An Approach to Acquire and Share Tacit Knowledge within a Security Assessment Lab

سال انتشار: 1394
نوع سند: مقاله کنفرانسی
زبان: انگلیسی
مشاهده: 472

فایل این مقاله در 19 صفحه با فرمت PDF قابل دریافت می باشد

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این مقاله:

شناسه ملی سند علمی:

IKMC07_472

تاریخ نمایه سازی: 9 مرداد 1395

چکیده مقاله:

This paper describes and validates an approach to improve security products assessment process within a security lab. The proposed approach includes mechanisms to acquire the experiences of individuals working in different security groups in security department of information and communication technology of Iran telecommunication research center (ITRC), combine them with the existing Lab’s knowledge assets, and share the evolved knowledge for all of the security lab’s experts. This approach was verified and validated by junior experts in a controlled environment over a four-week period. The main objective of this verification and validation was to assess whether the proposed approach provides an effective assessment process to evaluate security products. Results show that the approach helps security lab’s experts to improve their ability to assess security products and obtaining also high levels of security knowledge for evaluating new security products

نویسندگان

مراجع و منابع این مقاله:

لیست زیر مراجع و منابع استفاده شده در این مقاله را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود مقاله لینک شده اند :
  • ASIO. (2009). Protective security and T4 Retrieved 05/06/09, from .spxه ...
  • Armstrong, D. (2005). A Model for the Evaluation of Barriers ...
  • ASIO. (2006). SEC 2006 Security Equipment Catalogue. Canberra: C ommonwealth ...
  • Brooks, D. J. (2009). Defeating biometric fingerprint systems: An applied ...
  • Claber, K. J. (1998a). Designing Window Glazing for Explosive Loading. ...
  • Ma n _ t Conference F tb. 1 7 - ...
  • F tb. 1 7 - 1 8, 201 5 _ ...
  • Claber, K. J. (1998b). _ Development of Standards for Explosion ...
  • organizational knowledge sharing, in Promoting؛ Cook, J.S. and Cook, L. ...
  • CPNI. (2009). Research Retrieved 06/06/09, from http ://www.cpni. gov.uk/re searcl. ...
  • Hellard, G. (1998). GRYFFIN TALOS taut wire perimeter detection system. ...
  • Jackson, W., (2006) "Time to focus on security, not compliance", ...
  • Jones, D. E. L., & Smith, C. L. (2005). The ...
  • Maki, M., Hill, C., & Malone, C. R. (1999). User ...
  • Nonaka, I., Toyama, R. & Konno, N. (2000). SECI, ba, ...
  • Nonaka, I. & Takeuchi, H. (1995). The knowledge creating company. ...
  • Papoutsakis, H., and Valles, R. S. (2006) "Linking Knowledge Management ...
  • Polanyi, M., (1966) "The Tacit D imension" 'London, Routledge and ...
  • van Baalen, P., B lo emho f-Ruwaard, J. and van ...
  • Ma n _ t Conference F tb. 1 7 - ...
  • F tb. 1 7 - 1 8, 201 5 _ ...
  • Von Solms, B., and Von Solms, R., (2005) :From Information ...
  • von Krogh, G. and KoFhne, M. (1998), :Der Wi ssenstransfer ...
  • Weick, K., (1993b) _ Organisational Redesign as Improvisation, _ in ...
  • (Eds.), Organisational Change and Redesign, Oxford: Oxford University Press pp ...
  • Ma n _ t Conference F tb. 1 7 - ...
  • نمایش کامل مراجع