IDEAS home Printed from https://ideas.repec.org/a/igg/jea000/v3y2011i4p44-51.html
   My bibliography  Save this article

Preventing Social Engineering and Espionage in Collaborative Knowledge Management Systems (KMSs)

Author

Listed:
  • Oluwafemi S. Ogunseye

    (University of Agriculture, Nigeria)

  • Olusegun Folorunso

    (University of Agriculture, Nigeria)

  • Jeff Zhang

    (Ball State University, USA)

Abstract

Insider attack and espionage on computer-based information is a major problem for business organizations and governments. Knowledge Management Systems (KMSs) are not exempt from this threat. Prior research presented the Congenial Access Control Model (CAC), a relationship-based access control model, as a better access control method for KMS because it reduces the adverse effect of stringent security measures on the usability of KMSs. However, the CAC model, like other models, e.g., Role Based Access Control (RBAC), Time-Based Access Control (TBAC), and History Based Access Control (HBAC), does not provide adequate protection against privilege abuse by authorized users that can lead to industrial espionage. In this paper, the authors provide an Espionage Prevention Model (EP) that uses Semantic web-based annotations on knowledge assets to store relevant information and compares it to the Friend-Of-A-Friend (FOAF) data of the potential recipient of the resource. It can serve as an additional layer to previous access control models, preferably the Congenial Access Control (CAC) model.

Suggested Citation

  • Oluwafemi S. Ogunseye & Olusegun Folorunso & Jeff Zhang, 2011. "Preventing Social Engineering and Espionage in Collaborative Knowledge Management Systems (KMSs)," International Journal of E-Adoption (IJEA), IGI Global, vol. 3(4), pages 44-51, October.
  • Handle: RePEc:igg:jea000:v:3:y:2011:i:4:p:44-51
    as

    Download full text from publisher

    File URL: http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/jea.2011100104
    Download Restriction: no
    ---><---

    More about this item

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:igg:jea000:v:3:y:2011:i:4:p:44-51. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Journal Editor (email available below). General contact details of provider: https://www.igi-global.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.