502
Views
10
CrossRef citations to date
0
Altmetric
Original Articles

Identifying and Ranking Knowledge Management Tools and Techniques Affecting Organizational Information Security Improvement

&
Pages 276-305 | Received 11 Apr 2017, Accepted 21 Mar 2019, Published online: 26 Apr 2019

References

  • Asian Productivity Organization (APO). (2010). Knowledge management tools and techniques manual. Retrived from http://www.apo-tokyo.org/00e-books/IS-43_KM-ools_and_Techniques_2010/IS-43_KM-ools_and_Techniques_2010.pdf
  • Azar, A., & Faraji, H. (2010). Fuzzy management science (pp. 50–180). Tehran, Iran: Mehraban Nashr Press.
  • Benaroch, M., Chernobai, A., & Goldstein, J. (2012). An internal control perspective on the market value consequences of IT operational risk events. International Journal of Accounting Information Systems, 13(4), 357–381.
  • Bertino, E., Khan, L. R., Sandhu, R., & Thuraisingham, B. (2006). Secure knowledge management: Confidentiality, trust, and privacy. IEEE Transactions on Systems, Man, and Cybernetics Part A:Systems and Humans, 36(3), 429–438.
  • Bodin, L. D., Gordon, L. A., & Loeb, M. P. (2008). Information security and risk management. Communications of the ACM, 51(4), 64–68.
  • Büyüközkan, G., & Güleryüz, S. (2016). An integrated DEMATEL-ANP approach for renewable energy resources selection in Turkey. International Journal of Production Economics, 182, 435–448.
  • Cebula, J. J., & Young, L. R. (2010). A taxonomy of operational cyber security risks (pp. 1–47).  Pittsburgh, PA: Carnegie-Mellon Univ.
  • Chen, C. H., & Tzeng, G. H. (2011). Creating the aspired intelligent assessment systems for teaching materials. Expert Systems with Applications, 38(10), 12168–12179.
  • Chen, F. H., Hsu, T. S., & Tzeng, G. H. (2011). A balanced scorecard approach to establish a performance evaluation and relationship model for hot spring hotels based on a hybrid MCDM model combining DEMATEL and ANP. International Journal of Hospitality Management, 30(4), 908–932.
  • Chen, V. Y. C., Lien, H. P., Liu, C. H., Liou, J. J. H., Tzeng, G. H., & Yang, L. S. (2011). Fuzzy MCDM approach for selecting the best environment-watershed plan. Applied Soft Computing Journal, 11(1), 265–275.
  • Chen, Y. C., Lien, H. P., & Tzeng, G. H. (2010). Measures and evaluation for environment watershed plans using a novel hybrid MCDM model. Expert Systems with Applications, 37(2), 926–938.
  • Chiu, Y.-J., Chen, H.-C., Tzeng, G.-H., & Shyu, J. Z. (2015). Marketing strategy based on customer behavior for the LCD-TV. International Journal of Management and Decision Making, 7(2), 143–165.
  • Comm Ja‘Nel Esterhuysen, B. (2003).The management of operational risk in South African banks, Dissertation submitted for the partial fulfillment of the requirements for the degree Master of Commerce, Potchefstroom University for Christian Higher Education
  • Dalalah, D., Hayajneh, M., & Batieha, F. (2011). A fuzzy multi-criteria decision making model for supplier selection. Expert Systems with Applications, 38, 8384–8391.
  • ESFANDYAR Pour, R. Z.,  & Akbari, M. (2016). Identifying mental models in terms of information security polices. IT Management, 8(2), 215–230.
  • Freimer, M., & Yu, P. L. (1976). Some new results on compromise solutions for group decision problems. Management Science, 22(6), 688–693.
  • Hashemkhani Zolfani, S., & Radfar, I. (2011). A research on hybrid models of balanced scorecard and MADM methods for selecting the best hybrid model. American Journal of Scientific Research, 36, 83–89.
  • Ho, J. W. R., Tsai, C. L., Tzeng, G.H., & Fang, S. K. (2011). Combined dematel technique with a novel MCDM model for exploring portfolio selection based on capm. Expertsystems with Applications, 38, 16–25.
  • Huang, C. Y., Tzeng, G. H., & Ho, W. R. J. (2011). System on chip design service e-business value maximization through a novel MCDM framework. Expert Systems with Applications, 38(7), 7947–7962.
  • Hung, Y. H., Chou, S. C. T., & Tzeng, G. H. (2011). Knowledge management adoption and assessment for SMEs by a novel MCDM approach. Decision Support Systems, 51(2), 270–291.
  • Ilvonen, I., Jussila, J., & Kärkkäinen, H. (2015). Towards a business-driven process model for knowledge security risk management: making sense of knowledge risks. International Journal of Knowledge Management, 11(4), 18.
  • Joshi, C., & Singh, U. K. (2017). Information security risks management framework – A step towards mitigating security risks in university network. Journal of Information Security and Applications, 35, 128–137.
  • Jouini, M., Rabai, L. B. A., & Aissa, A. B. (2014). Classification of security threats in information systems. In Procedia Computer Science, 32, 489–496.
  • Kazemi, M., & Alizadeh, A. (2014). Combined approach of ANP and DEMATEL to use advertising media. Research Operation and Its Applications, 11th Year, 4(43), 39–58.
  • Khani, M., & Nadi, F. (2011). Knowledge management system performance assessment based on balanced scorecard using fuzzy model (Case study: Ministry of road and transportation). IT Management, 3(9), 139–162.
  • Kimiz, D. (2005). Knowledge management in theory and practice. Burlington, USA: Elsevier Butterworth–Heinemann.
  • Ko, M., & Dorantes, C. (2006). The impact of information security breaches on financial performance of the breached firms: An empirical investigation. J Inf Technol Manage, 17(2), 13–22.
  • Laudon, K. C., & Laudon, J. A. N. E. P. (2012). Management information systems: Managing the digital firm (pp. 295–310). New Jersey, USA: Pearson Prentice Hall.
  • Lee, W. S., Tzeng, G. H., Guan, J. L., Chien, K. T., & Huang, J. M. (2009). Combined MCDM techniques for exploring stock selection based on Gordon model. Expert Systems with Applications, 36(3 PART 2), 6421–6430.
  • Li, C. W., & Tzeng, G. H. (2009a). Identification of interrelationship of key customers’ needs based on structural model for services/capabilities provided by a semiconductor-intellectual property mall. Applied Mathematics and Computation, 215(6), 2001–2010.
  • Li, C. W., & Tzeng, G. H. (2009b). Identification of a threshold value for the DEMATEL method using the maximum mean de-entropy algorithm to find critical services provided by a semiconductor intellectual property mall. Expert Systems with Applications, 36(6), 9891–9898.
  • Liao, S. (2003). Knowledge management technologies and applications – Literature review from 1995 to 2002. Expert Systems with Applications, 25(2), 155–164.
  • Liou, J. J. H., Tzeng, G. H., Tsai, C. Y., & Hsu, C. C. (2011). A hybrid ANP model in fuzzy environments for strategic alliance partner selection in the airline industry. Applied Soft Computing Journal, 11(4), 3515–3524.
  • Liou, J. J. H., Tzeng, G.-H., & Chang, H.-C. (2007). Airline safety measurement using a hybrid model. Journal of Air Transport Management, 13, 243–249.
  • Liu, C.-H., Tzeng, G.-H., & Lee, M.-H. (2013). Strategies for improving cruise product sales using hybrid “multiple criteria decision making” models. The Service Industries Journal, 33(5), 542–563.
  • Manhart, M., & Thalmann, S. (2015). Protecting organizational knowledge: A structured literature review. Journal of Knowledge Management, 19(2), 190–211.
  • Martínez-Sánchez, J. F., Martínez-Palacios, M. T. V., & Venegas-Martínez, F. (2016). An analysis on operational risk in international banking: A Bayesian approach (2007–2011). Estudios Gerenciales, 32(140), 208–220.
  • Massingham, P. (2014). An evaluation of knowledge management tools: Part 1 – Managing knowledge resources. Journal of Knowledge Management, 18(6), 1075–1100.
  • Mittal, Y. K., Roy, S., & Saxena, M. (2010). A knowledge management model to improve information security. International Journal of Computer Science Issues, 7(6), 105–108. Retrieved from http://www.ijcsi.org/papers/7-6-105-108.pdf
  • Nikoukar, G., Soltani, M., & Pashai, A. (2014). Knowledge management infrastructures in one of Armed Force Universities. IT Management, 6(3), 505–528.
  • Opricovic, S. (1998). Multi-criteria optimization of civil engineering systems. Faculty of Civil Engineering. Belgrade, 2(1), 5–21.
  • Opricovic, S., & Tzeng, G. H. (2004). Compromise solution by MCDM methods: A comparative analysis of VIKOR and TOPSIS. European Journal of Operational Research, 156(2), 445–455.
  • Opricovic, S., & Tzeng, G. H. (2007). Extended VIKOR method in comparison with outranking methods. European Journal of Operational Research, 178(2), 514–529.
  • Ou Yang, Y.-P., Shieh, H.-M., Leu, J.-D., & Tzeng, G.-H. (2009). A VIKOR-based multiple criteria decision method for improving information security risk. International Journal of Information Technology & Decision Making, 8(2), 267.
  • Panahi, S., Watson, J., & Partridge, H. (2013). Towards tacit knowledge sharing over social web tools. Journal of Knowledge Management, 17, 379–397.
  • Rollet, H. (2003). Knowledge management processes and technologies. Norwell, MA: Kluwer.
  • Ruggles, R. (1997). Knowledge management tools. Oxford: Butterworth-Heinemann.
  • Russ, M., Lytras, M., & Maier, R. (2008). Knowledge management strategies: a handbook of applied technologies. Hershey, PA: USA IGI Publishing.
  • Saaty, R. W. (2003). Decision making in complex environment: The analytic hierarchy process (AHP) for decision making and the analytic network process (ANP) for decision making with dependence and feedback. Pittsburgh: Super Decisions.
  • Safaei Ghadikolaei, A., Chen, I. S., Hashemkhani Zolfani, S., & Akbarzadeh, Z. (2011). Using DEMATEL method for cause and effect relations of BSC in Universities of Iran, The 1st International Symposium and 10th Balkan Conference on Operational Research (BALCOR), Thessaloniki, 333–340.
  • Said, A. R., Abdullah, H., Uli, J., & Mohamed, Z. A. (2014). Relationship between organizational characteristics and information security knowledge management implementation. Procedia - Social and Behavioral Sciences, 123, 433–443.
  • Shamala, P., Ahmad, R., Zolait, A., & Sedek, M. (2017). Integrating information quality dimensions into information security risk management (ISRM). Journal of Information Security and Applications, 36, 1–10.
  • Shen, Y. C., Lin, G. T. R., & Tzeng, G. H. (2011). Combined DEMATEL techniques with novel MCDM for the organic light emitting diode technology selection. Expert Systems with Applications, 38(3), 1468–1481.
  • Singh, A., Gupta, M., & Ojha, A. (2014). Identifying factors of “ organizational information security management .”. Journal of Enterprise Information Management, 27(5), 644–667.
  • Taj Far, A. H., Mahmudi, M., Soltani, F., & Soltani, P. (2014). Ranking barriers to information security management system and extent of readiness for discovery management. IT Management, 6(4), 551–566.
  • Tsai, W. H., & Chou, W. C. (2009). Selecting management systems for sustainable development in SMEs: A novel hybrid model based on DEMATEL, ANP, and ZOGP. Expert Systems with Applications, 36(2 PART 1), 1444–1458.
  • Tzeng, G. H., Chiang, C. H., & Li, C. W. (2007). Evaluating intertwined effects in e-learning programs: A novel hybrid MCDM model based on factor analysis and DEMATEL. Expert Systems with Applications, 32(4), 1028–1044.
  • Tzeng, G. H., Lin, C. W., & Opricovic, S. (2005). Multi-criteria analysis of alternative-fuel buses for public transportation. Energy Policy, 33(11), 1373–1383.
  • Tzeng, G. H., Teng, M. H., Chen, J. J., & Opricovic, S. (2002). Multicriteria selection for a restaurant location in Taipei. International Journal of Hospitality Management, 21(2), 171–187.
  • Uriarte, F. A. (2008). Introduction to knowledge management. Jakarta: ASEAN Foundation.
  • Wang, Y. L., & Tzeng, G. H. (2012). Brand marketing for creating brand value based on a MCDM model combining DEMATEL with ANP and VIKOR methods. Expert Systems with Applications, 39, 5600–5615.
  • Wu, W. W., & Lee, Y. T. (2007). Developing global managers’ competencies using the fuzzy DEMATEL method. Expert Systems with Applications, 32(2), 499–507.
  • Yang, J. L., & Tzeng., G. H. (2011). An integrated MCDM technique combined with DEMATEL for a novel cluster-weighted with ANP method. Expert Systems with Applications, 38(3), 1417–1424.
  • Yu, P. L. (1973). A class of solutions for group decision problems. Management Science, 19(8), 936–946.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.