Addressing Knowledge Leakage Risk caused by the use of mobile devices in Australian Organizations

Information and knowledge leakage has become a significant security risk to Australian organizations. Each security incident in Australian business cost an average US$2.8 million. Furthermore, Australian organisations spend the second most worldwide (US$1.2 million each on average) on investigating and assessing information breaches. The leakage of sensitive organizational information occurs through different avenues, such as social media, cloud computing and mobile devices. In this study, we (1) analyze the knowledge leakage risk (KLR) caused by the use of mobile devices in knowledge-intensive Australian organizations, (2) present a conceptual research model to explain the determinants that influence KLR through the use of mobile devices grounded in the literature, (3) conduct interviews with security and knowledge managers to understand what strategies they use to mitigate KLR caused by the use of mobile devices and (4) use content analysis and the conceptual model to frame the preliminary findings from the interviews. Keywords: Knowledge leakage, mobile devices, mobile contexts, knowledge leakage risk

READ FULL TEXT

page 1

page 2

page 3

page 4

research
08/21/2023

Towards a knowledge leakage Mitigation framework for mobile Devices in knowledge-intensive Organizations

The use of mobile devices in knowledge-intensive organizations while eff...
research
08/18/2023

Mitigating the Risk of Knowledge Leakage in Knowledge Intensive Organizations: a Mobile Device Perspective

In the current knowledge economy, knowledge represents the most strategi...
research
04/14/2021

Exploring Knowledge Leakage Risk in Knowledge-Intensive Organisations: Behavioural aspects and Key controls

Knowledge leakage poses a critical risk to the competitive advantage of ...
research
08/17/2023

Watch Out! Smartwatches as criminal tool and digital forensic investigations

In the rapidly advancing technological landscape, smartwatches have mate...
research
08/13/2022

Analysis and implementation of the SNOW 3G generator used in 4G/LTE systems

The fourth generation of cell phones, marketed as 4G/LTE (Long-Term Evol...
research
06/26/2019

MagneticSpy: Exploiting Magnetometer in Mobile Devices for Website and Application Fingerprinting

Recent studies have shown that aggregate CPU usage and power consumption...
research
01/30/2020

Towards Designing A Secure Plausibly Deniable System for Mobile Devices against Multi-snapshot Adversaries – A Preliminary Design

Mobile computing devices have been used broadly to store, manage and pro...

Please sign up or login with your details

Forgot password? Click here to reset