Protecting organizational competitive advantage: A knowledge leakage perspective

Abstract The strategic management literature emphasizes the importance of protecting organizational knowledge and information, especially in terms of maintaining competitive advantage. We synthesized several mechanisms from the literature that organizations could deploy to protect their knowledge and information. An Australian field study investigated how and to what extent these mechanisms were deployed in 11 knowledge-intensive organizations. The study revealed surprising findings: firstly, there was no evidence of a systematic and comprehensive management approach to the identification and protection of knowledge assets. Approaches were often haphazard, driven in a bottom-up fashion with much of the responsibility delegated to individual employees and knowledge owners. Secondly, concerns about confidentiality of organizations' operational data (e.g., client details), often crowded out managerial attention to protecting organizations' own knowledge and information assets. Based on these observations, we outline several implications for future research, including the need for more comprehensive frameworks to address knowledge leakage from a strategic perspective.

[1]  Juan E. Tapiador,et al.  Bypassing information leakage protection with trusted applications , 2012, Comput. Secur..

[2]  Pia Hurmelinna-Laukkanen,et al.  Formation of the appropriability regime: Strategic and practical considerations , 2007 .

[3]  R. Grant Toward a Knowledge-Based Theory of the Firm,” Strategic Management Journal (17), pp. , 1996 .

[4]  J. Barney The Resource-Based Theory of the Firm , 1996 .

[5]  S. Winter Understanding dynamic capabilities , 2003 .

[6]  Joseph T. Mahoney,et al.  The resource-based view within the conversation of strategic management , 1992 .

[7]  J. Liebeskind,et al.  Knowledge, Strategy, and the Theory of the Firm , 1996 .

[8]  Kathleen M. Eisenhardt,et al.  DYNAMIC CAPABILITIES, WHAT ARE THEY? , 2000 .

[9]  Pia Hurmelinna-Laukkanen,et al.  THE EFFECTS OF HRM-RELATED MECHANISMS ON COMMUNICATION IN R&D COLLABORATION , 2010 .

[10]  Richard Ford,et al.  Web Information Leakage: Googling for gold , 2004 .

[11]  Morten T. Hansen,et al.  What's your strategy for managing knowledge? , 1999, Harvard business review.

[12]  Albert H. Segars,et al.  Knowledge Management: An Organizational Capabilities Perspective , 2001, J. Manag. Inf. Syst..

[13]  Philip Powell,et al.  Knowledge and Security , 2003, AMCIS.

[14]  Dorothy E. Denning,et al.  Information Warfare And Security , 1998 .

[15]  Atif Ahmad,et al.  Incorporating a knowledge perspective into security risk assessments , 2011 .

[16]  Wolfgang Sofka,et al.  Knowledge protection strategies of multinational firms--A cross-country comparison , 2010 .

[17]  D. Leonard-Barton CORE CAPABILITIES AND CORE RIGIDITIES: A PARADOX IN MANAGING NEW PRODUCT DEVELOPMENT , 1992 .

[18]  J. Barney Firm Resources and Sustained Competitive Advantage , 1991 .

[19]  Eugene H. Spafford,et al.  Understanding insiders: An analysis of risk-taking behavior , 2013, Inf. Syst. Frontiers.

[20]  Finn Olav Sveen,et al.  Overcoming organizational challenges to secure knowledge management , 2007, Inf. Syst. Frontiers.

[21]  Holger Graf,et al.  Gatekeepers in Regional Networks of Innovators , 2007 .

[22]  D. Ketchen,et al.  Reconsidering the Reputation—Performance Relationship: A Resource-Based View , 2010 .

[23]  Robert M. Grant,et al.  The knowledge-based view of the firm: Implications for management practice , 1997 .

[24]  Kevin C. Desouza,et al.  Knowledge risks in organizational networks: An exploratory framework , 2012, J. Strateg. Inf. Syst..

[25]  Antoaneta P. Petkova,et al.  Reputation as an Intangible Asset: Reflections on Theory and Methods in Two Empirical Studies of Business School Reputations , 2010 .

[26]  JinKyu Lee,et al.  Secure knowledge management and the semantic web , 2005, CACM.

[27]  Marjorie A. Lyles,et al.  Inter-Organizational Knowledge Transfer: Current Themes and Future Prospects , 2008 .

[28]  Surendra Sarnikar,et al.  A Framework for Assessing Knowledge Sharing Risks in Interorganizational Networks , 2009, AMCIS.

[29]  Ann Majchrzak,et al.  Safe Contexts for Interorganizational Collaborations Among Homeland Security Professionals , 2010, J. Manag. Inf. Syst..

[30]  William David Salisbury,et al.  Understanding the influence of organizational change strategies on information technology and knowledge management strategies , 2001, Decis. Support Syst..

[31]  Kevin C. Desouza,et al.  Securing knowledge in organizations: lessons from the defense and intelligence sectors , 2005, Int. J. Inf. Manag..

[32]  Paul Hildreth,et al.  The duality of knowledge , 2002, Inf. Res..

[33]  Karel Cool,et al.  Asset stock accumulation and sustainability of competitive advantage , 1989 .

[34]  Clyde W. Holsapple,et al.  Exploring secondary activities of the knowledge chain , 2005 .

[35]  David W. Chadwick,et al.  Guest editorial: A brief overview of data leakage and insider threats , 2013, Inf. Syst. Frontiers.

[36]  Michael E. Whitman Enemy at the gate: threats to information security , 2003, CACM.

[37]  I. Nonaka,et al.  SECI, Ba and Leadership: a Unified Model of Dynamic Knowledge Creation , 2000 .

[38]  Debi Ashenden,et al.  Risk Management for Computer Security , 2005 .

[39]  Jay B. Barney,et al.  Strategic Management and Competitive Advantage: Concepts and Cases , 2005 .

[40]  Edwin B. Heinlein Principles of information systems security , 1995, Comput. Secur..

[41]  Patricia M. Norman Are your secrets safe? Knowledge protection in strategic alliances , 2001 .

[42]  Klaus Krippendorff,et al.  Content Analysis: An Introduction to Its Methodology , 1980 .

[43]  Thomas H. Davenport,et al.  Book review:Working knowledge: How organizations manage what they know. Thomas H. Davenport and Laurence Prusak. Harvard Business School Press, 1998. $29.95US. ISBN 0‐87584‐655‐6 , 1998 .

[44]  David T. Croasdell,et al.  Protecting knowledge assets in multinational enterprises: a comparative case approach , 2009 .

[45]  Kah-Hin Chai,et al.  Network closure's impact on firms' competitive advantage: The mediating roles of knowledge processes , 2011 .

[46]  I. Nonaka A Dynamic Theory of Organizational Knowledge Creation , 1994 .

[47]  Herbert J. Mattord,et al.  Principles of Information Security , 2004 .

[48]  M. Polanyi Chapter 7 – The Tacit Dimension , 1997 .

[49]  Pia Hurmelinna-Laukkanen,et al.  WHAT'S SMALL SIZE GOT TO DO WITH IT? PROTECTION OF INTELLECTUAL ASSETS IN SMEs , 2009 .

[50]  D. Teece,et al.  DYNAMIC CAPABILITIES AND STRATEGIC MANAGEMENT , 1997 .

[51]  Ali Amiri,et al.  Dare to share: Protecting sensitive knowledge with data sanitization , 2007, Decis. Support Syst..

[52]  Michelle L. Kaarst-Brown,et al.  Sensitive information: A review and research agenda , 2005, J. Assoc. Inf. Sci. Technol..

[53]  Margaret A. Peteraf The cornerstones of competitive advantage: A resource‐based view , 1993 .

[54]  Matthew B. Miles,et al.  Qualitative Data Analysis: An Expanded Sourcebook , 1994 .

[55]  Fenio Annansingh,et al.  Exploring the Risks of Knowledge Leakage: An Information Systems Case Study Approach , 2012 .

[56]  Sue Newell,et al.  Knowledge Risks in Organizational Networks: The Practice Perspective , 2012, J. Strateg. Inf. Syst..