메뉴 건너뛰기




Volumn 42, Issue , 2014, Pages 27-39

Protecting organizational competitive advantage: A knowledge leakage perspective

Author keywords

Information security; Knowledge leakage; Resource based view; Security risk; Sensitive information

Indexed keywords

COMPREHENSIVE MANAGEMENTS; IMPLICATIONS FOR FUTURES; KNOWLEDGE-INTENSIVE ORGANIZATIONS; ORGANIZATIONAL KNOWLEDGE; RESOURCE-BASED VIEW; SECURITY RISKS; SENSITIVE INFORMATIONS; STRATEGIC PERSPECTIVES;

EID: 84893760018     PISSN: 01674048     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.cose.2014.01.001     Document Type: Article
Times cited : (140)

References (62)
  • 1
    • 84901464474 scopus 로고    scopus 로고
    • Information security strategies: Towards an organisational multi-strategy perspective
    • A. Ahmad, S.B. Maynard, and S. Park Information security strategies: towards an organisational multi-strategy perspective J Intell Manuf 2012 1 14
    • (2012) J Intell Manuf , pp. 1-14
    • Ahmad, A.1    Maynard, S.B.2    Park, S.3
  • 3
    • 33846040793 scopus 로고    scopus 로고
    • Dare to share: Protecting sensitive knowledge with data sanitization
    • DOI 10.1016/j.dss.2006.08.007, PII S0167923606001230, Mobile Commerce: Strategies, Technologies, and Applications
    • A. Amiri Dare to share: protecting sensitive knowledge wit (Pubitemid 46073235)
    • (2007) Decision Support Systems , vol.43 , Issue.1 , pp. 181-191
    • Amiri, A.1
  • 4
    • 0008942383 scopus 로고    scopus 로고
    • Vol. 2nd ed. John Wiley and sons Indiana
    • R. Anderson Security engineering Vol. 2nd ed. 2008 John Wiley and sons Indiana
    • (2008) Security Engineering
    • Anderson, R.1
  • 6
    • 84896930624 scopus 로고
    • Firm resources and sustained competitive advantage
    • J. Barney Firm resources and sustained competitive advantage J Manag 17 1 1991 99 120
    • (1991) J Manag , vol.17 , Issue.1 , pp. 99-120
    • Barney, J.1
  • 7
    • 21444454485 scopus 로고    scopus 로고
    • The resource-based theory of the firm
    • J. Barney The resource-based theory of the firm Organ Sci 7 5 1996 469 479
    • (1996) Organ Sci , vol.7 , Issue.5 , pp. 469-479
    • Barney, J.1
  • 9
    • 84861092434 scopus 로고    scopus 로고
    • Bypassing information leakage protection with trusted applications
    • A. Blasco, and X. Jorge Bypassing information leakage protection with trusted applications Comput Secur 31 4 2013 557 568
    • (2013) Comput Secur , vol.31 , Issue.4 , pp. 557-568
    • Blasco, A.1    Jorge, X.2
  • 10
    • 0035342396 scopus 로고    scopus 로고
    • Understanding the influence of organizational change strategies on information technology and knowledge management strategies
    • DOI 10.1016/S0167-9236(00)00119-6, PII S0167923600001196
    • J.M. Bloodgood, and W.D. Salisbury Understanding the influence of organizational change strategies on information technology and knowledge management strategies Decis Support Syst 31 2001 55 69 (Pubitemid 32284753)
    • (2001) Decision Support Systems , vol.31 , Issue.1 , pp. 55-69
    • Bloodgood, J.M.1    Salisbury, W.D.2
  • 11
    • 77950124246 scopus 로고    scopus 로고
    • Reconsidering the reputation - Performance relationship: A resource-based view
    • B.K. Boyd, D.D. Bergh, and D.K. Ketchen Reconsidering the reputation - performance relationship: a resource-based view J Manag 36 3 2010 588 609
    • (2010) J Manag , vol.36 , Issue.3 , pp. 588-609
    • Boyd, B.K.1    Bergh, D.D.2    Ketchen, D.K.3
  • 12
    • 79952771287 scopus 로고    scopus 로고
    • Network closure's impact on firms' competitive advantage
    • H.-K. Chai, C.M. Yap, and X. Wang Network closure's impact on firms' competitive advantage J Eng Technol Manag 28 2011 2 22
    • (2011) J Eng Technol Manag , vol.28 , pp. 2-22
    • Chai, H.-K.1    Yap, C.M.2    Wang, X.3
  • 14
    • 77953810798 scopus 로고    scopus 로고
    • Knowledge protection strategies of mutinational firms - A cross-country comparison
    • P. De Faria, and W. Sofka Knowledge protection strategies of mutinational firms - a cross-country comparison Res Policy 39 2010 956 968
    • (2010) Res Policy , vol.39 , pp. 956-968
    • De Faria, P.1    Sofka, W.2
  • 16
    • 84873185734 scopus 로고    scopus 로고
    • Knowledge Security: An interesting research space
    • K.C. DeSouza Knowledge Security: an interesting research space J Inf Sci Technol 25 2006 85 98
    • (2006) J Inf Sci Technol , vol.25 , pp. 85-98
    • Desouza, K.C.1
  • 17
    • 12444282670 scopus 로고    scopus 로고
    • Securing knowledge in organizations: Lessons from the defense and intelligence sectors
    • K.C. DeSouza, and G.K. Vanapalli Securing knowledge in organizations: lessons from the defense and intelligence sectors Int J Inf Manag 3 1 2005 1 7
    • (2005) Int J Inf Manag , vol.3 , Issue.1 , pp. 1-7
    • Desouza, K.C.1    Vanapalli, G.K.2
  • 19
    • 0000857363 scopus 로고
    • Asset stock accumulation and sustainability of competitive advantage
    • L. Dierickx, and K. Cool Asset stock accumulation and sustainability of competitive advantage Manag Sci 35 12 1989 1504 1511
    • (1989) Manag Sci , vol.35 , Issue.12 , pp. 1504-1511
    • Dierickx, L.1    Cool, K.2
  • 20
    • 0034899986 scopus 로고    scopus 로고
    • Knowledge management strategies: Toward a taxonomy
    • M. Earl Knowledge management strategies: towards a taxonomy J Manag Inf Syst 18 1 2001 215 233 (Pubitemid 32716730)
    • (2001) Journal of Management Information Systems , vol.18 , Issue.1 , pp. 215-233
    • Earl, M.1
  • 21
    • 43049109560 scopus 로고    scopus 로고
    • Inter-organizational knowledge transfer: Current themes and future prospects
    • M. Easterby-Smith, M.A. Lyles, and E.W.K. Tsang Inter-organizational knowledge transfer: current themes and future prospects J Manag Stud 45 4 2008 677 690
    • (2008) J Manag Stud , vol.45 , Issue.4 , pp. 677-690
    • Easterby-Smith, M.1    Lyles, M.A.2    Tsang, E.W.K.3
  • 22
    • 0000877903 scopus 로고    scopus 로고
    • Dynamic capabilities: What are they?
    • K.M. Eisenhardt, and J.A. Martin Dynamic capabilities: what are they? Strateg Manag J 21 2000 1105 1121
    • (2000) Strateg Manag J , vol.21 , pp. 1105-1121
    • Eisenhardt, K.M.1    Martin, J.A.2
  • 23
    • 84874933538 scopus 로고    scopus 로고
    • Understanding insiders: An analysis of risk-taking behaviour
    • F. Farahmand, and E.H. Spafford Understanding insiders: an analysis of risk-taking behaviour Inf Syst Front 15 2013 5 15
    • (2013) Inf Syst Front , vol.15 , pp. 5-15
    • Farahmand, F.1    Spafford, E.H.2
  • 24
    • 0742268516 scopus 로고    scopus 로고
    • Googling for Gold: Web Crawlers, Hacking and Defense Explained
    • DOI 10.1016/S1353-4858(04)00023-6, PII S1353485804000236
    • R. Ford, and R. Helayne Googling for gold: web crawlers, hacking and defense explained Netw Secur 1 2004 10 13 (Pubitemid 38152183)
    • (2004) Network Security , vol.2004 , Issue.1 , pp. 10-13
    • Ford, R.1    Ray, H.2
  • 26
    • 78650294645 scopus 로고    scopus 로고
    • Gatekeepers in regional networks of innovators
    • H. Graf Gatekeepers in regional networks of innovators Camb J Econ 35 1 2011 173 198
    • (2011) Camb J Econ , vol.35 , Issue.1 , pp. 173-198
    • Graf, H.1
  • 27
    • 2942649403 scopus 로고    scopus 로고
    • Toward a knowledge-based theory of the firm
    • R.M. Grant Toward a knowledge-based theory of the firm Strateg Manag J 17 Winter special issue 1996 109 122
    • (1996) Strateg Manag J , vol.17 , pp. 109-122
    • Grant, R.M.1
  • 28
    • 0000149309 scopus 로고    scopus 로고
    • The knowledge-based view of the firm: Implications for management practice
    • PII S0024630197000253
    • R.M. Grant The knowledge-based view of the firm: implications for management practice Long Range Planning 30 1997 450 454 (Pubitemid 127705043)
    • (1997) Long Range Planning , vol.30 , Issue.3 , pp. 450-454
    • Grant, R.M.1
  • 29
    • 0041490885 scopus 로고    scopus 로고
    • What's your strategy for managing knowledge?
    • M. Hansen, N. Nohria, and T. Tierney What's your strategy for managing knowledge? Harv Bus Rev 77 2 1999 106 116
    • (1999) Harv Bus Rev , vol.77 , Issue.2 , pp. 106-116
    • Hansen, M.1    Nohria, N.2    Tierney, T.3
  • 30
    • 2942567931 scopus 로고    scopus 로고
    • The duality of knowledge
    • P.M. Hildreth, and C. Kimble The duality of knowledge Inf Res 8 1 2002
    • (2002) Inf Res , vol.8 , Issue.1
    • Hildreth, P.M.1    Kimble, C.2
  • 31
    • 85001796173 scopus 로고    scopus 로고
    • Exploring Secondary Activities of the Knowledge Chain
    • DOI 10.1002/kpm.219
    • C. Holsapple, and K. Jones Exploring secondary activities of the knowledge chain Knowl Process Manag 12 1 2005 3 31 (Pubitemid 40217694)
    • (2005) Knowledge And Process Management , vol.12 , Issue.1 , pp. 3-31
    • Holsapple, C.W.1    Jones, K.2
  • 32
    • 77952058900 scopus 로고    scopus 로고
    • Formation of the appropriate regime: Strategic and practical considerations
    • P. Hurmelinna-Laukkanen, and K. Puumalainen Formation of the appropriate regime: strategic and practical considerations Innovation Manag policy Pract 9 2007 2 13
    • (2007) Innovation Manag Policy Pract , vol.9 , pp. 2-13
    • Hurmelinna-Laukkanen, P.1    Puumalainen, K.2
  • 33
    • 84874125828 scopus 로고    scopus 로고
    • Guest editorial: A brief overview of data leakage and insider threats
    • C.L. Huth Guest editorial: a brief overview of data leakage and insider threats Inf Syst Front 2013 1 4
    • (2013) Inf Syst Front , pp. 1-4
    • Huth, C.L.1
  • 37
    • 84938687906 scopus 로고
    • Core capabilities and core rigidities: A paradox in managing new product development
    • D. Leonard-Barton Core capabilities and core rigidities: a paradox in managing new product development Strateg Manag J 13 Summer special issue 1992 111 126
    • (1992) Strateg Manag J , vol.13 , pp. 111-126
    • Leonard-Barton, D.1
  • 38
    • 0002083939 scopus 로고    scopus 로고
    • Knowledge, strategy, and the theory of the firm
    • J.P. Liebeskind Knowledge, strategy, and the theory of the firm Strateg Manag J 17 Winter Special Issue 1996 93 107
    • (1996) Strateg Manag J , vol.17 , pp. 93-107
    • Liebeskind, J.P.1
  • 39
    • 84989029859 scopus 로고
    • The resource-based view within the conversation of strategic management
    • J.T. Mahoney, and J.R. Pandian The resource-based view within the conversation of strategic management Strateg Manag J 13 5 1992 363 380
    • (1992) Strateg Manag J , vol.13 , Issue.5 , pp. 363-380
    • Mahoney, J.T.1    Pandian, J.R.2
  • 40
    • 78649390704 scopus 로고    scopus 로고
    • Safe context for Interorganizational collaborations among homeland security professionals
    • M. Majchrzak, and S.L. Jarvenpaa Safe context for Interorganizational collaborations among homeland security professionals J Strateg Inf Syst 27 2 2010 55 86
    • (2010) J Strateg Inf Syst , vol.27 , Issue.2 , pp. 55-86
    • Majchrzak, M.1    Jarvenpaa, S.L.2
  • 41
    • 84858439683 scopus 로고    scopus 로고
    • Knowledge risks in organizational networks: The practice perspective
    • M. Marabelli, and S. Newell Knowledge risks in organizational networks: the practice perspective J Strateg Inf Syst 21 2012 18 30
    • (2012) J Strateg Inf Syst , vol.21 , pp. 18-30
    • Marabelli, M.1    Newell, S.2
  • 44
    • 0009993525 scopus 로고
    • A dynamic theory of organizational knowledge creation
    • I. Nonaka A dynamic theory of organizational knowledge creation Organ Sci 5 1 1994 14 37
    • (1994) Organ Sci , vol.5 , Issue.1 , pp. 14-37
    • Nonaka, I.1
  • 45
    • 0002696386 scopus 로고    scopus 로고
    • SECI, Ba and Leadership: A unified model of dynamic knowledge creation
    • I. Nonaka, R. Toyama, and N. Konno SECI, Ba and Leadership: a unified model of dynamic knowledge creation Long Range Plan 33 2000 5 34
    • (2000) Long Range Plan , vol.33 , pp. 5-34
    • Nonaka, I.1    Toyama, R.2    Konno, N.3
  • 46
    • 0041370064 scopus 로고    scopus 로고
    • Are your secrets safe? Knowledge protection in strategic alliances
    • P.M. Norman Are your secrets safe? Knowledge protection in strategic alliances Bus Horizons Nov-Dec 2001 51 60
    • (2001) Bus Horizons , pp. 51-60
    • Norman, P.M.1
  • 47
    • 71949092630 scopus 로고    scopus 로고
    • Protecting knowledge assets in multinational enterprises: A comparative case approach
    • N. O'Donoghue, and D.T. Croasdell Protecting knowledge assets in multinational enterprises: a comparative case approach VINE 39 4 2009 298 318
    • (2009) VINE , vol.39 , Issue.4 , pp. 298-318
    • O'Donoghue, N.1    Croasdell, D.T.2
  • 48
    • 77954547842 scopus 로고    scopus 로고
    • The effects of HRM-related mechanisms on communication in R&D Collaboration
    • H. Olander, and P. Hurmelinna-Laukunnen The effects of HRM-related mechanisms on communication in R&D Collaboration Int J Innovation Manag 14 3 2010 415 433
    • (2010) Int J Innovation Manag , vol.14 , Issue.3 , pp. 415-433
    • Olander, H.1    Hurmelinna-Laukunnen, P.2
  • 49
    • 70350430509 scopus 로고    scopus 로고
    • What's small size got to do with it? Protection of intellectual assets in SMEs
    • H. Olander, P. Hurmelinna-Laukunnen, and J. Mahonen What's small size got to do with it? Protection of intellectual assets in SMEs Int J Innovation Manag 13 3 2009 349 370
    • (2009) Int J Innovation Manag , vol.13 , Issue.3 , pp. 349-370
    • Olander, H.1    Hurmelinna-Laukunnen, P.2    Mahonen, J.3
  • 50
    • 84989113324 scopus 로고
    • The cornerstones of competitive advantage: A resource-based view
    • M.A. Peteraf The cornerstones of competitive advantage: a resource-based view Strateg Manag J 14 3 1993 179 191
    • (1993) Strateg Manag J , vol.14 , Issue.3 , pp. 179-191
    • Peteraf, M.A.1
  • 52
    • 77950135983 scopus 로고    scopus 로고
    • Reputation as an intangible asset: Reflections on theory and methods in two empirical studies of business school reputations
    • V.P. Rindova, I.O. Williamson, and A.P. Petkova Reputation as an intangible asset: reflections on theory and methods in two empirical studies of business school reputations J Manag 36 3 2010 610 619
    • (2010) J Manag , vol.36 , Issue.3 , pp. 610-619
    • Rindova, V.P.1    Williamson, I.O.2    Petkova, A.P.3
  • 54
    • 79955934365 scopus 로고    scopus 로고
    • Incorporating a knowledge perspective into security risk assessment
    • P. Shedden, R. Scheepers, W. Smith, and A. Ahmad Incorporating a knowledge perspective into security risk assessment VINE J Knowl Manag 41 2 2011 152 166
    • (2011) VINE J Knowl Manag , vol.41 , Issue.2 , pp. 152-166
    • Shedden, P.1    Scheepers, R.2    Smith, W.3    Ahmad, A.4
  • 56
    • 35548988920 scopus 로고    scopus 로고
    • Overcoming organizational challenges to secure knowledge management
    • DOI 10.1007/s10796-007-9052-5
    • F.O. Sveen, E. Rich, and M. Jager Overcoming organizational challenges to secure knowledge management Inf Syst Front 9 2007 481 492 (Pubitemid 350010909)
    • (2007) Information Systems Frontiers , vol.9 , Issue.5 , pp. 481-492
    • Sveen, F.O.1    Rich, E.2    Jager, M.3
  • 59
    • 84858447286 scopus 로고    scopus 로고
    • Knowledge risks in organizational networks: An exploratory framework
    • P. Trkman, and K. Desouza Knowledge risks in organizational networks: an exploratory framework J Strateg Inf Syst 21 2012 1 17
    • (2012) J Strateg Inf Syst , vol.21 , pp. 1-17
    • Trkman, P.1    Desouza, K.2
  • 60
    • 4243198165 scopus 로고    scopus 로고
    • Enemy at the gate: Threats to information security
    • M.E. Whitman Enemy at the gate: threats to information security Commun ACM 46 8 2003
    • (2003) Commun ACM , vol.46 , Issue.8
    • Whitman, M.E.1
  • 62
    • 0141792319 scopus 로고    scopus 로고
    • Understanding dynamic capabilities
    • S.G. Winter Understanding dynamic capabilities Strategic Manag J 24 2003 991 995
    • (2003) Strategic Manag J , vol.24 , pp. 991-995
    • Winter, S.G.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.