Access the full text.
Sign up today, get DeepDyve free for 14 days.
S. Nambisan, K. Lyytinen, A. Majchrzak, Michael Song (2017)
Digital innovation management: reinventing innovation management research in a digital worldManagement Information Systems Quarterly, 41
N. Doherty, L. Anastasakis, H. Fulford (2009)
The information security policy unpacked: A critical study of the content of university policiesInt. J. Inf. Manag., 29
(2017)
" University secrets are stolen by cybergangs " , The Times [ online ]
(2019)
How safe is your data? Cyber-security in higher education
R. Solms, J. Niekerk (2013)
From information security to cyber securityComput. Secur., 38
(1993)
Apprendimento organizzativo e pubblica amministrazione locale
P. Yeung, R. Bennett (2017)
University secrets are stolen by cybergangsThe Times
Susan Spiggle (1994)
Analysis and Interpretation of Qualitative Data in Consumer ResearchJournal of Consumer Research, 21
(2019)
Oxford University ‘right to be concerned' over China trade secrets theft, MP warns
D. Stenmark (2000)
Leveraging Tacit Organizational KnowledgeJ. Manag. Inf. Syst., 17
Giovanna Mariani, Ada Carlesi, Alfredo Scarfò (2018)
Academic spinoffs as a value driver for intellectual capital: the case of the University of PisaJournal of Intellectual Capital, 19
L. Edvinsson, P. Sullivan (1996)
Developing a model for managing intellectual capitalEuropean Management Journal, 14
S. Solms, R. Solms (2004)
The 10 deadly sins of information security managementComput. Secur., 23
Tim Lane (2007)
Information security management in Australian universities : an exploratory analysis
M. Zięba, S. Durst (2018)
Knowledge Risks in the Sharing Economy
M. Sánchez, Susana Elena, Rocío Castrillo (2009)
Intellectual capital dynamics in universities: a reporting modelJournal of Intellectual Capital, 10
M. Adler (2006)
A Unified Approach to Information Security Compliance.Educational Review, 41
K. Asiaei, Ruzita Jusoh (2015)
A multidimensional view of intellectual capital: the impact on organizational performanceManagement Decision, 53
Janine Nahapiet, S. Ghoshal (1998)
Social Capital, Intellectual Capital, and the Organizational AdvantageAcademy of Management Review, 23
W. Alston, Fred Dretske (1985)
Knowledge and the Flow of Information
D. Sangiorgi, Benedetta Siboni (2017)
The disclosure of intellectual capital in Italian universitiesJournal of Intellectual Capital, 18
G. Secundo, Susana Pérez, Žilvinas Martinaitis, K. Leitner (2015)
An intellectual capital maturity model (ICMM) to improve strategic management in European universitiesJournal of Intellectual Capital, 16
V. Jupp (2006)
The SAGE Dictionary of Social Research Methods
Marco Bisogno, John Dumay, F. Rossi, Paolo Polcini (2018)
Identifying future directions for IC research in education: a literature reviewJournal of Intellectual Capital, 19
M. Miles, A. Huberman (1984)
Drawing Valid Meaning from Qualitative Data: Toward a Shared CraftEducational Researcher, 13
K. Leitner (2014)
A Strategic Approach for Intellectual Capital Management in European Universities . Guidelines for Implementation Final report
Susana Elena-Pérez, O. Saritas, Katja Pook, Campbell Warden (2011)
Ready for the future? Universities' capabilities to strategically manage their intellectual capitalForesight, 13
S. Solms, R. Solms (2018)
Cybersecurity and information security - what goes where?Inf. Comput. Secur., 26
G. Secundo, John Dumay, G. Schiuma, G. Passiante (2016)
Managing intellectual capital through a collective intelligence approach: An integrated framework for universitiesJournal of Intellectual Capital, 17
Yolanda Ramírez, Carmen Lorduy, J. Rojas (2007)
Intellectual capital management in Spanish universitiesJournal of Intellectual Capital, 8
Nirmalya Kumar, L. Stern, James Anderson (1993)
Conducting Interorganizational Research Using Key InformantsAcademy of Management Journal, 36
Yolanda Ramírez, Á. Tejada, M. Manzaneque (2016)
The value of disclosing intellectual capital in Spanish universities: A new challenge of our daysJournal of Organizational Change Management, 29
Maryam Alavi, Dorothy Leidner (2001)
Review: Knowledge Management and Knowledge Management Systems: Conceptual Foundations and Research IssuesMIS Q., 25
Ingemar Dierickx, Karel Cool (1989)
Asset stock accumulation and sustainability of competitive advantageManagement Science, 35
S. Mann (1999)
Intellectual Capital: The New Wealth of OrganizationsLeadership & Organization Development Journal, 20
S. Nambisan (2017)
Digital Entrepreneurship: Toward a Digital Technology Perspective of EntrepreneurshipEntrepreneurship Theory and Practice, 41
K. Desouza, Ganesh Vanapalli (2005)
Securing knowledge in organizations: lessons from the defense and intelligence sectorsInt. J. Inf. Manag., 25
(2015)
Business research methods, Fourth ed
I. Tuomi (1999)
Data is more than knowledge: implications of the reversed knowledge hierarchy for knowledge management and organizational memoryProceedings of the 32nd Annual Hawaii International Conference on Systems Sciences. 1999. HICSS-32. Abstracts and CD-ROM of Full Papers, Track1
S. Durst, M. Zięba (2017)
Knowledge risks - towards a taxonomyInternational Journal of Business Environment, 9
(2002)
“ GUIDELINES FOR MANAGING AND REPORTING ON INTANGIBLES ( INTELLECTUAL CAPITAL REPORT ) ”
G. Secundo, M. Massaro, John Dumay, Carlo Bagnoli (2017)
Intellectual capital management in the fourth stage of IC research: A critical case study in university settingsJournal of Intellectual Capital, 19
L. Vogt (2016)
Intellectual Capital The New Wealth Of Organizations
Matteo Torre, John Dumay, M. Rea (2018)
Breaching intellectual capital: critical reflections on Big Data securityMeditari Accountancy Research
M. Siponen, M. Mahmood, Seppo Pahnila (2014)
Employees' adherence to information security policies: An exploratory field studyInf. Manag., 51
K. Renaud, B. Solms, Rossouw Solms (2019)
How does intellectual capital align with cyber security?Journal of Intellectual Capital
P. Trkman, K. Desouza (2012)
Knowledge risks in organizational networks: An exploratory frameworkJ. Strateg. Inf. Syst., 21
Y. Rezgui, Adam Marks (2008)
Information security awareness in higher education: An exploratory studyComput. Secur., 27
Ulrike Schultze, D. Leidner (2002)
Studying Knowledge Management in Information Systems Resarch: Discourses and Theoretical AssumptionsMIS Q., 26
Ivano Bongiovanni (2019)
The least secure places in the universe? A systematic literature review on information security management in higher educationComput. Secur., 86
Eliana Echenique, Luis Molías, M. Bullen (2015)
Students in higher education: Social and academic uses of digital technologyInternational Journal of Educational Technology in Higher Education, 12
Andrea Mauro, Marco Greco, M. Grimaldi (2016)
A formal definition of Big Data based on its essential featuresLibrary Review, 65
J. Tien (2013)
Big Data: Unleashing informationJournal of Systems Science and Systems Engineering, 22
H. Etzkowitz, A. Webster, C. Gebhardt, B.R.C. Terra (2000)
The Future of the University and the University of the Future: Evolution of Ivory Tower to Entrepreneurial ParadigmResearch Policy, 29
G. Williamson (2007)
The Sage Dictionary of Social Research MethodsJournal of Advanced Nursing, 57
(2019)
China behind massive Australian National University hack, intelligence officials say
(2006)
Knowledge Security : An Interesting Research Space
(2002)
2016) Case Study: Time Line of DDoS campaigns against MIT, Akamai
P. Paoloni, F. Cesaroni, P. Demartini (2018)
Relational capital and knowledge transfer in universitiesBus. Process. Manag. J., 25
N. Bontis (1998)
Intellectual capital: an exploratory study that develops measures and modelsManagement Decision, 36
(2017)
Cybersecurity Management, Intellectual Capital and Trust: A New Management Dilemma
Karim Moustaghfir, G. Schiuma (2013)
Knowledge, learning, and innovation: research and perspectivesJ. Knowl. Manag., 17
Ann Martin‐Sardesai, J. Guthrie (2018)
Human capital loss in an academic performance measurement systemJournal of Intellectual Capital, 19
Z. Soomro, M. Shah, J. Ahmed (2016)
Information security management needs more holistic approach: A literature reviewInt. J. Inf. Manag., 36
J. Mouritsen, M. Johansen, H. Larsen, P. Bukh (2001)
Reading an intellectual capital statement: Describing and prescribing knowledge management strategiesJournal of Intellectual Capital, 2
E. Vagnoni, C. Oppi (2015)
Investigating factors of intellectual capital to enhance achievement of strategic goals in a university hospital settingJournal of Intellectual Capital, 16
M. Sánchez, Susana Elena (2006)
Intellectual capital in universitiesJournal of Intellectual Capital, 7
D. Berardino, C. Corsi (2018)
A quality evaluation approach to disclosing third mission activities and intellectual capital in Italian universitiesJournal of Intellectual Capital, 19
Mary Low, Grant Samkin, Yuanyuan Li (2015)
Voluntary reporting of intellectual capitalJournal of Intellectual Capital, 16
E. Rapetti, Lorenzo Cantoni (2010)
"Digital Natives" and learning with the ICTs. The "GenY @ work" research in Ticino, SwitzerlandJournal of e-learning and knowledge society, 6
Che-Wei Liu, Peng Huang, H. Lucas (2017)
IT Centralization, Security Outsourcing, and Cybersecurity Breaches: Evidence from the U.S. Higher Education
J. Quinn (1992)
Intelligent Enterprise: A Knowledge and Service Based Paradigm for Industry
C. Borgman (2018)
Open Data, Grey Data, and Stewardship: Universities at the Privacy FrontierArXiv, abs/1802.02953
Sadaf Hina, D. Dominic (2016)
Information security policies: Investigation of compliance in universities2016 3rd International Conference on Computer and Information Sciences (ICCOINS)
B. Perrott (2007)
A strategic risk approach to knowledge managementBusiness Horizons, 50
J. Christopher (2014)
Australian public universities: are they practising a corporate approach to governance?Studies in Higher Education, 39
S. Timmermans, Iddo Tavory (2012)
Theory Construction in Qualitative ResearchSociological Theory, 30
To investigate the links between IC and the protection of data, information and knowledge in universities, as organizations with unique knowledge-related foci and challenges.Design/methodology/approachThe authors gathered insights from existing IC-related research publications to delineate key foundational aspects of IC, identify and propose links to traditional information security that impact the protection of IC. They conducted interviews with key stakeholders in Australian universities in order to validate these links.FindingsThe authors’ investigation revealed two kinds of embeddedness characterizing the organizational fabric of universities: (1) vertical and (2) horizontal, with an emphasis on the connection between these and IC-related knowledge protection within these institutions.Research limitations/implicationsThere is a need to acknowledge the different roles played by actors within the university and the relevance of information security to IC-related preservation.Practical implicationsFraming information security as an IC-related issue can help IT security managers communicate the need for knowledge security with executives in higher education, and secure funding to preserve and secure such IC-related knowledge, once its value is recognized.Originality/valueThis is one of the first studies to explore the connections between data and information security and the three core components of IC's knowledge security in the university context.
Journal of Intellectual Capital – Emerald Publishing
Published: Jun 3, 2020
Keywords: Intellectual capital; Data security; Information security; Knowledge security; Cyber security; Higher education; University
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.