Difference between revisions of "Knowledge Security Theory"

From IS Theory
Jump to navigation Jump to search
(Knowledge Security Theory)
Line 13: Line 13:
 
== Main dependent construct(s)/factor(s)==
 
== Main dependent construct(s)/factor(s)==
 
Measures the need of providing protection from AI prediction.   
 
Measures the need of providing protection from AI prediction.   
 +
 
 
== Main independent construct(s)/factor(s) ==
 
== Main independent construct(s)/factor(s) ==
Information Security
+
Confidentiality
 +
 
 +
Integrity 
 +
 
 +
Availability 
 +
 
 +
Sensitivity 
 +
 
 +
Critical knowledge Domain properties 
 
== Concise description of theory ==
 
== Concise description of theory ==
 
Knowledge Security is user ability to identify, measure riskand protect his privacy information suitable to AI prediction. Knowldge Security is introduced by Tiago C. Pereira and Henrique Santos in 2017.
 
Knowledge Security is user ability to identify, measure riskand protect his privacy information suitable to AI prediction. Knowldge Security is introduced by Tiago C. Pereira and Henrique Santos in 2017.
Line 22: Line 31:
 
When absorption limits exist, they provide one explanation for firms to develop internal R&D capacities. R&D departments can not only conduct development along lines they are already familiar with, but they have formal training and external professional connections that make it possible for them to evaluate and incorporate externally generated technical knowledge into the firm. In other words, a partial explanation for R&D investments by firms is to work around the absorptive capacity constraint.
 
When absorption limits exist, they provide one explanation for firms to develop internal R&D capacities. R&D departments can not only conduct development along lines they are already familiar with, but they have formal training and external professional connections that make it possible for them to evaluate and incorporate externally generated technical knowledge into the firm. In other words, a partial explanation for R&D investments by firms is to work around the absorptive capacity constraint.
  
 
N/A
 
 
== Originating author(s) ==
 
== Originating author(s) ==
 
Pereira and Santos (2017)
 
Pereira and Santos (2017)
Line 32: Line 39:
 
Information Systems
 
Information Systems
 
== Level of analysis ==
 
== Level of analysis ==
Individual
+
Individual, Knowledge Domain Critical properties
 
== IS articles that use the theory ==
 
== IS articles that use the theory ==
 
Pereira, T. and Santos, H. (2017). Knowledge Security - An Empirical Use of IT – Child Abuse Monitor System Model. In Proceedings of the 3rd International Conference on Information and Communication Technologies for Ageing Well and e-Health - ICT4AWE, ISBN 978-989-758-251-6; ISSN 2184-4984, pages 236-243. DOI: 10.5220/0006384002360243<
 
Pereira, T. and Santos, H. (2017). Knowledge Security - An Empirical Use of IT – Child Abuse Monitor System Model. In Proceedings of the 3rd International Conference on Information and Communication Technologies for Ageing Well and e-Health - ICT4AWE, ISBN 978-989-758-251-6; ISSN 2184-4984, pages 236-243. DOI: 10.5220/0006384002360243<

Revision as of 15:24, 17 September 2022

This site is sponsored by the University of Colorado


Knowledge Security Theory is based on Information Security principles applied to knowledge discovery. Assuming That, Knowledge is the manipulation of information for prediction.

Knowledge Security Theory


Acronym

KST.

Alternate name(s)

Theory of Knowledge Security

Main dependent construct(s)/factor(s)

Measures the need of providing protection from AI prediction.

Main independent construct(s)/factor(s)

Confidentiality

Integrity

Availability

Sensitivity

Critical knowledge Domain properties

Concise description of theory

Knowledge Security is user ability to identify, measure riskand protect his privacy information suitable to AI prediction. Knowldge Security is introduced by Tiago C. Pereira and Henrique Santos in 2017.

Pereira and Santos (2017) extended the the InfoSec principles with the sensibility and Critical Knowledge.

When absorption limits exist, they provide one explanation for firms to develop internal R&D capacities. R&D departments can not only conduct development along lines they are already familiar with, but they have formal training and external professional connections that make it possible for them to evaluate and incorporate externally generated technical knowledge into the firm. In other words, a partial explanation for R&D investments by firms is to work around the absorptive capacity constraint.

Originating author(s)

Pereira and Santos (2017)

Seminal articles

Pereira, T. and Santos, H. (2017). Knowledge Security - An Empirical Use of IT – Child Abuse Monitor System Model. In Proceedings of the 3rd International Conference on Information and Communication Technologies for Ageing Well and e-Health - ICT4AWE, ISBN 978-989-758-251-6; ISSN 2184-4984, pages 236-243. DOI: 10.5220/0006384002360243

Originating area

Information Systems

Level of analysis

Individual, Knowledge Domain Critical properties

IS articles that use the theory

Pereira, T. and Santos, H. (2017). Knowledge Security - An Empirical Use of IT – Child Abuse Monitor System Model. In Proceedings of the 3rd International Conference on Information and Communication Technologies for Ageing Well and e-Health - ICT4AWE, ISBN 978-989-758-251-6; ISSN 2184-4984, pages 236-243. DOI: 10.5220/0006384002360243<

Links from this theory to other theories

Information Security

External links

N/A

Original Contributor(s)

Tiago C. Pereira



Please feel free to make modifications to this site. In order to do so, you must register.

Return to Theories Used in IS Research