The Characteristics of Access Control Model Towards Securing Collaborative Knowledge Management System: Empirical Verification
DOI: 389 Downloads 8200 Views
Author(s)
Abstract
Knowledge Management System (KMS) is such an application of computer based communications and information systems that grant sharing and transferring knowledge effectively; furthermore with the evolution of Internet, KMS has improved its knowledge process and activities where it can be accessed with varied form of technologies such as email, video conferencing and so forth, from dispersed geographical area. Hence, security becomes major issue as knowledge is an intellectual property of an organization and it must be well managed. Mostly the issues are regard to the restriction of the access permission to knowledge. Therefore, there is a need to construct a security model towards secure KMS, for managing access restriction in order to avoid unauthorized access as well as to protect knowledge throughout Knowledge Management (KM) activities. This research found that Access Control Model (ACM) is competent to overcome these issues, thus, this paper is to study the characteristics of this security model which considering the criteria of collaborative system as the KMS will be developed in collaborative environment. The study entailed online questionnaire survey and was responed by multi level groups of Community of Practice (CoP). Generally, the result of this study shows that the Quality Dimension which consists of fourteen (14) criteria has been agreed from most of the respondents. These criteria will be applied during the development of the system prototype of secure collaborative KMS.
Keywords
Knowledge Management System (KMS), Secure KMS, Quality Dimension, Access Control Model
Cite this paper
Azreena Abu Bakar, Rusli Abdullah,
The Characteristics of Access Control Model Towards Securing Collaborative Knowledge Management System: Empirical Verification
, SCIREA Journal of Computer.
Volume 2, Issue 1, February 2017 | PP. 1-11.
References
[ 1 ] | J. H. Wu and Y. M. Wang, “Measuring KMS success: A respecification of the DeLone and McLean’s model,” Inf. Manag., vol. 43, pp. 728–739, 2006. |
[ 2 ] | R. Abdullah, Knowledge Management Systen in a Collaborative Environment. Serdang, Malaysia: Penerbit Universiti Putra Malaysia, 2008. |
[ 3 ] | W. R. King, “Knowledge Management and Organizational Learning,” vol. 4, pp. 3–13, 2009. |
[ 4 ] | M. E. Jennex and S. Zyngier, “Security as a contributor to knowledge management success,” Inf. Syst. Front., vol. 9, no. 5, pp. 493–504, Oct. 2007. |
[ 5 ] | X. Zu, L. Liu, and R. Xu, “Access Control Architecture Design Issues in Enterprise Collaborative Environment,” 2009 Int. Conf. Manag. Serv. Sci., pp. 1–4, Sep. 2009. |
[ 6 ] | E. Ngai and E. Chan, “Evaluation of Knowledge Management Tools using AHP,” Expert Syst. Appl., vol. 29, no. 4, pp. 889–899, 2005. |
[ 7 ] | H. Zhu, “Role Mechanisms in Collaborative Systems,” Int. J. Prod. Res., vol. 44, pp. 181–193, 2006. |
[ 8 ] | A. M. Colarik, Cyber Terrorism: Political and Economic Implications. Igi Global, 2006. |
[ 9 ] | M. Doinea and W. Van Osch, “Collaborative Systems : Defining and Measuring Quality Characteristics,” J. Appl. Collab. Syst., vol. 2, no. 1, pp. 50–61, 2010. |
[ 10 ] | W. Tolone, G.-J. Ahn, T. Pai, and S.-P. Hong, “Access control in collaborative systems,” ACM Comput. Surv., vol. 37, no. 1, pp. 29–41, Mar. 2005. |
[ 11 ] | Y. Lu, L. Zhang, and J. Sun, “Task-activity based access control for process collaboration environments,” Comput. Ind., vol. 60, no. 6, pp. 403–415, Aug. 2009. |
[ 12 ] | T.-Y. Chen, “Knowledge sharing in virtual enterprises via an ontology-based access control approach,” Comput. Ind., vol. 59, no. 5, pp. 502–519, May 2008. |
[ 13 ] | A. Abu Bakar, R. Abdullah, N. I. Udzir, and H. Ibrahim, “An Empirical Study of the Characteristics of Access Control Model Towards Secure KMS in Collaborative Environment,” in International Conference on Electrical Engineering and Informatics, 2011, no. July. |
[ 14 ] | M. S. Owlia, “A framework for quality dimensions of knowledge management systems,” Total Qual. Manag. Bus. Excell., vol. 21, no. 11, pp. 1215–1228, Nov. 2010. |
[ 15 ] | D. A. Garvin, Managing Quality: The Strategic and Competitive Edge. New York: The Free Press, 1988, p. 319. |
[ 16 ] | M. Usrey and K. Dooley, “The Dimensions of Software Quality,” Qual. Manag. J., vol. 3, no. 3, pp. 67–86, 1996. |
[ 17 ] | M. E. Jennex and L. Olfman, “Modeling Knowledge Management Success,” in Conference on Information Science and Technology Management (CISTM), 2004. |
[ 18 ] | W. E. Sasser, R. P. Olsen, and D. D. Wyckoff, Management of Service Operations, 2nd ed. Boston: Allyn & Bacon, 1978. |
[ 19 ] | A. Tiwana, The Knowledge Management Toolkit: Orchestrating IT, Strategy, And Knowledge Platforms (2nd Edition), 2nd ed. Prentice Hall, 2002, p. 416. |
[ 20 ] | I. M. Olson and M. D. Abrams, “Information Security Policy,” in Information Security: An Integrated Collection of Essays, Los Alamitos, California: IEEE Computer Society Press, 1995, pp. 160–170. |
[ 21 ] | M. S. Adalati, P. Akhavan, and R. Hosnavi, “Essential Issues in Knowledge Management System Implementation: Lessons from Iranian IT-Based,” in 11th International Conference of Social Responsibility, Professional Ethics, and Management, 2010, no. November, pp. 24–27. |