An interorganizational knowledge-sharing security model with breach propagation detection

Daniel S. Soper, Haluk Demirkan, Kenneth Goul

Research output: Contribution to journalArticlepeer-review

19 Scopus citations

Abstract

The increasing adoption of Service Oriented Architecture (SOA) is allowing more and more companies to integrate themselves in interorganizational netchain environments wherein knowledge assets can be electronically shared with selected business partners. The dynamic nature of these environments implies a need for organizations to protect and monitor the flow of their valuable knowledge assets throughout the netchain if they hope to maintain their long-term competitive positions. In this paper, we propose an interorganizational knowledge-sharing security model that integrates the value chain reference model (VCOR), the federated enterprise reference architecture model (FERA), and multidimensional data warehouse technologies to allow for the proactive monitoring of shared knowledge assets across an SOA-based netchain. The proposed architecture is novel In that it supports dynamic policy revision through the automated detection of knowledge-sharing breaches within a netchain-a process whose viability is demonstrated using network flow theory and a series of simulations. Existing business intelligence infrastructures can be readily modified to support the proposed model, as multidimensional data warehousing has already been adopted in many organizations.

Original languageEnglish (US)
Pages (from-to)469-479
Number of pages11
JournalInformation Systems Frontiers
Volume9
Issue number5
DOIs
StatePublished - Nov 1 2007

Keywords

  • Business intelligence
  • Collaboration
  • Interdependence
  • Knowledge security
  • Netchain
  • Supply chain

ASJC Scopus subject areas

  • Software
  • Theoretical Computer Science
  • Information Systems
  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'An interorganizational knowledge-sharing security model with breach propagation detection'. Together they form a unique fingerprint.

Cite this