Knowledge Protection Challenges of Social Media Encountered by Organizations

Although social media (SM) represents a new means of creating and sharing knowledge, it also presents new challenges for protecting confidential information and other data that companies do not want to share. However, knowledge protection and security-oriented knowledge management processes related to SM have received little attention in previous studies. This research attempts to close that gap by examining which information and knowledge protection challenges arise from employees' use of SM, why they arise, and how organizations can address them. The main contribution of this study is a framework that integrates three types of knowledge protection challenges (information security challenges; reputation challenge; management challenges) with five special characteristics of SM (information distribution speed; blurry audience; merging of private and professional identity; easily collectible information; generation transition), which explain why these challenges arise. In addition, the framework presents eight questions that organizations should answer to help them address the three types of knowledge protection challenges. Our findings have practical implications: by answering the eight questions proposed in this study, companies can create knowledge management and protection policies for SM. Furthermore, the findings in this study open up several future research questions.

[1]  William David Salisbury,et al.  Understanding the influence of organizational change strategies on information technology and knowledge management strategies , 2001, Decis. Support Syst..

[2]  Alessandro Acquisti,et al.  Information revelation and privacy in online social networks , 2005, WPES '05.

[3]  Haroon Malik,et al.  Towards Identifying the Challenges Associated with Emerging Large Scale Social Networks , 2011, ANT/MobiWIS.

[4]  Ben Light,et al.  More Than Just Friends? Facebook, Disclosive Ethics and the Morality of Technology , 2008, ICIS.

[5]  James Backhouse,et al.  Current directions in IS security research: towards socio‐organizational perspectives , 2001, Inf. Syst. J..

[6]  Izak Benbasat,et al.  The Case Research Strategy in Studies of Information Systems , 1987, MIS Q..

[7]  Jonathan Grudin,et al.  When social networks cross boundaries: a case study of workplace use of facebook and linkedin , 2009, GROUP.

[8]  Pekka Aula Social media, reputation risk and ambient publicity management , 2010 .

[9]  Stephen J. Andriole,et al.  Business impact of Web 2.0 technologies , 2010, Commun. ACM.

[10]  A. Kaplan,et al.  Users of the world, unite! The challenges and opportunities of Social Media , 2010 .

[11]  Shahper Vodanovich,et al.  Research Commentary - Digital Natives and Ubiquitous Information Systems , 2010, Inf. Syst. Res..

[12]  Albert H. Segars,et al.  Knowledge Management: An Organizational Capabilities Perspective , 2001, J. Manag. Inf. Syst..

[13]  M. Grant,et al.  Communities of practice. , 2020, Health progress.

[14]  Marc Spaniol,et al.  Watching the Blogosphere: Knowledge Sharing in the Web 2.0 , 2007, ICWSM.

[15]  Yongsuk Kim Adhoc Inter-organizational Collaboration: Safeguards for Balancing Sharing and Protection of Knowledge , 2008 .

[16]  J. Whitney Case Study Research , 1999 .

[17]  Dorothy E. Leidner,et al.  Studying Knowledge Management in Information Systems Resarch: Discourses and Theoretical Assumptions , 2002, MIS Q..

[18]  Meri Kuikka,et al.  Determining the challenges of organizational social media adoption and use , 2011, ECIS.

[19]  R. Mason,et al.  HOW EXECUTIVES PERCEIVE THE NET GENERATION , 2010 .

[20]  E LeidnerDorothy,et al.  Studying knowledge management in information systems research , 2002 .

[21]  D. Sandy Staples,et al.  Are full and partial knowledge sharing the same? , 2010, J. Knowl. Manag..

[22]  Samer Faraj,et al.  Why Should I Share? Examining Social Capital and Knowledge Contribution in Electronic Networks of Practice , 2005, MIS Q..

[23]  FarajSamer,et al.  Why should i share? examining social capital and knowledge contribution in electronic networks of practice , 2005 .

[24]  Gina Harden,et al.  Knowledge Sharing in the Workplace: A Social Networking Site Assessment , 2012, 2012 45th Hawaii International Conference on System Sciences.

[25]  Izak Benbasat,et al.  Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness , 2010, MIS Q..

[26]  Daniel E. Geer,et al.  Information security is information risk management , 2001, NSPW '01.

[27]  Robert M. Mason,et al.  Knowledge-Based Theory of the Firm, Challenges by Social Media , 2012, 2012 45th Hawaii International Conference on System Sciences.

[28]  Mikko T. Siponen,et al.  Analysis of modern IS security development approaches: towards the next generation of social and adaptable ISS methods , 2005, Inf. Organ..

[29]  M. B. Lloria,et al.  A review of the main approaches to knowledge management , 2008 .

[30]  M. McLure Wasko,et al.  "It is what one does": why people participate and help others in electronic communities of practice , 2000, J. Strateg. Inf. Syst..

[31]  K. Eisenhardt Building theories from case study research , 1989, STUDI ORGANIZZATIVI.

[32]  Sylwia Męcfal Recenzja książki. Robert K. yin, Case Study Research. Design and Methods (fourth Edition), thousand Oaks, CA: Sage Publications, 2009 , 2012 .

[33]  Michael D. Myers,et al.  The qualitative interview in IS research: Examining the craft , 2007, Inf. Organ..

[34]  野中 郁次郎,et al.  The knowledge-creating company , 2008 .

[35]  Moria Levy,et al.  WEB 2.0 implications on knowledge management , 2009, J. Knowl. Manag..

[36]  Emmanuelle Vaast,et al.  Innovating or Doing as Told? Status Differences and Overlapping Boundaries in Offshore Collaboration , 2008, MIS Q..

[37]  Douglas R. Vogel,et al.  Understanding the Influence of Social Media in the Workplace: An Integration of Media Synchronicity and Social Capital Theories , 2012, 2012 45th Hawaii International Conference on System Sciences.

[38]  Izak Benbasat,et al.  Effectiveness of Knowledge Seeking Behaviors Embedded in Social Networks: A Perspective of Individuals in Workplaces , 2012, 2012 45th Hawaii International Conference on System Sciences.

[39]  I. Nonaka A Dynamic Theory of Organizational Knowledge Creation , 1994 .

[40]  Robert M. Mason,et al.  The Nature of Knowledge in the Social Media Age: Implications for Knowledge Management Models , 2012, 2012 45th Hawaii International Conference on System Sciences.

[41]  Jean Hartley,et al.  Case study research , 2004 .

[42]  Hüseyin Tanriverdi,et al.  Information Technology Relatedness, Knowledge Management Capability, and Performance of Multibusiness Firms , 2005, MIS Q..

[43]  D. Stenmark Information vs. knowledge: the role of intranets in knowledge management , 2002, Proceedings of the 35th Annual Hawaii International Conference on System Sciences.

[44]  Hala Annabi,et al.  Guidelines to Align Communities of Practice with Business Objectives: An Application of Social Media , 2012, 2012 45th Hawaii International Conference on System Sciences.

[45]  Karin Väyrynen,et al.  Information Security Challenges of Social Media for Companies , 2012, ECIS.

[46]  Christoph Seebach,et al.  Searching for Answers--Knowledge Exchange through Social Media in Organizations , 2012, 2012 45th Hawaii International Conference on System Sciences.

[47]  Paul R. Carlile,et al.  A Pragmatic View of Knowledge and Boundaries: Boundary Objects in New Product Development , 2002, Organ. Sci..