal Brand on LinkedIn - Expert Planet- 2024
 Building Your Personal Brand on LinkedIn - Expert Planet-  2024 Building Your Personal Brand on LinkedIn - Expert Planet-  2024
Building Your Personal Brand on LinkedIn - Expert Planet- 2024Stephan Koning
 
MC Heights construction company in Jhang
MC Heights construction company in JhangMC Heights construction company in Jhang
MC Heights construction company in Jhangmcgroupjeya
 
To Create Your Own Wig Online To Create Your Own Wig Online
To Create Your Own Wig Online  To Create Your Own Wig OnlineTo Create Your Own Wig Online  To Create Your Own Wig Online
To Create Your Own Wig Online To Create Your Own Wig Onlinelng ths
 
Borderless Access - Global B2B Panel book-unlock 2024
Borderless Access - Global B2B Panel book-unlock 2024Borderless Access - Global B2B Panel book-unlock 2024
Borderless Access - Global B2B Panel book-unlock 2024Borderless Access
 
Intellectual Property Licensing Examples
Intellectual Property Licensing ExamplesIntellectual Property Licensing Examples
Intellectual Property Licensing Examplesamberjiles31
 
ISONIKE Ltd Accreditation for the Conformity Assessment and Certification of ...
ISONIKE Ltd Accreditation for the Conformity Assessment and Certification of ...ISONIKE Ltd Accreditation for the Conformity Assessment and Certification of ...
ISONIKE Ltd Accreditation for the Conformity Assessment and Certification of ...ISONIKELtd
 
Q2 2024 APCO Geopolitical Radar - The Global Operating Environment for Business
Q2 2024 APCO Geopolitical Radar - The Global Operating Environment for BusinessQ2 2024 APCO Geopolitical Radar - The Global Operating Environment for Business
Q2 2024 APCO Geopolitical Radar - The Global Operating Environment for BusinessAPCO
 
Borderless Access - Global Panel book-unlock 2024
Borderless Access - Global Panel book-unlock 2024Borderless Access - Global Panel book-unlock 2024
Borderless Access - Global Panel book-unlock 2024Borderless Access
 
Project Brief & Information Architecture Report
Project Brief & Information Architecture ReportProject Brief & Information Architecture Report
Project Brief & Information Architecture Reportamberjiles31
 
Lecture_6.pptx English speaking easyb to
Lecture_6.pptx English speaking easyb toLecture_6.pptx English speaking easyb to
Lecture_6.pptx English speaking easyb toumarfarooquejamali32
 

Dernier (20)

Trauma Training Service for First Responders
Trauma Training Service for First RespondersTrauma Training Service for First Responders
Trauma Training Service for First Responders
 
Personal Brand Exploration Presentation Eric Bonilla
Personal Brand Exploration Presentation Eric BonillaPersonal Brand Exploration Presentation Eric Bonilla
Personal Brand Exploration Presentation Eric Bonilla
 
Upgrade Your Banking Experience with Advanced Core Banking Applications
Upgrade Your Banking Experience with Advanced Core Banking ApplicationsUpgrade Your Banking Experience with Advanced Core Banking Applications
Upgrade Your Banking Experience with Advanced Core Banking Applications
 
Cracking the ‘Business Process Outsourcing’ Code Main.pptx
Cracking the ‘Business Process Outsourcing’ Code Main.pptxCracking the ‘Business Process Outsourcing’ Code Main.pptx
Cracking the ‘Business Process Outsourcing’ Code Main.pptx
 
Data skills for Agile Teams- Killing story points
Data skills for Agile Teams- Killing story pointsData skills for Agile Teams- Killing story points
Data skills for Agile Teams- Killing story points
 
Borderless Access - Global Panel book-unlock 2024
Borderless Access - Global Panel book-unlock 2024Borderless Access - Global Panel book-unlock 2024
Borderless Access - Global Panel book-unlock 2024
 
WAM Corporate Presentation Mar 25 2024.pdf
WAM Corporate Presentation Mar 25 2024.pdfWAM Corporate Presentation Mar 25 2024.pdf
WAM Corporate Presentation Mar 25 2024.pdf
 
Live-Streaming in the Music Industry Webinar
Live-Streaming in the Music Industry WebinarLive-Streaming in the Music Industry Webinar
Live-Streaming in the Music Industry Webinar
 
Talent Management research intelligence_13 paradigm shifts_20 March 2024.pdf
Talent Management research intelligence_13 paradigm shifts_20 March 2024.pdfTalent Management research intelligence_13 paradigm shifts_20 March 2024.pdf
Talent Management research intelligence_13 paradigm shifts_20 March 2024.pdf
 
HELENE HECKROTTE'S PROFESSIONAL PORTFOLIO.pptx
HELENE HECKROTTE'S PROFESSIONAL PORTFOLIO.pptxHELENE HECKROTTE'S PROFESSIONAL PORTFOLIO.pptx
HELENE HECKROTTE'S PROFESSIONAL PORTFOLIO.pptx
 
Building Your Personal Brand on LinkedIn - Expert Planet- 2024
 Building Your Personal Brand on LinkedIn - Expert Planet-  2024 Building Your Personal Brand on LinkedIn - Expert Planet-  2024
Building Your Personal Brand on LinkedIn - Expert Planet- 2024
 
MC Heights construction company in Jhang
MC Heights construction company in JhangMC Heights construction company in Jhang
MC Heights construction company in Jhang
 
To Create Your Own Wig Online To Create Your Own Wig Online
To Create Your Own Wig Online  To Create Your Own Wig OnlineTo Create Your Own Wig Online  To Create Your Own Wig Online
To Create Your Own Wig Online To Create Your Own Wig Online
 
Borderless Access - Global B2B Panel book-unlock 2024
Borderless Access - Global B2B Panel book-unlock 2024Borderless Access - Global B2B Panel book-unlock 2024
Borderless Access - Global B2B Panel book-unlock 2024
 
Intellectual Property Licensing Examples
Intellectual Property Licensing ExamplesIntellectual Property Licensing Examples
Intellectual Property Licensing Examples
 
ISONIKE Ltd Accreditation for the Conformity Assessment and Certification of ...
ISONIKE Ltd Accreditation for the Conformity Assessment and Certification of ...ISONIKE Ltd Accreditation for the Conformity Assessment and Certification of ...
ISONIKE Ltd Accreditation for the Conformity Assessment and Certification of ...
 
Q2 2024 APCO Geopolitical Radar - The Global Operating Environment for Business
Q2 2024 APCO Geopolitical Radar - The Global Operating Environment for BusinessQ2 2024 APCO Geopolitical Radar - The Global Operating Environment for Business
Q2 2024 APCO Geopolitical Radar - The Global Operating Environment for Business
 
Borderless Access - Global Panel book-unlock 2024
Borderless Access - Global Panel book-unlock 2024Borderless Access - Global Panel book-unlock 2024
Borderless Access - Global Panel book-unlock 2024
 
Project Brief & Information Architecture Report
Project Brief & Information Architecture ReportProject Brief & Information Architecture Report
Project Brief & Information Architecture Report
 
Lecture_6.pptx English speaking easyb to
Lecture_6.pptx English speaking easyb toLecture_6.pptx English speaking easyb to
Lecture_6.pptx English speaking easyb to
 

9 mahmood shah risk 4 3

  • 1. Use of knowledge Management in Information Security By Dr. Mahmood Hussain Shah Lancashire Business School University of Central Lancashire
  • 2. Knowledge Management Is the process of • Creating Knowledge • Storing Knowledge • Processing Knowledge • Sharing Knowledge
  • 3. Knowledge Management and Information Security • Managing information securely has become a big challenge for the companies throughout the globe. • Organizations must be capable enough to handle and manage information securely and safely • Information is one of the most important assets for the business organisations in today’s advanced world. • Knowledge Management plays vital role in the field of information security.
  • 4. Involvement of the users and other stakeholders in: Management of information security relies on the involvement of the users and other stakeholders in: • Security analysis • Information security infrastructure design • And the implementation of Information Security Systems. However, most stakeholders lack the required knowledge of information security issues that would allow them to play an important role in knowledge management and its uses.
  • 5. Two Ongoing Research Projects in role of Knowledge Management in Information Security • 1. Investigation of Knowledge Transfer Process to Prevent Identity Theft inside the Organisation (Units within an organization) • 2. Investigation of Knowledge Sharing Process to Prevent Identity Theft with external Organisations (i.e. Competitors, Partners)
  • 6. Research Methods The qualitative research methods using three case studies for each project are being conducted to explore the validity of factors identified in the framework. Data collection methods and sources • Semi-Structured Interviews (10 to 15) • Analysis of internal documents of the organisation (memos, survey reports of the organisation and their website) • Investigation of secondary sources such as news items and electronic media.
  • 7. Findings to date • Staff working within organisations are unaware about knowledge sharing of;  Information security risks  Prevention practice • There is no environment of knowledge sharing for information security . • An educational environment is needed to enhance the knowledge of staff for information security knowledge sharing. • Needs develop the culture of knowledge sharing by facilitating trust • Needs to enhance trust level among individuals and between departments. • Develop a system for knowledge transfer
  • 8. Existing Practices of Knowledge Sharing in the Companies  Inductions to new comers  Emails for updating employees  Use e-learning system for updates of available trainings  Policy documents  Share knowledge within departments  Meetings of managers and staff
  • 9. Existing Barriers for Sharing the Knowledge • Lack of focus on enhancing e information security knowledge of employees • Very basic trainings in induction (Use of existing system, use databases and create spreadsheets) • Lack of trainings for information security and security departments • Almost no knowledge sharing among individuals or departments • No job rotation for enhancing knowledge of employees • Sensitivity of customers knowledge going to its rivals (loss of competitive advantage) • Lack of trust among the organisations and need of formal agreements for proper collaboration • Legal and ethical barriers in sharing of information
  • 10. Recommendations Company need to; • Develop employees’ education programmes to enhance awareness • Develop knowledge sharing systems • Job rotation • Increase the trust level between individuals and departments (incentives?) • Develop a trusting and collaborative culture • Frameworks for internal and external knowledge sharing (industry wide and beyond) • Seek clarity in dealing with legal and ethical issues and embed them in training