首页> 外文期刊>VINE >Incorporating a knowledge perspective into security risk assessments
【24h】

Incorporating a knowledge perspective into security risk assessments

机译:将知识观点纳入安全风险评估

获取原文
获取原文并翻译 | 示例
       

摘要

Many methodologies exist to assess the security risks associated with unauthorized leakage, modification and interruption of information used by organisations. This paper argues that these methodologies have a traditional orientation towards the identification and assessment of technical information assets. This obscures key risks associated with the cultivation and deployment of organisational knowledge. The purpose of this paper is to explore how security risk assessment methods can more effectively identify and treat the knowledge associated with business processes. Design/methodology/approach: The argument was developed through an illustrative case study in which a well-documented traditional methodology is applied to a complex data backup process. Follow-up interviews were conducted with the organisation's security managers to explore the results of the assessment and the nature of knowledge "assets" within a business process. Findings: It was discovered that the backup process depended, in subtle and often informal ways, on tacit knowledge to sustain operational complexity, handle exceptions and make frequent interventions. Although typical information security methodologies identify people as critical assets, this study suggests a new approach might draw on more detailed accounts of individual knowledge, collective knowledge and their relationship to organisational processes. Originality/value: Drawing on the knowledge management literature, the paper suggests mechanisms to incorporate these knowledge-based considerations into the scope of information security risk methodologies. A knowledge protection model is presented as a result of this research. This model outlines ways in which organisations can effectively identify and treat risks around process knowledge critical to the business.
机译:存在许多评估与未经授权泄漏,修改和中断组织使用的信息有关的安全风险的方法。本文认为,这些方法对技术信息资产的识别和评估具有传统的方向。这消除了与组织知识的培养和部署相关的主要风险。本文的目的是探讨安全风险评估方法如何更有效地识别和处理与业务流程相关的知识。设计/方法/方法:该论点是通过一个说明性的案例研究得出的,在该案例研究中,有据可查的传统方法被应用于复杂的数据备份过程。与组织的安全经理进行了后续访谈,以探讨评估结果以及业务流程中知识“资产”的性质。结果:发现备份过程以隐含且通常是非正式的方式依赖于隐性知识,以维持操作复杂性,处理异常并进行频繁干预。尽管典型的信息安全方法将人视为关键资产,但这项研究表明,一种新方法可能会利用个人知识,集体知识及其与组织过程之间关系的更详细说明。独创性/价值:利用知识管理文献,本文提出了将这些基于知识的考虑因素纳入信息安全风险方法论范围的机制。作为这项研究的结果,提出了一种知识保护模型。该模型概述了组织可以有效识别和处理对业务至关重要的流程知识周围的风险的方式。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号