Incorporating a knowledge perspective into security risk assessments


Autoria(s): Shedden, Piya; Scheepers, Rens; Smith, Wally; Ahmad, Atif
Data(s)

01/01/2011

Resumo

<b>Purpose</b><b> –</b> Many methodologies exist to assess the security risks associated with unauthorized leakage, modification and interruption of information used by organisations. This paper argues that these methodologies have a traditional orientation towards the identification and assessment of technical information assets. This obscures key risks associated with the cultivation and deployment of organisational knowledge. The purpose of this paper is to explore how security risk assessment methods can more effectively identify and treat the knowledge associated with business processes.<br /><br /><b>Design/methodology/approach –</b> The argument was developed through an illustrative case study in which a well-documented traditional methodology is applied to a complex data backup process. Follow-up interviews were conducted with the organisation’s security managers to explore the results of the assessment and the nature of knowledge “assets” within a business process.<br /><br /><b>Findings –</b> It was discovered that the backup process depended, in subtle and often informal ways, on tacit knowledge to sustain operational complexity, handle exceptions and make frequent interventions. Although typical information security methodologies identify people as critical assets, this study suggests a new approach might draw on more detailed accounts of individual knowledge, collective knowledge and their relationship to organisational processes.<br /><br /><b>Originality/value –</b> Drawing on the knowledge management literature, the paper suggests mechanisms to incorporate these knowledge-based considerations into the scope of information security risk methodologies. A knowledge protection model is presented as a result of this research. This model outlines ways in which organisations can effectively identify and treat risks around process knowledge critical to the business.<br />

Identificador

http://hdl.handle.net/10536/DRO/DU:30036333

Idioma(s)

eng

Publicador

Emerald Group Publishing

Relação

http://dro.deakin.edu.au/eserv/DU:30036333/scheepers-incorporatinga-2011.pdf

http://dx.doi.org/10.1108/03055721111134790

Direitos

2011, Emerald Group Publishing Limited

Palavras-Chave #data security #risk management #information systems #risk assessment
Tipo

Journal Article