CKM-2024: Cybersecurity in Knowledge Management: Cyberthreats and Solutions |
Website | https://www.narasimharao.net/ckm |
Submission link | https://easychair.org/conferences/?conf=ckm2024 |
Abstract registration deadline | March 15, 2024 |
Submission deadline | June 30, 2024 |
This book will explore the convergence between cybersecurity and knowledge management (KM), bridging two critical disciplines in the digital age. This book will have detailed case studies and real-world examples so that readers can understand the immediate relevance of cybersecurity in knowledge management. In addition to addressing current challenges, this book will also discuss future threats and opportunities, such as the role of Artificial Intelligence (AI) and the potential challenges posed by quantum computing. Beyond technical aspects, this book will also delve into human factors, organizational culture, and the importance of training and awareness programs, providing a 360-degree view of the subject matter. This edited book will present actionable strategies, best practices, and hands-on tools to empower professionals and organizational leadership to implement. While there are several books on either cybersecurity or knowledge management individually, our book occupies a niche space that combines the two. This book will address the increasing recognition that as knowledge becomes more digital and cloud-based, its security becomes paramount. The book will be essential for IT professionals, knowledge managers, and organizational leaders. In summary, our book is designed as a theoretical guide and a practical handbook for professionals at the intersection of knowledge management and cybersecurity.
Note: There are NO submission or acceptance fees for manuscripts submitted to this book publication.
The research questions guiding this proposed book project include:
- How are knowledge assets defined and categorized in modern organizations? What are the unique characteristics of knowledge assets that make them susceptible to cybersecurity threats?
- How do knowledge management systems and processes intersect with cybersecurity principles and practices? How have historical cybersecurity breaches impacted the integrity, confidentiality, and availability of knowledge assets?
- What are the specific vulnerabilities in current KM systems and technologies? How do emerging technologies like AI, machine learning, and quantum computing influence the cybersecurity landscape in KM?
- How do human behaviors and organizational cultures contribute to or mitigate cybersecurity risks in KM? What are the most effective training and awareness strategies for enhancing the cybersecurity posture of individuals involved in KM?
- How do organizations balance the need for knowledge accessibility and collaboration with the imperative of cybersecurity? What are the tangible and intangible cost implications of cybersecurity breaches in KM?
- What are the predicted future threats and challenges in cybersecurity concerning KM? How can organizations proactively prepare for and adapt to these future challenges?
- How do existing regulations and policies address cybersecurity in KM? What are the best practices for ensuring compliance without stifling innovation and knowledge sharing?
- How do cybersecurity practices in KM differ across sectors (e.g., healthcare, finance, education) and regions (e.g., North America, Asia, Europe)? What can industries learn from each other's successes and failures?
Submission Guidelines
All papers must be original and not simultaneously submitted to another book, journal, or conference.
Kindly note the following when submitting your book chapter:
-
Submit an initial proposal through the EasyChair submission system, including the chapter title and the problem/purpose statement explaining the proposed chapter:
-
The length of the chapter should be 7,000-10,000 words.
-
Paper should be formatted as per the template provided.
Feel free to email us if you have questions or want feedback on your proposed research question (narasimharaonarasimha@gmail.com). You may also contact us via professional social media at:https://www.linkedin.com/in/drvajjhala/
https://www.researchgate.net/profile/Narasimha-Vajjhala
http://linkedin.com/in/kennethdavidstrang
https://www.researchgate.net/profile/Kenneth_David_Strang
List of Topics
The proposed tentative content for this book is given below:
-
Introduction
-
The Convergence of Knowledge Management and Cybersecurity
-
The Value of Knowledge in the Digital Age
-
-
Understanding Knowledge Management (KM)
-
Definitions and Components of KM
-
KM Systems and Technologies
-
Organizational Knowledge Flows
-
Strategies and Techniques to Discover Organizational Knowledge
-
-
The Landscape of Cyber Threats
-
Current Cybersecurity Threats and Trends
-
Specific Threats to KM Systems
-
Case Studies: KM Breaches and Their Impact
-
-
Foundational Cybersecurity Principles
-
The CIA Triad: Confidentiality, Integrity, and Availability
-
Risk Management in Cybersecurity
-
-
Designing Secure KM Systems
-
Security by Design: KM System Architecture
-
Access Control Mechanisms
-
Encryption and Data Protection Techniques
-
-
KM in the Cloud
-
Cloud-based KM Systems and Their Security Concerns
-
Mitigating Risks in Cloud Deployments
-
-
Human Factors in KM Security
-
The Role of Organizational Culture and Behavior
-
Social Engineering: A Threat to Knowledge Assets
-
Training and Awareness Programs
-
-
Incident Response and Knowledge Recovery
-
Developing an Incident Response Plan
-
Disaster Recovery and Knowledge Continuity
-
-
KM Security Policies and Compliance
-
Developing and Implementing KM Security Policies
-
Regulatory Frameworks and Compliance Issues
-
-
Monitoring and Auditing KM Systems
-
Tools and Techniques for Continuous Monitoring
-
Periodic Audits and Their Role
-
-
Case Studies on Real-world Cybersecurity Breaches in Knowledge Management
-
The Vulnerability of Legacy Systems
-
Understanding Insider Threats
-
Supply Chain Vulnerabilities in Knowledge Systems
-
Cloud Security in Knowledge Management
-
-
Future Challenges and Opportunities
-
The Role of AI and Machine Learning in KM and Cybersecurity
-
Potential Threats from Quantum Computing
-
Embracing Innovation While Managing Risks
-
-
Conclusion
-
The Continuous Evolution of Cybersecurity in KM
-
Emphasizing a Proactive and Holistic Approach
-
Important Dates
Expression of Interest (Chapter Proposal) | April 15, 2024 |
Draft chapter due date | June 30, 2024 |
Peer review period | July 1- August 30, 2024 |
Finalized chapter due | September 15, 2024 |
Final acceptance notification | October 1, 2024 |
Book publication date | November 2024 |
Editors
Assoc. Prof. Narasimha Rao Vajjhala
Dean, Faculty of Engineering and Architecture
University of New York Tirana,
Tirana, Albania.
Prof. Dr. Kenenth David Strang
State University of New York (Retired)
W3 Research, USA.
Publication
This book is scheduled to be published will be published as a volume in the Chapman & Hall/CRC. For additional information regarding the publisher, please visit https://taylorandfrancis.com/. This publication is anticipated to be released in November 2024. All manuscripts will be accepted based on a double-blind peer-review editorial process. This book will be submitted for possible indexation in Scopus, Web of Science, and major indices.
Contact
All questions about submissions should be emailed to:
Assoc. Prof. Narasimha Rao Vajjhala