Browsing by Author "Shear, Christopher James"
Now showing 1 - 2 of 2
Results Per Page
Sort Options
- ItemBusiness counterintelligence : sustainable practice or passing fad?(Stellenbosch : University of Stellenbosch, 2009-03) Shear, Christopher James; Van der Walt, M. S.; University of Stellenbosch. Faculty of Arts and Social Sciences. Dept. Information Science.Traditional information protection mechanisms are no longer adequately placed to effectively deal with the adversarial threats that have arisen as a result of the rise in importance of knowledge for today’s organisations. Business counterintelligence appears to be a protective entity, which in principle can effectively engage with and mitigate many of these newly manifested threats. Yet, business counterintelligence is also an entity that is accompanied by a great deal of haze and confusion as to its use, implementation and integration within different organisations. This is evident from the literature where there currently exist multiple fragmented definitions of what business counterintelligence is. Organisations may as a result adopt a particular business counterintelligence definition that may not be effective for their context. This can result in the ineffective protection of critical information assets and the misappropriation of organisational resources; something which is not sustainable. This thesis proposes that in order to allay the confusion caused by these differing fragmented definitions, one needs to be able to arrive at a consolidated definition of what constitutes business counterintelligence; this thesis’s primary objective. This has been examined by firstly contextualising business counterintelligence in order to better understand the topic; the information society was used as a backdrop for this purpose. Secondly, an examination of the prevailing views of business counterintelligence and its role within organisations is offered in order to build clarity. Thirdly, a consolidated definition of business counterintelligence is proposed and its implications for different organisations examined. Finally, the implications of this consolidated definition for the sustainability of business counterintelligence are discussed and conclusions based on the evidence presented within the thesis drawn. Based on the arguments presented, this thesis postulates that a consolidated definition of business counterintelligence is more effective and is thus more sustainable.
- ItemModelling knowledge security : knowledge security as a knowledge management problem(Stellenbosch : Stellenbosch University, 2021-12) Shear, Christopher James; Watson, Bruce W.; Van der Walt, Martin; Stellenbosch University. Faculty of Arts and Social Sciences. Dept. of Information Science.ENGLISH SUMMARY : For today’s organisations, knowledge has become a highly valuable resource, one that is often critical for competitive success. As such, a variety of methods and approaches have surfaced in recent decades, coalescing into what has become known as knowledge management (KM). The purpose of KM is largely focused on using various mechanisms and technologies to promote the discovery, capture, sharing and application of knowledge to derive value. Yet, while many studies address how knowledge should be leveraged more openly, fewer have focused on how best to secure it. This poses a risk to organisations, due to the increasing complexity of the intelligence-gathering mechanisms employed by those seeking to gain this knowledge for their advantage. In response, the idea of knowledge security has emerged as a mechanism to counter this risk. From an academic perspective, it has largely been grounded in information security theory. This has occurred because of the convergence that has taken place between information systems and KM, with security having taken a largely explicit focus. While beneficial in some ways, this approach is also somewhat problematic for a couple of reasons. Firstly, knowledge can extend beyond the explicit and is often found in intangible tacit forms, which may not be covered by taking a pure information security-driven approach. Thus, not having a comprehensive understanding of the measures needed to secure organisational knowledge at each dimension of KM activity, and vice versa, can make knowledge more vulnerable to compromise. Secondly, this creates a dichotomy between KM activity, predominantly centred on the amplification and distribution of knowledge and current security practices, which aim to limit and control access to processes. It is also a symptom indicative of the deeper question about knowledge in organisations, in terms of how it should best be retained, protected, and managed, in a balanced manner. Thus, the study focuses on overcoming this discrepancy by imposing the meta-question of knowledge security upon KM theory. The objective of the research is to advance the body of knowledge, by contributing to it in the form of a better understanding of how knowledge security can be conceptualised as a KM problem and be presented as a model. It is hoped that in doing so, it will set the foundation for future research on this topic and that it will contribute to solidifying knowledge security as part of the broader set of KM processes. To achieve these research objectives, the research design is structured to focus on three components. The first is a theoretical analysis centred on an examination of the literature related to organisational knowledge, KM, and knowledge security. The second is an empirical analysis focused on identifying the relationship between security and knowledge in practice. The third is combining the insights gained from the first two components and using these inputs to design a conceptual model outlining the relationship between knowledge security and KM. This process culminated in the development of a conceptual model of knowledge security that highlights its relationship with KM.