Navigating The Duality: Privacy And Security Concerns In Knowledge Management Systems (KMS)
pdf

Keywords

knowledge management system
privacy
security

How to Cite

Satibi, I. F., & Ragil Tri Atmi. (2024). Navigating The Duality: Privacy And Security Concerns In Knowledge Management Systems (KMS). IJDASEA (International Journal of Data Science, Engineering, and Analytics), 4(2), 1–14. https://doi.org/10.33005/ijdasea.v4i2.23

Abstract

This study delves into the intricate relationship between privacy and security within Knowledge Management Systems (KMS). It identifies and analyzes distinct employee perceptions of these intertwined issues within a company's KMS environment. By exploring these perspectives, the authors aim to dispel the confusion surrounding privacy and security in KMS settings. The research employed an explanatory sequential mixed method design.  First, a questionnaire survey was distributed directly to KM staff across three companies. This was followed by semi-structured interviews with four KM staff members. The findings reveal a high level of employee awareness regarding the importance of KMS and, consequently, the significance of personal information privacy and security. The study further distinguishes between privacy and security concerns within KMS. Privacy concerns, differentiated across three dimensions: confidentiality, trust, and behavior, are primarily viewed from the organizational layer. Security aspects, on the other hand, are seen as aligned with the ICT layer, governed by legal frameworks and KMS architecture.

https://doi.org/10.33005/ijdasea.v4i2.23
pdf

References

R. Maier, Knowledge Management Systems: Information and Communication Technologies for Knowledge Management. Springer Science & Business Media, 2007.

S. Wang, R. A. Noe, and Z.-M. Wang, “Motivating Knowledge Sharing in Knowledge Management Systems: A Quasi–Field Experiment,” J. Manag., vol. 40, no. 4, pp. 978–1009, May 2014, doi: 10.1177/0149206311412192.

J. P. Zeiringer and S. Thalmann, “Knowledge sharing and protection in data-centric collaborations: An exploratory study,” Knowl. Manag. Res. Pract., vol. 20, no. 3, pp. 436–448, May 2022, doi: 10.1080/14778238.2021.1978886.

A. de Bem Machado, S. Secinaro, D. Calandra, and F. Lanzalonga, “Knowledge management and digital transformation for Industry 4.0: a structured literature review,” Knowl. Manag. Res. Pract., vol. 20, no. 2, pp. 320–338, Mar. 2022, doi: 10.1080/14778238.2021.2015261.

J. Choe, “The Construction Of An It Infrastructure For Knowledge Management”.

R. Grandinetti, “Absorptive capacity and knowledge management in small and medium enterprises,” Knowl. Manag. Res. Pract., vol. 14, no. 2, pp. 159–168, May 2016, doi: 10.1057/kmrp.2016.2.

W. Yu Chung Wang, D. Pauleen, and N. Taskin, “Enterprise systems, emerging technologies, and the data-driven knowledge organisation,” Knowl. Manag. Res. Pract., vol. 20, no. 1, pp. 1–13, Jan. 2022, doi: 10.1080/14778238.2022.2039571.

M. Kolyasnikov and N. Kelchevskaya, “Knowledge management strategies in companies: Trends and the impact of Industry 4.0,” Upravlenets, vol. 11, no. 4, pp. 82–96, Sep. 2020, doi: 10.29141/2218-5003-2020-11-4-7.

Herison Surbakti, “Web Technology Knowledge Management And Its Privacy And Security Challenge,” 2015, doi: 10.13140/2.1.3178.2727.

K. Bajpai and K. Weber, “Privacy in Public: Translating the Category of Privacy to the Digital Age,” in Research in the Sociology of Organizations, vol. 51, R. Durand, N. Granqvist, and A. Tyllström, Eds., Emerald Publishing Limited, 2017, pp. 223–258. doi: 10.1108/S0733-558X20170000051006.

H. Drachsler and W. Greller, “Privacy and analytics: it’s a DELICATE issue a checklist for trusted learning analytics,” in Proceedings of the Sixth International Conference on Learning Analytics & Knowledge - LAK ’16, Edinburgh, United Kingdom: ACM Press, 2016, pp. 89–98. doi: 10.1145/2883851.2883893.

T. Matzner, “Why privacy is not enough privacy in the context of ‘ubiquitous computing’ and ‘big data,’” J. Inf. Commun. Ethics Soc., vol. 12, no. 2, pp. 93–106, May 2014, doi: 10.1108/JICES-08-2013-0030.

K. Ball, E. M. Daniel, and C. Stride, “Dimensions of employee privacy: an empirical study,” Inf. Technol. People, vol. 25, no. 4, pp. 376–394, Nov. 2012, doi: 10.1108/09593841211278785.

C. Liu, J. T. Marchewka, J. Lu, and C.-S. Yu, “Beyond concern—a privacy-trust-behavioral intention model of electronic commerce,” Inf. Manage., vol. 42, no. 2, pp. 289–304, Jan. 2005, doi: 10.1016/j.im.2004.01.003.

R. Wilton, “After Snowden – the evolving landscape of privacy and technology,” J. Inf. Commun. Ethics Soc., vol. 15, no. 3, pp. 328–335, Aug. 2017, doi: 10.1108/JICES-02-2017-0010.

N. Evans, “Virtue Ethics in Knowledge Management,” in Handbook of Virtue Ethics in Business and Management, A. J. G. Sison, G. R. Beabout, and I. Ferrero, Eds., in International Handbooks in Business Ethics. , Dordrecht: Springer Netherlands, 2017, pp. 1231–1243. doi: 10.1007/978-94-007-6510-8_94.

Y. Ren, F. Cheng, Z. Peng, X. Huang, and W. Song, “A privacy policy conflict detection method for multi-owner privacy data protection,” Electron. Commer. Res., vol. 11, no. 1, pp. 103–121, Jan. 2011, doi: 10.1007/s10660-010-9067-8.

C. Fuchs, “Towards an alternative concept of privacy,” J. Inf. Commun. Ethics Soc., vol. 9, no. 4, pp. 220–237, Nov. 2011, doi: 10.1108/14779961111191039.

E. Bertino, L. R. Khan, R. Sandhu, and B. Thuraisingham, “Secure knowledge management: confidentiality, trust, and privacy,” IEEE Trans. Syst. Man Cybern. - Part Syst. Hum., vol. 36, no. 3, pp. 429–438, May 2006, doi: 10.1109/TSMCA.2006.871796.

G. Skinner, S. Han, and E. Chang, “An information privacy taxonomy for collaborative environments,” Inf. Manag. Comput. Secur., vol. 14, no. 4, pp. 382–394, Aug. 2006, doi: 10.1108/09685220610690835.

S. Stalla-Bourdillon, J. Phillips, and M. D. Ryan, Privacy vs. Security. Springer, 2014.

C. Mei‐Sha Chieh and B. H. Kleiner, “How organisations manage the issue of employee privacy today,” Manag. Res. News, vol. 26, no. 2/3/4, pp. 82–88, Mar. 2003, doi: 10.1108/01409170310783790.

S. D. Warren and L. D. Brandeis, “The Right to Privacy,” Harv. Law Rev., vol. 4, no. 5, p. 193, Dec. 1890, doi: 10.2307/1321160.

C. Fried, “Privacy,” Yale Law J., vol. 77, no. 3, p. 475, Jan. 1968, doi: 10.2307/794941.

D. Berdik, S. Otoum, N. Schmidt, D. Porter, and Y. Jararweh, “A Survey on Blockchain for Information Systems Management and Security,” Inf. Process. Manag., vol. 58, no. 1, p. 102397, Jan. 2021, doi: 10.1016/j.ipm.2020.102397.

Y. Kurniawan, A. Hardianto, and F. Meylani, “The Influence of Knowledge Management Capabilities on Organizational Effectiveness,” . Vol., no. 18, 2005.

M. Alavi and D. E. Leidner, “Review: Knowledge Management and Knowledge Management Systems: Conceptual Foundations and Research Issues,” MIS Q., vol. 25, no. 1, p. 107, Mar. 2001, doi: 10.2307/3250961.

I. Rechberg and J. Syed, “Knowledge Management Practices and the Focus on the Individual:,” Int. J. Knowl. Manag., vol. 10, no. 1, pp. 26–42, Jan. 2014, doi: 10.4018/ijkm.2014010102.

W. He, Q. Qiao, and K.-K. Wei, “Social relationship and its role in knowledge management systems usage,” Inf. Manage., vol. 46, no. 3, pp. 175–180, Apr. 2009, doi: 10.1016/j.im.2007.11.005.

S. K. Satapathy and C. R. Moharana, “Knowledge Management Effectiveness in Securing Information and Network Systems: A Study on Odisha,” vol. 6, no. 2349, 2017.

M. Saratchandra and A. Shrestha, “The role of cloud computing in knowledge management for small and medium enterprises: a systematic literature review,” J. Knowl. Manag., vol. 26, no. 10, pp. 2668–2698, Jan. 2022, doi: 10.1108/JKM-06-2021-0421.

C. L. Miltgen and H. J. Smith, “Exploring information privacy regulation, risks, trust, and behavior,” Inf. Manage., vol. 52, no. 6, pp. 741–759, Sep. 2015, doi: 10.1016/j.im.2015.06.006.

R. Moll, S. Pieschl, and R. Bromme, “Competent or clueless? Users’ knowledge and misconceptions about their online privacy management,” Comput. Hum. Behav., vol. 41, pp. 212–219, Dec. 2014, doi: 10.1016/j.chb.2014.09.033.

D. J. Solove, Understanding Privacy. Harvard University Press, 2010.

T. Dey and S. Mukhopadhyay, “Influence of Behavioral Intentions, Affective Trust and Affective Commitment on Knowledge Sharing Behavior:,” Int. J. Knowl. Manag., vol. 14, no. 2, pp. 37–51, Apr. 2018, doi: 10.4018/IJKM.2018040103.

V. Scovetta, “The Impact of Personal and Positional Powers on Knowledge Management Systems:,” Int. J. Knowl. Manag., vol. 13, no. 2, pp. 18–34, Apr. 2017, doi: 10.4018/IJKM.2017040102.

Creative Commons License

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.

Copyright (c) 2024 Iswanda Fauzan Satibi, Ragil Tri Atmi