A Sociotechnical Systems Analysis of Knowledge Management for Cybersecurity

Knowledge management (KM) is a tool to tackle cybersecurity issues, provided it emphasizes on the interrelated social, organizational, and technological factors involved in cybersecurity. This paper proposes a sociotechnical systems analysis framework of KM systems for cybersecurity. Specifically, it applies a sociotechnical systems approach to investigation of constructs of KM systems for cybersecurity and identifies five major constructs of KM systems for cybersecurity: roles of KM in cybersecurity, organizational framework of KM for cybersecurity, cybersecurity analytics process, tools of KM for cybersecurity, and system architecture of KM for cybersecurity. The five constructs in the proposed sociotechnical systems analysis framework are analyzed. The paper makes contribution to the growing information systems literature by presenting a special case of sociotechnical systems analysis. The sociotechnical systems analysis framework provides guidelines for the development of KM systems for cybersecurity in organizations.

[1]  Khalid M. Hosny,et al.  New Detection Mechanism for Distributed Denial of Service Attacks in Software Defined Networks , 2020, Int. J. Sociotechnology Knowl. Dev..

[2]  Josep Domingo-Ferrer,et al.  FuturICT — The road towards ethical ICT , 2012, The European Physical Journal Special Topics.

[3]  Luke Georghiou,et al.  Rising to the challenges—Reflections on Future-oriented Technology Analysis , 2013 .

[4]  Jay Liebowitz,et al.  Commentary: Research Needed on Cross-Cultural Generational Knowledge Flows , 2009, Int. J. Sociotechnology Knowl. Dev..

[5]  Thomas Herrmann,et al.  Socio-Technical Systems: A Meta-Design Perspective , 2011, Int. J. Sociotechnology Knowl. Dev..

[6]  Andrew Blyth,et al.  A Socio-Technical Approach to Cyber Risk Management and Impact Assessment , 2013 .

[7]  Thomas R. Gruber,et al.  A translation approach to portable ontology specifications , 1993, Knowl. Acquis..

[8]  Bruce W. Finnie,et al.  Cornish miners in California: 150 years of a unique sociotechnical system , 2008 .

[9]  Meliha Handzic,et al.  Integrated Socio-Technical Knowledge Management Model: An Empirical Evaluation , 2011, J. Knowl. Manag..

[10]  Svetlana Sajeva,et al.  Towards a Conceptual Knowledge Management System Based on Systems Thinking and Sociotechnical Thinking , 2011, Int. J. Sociotechnology Knowl. Dev..

[11]  Jaideep Motwani,et al.  How Can Knowledge Leakage be Stopped: A Socio-Technical System Design Approach to Risk Management , 2017, Int. J. Sociotechnology Knowl. Dev..

[12]  K. Madhu Kishore Raghunath,et al.  Effectiveness of Risk Assessment Models in Business Decisions: Reinforcing Knowledge , 2018, Int. J. Sociotechnology Knowl. Dev..

[13]  Cheryl Z. Qian,et al.  Multi-aspect visual analytics on large-scale high-dimensional cyber security data , 2015, Inf. Vis..

[14]  E. Trist,et al.  Some Social and Psychological Consequences of the Longwall Method of Coal-Getting , 1951 .

[15]  Randy Borum,et al.  Strategic cyber intelligence , 2015, Inf. Comput. Secur..

[16]  Brian J. Galli,et al.  Importance and Impact of Culture and People in Continuous Improvement , 2018, Int. J. Sociotechnology Knowl. Dev..

[17]  Chinonye Love Moses,et al.  Empirical Evidence of Organizational Knowledge From a Typological Perspective and Its Linkages With Performance , 2018, Int. J. Sociotechnology Knowl. Dev..

[18]  Kevin Mentzer,et al.  Foresight for a responsible future with ICT , 2014, Information Systems Frontiers.

[19]  Christina E. Evangelou,et al.  On the interaction between humans and Knowledge Management Systems: a framework of knowledge sharing catalysts , 2005 .

[20]  Robert L. Goldstone,et al.  Using relations within conceptual systems to translate across conceptual systems , 2002, Cognition.

[21]  Calvin Pava,et al.  Redesigning Sociotechnical Systems Design: Concepts and Methods for the 1990s , 1986 .

[22]  Masike Malatji,et al.  Socio-technical systems cybersecurity framework , 2019, Inf. Comput. Secur..

[23]  Peter A. C. Smith,et al.  Affective Factors for Successful Knowledge Management , 2010, Int. J. Sociotechnology Knowl. Dev..

[24]  Nicola Guarino,et al.  Formal ontology, conceptual analysis and knowledge representation , 1995, Int. J. Hum. Comput. Stud..

[25]  P. Carayon,et al.  Sociotechnical systems analysis in health care: a research agenda , 2011, IIE transactions on healthcare systems engineering.

[26]  Alaa M. Momani The Unified Theory of Acceptance and Use of Technology: A New Approach in Technology Acceptance , 2020, Int. J. Sociotechnology Knowl. Dev..

[27]  Stefano Biazzo,et al.  Process mapping techniques and organisational analysis: Lessons from sociotechnical system theory , 2002, Bus. Process. Manag. J..

[28]  Gremil Alessandro Alcazar Naz A Grounded Theory on Conflict Management in Long-Distance Relationships: A Sociotechnical Perspective , 2020, Int. J. Sociotechnology Knowl. Dev..

[29]  Elayne W. Coakes,et al.  A Meta-Analysis of the Direction and State of Sociotechnical Research in a Range of Disciplines: For Practitioners and Academics , 2009, Int. J. Sociotechnology Knowl. Dev..

[30]  Randy Borum,et al.  Operational Levels of Cyber Intelligence , 2014 .

[31]  Sanjay Bahl,et al.  Perceived significance of information security governance to predict the information security service quality in software service industry: An empirical analysis , 2014, Inf. Manag. Comput. Secur..

[32]  Ghassan Issa Al Omari,et al.  Organisational Memory and its Impact on Competitive Strategies in IT Companies in Jordan , 2019, Int. J. Sociotechnology Knowl. Dev..

[33]  Albert Cherns,et al.  Principles of Sociotechnical Design Revisted , 1987 .

[34]  Rafik I. Beekun,et al.  Assessing the Effectiveness of Sociotechnical Interventions: Antidote or Fad? , 1989 .

[35]  M. Shamim Hossain,et al.  Context-aware multimodal recommendations of multimedia data in cyber situational awareness , 2017, Multimedia Tools and Applications.

[36]  Walaa Medhat,et al.  A Framework for Managing Big Data in Enterprise Organizations , 2020, Int. J. Sociotechnology Knowl. Dev..

[37]  Thomas R. Gruber,et al.  Toward principles for the design of ontologies used for knowledge sharing? , 1995, Int. J. Hum. Comput. Stud..

[38]  Shouhong Wang,et al.  Knowledge Management for Cybersecurity in Business Organizations: A Case Study , 2019, Journal of Computer Information Systems.

[39]  P. Neal,et al.  Protecting Information: Active Cyber Defence for the Business Entity: A Prerequisite Corporate Policy , 2016 .

[40]  Kamal Dahbur,et al.  Assessment of Security Awareness: A Qualitative and Quantitative Study , 2017 .

[41]  Latifa Ben Arfa Rabai,et al.  Classification of Security Threats in Information Systems , 2014, ANT/SEIT.

[42]  Erik M. Fredericks,et al.  Uncertainty in big data analytics: survey, opportunities, and challenges , 2019, Journal of Big Data.

[43]  Shouhong Wang,et al.  Organizational schemata of e-portfolios for fostering higher-order thinking , 2012, Inf. Syst. Frontiers.

[44]  Muhammad Ali Babar,et al.  Architectural Tactics for Big Data Cybersecurity Analytic Systems: A Review , 2018, ArXiv.