Addressing Knowledge Leakage Risk caused by the use of mobile devices in Australian Organizations

Information and knowledge leakage has become a significant security risk to Australian organizations. Each security incident in Australian business cost an average US$2.8 million. Furthermore, Australian organisations spend the second most worldwide (US$1.2 million each on average) on investigating and assessing information breaches. The leakage of sensitive organizational information occurs through different avenues, such as social media, cloud computing and mobile devices. In this study, we (1) analyze the knowledge leakage risk (KLR) caused by the use of mobile devices in knowledge-intensive Australian organizations, (2) present a conceptual research model to explain the determinants that influence KLR through the use of mobile devices grounded in the literature, (3) conduct interviews with security and knowledge managers to understand what strategies they use to mitigate KLR caused by the use of mobile devices and (4) use content analysis and the conceptual model to frame the preliminary findings from the interviews. Keywords: Knowledge leakage, mobile devices, mobile contexts, knowledge leakage risk


page 1

page 2

page 3

page 4


Towards a knowledge leakage Mitigation framework for mobile Devices in knowledge-intensive Organizations

The use of mobile devices in knowledge-intensive organizations while eff...

Mitigating the Risk of Knowledge Leakage in Knowledge Intensive Organizations: a Mobile Device Perspective

In the current knowledge economy, knowledge represents the most strategi...

Exploring Knowledge Leakage Risk in Knowledge-Intensive Organisations: Behavioural aspects and Key controls

Knowledge leakage poses a critical risk to the competitive advantage of ...

Watch Out! Smartwatches as criminal tool and digital forensic investigations

In the rapidly advancing technological landscape, smartwatches have mate...

Analysis and implementation of the SNOW 3G generator used in 4G/LTE systems

The fourth generation of cell phones, marketed as 4G/LTE (Long-Term Evol...

MagneticSpy: Exploiting Magnetometer in Mobile Devices for Website and Application Fingerprinting

Recent studies have shown that aggregate CPU usage and power consumption...

Towards Designing A Secure Plausibly Deniable System for Mobile Devices against Multi-snapshot Adversaries – A Preliminary Design

Mobile computing devices have been used broadly to store, manage and pro...

Please sign up or login with your details

Forgot password? Click here to reset