Start Date
10-12-2017 12:00 AM
Description
Information and knowledge leakage has become a significant security risk to organizations. Each security incident in business cost an average US$2.8 million. Furthermore, organizations spend US$1.2 million on average investigating and assessing information breaches. The leakage of sensitive organizational knowledge occurs through different avenues, such as social media, cloud computing and mobile devices. In this study, we (1) analyze the knowledge leakage risk (KLR) caused by the use of mobile devices in knowledge-intensive organizations, (2) present a conceptual research model to explain the determinants that influence KLR through the use of mobile devices grounded in the literature, (3) conduct interviews with security and knowledge managers to understand what strategies they use to mitigate KLR caused by the use of mobile devices and (4) present preliminary findings drawing on the conceptual model and the interviews.
Recommended Citation
Agudelo-Serna, Carlos Andres; Bosua, Rachelle; Ahmad, Atif; and Maynard, Sean, "Strategies to Mitigate Knowledge Leakage Risk caused by the use of mobile devices: A Preliminary Study" (2017). ICIS 2017 Proceedings. 24.
https://aisel.aisnet.org/icis2017/Security/Presentations/24
Strategies to Mitigate Knowledge Leakage Risk caused by the use of mobile devices: A Preliminary Study
Information and knowledge leakage has become a significant security risk to organizations. Each security incident in business cost an average US$2.8 million. Furthermore, organizations spend US$1.2 million on average investigating and assessing information breaches. The leakage of sensitive organizational knowledge occurs through different avenues, such as social media, cloud computing and mobile devices. In this study, we (1) analyze the knowledge leakage risk (KLR) caused by the use of mobile devices in knowledge-intensive organizations, (2) present a conceptual research model to explain the determinants that influence KLR through the use of mobile devices grounded in the literature, (3) conduct interviews with security and knowledge managers to understand what strategies they use to mitigate KLR caused by the use of mobile devices and (4) present preliminary findings drawing on the conceptual model and the interviews.