IMPLEMENTING KNOWLEDGE MANAGEMENT TECHNIQUES FOR SECURITY PURPOSES

Petros Belsis, Stefanos Gritzalis, Christos Skourlas, Ioannis Drakopoulos

2004

Abstract

Due to its rapid growth, Information Systems Security becomes a new era of expertise, related to a vast quantity of knowledge. Exploiting all this knowledge becomes a difficult task, due to its heterogeneity. Knowledge Management (KM) on the other hand, becomes an expanding and promising discipline that has drawn considerable attention. In this paper we deploy our arguments about the benefits of KM techniques and their possible applications to assist security officers in improving their productivity and effectiveness. To prove this, we exploit possible technological prospects, and we present the architecture of a prototype developed to implement selected innovating KM components, embedding state-of-the-art multimedia java-based applications.

References

  1. Chase R. L 1997. “The knowledge-based Organization: An International Survey”, The Journal of Knowledge Management, vol. 1, No 1, 1997.
  2. Davenport T., S. Volpel 2001 “The rise of knowledge towards attention management”, Journal of knowledge management, vol. 5, No 3, pp 212-221.
  3. Davenport, T 1998. “Knowledge management case studies”, Graduate School of Business, University of Texas at Austin, www.bus.texas.edu/kman.html.
  4. Ertoz L., Eilertson E., Lazarevic A., Tan P., Dokas P., Kumar V., Srivastava J., 2003. “Detection of Novel Network attacks using data mining”, ICDM 03, Workshop on Data mining for computer security, Nov. 2003 Melbourne.
  5. Fung P., Kwok L., Longley D 2001. “Electronic Information Security Documentation”, Conference on Information Security management and small systems security, Nevada, USA.
  6. JMF, 2001. Java Media Framework Guide, available at www.sun.com
  7. King W., Marks P., McCoy S, 2002. “The most important issues in Knowledge Management”, Communications of the ACM, Sept. 2002, vol.45, No. 9.
  8. McCampbell A., Mordhead Clare L., Howard Gittters S, 1999. “Knowledge management: the new challenge for the 21st century”, Journal of Knowledge Management, vol. 3, No 3, pp 172-179.
  9. Polanyi M., 1966. “The Tacit Dimension”, Routledge & Kegan Paul, London.
  10. Rus I., Lindvall M,2002. “Knowledge Management in Software Engineering, IEEE Software, vol. 3, pp.26- 38.
  11. Vermeulen C., Solms Von R, 2002. “The information security management toolbox - taking the pain out of security management”, Information Management & Computer Security, 10/3, pp. 119-125.
  12. Vouros G, 2003. “Technological Issues towards Knowledge-Powered Organizations”, Knowledge Management Journal, Vol 7, No. 1.
  13. Yurcik W., Lakkaraju K., Barlow J., Rosendale J., 2003. “A prototype tool for visual Data Mining of Network Traffic for intrusion detection”, ICDM 03, Workshop on Data mining for computer security, Nov. 2003 Melbourne.
Download


Paper Citation


in Harvard Style

Belsis P., Gritzalis S., Skourlas C. and Drakopoulos I. (2004). IMPLEMENTING KNOWLEDGE MANAGEMENT TECHNIQUES FOR SECURITY PURPOSES . In Proceedings of the Sixth International Conference on Enterprise Information Systems - Volume 2: ICEIS, ISBN 972-8865-00-7, pages 535-540. DOI: 10.5220/0002655605350540


in Bibtex Style

@conference{iceis04,
author={Petros Belsis and Stefanos Gritzalis and Christos Skourlas and Ioannis Drakopoulos},
title={IMPLEMENTING KNOWLEDGE MANAGEMENT TECHNIQUES FOR SECURITY PURPOSES},
booktitle={Proceedings of the Sixth International Conference on Enterprise Information Systems - Volume 2: ICEIS,},
year={2004},
pages={535-540},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002655605350540},
isbn={972-8865-00-7},
}


in EndNote Style

TY - CONF
JO - Proceedings of the Sixth International Conference on Enterprise Information Systems - Volume 2: ICEIS,
TI - IMPLEMENTING KNOWLEDGE MANAGEMENT TECHNIQUES FOR SECURITY PURPOSES
SN - 972-8865-00-7
AU - Belsis P.
AU - Gritzalis S.
AU - Skourlas C.
AU - Drakopoulos I.
PY - 2004
SP - 535
EP - 540
DO - 10.5220/0002655605350540