Knowledge Management and Security

1. Preventing Social Engineering and Espionage in Collaborative Knowledge Management Systems (KMSs), Adoption of Virtual Technologies for Business, Educational, and Governmental Advancements, IGI. With Olusegun Folorunso and Jeff Zhang

Insider attack and espionage on computer-based information is a major problem for business organizations and governments. Knowledge Management Systems (KMSs) are not exempt from this threat. Prior research presented the Congenial Access Control Model (CAC), a relationship-based access control model, as a better access control method for KMS because it reduces the adverse effect of stringent security measures on the usability of KMSs. However, the CAC model, like other models, e.g., Role Based Access Control (RBAC), Time-Based Access Control (TBAC), and History Based Access Control (HBAC), does not provide adequate protection against privilege abuse by authorized users that can lead to industrial espionage. In this paper, the authors provide an Espionage Prevention Model (EP) that uses Semantic web-based annotations on knowledge assets to store relevant information and compares it to the FriendOf-A-Friend (FOAF) data of the potential recipient of the resource. It can serve as an additional layer to previous access control models, preferably the Congenial Access Control (CAC) model

2. Ogunseye, O. S., Adetiloye, P. K., Idowu, S. O., Folorunso, O., & Akinwale, A. T. (2011). Harvesting knowledge from computer-mediated social networks. Vine

This paper aims to focus on how the advantages of computer mediated social networks (CMSN) can be effectively harnessed to create value for organizations in the form of ready knowledge and quick solutions to problems. Design/methodology/approach A knowledge capture technique – the Delphi technique – was fused into the social networking process. A model was designed to help show how this can be achieved and further illustrated through a case study of the dotCSC intranet portal – a social networking project conceptualized and designed by the authors for the Department of Computer Science, in the authors’ university. An online survey was carried out to determine the efficacy of the prototype dotCSC. Findings The results show that, though computer mediated social networks are regarded as major sources of social capital development and potential sources of knowledge capital, there is still room for improvement in their present design if they are to be effectively used for knowledge creation and management attaining their optimum potential. Conversely, the bad spells and pitfalls of KM acceptance and deployment in organizations tend to be reduced when it is amalgamated with SN. The survey conducted showed that the users of the dotCSC enjoyed using the prototype as they would any other CMSN and that the strategies employed in the development of the dotCSC was effective in problem solving, knowledge creation, capturing, and indeed, management. Research limitations/implications This improvement strategy is by no means exhaustive of the creative ways that knowledge capturing and management concepts can be combined and applied in the actual design of CMSNs for the benefit of organizations. It is meant to be an eye opener, a clarion call to developers and IS managers. It will also serve as a starting point into the future of objective KM oriented CMSN. Possible response bias from some respondents can be considered a primary limitation of the research. Originality/value Looking through existing documentation and literature would show that this research presents a novel approach/model in the design of CMSNs. It is able to aid knowledge generation or synthesis in organizations by objectively structuring staff conversations through the CMSNs to facilitate knowledge management. It can also help organizations leverage the success and appeal of CMSN in their design of KMSs.

3. Meta-heuristics based multi-layer access control technique (MBMAC). ANALE Seria Informatica, 145-154. WIth J. Okesola

Access control is a major preventative measure for sensitive resources. Most access control methods have been found to be inadequate in providing sufficient security to KMSs which house the sources of competitive advantage for many organizations today. However, current research showed that combining access control techniques can help provide better security. In this work, a meta-heuristic strategy for access control technique combination that is both more effective than previous methods of combination but also more effective is presented. The new method applies access control technique with human reasoning in a multilayer architecture ensuring that malicious users are prevented access and the misuse or abuse of priviledges common to other methods is stemmed.

4. Challenges in the adoption of visualization system: a survey
Kybernetes 2008. With Olusegun Folorunso

The need for maximum cognition from massive amounts of data is becoming explosive. Different visualization mechanisms are being introduced to achieve this aim. This paper aims to consider the state of organizations as regards being abreast with the recent visualization technologies. Design/methodology/approach – In this paper, the authors look critically at the system adoption life cycle as it applied to visualization system. Also, the two forms of visualization; static and dynamic are looked at, considering the least applied and why. An evaluation of the visualization system was implemented in order to discern if it provides any benefit to organizations. Findings – The study showed that the RT‐DANGO tool when compared to result from Excel exposed some spikes at some points when visualized dynamically which are not observed using usual static graph as it exposed some unseen events. The mean time taken to finish analysis of 4,000 concurrent‐related data were 168 s using RT‐DANGO and 121 s with the MS‐Excel. The difference was significant to p<0.05 (Z=−2.040). This was considered a reasonable tradeoff for accuracy, clarity and completeness of information. Originality/value – The paper shows the factors that are responsible for visualization's usage in organizations. The paper will thus serve as an eye opener to critical issues affecting the visualization industry to the benefit of all stakeholders. Some references are made to the challenges faced in Nigeria.

5. Folorunso, O., & Ogunseye, S. O. (2008). Applying an enhanced technology acceptance model to knowledge management in agricultural extension services. Data Science Journal, 7, 31-45

This research investigates the applicability of Davis’s Technology Acceptance Model (TAM) to agriculturist’s acceptance of a knowledge management system (KMS), developed by the authors. It is called AGROWIT. Although the authors used previous Technology Acceptance Model user acceptance research as a basis for investigation of user acceptance of AGROWIT, the model had to be extended and constructs from the Triandis model that were added increased the predictive results of the TAM, but only slightly. Relationships among primary TAM constructs used are in substantive agreement with those characteristic of previous TAM research. Significant positive relationships between perceived usefulness, ease of use, and system usage were consistent with previous TAM research. The observed mediating role of perceived usefulness in the relationship between ease of use and usage was also in consonance with earlier findings. The findings are significant because they suggest that the considerable body of previous TAM-related information technology research may be usefully applied to the knowledge management domain to promote further investigation of factors affecting the acceptance and usage of knowledge management information systems such as AGROWIT by farmers, extension workers, and agriculture researchers.