Changes

Jump to navigation Jump to search
Line 13: Line 13:  
== Main dependent construct(s)/factor(s)==
 
== Main dependent construct(s)/factor(s)==
 
Measures the need of providing protection from AI prediction.   
 
Measures the need of providing protection from AI prediction.   
 +
 
 
== Main independent construct(s)/factor(s) ==
 
== Main independent construct(s)/factor(s) ==
Information Security
+
[https://en.wikipedia.org/wiki/Information_security Confidentiality]
 +
 
 +
[https://en.wikipedia.org/wiki/Information_security Integrity] 
 +
 
 +
[https://en.wikipedia.org/wiki/Information_security Availability]
 +
 
 +
Sensitivity 
 +
 
 +
Critical knowledge Domain properties 
 
== Concise description of theory ==
 
== Concise description of theory ==
Knowledge Security is user ability to identify, measure riskand protect his privacy information suitable to AI prediction. Knowldge Security is introduced by Tiago C. Pereira and Henrique Santos in 2017.
+
Knowledge Security is the user ability to identify, measure risk and protect his privacy information suitable to AI prediction. Knowledge Security is introduced by Tiago C. Pereira and Henrique Santos in 2017.
   −
Pereira and Santos (2017) extended the the InfoSec principles with the sensibility and Critical Knowledge.
+
Pereira and Santos (2017) extended the InfoSec principles with the sensibility and Critical Knowledge.
    
When absorption limits exist, they provide one explanation for firms to develop internal R&D capacities. R&D departments can not only conduct development along lines they are already familiar with, but they have formal training and external professional connections that make it possible for them to evaluate and incorporate externally generated technical knowledge into the firm. In other words, a partial explanation for R&D investments by firms is to work around the absorptive capacity constraint.
 
When absorption limits exist, they provide one explanation for firms to develop internal R&D capacities. R&D departments can not only conduct development along lines they are already familiar with, but they have formal training and external professional connections that make it possible for them to evaluate and incorporate externally generated technical knowledge into the firm. In other words, a partial explanation for R&D investments by firms is to work around the absorptive capacity constraint.
   −
  −
N/A
   
== Originating author(s) ==
 
== Originating author(s) ==
 
Pereira and Santos (2017)
 
Pereira and Santos (2017)
Line 32: Line 39:  
Information Systems
 
Information Systems
 
== Level of analysis ==
 
== Level of analysis ==
Individual
+
Individual, Knowledge Domain Critical properties
 
== IS articles that use the theory ==
 
== IS articles that use the theory ==
 
Pereira, T. and Santos, H. (2017). Knowledge Security - An Empirical Use of IT – Child Abuse Monitor System Model. In Proceedings of the 3rd International Conference on Information and Communication Technologies for Ageing Well and e-Health - ICT4AWE, ISBN 978-989-758-251-6; ISSN 2184-4984, pages 236-243. DOI: 10.5220/0006384002360243<
 
Pereira, T. and Santos, H. (2017). Knowledge Security - An Empirical Use of IT – Child Abuse Monitor System Model. In Proceedings of the 3rd International Conference on Information and Communication Technologies for Ageing Well and e-Health - ICT4AWE, ISBN 978-989-758-251-6; ISSN 2184-4984, pages 236-243. DOI: 10.5220/0006384002360243<
    
== Links from this theory to other theories ==
 
== Links from this theory to other theories ==
[[Information Security]]
+
[https://en.wikipedia.org/wiki/Information_security Information Security]
    
== External links ==
 
== External links ==
8

edits

Navigation menu