A Sociotechnical Systems Analysis of Knowledge Management for Cybersecurity

A Sociotechnical Systems Analysis of Knowledge Management for Cybersecurity

Shouhong Wang, Hai Wang
Copyright: © 2021 |Pages: 18
DOI: 10.4018/IJSKD.2021070105
OnDemand:
(Individual Articles)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Knowledge management (KM) is a tool to tackle cybersecurity issues, provided it emphasizes on the interrelated social, organizational, and technological factors involved in cybersecurity. This paper proposes a sociotechnical systems analysis framework of KM systems for cybersecurity. Specifically, it applies a sociotechnical systems approach to investigation of constructs of KM systems for cybersecurity and identifies five major constructs of KM systems for cybersecurity: roles of KM in cybersecurity, organizational framework of KM for cybersecurity, cybersecurity analytics process, tools of KM for cybersecurity, and system architecture of KM for cybersecurity. The five constructs in the proposed sociotechnical systems analysis framework are analyzed. The paper makes contribution to the growing information systems literature by presenting a special case of sociotechnical systems analysis. The sociotechnical systems analysis framework provides guidelines for the development of KM systems for cybersecurity in organizations.
Article Preview
Top

Introduction

Cybersecurity is the protection of computer systems from the theft or damage to their hardware, software, or information, as well as from disruption or misdirection of the provided services (Schatz, Bashroush, & Wall, 2017; Hosny, Gouda, & Mohamed, 2020). Along with the increasing use of the Internet and mobile devices in business, government organizations, and civilian’s life, cybersecurity has become a major concern of the society. The estimated average cost for each lost or stolen record containing sensitive and confidential information is increasing dramatically every year (IBM Security, 2018).

There have been numerous taxonomies of cybersecurity (e.g., Jouini, Rabai, & Aissa, 2014; ENISA, 2016). The following is a list of common types of cybersecurity threats.

  • Backdoor: A secret method of bypassing normal authentication or encryption in the system.

  • Denial-of-service attack: An offensive attempt to make a computer or network resource unavailable to its intended users.

  • Direct access attack: An offensive attempt to gain access to a computer and to directly download data from it.

  • Eavesdropping: Unauthorized real-time interception of a private communication on the network.

  • Spoofing attack: A fraudulent practice to masquerades the sender of a message as a source known to the receiver.

  • Tampering: A malicious modification of hardware and software products.

  • Privilege escalation: A fraudulent practice to elevate the access privilege level without authorization.

  • Phishing: An attempt to acquire sensitive information directly from users using a fake website.

  • Clickjacking: A malicious technique of tricking a web user into clicking on something different from what the user perceives they are clicking on.

  • Social engineering: Psychological manipulation of people into performing actions or disclosing confidential information.

Cybersecurity offenders possess special knowledge in order to make cybersecurity threats. To fight against cybersecurity threats, the organization must possess superior knowledge of cybersecurity to take proactive actions. Empirical studies (Bahl & Wali, 2014; Neal & Ilsever, 2016) have suggested that knowledge management (KM) can be an effective tool to tackle cybersecurity issues. KM is supported by a KM system (Maier, 2007). A KM system is a sociotechnical system of knowledge development and knowledge sharing which is influenced by diversified human and cultural factors of the organization as well as the enabling roles of technology (Handzic, 2007; 2011). Organizations need to develop effective KM systems for cybersecurity by analyzing the human, cultural, and technological factors underlying the cost, risk, and prevalence of cybersecurity. However, few holistic structural models in the literature exist addressing this important issue; thus, a research study has been initiated to investigate the major constructs of KM for cybersecurity in the context of sociotechnical systems analysis and their interconnected relationships. The research objective of this study is to develop a general framework of sociotechnical systems analysis for KM for cybersecurity. Specifically, the study applies the sociotechnical systems analysis approach to investigation of the major constructs of effective KM systems for cybersecurity. The rest of the article is organized as follows. The next section reviews the literature of sociotechnical systems in the context of KM for cybersecurity. The subsequent five sections present a sociotechnical system analysis of KM for cybersecurity, and describe the five key constructs of sociotechnical systems of KM for cybersecurity, including roles of KM in cybersecurity, organizational structure of KM for cybersecurity, tools of KM for cybersecurity, cybersecurity analytics process, and KM system architecture for cybersecurity. The sociotechnical systems analysis of KM for cybersecurity is followed by two discussion sections. The final section concludes this study.

Complete Article List

Search this Journal:
Reset
Volume 16: 1 Issue (2024)
Volume 15: 1 Issue (2023)
Volume 14: 4 Issues (2022): 2 Released, 2 Forthcoming
Volume 13: 4 Issues (2021)
Volume 12: 4 Issues (2020)
Volume 11: 4 Issues (2019)
Volume 10: 4 Issues (2018)
Volume 9: 4 Issues (2017)
Volume 8: 4 Issues (2016)
Volume 7: 4 Issues (2015)
Volume 6: 4 Issues (2014)
Volume 5: 4 Issues (2013)
Volume 4: 4 Issues (2012)
Volume 3: 4 Issues (2011)
Volume 2: 4 Issues (2010)
Volume 1: 4 Issues (2009)
View Complete Journal Contents Listing