Managing Knowledge Security: Strategies for Protecting Your Company's Intellectual Assets

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

Managing Knowledge Security is a comprehensive reference guide detailing how to secure both the physical and intangible assets owned by a business. Citing international examples such as Hewlett Packard, Microsoft, Google, Boeing, and Amazon, the author covers all aspects of knowledge protection, from employee retention strategies to physical security. Knowledge managers, security professionals, general managers, information systems managers, and competitive intelligence professionals will find the book of immediate relevance, as will members of the defense, national security, and government intelligence agencies.

Author(s): Kevin C Desouza, Kevin C. Desouza
Edition: 1
Publisher: Kogan Page
Year: 2007

Language: English
Commentary: 30635
Pages: 225

Contents......Page 7
Preface......Page 9
Acknowledgements......Page 17
About the author......Page 19
1 The basics......Page 21
Compromising your intellectual assets......Page 23
Intellectual assets: the bedrock of organizations......Page 26
Knowledge management......Page 29
Competitive intelligence......Page 35
Security management......Page 40
Roadmap of the book......Page 42
2 The human stain......Page 47
Security breaches......Page 50
Preventive measures......Page 59
Closing thoughts......Page 73
3 Technology hiccups......Page 75
Security breaches......Page 79
Preventive measures......Page 87
Closing thoughts......Page 94
4 When friends become liabilities......Page 95
Types of alliance......Page 99
Security breaches......Page 108
Preventive measures......Page 117
Closing thoughts......Page 123
5 Guarding the fortress......Page 125
Defining the fortress......Page 128
Security breaches......Page 129
Preventive measures......Page 137
Closing thoughts......Page 147
6 From abnormalities to crises......Page 149
Understanding the beast......Page 152
Preventative measures......Page 174
Closing thoughts......Page 191
The seven strategic considerations......Page 193
Closing thoughts......Page 207
Notes......Page 209
References......Page 211
Index......Page 215