메뉴 건너뛰기




Volumn 25, Issue 1, 2005, Pages 85-98

Securing knowledge in organizations: Lessons from the defense and intelligence sectors

Author keywords

Knowledge management; National security; Security

Indexed keywords

INFORMATION MANAGEMENT; KNOWLEDGE ACQUISITION; MATHEMATICAL MODELS; SECURITY OF DATA; SOCIETIES AND INSTITUTIONS; SOFTWARE ENGINEERING;

EID: 12444282670     PISSN: 02684012     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.ijinfomgt.2004.10.007     Document Type: Article
Times cited : (55)

References (15)
  • 2
    • 12444331320 scopus 로고    scopus 로고
    • Segmenting and destroying knowledge
    • S. Crainer & D. Dearlove (Eds.) London, UK: Financial Times/Pitman Publishing.
    • Desouza, K. C. (2004). Segmenting and destroying knowledge.In S. Crainer & D. Dearlove (Eds.), The financial times handbook of management. London, UK: Financial Times/Pitman Publishing.
    • (2004) The Financial Times Handbook of Management
    • Desouza, K.C.1
  • 3
    • 0001073758 scopus 로고
    • Building theories from case study research
    • K.M. Eisenhardt Building theories from case study research Academy of Management Review 14 4 1989 532 550
    • (1989) Academy of Management Review , vol.14 , Issue.4 , pp. 532-550
    • Eisenhardt, K.M.1
  • 5
    • 0042342623 scopus 로고    scopus 로고
    • Access to classified information: Seeking security clearances for state and local officials and personnel
    • F.M. Kaiser Access to classified information seeking security clearances for state and local officials and personnel Government Information Quarterly 20 3 2003 213 232
    • (2003) Government Information Quarterly , vol.20 , Issue.3 , pp. 213-232
    • Kaiser, F.M.1
  • 6
    • 0001946339 scopus 로고    scopus 로고
    • A set of principles for conducting and evaluating interpretive field studies in information systems
    • H.K. Klein, and M.D. Myers A set of principles for conducting and evaluating interpretive field studies in information systems MIS Quarterly 23 1 1999 67 93
    • (1999) MIS Quarterly , vol.23 , Issue.1 , pp. 67-93
    • Klein, H.K.1    Myers, M.D.2
  • 7
    • 77954516553 scopus 로고
    • Knowledge of the firm, combinative capabilities and the replication technology
    • B. Kogut, and U. Zander Knowledge of the firm, combinative capabilities and the replication technology Organization Science 3 3 1992 383 397
    • (1992) Organization Science , vol.3 , Issue.3 , pp. 383-397
    • Kogut, B.1    Zander, U.2
  • 12
    • 33846997404 scopus 로고    scopus 로고
    • The ten commandments of counter intelligence
    • Fall-Winter.
    • Olson, J. M. (2001). The ten commandments of counter intelligence. Studies in Intelligence, 11, Fall-Winter.
    • (2001) Studies in Intelligence , vol.11
    • Olson, J.M.1
  • 13
    • 0018519695 scopus 로고
    • A conceptual framework for the design of organizational control mechanisms
    • W.G. Ouchi A conceptual framework for the design of organizational control mechanisms Management Science 25 1979 833 848
    • (1979) Management Science , vol.25 , pp. 833-848
    • Ouchi, W.G.1
  • 14
    • 0003724905 scopus 로고
    • Information systems security: Scope, state-of-the-art, and evaluation of techniques
    • G. Pernul Information systems security scope, state-of-the-art, and evaluation of techniques International Journal of Information Management 15 3 1995 165 180
    • (1995) International Journal of Information Management , vol.15 , Issue.3 , pp. 165-180
    • Pernul, G.1
  • 15
    • 85016580926 scopus 로고    scopus 로고
    • Sensible authentication
    • Schneier, B. (2004). Sensible authentication. ACM Queue, 1(10).
    • (2004) ACM Queue , vol.1 , Issue.10
    • Schneier, B.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.