Show simple item record

hal.structure.identifierDauphine Recherches en Management [DRM]
dc.contributor.authorArduin, Pierre-Emmanuel
hal.structure.identifierLaboratoire d'Automatique, de Mécanique et d'Informatique industrielles et Humaines - UMR 8201 [LAMIH]
dc.contributor.authorRajaonah, Bako
HAL ID: 172656
ORCID: 0000-0001-8070-9308
hal.structure.identifierLaboratoire d'Automatique, de Mécanique et d'Informatique industrielles et Humaines - UMR 8201 [LAMIH]
dc.contributor.authorDe Oliveira, Kathia Marçal
dc.date.accessioned2020-09-30T12:17:40Z
dc.date.available2020-09-30T12:17:40Z
dc.date.issued2020
dc.identifier.urihttps://basepub.dauphine.fr/handle/123456789/21026
dc.language.isoenen
dc.subjectTacit knowledgeen
dc.subjectTrusten
dc.subjectInsider threatsen
dc.subject.ddc658.4en
dc.subject.classificationjelD.D8.D83en
dc.subject.classificationjelD.D8.D81en
dc.titleTrusting Security When Sharing Knowledge?en
dc.typeChapitre d'ouvrage
dc.description.abstractenThis chapter tackles knowledge sharing by focusing on security and trust issues. Although trust is recognized as important in security issues, few studies on information systems (ISs) deal with both trust and security. Knowledge sharing relies on sense-giving and sense-reading processes which require, encourage, and even create trust within individuals. We argue that individuals are processors of information and interpret information to create their own tacit knowledge.Recent security reports from organizations have presented that the majority of ISs security threats involve employees within the organizations. Individuals, as well as computers, maybe attacked through social engineering techniques in order to gain their trust. Despite this evidence, most of the work has focused on the control of outsider security threats rather than of insider security threats, particularly when humans are perpetrators.We propose to study insider threats through a trust factor during the knowledge sharing process. Knowledge sharers may induce insider threats for security due to trust-related attitudes and behaviours. The proposition is twofold with interviews and self-report questionnaires to collect information about the trust, and ontologies to categorize such information. The proposition is then discussed, notably in terms of problems and answers leading to study trust in security when sharing knowledge.en
dc.identifier.citationpages163-181en
dc.relation.ispartoftitleKnowledge, People, and Digital Transformationen
dc.relation.ispartofeditorEdvinsson, Leif
dc.relation.ispartofeditorMatos, Florinda
dc.relation.ispartofeditorVairinhos, Valter
dc.relation.ispartofeditorSalavisa, Isabel
dc.relation.ispartofeditorMassaro, Maurizio
dc.relation.ispartofpublnameSpringer International Publishingen
dc.relation.ispartofpublcityBerlin Heidelbergen
dc.relation.ispartofdate2020
dc.relation.ispartofpages296en
dc.relation.ispartofurl10.1007/978-3-030-40390-4en
dc.subject.ddclabelKnowledge Managementen
dc.relation.ispartofisbn978-3-030-40389-8en
dc.relation.forthcomingnonen
dc.identifier.doi10.1007/978-3-030-40390-4_11en
dc.description.ssrncandidatenonen
dc.description.halcandidateouien
dc.description.readershiprechercheen
dc.description.audienceInternationalen
dc.date.updated2020-09-29T13:03:10Z
hal.identifierhal-02953836*
hal.version1*
hal.update.actionupdateFiles*
hal.author.functionaut
hal.author.functionaut
hal.author.functionaut


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record