메뉴 건너뛰기




Volumn 9, Issue 5, 2007, Pages 481-492

Overcoming organizational challenges to secure knowledge management

Author keywords

Incident management; Knowledge management; Organizations; Security; Simulation; System dynamics

Indexed keywords

COMPUTER SIMULATION; CONSTRAINT THEORY; SECURITY OF DATA; SENSORY PERCEPTION; SOCIETIES AND INSTITUTIONS; SUSTAINABLE DEVELOPMENT;

EID: 35548988920     PISSN: 13873326     EISSN: None     Source Type: Journal    
DOI: 10.1007/s10796-007-9052-5     Document Type: Article
Times cited : (22)

References (57)
  • 2
    • 0035408394 scopus 로고    scopus 로고
    • A system approach to the reduction of medication error on the hospital ward
    • 1
    • Anderson, D. J., & Webster, C. S. (2001). A system approach to the reduction of medication error on the hospital ward. Journal of Advanced Nursing, 35(1), 34-41.
    • (2001) Journal of Advanced Nursing , vol.35 , pp. 34-41
    • Anderson, D.J.1    Webster, C.S.2
  • 3
    • 0034681861 scopus 로고    scopus 로고
    • Reporting and preventing medical mishaps: Lessons from nonmedical near miss reporting systems
    • Barach, P., & Small, S. D. (2000). Reporting and preventing medical mishaps: Lessons from nonmedical near miss reporting systems. British Medical Journal, 320, 759-763.
    • (2000) British Medical Journal , vol.320 , pp. 759-763
    • Barach, P.1    Small, S.D.2
  • 4
    • 0024962452 scopus 로고
    • Multiple tests for validation of system dynamics type of simulation models
    • Barlas, Y. (1989). Multiple tests for validation of system dynamics type of simulation models. European Journal of Operations Research, 42, 59-87.
    • (1989) European Journal of Operations Research , vol.42 , pp. 59-87
    • Barlas, Y.1
  • 5
    • 0001022016 scopus 로고    scopus 로고
    • Formal aspects of model validity and validation in system dynamics
    • 3
    • Barlas, Y. (1996). Formal aspects of model validity and validation in system dynamics. System Dynamics Review, 12(3), 183-210.
    • (1996) System Dynamics Review , vol.12 , pp. 183-210
    • Barlas, Y.1
  • 6
    • 84986099457 scopus 로고    scopus 로고
    • Knowledge management in organizations: Examining the interaction between technologies, techniques, and people
    • 1
    • Bhatt, G. D. (2001). Knowledge management in organizations: Examining the interaction between technologies, techniques, and people. Journal of Knowledge Management, 5(1), 68-75.
    • (2001) Journal of Knowledge Management , vol.5 , pp. 68-75
    • Bhatt, G.D.1
  • 7
    • 33745183747 scopus 로고    scopus 로고
    • How to think about security failures
    • 1
    • Campbell, S. (2006).How to think about security failures. Communications of the ACM, 49(1), 37-39 (01).
    • (2006) Communications of the ACM , vol.49 , pp. 37-39
    • Campbell, S.1
  • 8
    • 33845327850 scopus 로고    scopus 로고
    • Learning from incidents: From normal accidents to high reliability
    • 3
    • Cooke, D. L., & Rohleder, T. R. (2006). Learning from incidents: From normal accidents to high reliability. System Dynamics Review, 22(3), 213-239.
    • (2006) System Dynamics Review , vol.22 , pp. 213-239
    • Cooke, D.L.1    Rohleder, T.R.2
  • 9
    • 0034334828 scopus 로고    scopus 로고
    • Barriers and facilitators to the use of knowledge management systems
    • 6
    • Damodaran, L., & Olphert, W. (2000). Barriers and facilitators to the use of knowledge management systems. Behaviour & Information Technology, 19(6), 405-413.
    • (2000) Behaviour & Information Technology , vol.19 , pp. 405-413
    • Damodaran, L.1    Olphert, W.2
  • 12
    • 55249087535 scopus 로고
    • Perceived usefulness, perceived ease of use, and user acceptance of information technology
    • 3
    • Davis, F. D. (1989). Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Quarterly, 13(3), 319-340.
    • (1989) MIS Quarterly , vol.13 , pp. 319-340
    • Davis, F.D.1
  • 13
    • 35548944839 scopus 로고    scopus 로고
    • Intrusion detection: Introduction to intrusion detection and security information management
    • Springer Berlin Heidelberg
    • Debar, H., & Viinikka, J. (2005). Intrusion detection: Introduction to intrusion detection and security information management. In A. Aldini, R. Gorrieri, & F. Martinelli (Eds.), Foundations of security analysis and design III (pp. 207-236). Heidelberg: Springer Berlin.
    • (2005) Foundations of Security Analysis and Design III , pp. 207-236
    • Debar, H.1    Viinikka, J.2    Aldini, A.3    Gorrieri, R.4    Martinelli, F.5
  • 16
    • 0003018239 scopus 로고
    • Policies, decisions, and information sources for modeling
    • Productivity Press Portland, OR
    • Forrester, J. W. (1994). Policies, decisions, and information sources for modeling. In J. D. W. Morecroft, J. D. Sterman (Eds.), Modeling for learning organizations (pp. 51-84). Portland, OR: Productivity Press.
    • (1994) Modeling for Learning Organizations , pp. 51-84
    • Forrester, J.W.1    Morecroft, J.D.W.2    Sterman, J.D.3
  • 18
    • 30344462995 scopus 로고    scopus 로고
    • The economic incentives for sharing security information
    • 2
    • Gal-Or, E., & Ghose, A. (2005). The economic incentives for sharing security information. Information Systems Research, 16(2), 186-208.
    • (2005) Information Systems Research , vol.16 , pp. 186-208
    • Gal-Or, E.1    Ghose, A.2
  • 22
    • 0344899914 scopus 로고    scopus 로고
    • Sharing information on computer systems security: An economic analysis
    • 6
    • Gordon, L. A., Loeb, M., & Lucyshyn, W. (2003). Sharing information on computer systems security: An economic analysis. Journal of Accounting Public Policy, 22(6), 461-485.
    • (2003) Journal of Accounting Public Policy , vol.22 , pp. 461-485
    • Gordon, L.A.1    Loeb, M.2    Lucyshyn, W.3
  • 24
    • 36849064867 scopus 로고    scopus 로고
    • The myth of user education
    • 2006 11-13 October, Montréal, Canada
    • Görling, S. (2006). The myth of user education. Virus Bulletin Conference; 2006 11-13 October; Montréal, Canada.
    • (2006) Virus Bulletin Conference
    • Görling, S.1
  • 25
    • 0003855888 scopus 로고    scopus 로고
    • Jossey-Bass Publishers San Francisco
    • Halal, G. (1998). The infinite resource. San Francisco: Jossey-Bass Publishers.
    • (1998) The Infinite Resource
    • Halal, G.1
  • 26
    • 35549000061 scopus 로고    scopus 로고
    • A framework for security requirements engineering
    • Haley C. B., Moffett J. D., Laney, R., & Nuseibeh, B. (Eds.) Shanghai, China IEEE
    • Haley, C. B., Moffett, J. D., Laney, R., & Nuseibeh, B. (Eds.) (2005). A framework for security requirements engineering. The 2006 International Workshop on Software Engineering for Secure Systems; Shanghai, China IEEE.
    • (2005) The 2006 International Workshop on Software Engineering for Secure Systems
  • 29
    • 0041825291 scopus 로고    scopus 로고
    • 1000 anaesthetic incidents: Experience to date
    • James, R. H. (2003). 1000 anaesthetic incidents: Experience to date. Anaesthesia, 58, 856-863.
    • (2003) Anaesthesia , vol.58 , pp. 856-863
    • James, R.H.1
  • 32
  • 33
    • 0013094981 scopus 로고    scopus 로고
    • Prospect theory: An analysis of decision under risk
    • Cambridge University Press Cambridge, UK
    • Kahneman, D., & Tversky, A. (2000). Prospect theory: An analysis of decision under risk. In D. Kahneman & A. Tversky (Eds.), Choices, values, and frames. Cambridge, UK: Cambridge University Press.
    • (2000) Choices, Values, and Frames
    • Kahneman, D.1    Tversky, A.2    Kahneman, D.3    Tversky, A.4
  • 35
    • 34948866915 scopus 로고    scopus 로고
    • Air carrier safety and culture: An investigation of Taiwan's adaptation to western incident reporting programs
    • 1
    • Lee, P. I., & Weitzel, T. R. (2005). Air carrier safety and culture: An investigation of Taiwan's adaptation to western incident reporting programs. Journal of Air Transportation, 10(1), 20-37.
    • (2005) Journal of Air Transportation , vol.10 , pp. 20-37
    • Lee, P.I.1    Weitzel, T.R.2
  • 37
    • 33746593166 scopus 로고    scopus 로고
    • Effective reward systems for knowledge sharing
    • Moon, H. K., & Park, M. S. (2002). Effective reward systems for knowledge sharing. Knowledge Management Review, 22-25.
    • (2002) Knowledge Management Review , pp. 22-25
    • Moon, H.K.1    Park, M.S.2
  • 38
    • 35549004859 scopus 로고    scopus 로고
    • National Institute of Standards and Technology Special Publication 800-12: US Department of Commerce; July.
    • National Institute of Standards and Technology. (2000). An introduction to computer security: The NIST handbook. Special Publication 800-12: US Department of Commerce; July.
    • (2000) An Introduction to Computer Security: The NIST Handbook
  • 39
    • 35048897235 scopus 로고    scopus 로고
    • National Institute of Standards and Technology. Special Publication 800-27. Gaithersburg, MD: US Department of Commerce; 2001 June
    • National Institute of Standards and Technology. (2001). Engineering principles for information technology security (A baseline for achieving security). Special Publication 800-27. Gaithersburg, MD: US Department of Commerce; 2001 June.
    • (2001) Engineering Principles for Information Technology Security (A Baseline for Achieving Security)
  • 40
    • 33845243602 scopus 로고    scopus 로고
    • The prevention of occupational injuries in two industrial plants using an incident reporting scheme
    • Nielsen, K. J., Carstensen, O., & Rasmussen, K. (2006). The prevention of occupational injuries in two industrial plants using an incident reporting scheme. Journal of Safety Research, 37(5), 479-486.
    • (2006) Journal of Safety Research , vol.37 , Issue.5 , pp. 479-486
    • Nielsen, K.J.1    Carstensen, O.2    Rasmussen, K.3
  • 41
    • 14244249412 scopus 로고    scopus 로고
    • Reporting systems in healthcare from a case-by-case experience to a general framework: An example in anaesthesia
    • 21
    • Nyssen, A. S., Aunac, S., Faymonville, M. E., & Lutte, I. (2004). Reporting systems in healthcare from a case-by-case experience to a general framework: An example in anaesthesia. European Journal of Anaesthesiology, 10(21), 757-765.
    • (2004) European Journal of Anaesthesiology , vol.10 , pp. 757-765
    • Nyssen, A.S.1    Aunac, S.2    Faymonville, M.E.3    Lutte, I.4
  • 43
    • 0037976903 scopus 로고    scopus 로고
    • Near-miss incident management in the chemical process industry
    • 3
    • Phimister, J. R., Oktem, U., Kleindorfer, P. R., & Kunreuther, H. (2003). Near-miss incident management in the chemical process industry. Risk Analysis, 23(3), 445-459.
    • (2003) Risk Analysis , vol.23 , pp. 445-459
    • Phimister, J.R.1    Oktem, U.2    Kleindorfer, P.R.3    Kunreuther, H.4
  • 45
    • 0034681819 scopus 로고    scopus 로고
    • Human error models and management
    • Reason, J. (2000). Human error models and management. British Medical Journal, (320), 768-770.
    • (2000) British Medical Journal , Issue.320 , pp. 768-770
    • Reason, J.1
  • 46
    • 0035623034 scopus 로고    scopus 로고
    • Nobody ever gets credit for fixing defects that didn't happen: Creating and sustaining process improvement
    • 4
    • Repenning, N., & Sterman, J. (2001). Nobody ever gets credit for fixing defects that didn't happen: Creating and sustaining process improvement. California Management Review, 43(4), 64-88.
    • (2001) California Management Review , vol.43 , pp. 64-88
    • Repenning, N.1    Sterman, J.2
  • 53
    • 33748075456 scopus 로고    scopus 로고
    • Toward a unified security/safety model
    • 8
    • Stoneburner, G. (2006). Toward a unified security/safety model. Computer, 39(8), 96-97.
    • (2006) Computer , vol.39 , pp. 96-97
    • Stoneburner, G.1
  • 55
    • 0033872521 scopus 로고    scopus 로고
    • A theoretical extension of the technology acceptance model: Four longitudinal field studies
    • 2
    • Venkatesh, V., & Davis, F. D. (2000). A theoretical extension of the technology acceptance model: Four longitudinal field studies. Management Science, 46(2), 186-204.
    • (2000) Management Science , vol.46 , pp. 186-204
    • Venkatesh, V.1    Davis, F.D.2
  • 57
    • 0032119072 scopus 로고    scopus 로고
    • Towards a theory of continuous improvement and the learning curve
    • 7
    • Zangwill, W. I., & Kantor, P. B. (1998). Towards a theory of continuous improvement and the learning curve. Management Science, 44(7), 910-920.
    • (1998) Management Science , vol.44 , pp. 910-920
    • Zangwill, W.I.1    Kantor, P.B.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.