IDEAS home Printed from https://ideas.repec.org/a/igg/jkm000/v10y2014i2p1-12.html
   My bibliography  Save this article

Integrating IS Security with Knowledge Management: Are We Doing Enough?

Author

Listed:
  • Murray Jennex

    (San Diego State University, San Diego, CA, USA)

  • Alexandra Durcikova

    (University of Oklahoma, Norman, OK, USA)

Abstract

Knowledge management focuses on capturing and sharing knowledge. Because of this, KM researchers tend to focus on issues related to knowledge capture, storage, and sharing. However, because knowledge is valuable, it is a target needing to be protected. This paper posits that KM researchers and practitioners also need to think about security and explores how important security skills are to KM practitioners and researchers. A literature review was performed to determine how much attention is paid by KM researchers to knowledge security. Additionally, 50 KM job postings were examined from the spring of 2013 to determine if security skills are considered important by those hiring KM practitioners. Additionally, 38 job postings were examined from the summer of 2014 to determine if required skills changed based on the Target breech. Finally, a survey was prepared for exploring security attitudes of KM practitioners as an area of future research.

Suggested Citation

  • Murray Jennex & Alexandra Durcikova, 2014. "Integrating IS Security with Knowledge Management: Are We Doing Enough?," International Journal of Knowledge Management (IJKM), IGI Global, vol. 10(2), pages 1-12, April.
  • Handle: RePEc:igg:jkm000:v:10:y:2014:i:2:p:1-12
    as

    Download full text from publisher

    File URL: http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/ijkm.2014040101
    Download Restriction: no
    ---><---

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Amine Nehari-Talet & Louay Karadsheh & Samer Alhawari & Hana Hunaiti, 2021. "The Importance of Knowledge-Based Risk Processes to Risk Analysis," International Journal of Knowledge Management (IJKM), IGI Global, vol. 17(1), pages 1-19, January.

    More about this item

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:igg:jkm000:v:10:y:2014:i:2:p:1-12. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Journal Editor (email available below). General contact details of provider: https://www.igi-global.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.