IDEAS home Printed from https://ideas.repec.org/p/hal/journl/hal-02953836.html
   My bibliography  Save this paper

Trusting Security When Sharing Knowledge?

Author

Listed:
  • Pierre-Emmanuel Arduin

    (DRM - Dauphine Recherches en Management - Université Paris Dauphine-PSL - PSL - Université Paris sciences et lettres - CNRS - Centre National de la Recherche Scientifique)

  • Bako Rajaonah

    (LAMIH - Laboratoire d'Automatique, de Mécanique et d'Informatique industrielles et Humaines - UMR 8201 - CNRS - Centre National de la Recherche Scientifique - UPHF - Université Polytechnique Hauts-de-France - INSA Hauts-De-France - INSA Institut National des Sciences Appliquées Hauts-de-France - INSA - Institut National des Sciences Appliquées)

  • Káthia Marçal de Oliveira

    (LAMIH - Laboratoire d'Automatique, de Mécanique et d'Informatique industrielles et Humaines - UMR 8201 - CNRS - Centre National de la Recherche Scientifique - UPHF - Université Polytechnique Hauts-de-France - INSA Hauts-De-France - INSA Institut National des Sciences Appliquées Hauts-de-France - INSA - Institut National des Sciences Appliquées)

Abstract

This chapter tackles knowledge sharing by focusing on security and trust issues. Although trust is recognized as important in security issues, few studies on information systems (ISs) deal with both trust and security. Knowledge sharing relies on sense-giving and sense-reading processes which require, encourage, and even create trust within individuals. We argue that individuals are processors of information and interpret information to create their own tacit knowledge.Recent security reports from organizations have presented that the majority of ISs security threats involve employees within the organizations. Individuals, as well as computers, maybe attacked through social engineering techniques in order to gain their trust. Despite this evidence, most of the work has focused on the control of outsider security threats rather than of insider security threats, particularly when humans are perpetrators.We propose to study insider threats through a trust factor during the knowledge sharing process. Knowledge sharers may induce insider threats for security due to trust-related attitudes and behaviours. The proposition is twofold with interviews and self-report questionnaires to collect information about the trust, and ontologies to categorize such information. The proposition is then discussed, notably in terms of problems and answers leading to study trust in security when sharing knowledge.

Suggested Citation

  • Pierre-Emmanuel Arduin & Bako Rajaonah & Káthia Marçal de Oliveira, 2020. "Trusting Security When Sharing Knowledge?," Post-Print hal-02953836, HAL.
  • Handle: RePEc:hal:journl:hal-02953836
    DOI: 10.1007/978-3-030-40390-4_11
    Note: View the original document on HAL open archive server: https://hal.science/hal-02953836
    as

    Download full text from publisher

    File URL: https://hal.science/hal-02953836/document
    Download Restriction: no

    File URL: https://libkey.io/10.1007/978-3-030-40390-4_11?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    More about this item

    Keywords

    Tacit knowledge; Trust; Insider threats;
    All these keywords.

    NEP fields

    This paper has been announced in the following NEP Reports:

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:hal:journl:hal-02953836. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: CCSD (email available below). General contact details of provider: https://hal.archives-ouvertes.fr/ .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.