-
1
-
-
84901464474
-
Information security strategies: Towards an organisational multi-strategy perspective
-
A. Ahmad, S.B. Maynard, and S. Park Information security strategies: towards an organisational multi-strategy perspective J Intell Manuf 2012 1 14
-
(2012)
J Intell Manuf
, pp. 1-14
-
-
Ahmad, A.1
Maynard, S.B.2
Park, S.3
-
3
-
-
33846040793
-
Dare to share: Protecting sensitive knowledge with data sanitization
-
DOI 10.1016/j.dss.2006.08.007, PII S0167923606001230, Mobile Commerce: Strategies, Technologies, and Applications
-
A. Amiri Dare to share: protecting sensitive knowledge wit (Pubitemid 46073235)
-
(2007)
Decision Support Systems
, vol.43
, Issue.1
, pp. 181-191
-
-
Amiri, A.1
-
4
-
-
0008942383
-
-
Vol. 2nd ed. John Wiley and sons Indiana
-
R. Anderson Security engineering Vol. 2nd ed. 2008 John Wiley and sons Indiana
-
(2008)
Security Engineering
-
-
Anderson, R.1
-
6
-
-
84896930624
-
Firm resources and sustained competitive advantage
-
J. Barney Firm resources and sustained competitive advantage J Manag 17 1 1991 99 120
-
(1991)
J Manag
, vol.17
, Issue.1
, pp. 99-120
-
-
Barney, J.1
-
7
-
-
21444454485
-
The resource-based theory of the firm
-
J. Barney The resource-based theory of the firm Organ Sci 7 5 1996 469 479
-
(1996)
Organ Sci
, vol.7
, Issue.5
, pp. 469-479
-
-
Barney, J.1
-
9
-
-
84861092434
-
Bypassing information leakage protection with trusted applications
-
A. Blasco, and X. Jorge Bypassing information leakage protection with trusted applications Comput Secur 31 4 2013 557 568
-
(2013)
Comput Secur
, vol.31
, Issue.4
, pp. 557-568
-
-
Blasco, A.1
Jorge, X.2
-
10
-
-
0035342396
-
Understanding the influence of organizational change strategies on information technology and knowledge management strategies
-
DOI 10.1016/S0167-9236(00)00119-6, PII S0167923600001196
-
J.M. Bloodgood, and W.D. Salisbury Understanding the influence of organizational change strategies on information technology and knowledge management strategies Decis Support Syst 31 2001 55 69 (Pubitemid 32284753)
-
(2001)
Decision Support Systems
, vol.31
, Issue.1
, pp. 55-69
-
-
Bloodgood, J.M.1
Salisbury, W.D.2
-
11
-
-
77950124246
-
Reconsidering the reputation - Performance relationship: A resource-based view
-
B.K. Boyd, D.D. Bergh, and D.K. Ketchen Reconsidering the reputation - performance relationship: a resource-based view J Manag 36 3 2010 588 609
-
(2010)
J Manag
, vol.36
, Issue.3
, pp. 588-609
-
-
Boyd, B.K.1
Bergh, D.D.2
Ketchen, D.K.3
-
12
-
-
79952771287
-
Network closure's impact on firms' competitive advantage
-
H.-K. Chai, C.M. Yap, and X. Wang Network closure's impact on firms' competitive advantage J Eng Technol Manag 28 2011 2 22
-
(2011)
J Eng Technol Manag
, vol.28
, pp. 2-22
-
-
Chai, H.-K.1
Yap, C.M.2
Wang, X.3
-
14
-
-
77953810798
-
Knowledge protection strategies of mutinational firms - A cross-country comparison
-
P. De Faria, and W. Sofka Knowledge protection strategies of mutinational firms - a cross-country comparison Res Policy 39 2010 956 968
-
(2010)
Res Policy
, vol.39
, pp. 956-968
-
-
De Faria, P.1
Sofka, W.2
-
16
-
-
84873185734
-
Knowledge Security: An interesting research space
-
K.C. DeSouza Knowledge Security: an interesting research space J Inf Sci Technol 25 2006 85 98
-
(2006)
J Inf Sci Technol
, vol.25
, pp. 85-98
-
-
Desouza, K.C.1
-
17
-
-
12444282670
-
Securing knowledge in organizations: Lessons from the defense and intelligence sectors
-
K.C. DeSouza, and G.K. Vanapalli Securing knowledge in organizations: lessons from the defense and intelligence sectors Int J Inf Manag 3 1 2005 1 7
-
(2005)
Int J Inf Manag
, vol.3
, Issue.1
, pp. 1-7
-
-
Desouza, K.C.1
Vanapalli, G.K.2
-
19
-
-
0000857363
-
Asset stock accumulation and sustainability of competitive advantage
-
L. Dierickx, and K. Cool Asset stock accumulation and sustainability of competitive advantage Manag Sci 35 12 1989 1504 1511
-
(1989)
Manag Sci
, vol.35
, Issue.12
, pp. 1504-1511
-
-
Dierickx, L.1
Cool, K.2
-
20
-
-
0034899986
-
Knowledge management strategies: Toward a taxonomy
-
M. Earl Knowledge management strategies: towards a taxonomy J Manag Inf Syst 18 1 2001 215 233 (Pubitemid 32716730)
-
(2001)
Journal of Management Information Systems
, vol.18
, Issue.1
, pp. 215-233
-
-
Earl, M.1
-
21
-
-
43049109560
-
Inter-organizational knowledge transfer: Current themes and future prospects
-
M. Easterby-Smith, M.A. Lyles, and E.W.K. Tsang Inter-organizational knowledge transfer: current themes and future prospects J Manag Stud 45 4 2008 677 690
-
(2008)
J Manag Stud
, vol.45
, Issue.4
, pp. 677-690
-
-
Easterby-Smith, M.1
Lyles, M.A.2
Tsang, E.W.K.3
-
22
-
-
0000877903
-
Dynamic capabilities: What are they?
-
K.M. Eisenhardt, and J.A. Martin Dynamic capabilities: what are they? Strateg Manag J 21 2000 1105 1121
-
(2000)
Strateg Manag J
, vol.21
, pp. 1105-1121
-
-
Eisenhardt, K.M.1
Martin, J.A.2
-
23
-
-
84874933538
-
Understanding insiders: An analysis of risk-taking behaviour
-
F. Farahmand, and E.H. Spafford Understanding insiders: an analysis of risk-taking behaviour Inf Syst Front 15 2013 5 15
-
(2013)
Inf Syst Front
, vol.15
, pp. 5-15
-
-
Farahmand, F.1
Spafford, E.H.2
-
24
-
-
0742268516
-
Googling for Gold: Web Crawlers, Hacking and Defense Explained
-
DOI 10.1016/S1353-4858(04)00023-6, PII S1353485804000236
-
R. Ford, and R. Helayne Googling for gold: web crawlers, hacking and defense explained Netw Secur 1 2004 10 13 (Pubitemid 38152183)
-
(2004)
Network Security
, vol.2004
, Issue.1
, pp. 10-13
-
-
Ford, R.1
Ray, H.2
-
26
-
-
78650294645
-
Gatekeepers in regional networks of innovators
-
H. Graf Gatekeepers in regional networks of innovators Camb J Econ 35 1 2011 173 198
-
(2011)
Camb J Econ
, vol.35
, Issue.1
, pp. 173-198
-
-
Graf, H.1
-
27
-
-
2942649403
-
Toward a knowledge-based theory of the firm
-
R.M. Grant Toward a knowledge-based theory of the firm Strateg Manag J 17 Winter special issue 1996 109 122
-
(1996)
Strateg Manag J
, vol.17
, pp. 109-122
-
-
Grant, R.M.1
-
28
-
-
0000149309
-
The knowledge-based view of the firm: Implications for management practice
-
PII S0024630197000253
-
R.M. Grant The knowledge-based view of the firm: implications for management practice Long Range Planning 30 1997 450 454 (Pubitemid 127705043)
-
(1997)
Long Range Planning
, vol.30
, Issue.3
, pp. 450-454
-
-
Grant, R.M.1
-
29
-
-
0041490885
-
What's your strategy for managing knowledge?
-
M. Hansen, N. Nohria, and T. Tierney What's your strategy for managing knowledge? Harv Bus Rev 77 2 1999 106 116
-
(1999)
Harv Bus Rev
, vol.77
, Issue.2
, pp. 106-116
-
-
Hansen, M.1
Nohria, N.2
Tierney, T.3
-
30
-
-
2942567931
-
The duality of knowledge
-
P.M. Hildreth, and C. Kimble The duality of knowledge Inf Res 8 1 2002
-
(2002)
Inf Res
, vol.8
, Issue.1
-
-
Hildreth, P.M.1
Kimble, C.2
-
31
-
-
85001796173
-
Exploring Secondary Activities of the Knowledge Chain
-
DOI 10.1002/kpm.219
-
C. Holsapple, and K. Jones Exploring secondary activities of the knowledge chain Knowl Process Manag 12 1 2005 3 31 (Pubitemid 40217694)
-
(2005)
Knowledge And Process Management
, vol.12
, Issue.1
, pp. 3-31
-
-
Holsapple, C.W.1
Jones, K.2
-
33
-
-
84874125828
-
Guest editorial: A brief overview of data leakage and insider threats
-
C.L. Huth Guest editorial: a brief overview of data leakage and insider threats Inf Syst Front 2013 1 4
-
(2013)
Inf Syst Front
, pp. 1-4
-
-
Huth, C.L.1
-
36
-
-
33646887480
-
Secure knowledge management and the Semantic Web
-
DOI 10.1145/1101779.1101808
-
J. Lee, S.J. Upadhyaya, H.R. Rao, and R. Sharman Secure knowledge management and the semantic web Commun ACM 48 12 2005 48 54 (Pubitemid 43906410)
-
(2005)
Communications of the ACM
, vol.48
, Issue.12
, pp. 48-54
-
-
Lee, J.1
Upadhyaya, S.J.2
Raghav Rao, H.3
Sharman, R.4
-
37
-
-
84938687906
-
Core capabilities and core rigidities: A paradox in managing new product development
-
D. Leonard-Barton Core capabilities and core rigidities: a paradox in managing new product development Strateg Manag J 13 Summer special issue 1992 111 126
-
(1992)
Strateg Manag J
, vol.13
, pp. 111-126
-
-
Leonard-Barton, D.1
-
38
-
-
0002083939
-
Knowledge, strategy, and the theory of the firm
-
J.P. Liebeskind Knowledge, strategy, and the theory of the firm Strateg Manag J 17 Winter Special Issue 1996 93 107
-
(1996)
Strateg Manag J
, vol.17
, pp. 93-107
-
-
Liebeskind, J.P.1
-
39
-
-
84989029859
-
The resource-based view within the conversation of strategic management
-
J.T. Mahoney, and J.R. Pandian The resource-based view within the conversation of strategic management Strateg Manag J 13 5 1992 363 380
-
(1992)
Strateg Manag J
, vol.13
, Issue.5
, pp. 363-380
-
-
Mahoney, J.T.1
Pandian, J.R.2
-
40
-
-
78649390704
-
Safe context for Interorganizational collaborations among homeland security professionals
-
M. Majchrzak, and S.L. Jarvenpaa Safe context for Interorganizational collaborations among homeland security professionals J Strateg Inf Syst 27 2 2010 55 86
-
(2010)
J Strateg Inf Syst
, vol.27
, Issue.2
, pp. 55-86
-
-
Majchrzak, M.1
Jarvenpaa, S.L.2
-
41
-
-
84858439683
-
Knowledge risks in organizational networks: The practice perspective
-
M. Marabelli, and S. Newell Knowledge risks in organizational networks: the practice perspective J Strateg Inf Syst 21 2012 18 30
-
(2012)
J Strateg Inf Syst
, vol.21
, pp. 18-30
-
-
Marabelli, M.1
Newell, S.2
-
44
-
-
0009993525
-
A dynamic theory of organizational knowledge creation
-
I. Nonaka A dynamic theory of organizational knowledge creation Organ Sci 5 1 1994 14 37
-
(1994)
Organ Sci
, vol.5
, Issue.1
, pp. 14-37
-
-
Nonaka, I.1
-
45
-
-
0002696386
-
SECI, Ba and Leadership: A unified model of dynamic knowledge creation
-
I. Nonaka, R. Toyama, and N. Konno SECI, Ba and Leadership: a unified model of dynamic knowledge creation Long Range Plan 33 2000 5 34
-
(2000)
Long Range Plan
, vol.33
, pp. 5-34
-
-
Nonaka, I.1
Toyama, R.2
Konno, N.3
-
46
-
-
0041370064
-
Are your secrets safe? Knowledge protection in strategic alliances
-
P.M. Norman Are your secrets safe? Knowledge protection in strategic alliances Bus Horizons Nov-Dec 2001 51 60
-
(2001)
Bus Horizons
, pp. 51-60
-
-
Norman, P.M.1
-
47
-
-
71949092630
-
Protecting knowledge assets in multinational enterprises: A comparative case approach
-
N. O'Donoghue, and D.T. Croasdell Protecting knowledge assets in multinational enterprises: a comparative case approach VINE 39 4 2009 298 318
-
(2009)
VINE
, vol.39
, Issue.4
, pp. 298-318
-
-
O'Donoghue, N.1
Croasdell, D.T.2
-
48
-
-
77954547842
-
The effects of HRM-related mechanisms on communication in R&D Collaboration
-
H. Olander, and P. Hurmelinna-Laukunnen The effects of HRM-related mechanisms on communication in R&D Collaboration Int J Innovation Manag 14 3 2010 415 433
-
(2010)
Int J Innovation Manag
, vol.14
, Issue.3
, pp. 415-433
-
-
Olander, H.1
Hurmelinna-Laukunnen, P.2
-
49
-
-
70350430509
-
What's small size got to do with it? Protection of intellectual assets in SMEs
-
H. Olander, P. Hurmelinna-Laukunnen, and J. Mahonen What's small size got to do with it? Protection of intellectual assets in SMEs Int J Innovation Manag 13 3 2009 349 370
-
(2009)
Int J Innovation Manag
, vol.13
, Issue.3
, pp. 349-370
-
-
Olander, H.1
Hurmelinna-Laukunnen, P.2
Mahonen, J.3
-
50
-
-
84989113324
-
The cornerstones of competitive advantage: A resource-based view
-
M.A. Peteraf The cornerstones of competitive advantage: a resource-based view Strateg Manag J 14 3 1993 179 191
-
(1993)
Strateg Manag J
, vol.14
, Issue.3
, pp. 179-191
-
-
Peteraf, M.A.1
-
52
-
-
77950135983
-
Reputation as an intangible asset: Reflections on theory and methods in two empirical studies of business school reputations
-
V.P. Rindova, I.O. Williamson, and A.P. Petkova Reputation as an intangible asset: reflections on theory and methods in two empirical studies of business school reputations J Manag 36 3 2010 610 619
-
(2010)
J Manag
, vol.36
, Issue.3
, pp. 610-619
-
-
Rindova, V.P.1
Williamson, I.O.2
Petkova, A.P.3
-
54
-
-
79955934365
-
Incorporating a knowledge perspective into security risk assessment
-
P. Shedden, R. Scheepers, W. Smith, and A. Ahmad Incorporating a knowledge perspective into security risk assessment VINE J Knowl Manag 41 2 2011 152 166
-
(2011)
VINE J Knowl Manag
, vol.41
, Issue.2
, pp. 152-166
-
-
Shedden, P.1
Scheepers, R.2
Smith, W.3
Ahmad, A.4
-
56
-
-
35548988920
-
Overcoming organizational challenges to secure knowledge management
-
DOI 10.1007/s10796-007-9052-5
-
F.O. Sveen, E. Rich, and M. Jager Overcoming organizational challenges to secure knowledge management Inf Syst Front 9 2007 481 492 (Pubitemid 350010909)
-
(2007)
Information Systems Frontiers
, vol.9
, Issue.5
, pp. 481-492
-
-
Sveen, F.O.1
Rich, E.2
Jager, M.3
-
59
-
-
84858447286
-
Knowledge risks in organizational networks: An exploratory framework
-
P. Trkman, and K. Desouza Knowledge risks in organizational networks: an exploratory framework J Strateg Inf Syst 21 2012 1 17
-
(2012)
J Strateg Inf Syst
, vol.21
, pp. 1-17
-
-
Trkman, P.1
Desouza, K.2
-
60
-
-
4243198165
-
Enemy at the gate: Threats to information security
-
M.E. Whitman Enemy at the gate: threats to information security Commun ACM 46 8 2003
-
(2003)
Commun ACM
, vol.46
, Issue.8
-
-
Whitman, M.E.1
-
62
-
-
0141792319
-
Understanding dynamic capabilities
-
S.G. Winter Understanding dynamic capabilities Strategic Manag J 24 2003 991 995
-
(2003)
Strategic Manag J
, vol.24
, pp. 991-995
-
-
Winter, S.G.1
|