
The rest of the paper is organized as follows: In
Section 2 we present our arguments about the
benefits of establishing KM techniques, and how top
international companies gained competitive
advantage due to their KM platforms. In section 3
we present the main technological challenges in KM
implementations and we present how new
technologies can be helpful, describing our
contribution in relation to contemporary KM
approaches. Section 4 concludes the paper
describing how under certain circumstances our
approach can assist security experts in increasing
their productivity and effectiveness, and also
resuming where we attempt to innovate, describing
also our scheduled further steps towards adding
more functionality to the system.
2 MOTIVATION FOR KM IN IS
SECURITY
Information Systems security is a rapidly changing
knowledge intensive business, involving many
people with different kinds of expertise.
Organizations base their security on people, which
are not a steady asset for an organization. Security
related knowledge is diverse and its proportions
immense and steadily growing. Organizations face
the challenge to identify the content, location and
exploit knowledge. An improved use of this
knowledge is the basic motivation for KM and
deserves deeper analysis.
2.1 Knowledge Management
fundamental concepts
The three levels of refinement of knowledge items
are data, information and knowledge. By knowledge,
- a term fraught with history and definitional peril –
firms generally mean codified information with a
high proportion of human value-added, including
insight, interpretation, context, experience, wisdom,
and so forth (Davenport et al., 2001). Although often
the terms information and data can be used
interchangeably, we could define information to be
‘‘interpreted data’’ and knowledge to be
‘‘information to be transformed into capability for
effective action’’ (Vouros, 2003).
2.2 Knowledge types
Philosopher Polanyi (Polanyi, 1966) distinguishes
knowledge in two types: tacit, which is embedded in
the human brain and cannot be expressed easily, and
explicit knowledge, which can be easily codified
(Davenport et al., 2001). Most KM systems
implementations focus on managing explicit
knowledge. The real challenge is to exploit tacit
challenge. For example, a security professional’s
expertise is an intangible asset which can be under
certain circumstances used, without his physical
presence, as we try to demonstrate at a later section,
by embedding multimedia technologies in our
prototype.
2.3 Benefits of KM
Knowledge management is an emerging discipline
that promises to capitalize on organizations’
intellectual capital (Rus et al., 2002). As a concept,
KM appeared the late decade. Today, it has been
transformed to a core business function, among top-
level companies. According to a major study
undertaken at 1996 (Chase, 1997), by Ernst &
Young Business and Intelligence among the key
benefits of establishing KM, the following can be
distinguished:
• Improved decision making
• Improved efficiency of people and operations
• Improvement of innovation
• Improved products/services.
Among KM benefits we could also distinguish
enhanced collaboration and communication, new
knowledge creation, knowledge retention and
increased knowledge availability and access (Rus et
al, 2002).
2.4 Well-known case studies
Several major companies have gained from
implementing KM functions. Among the most
popular case studies, we can distinguish Ernst &
Young, Microsoft, Siemens (McCampbell et al,
1999) (Davenport et al, 2001).
2.4.1 Ernst &Young
Ernst & Young is one of the “big six” professional
services firms, which traditionally offered audit, tax
and management consulting. Due to the
geographical dispersion of E&Y, technology had to
be used as an enhancement to its knowledge base
accessibility. In the beginning, Lotus Notes was used
as the main platform, whereas by the growth of the
key documents and databases a shift to a web-based
intranet was performed.
ICEIS 2004 - ARTIFICIAL INTELLIGENCE AND DECISION SUPPORT SYSTEMS
536