2019
DOI: 10.1108/jic-04-2019-0079
|View full text |Cite
|
Sign up to set email alerts
|

How does intellectual capital align with cyber security?

Abstract: Purpose The purpose of this paper is to position the preservation and protection of intellectual capital as a cyber security concern. The paper outlines the security requirements of intellectual capital to help boards of directors (BoDs) and executive management teams to understand their responsibilities and accountabilities in this respect. Design/methodology/approach The research methodology is desk research. In other words, we gathered facts and existing research publications that helped us to define key … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
44
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
8
1

Relationship

2
7

Authors

Journals

citations
Cited by 29 publications
(45 citation statements)
references
References 63 publications
1
44
0
Order By: Relevance
“…Accordingly, an emerging focus area within IC research includes the exploration of improved methods to protect the firm's valuable assets from threats, especially cyber security threats, both internal and external. Renaud, et al (2019) and Sallos, et al (2019), in separate articles in JIC describe guidance for organizations and their boards of directors to protect the IC assets. In a forthcoming special issue, Renaud (2020) summarizes several JIC papers that present research related to cyber security and IC, as part of the “fourth wave” of IC research described by Dal Mas (2019).…”
Section: Discussion and Future Research Avenuesmentioning
confidence: 99%
“…Accordingly, an emerging focus area within IC research includes the exploration of improved methods to protect the firm's valuable assets from threats, especially cyber security threats, both internal and external. Renaud, et al (2019) and Sallos, et al (2019), in separate articles in JIC describe guidance for organizations and their boards of directors to protect the IC assets. In a forthcoming special issue, Renaud (2020) summarizes several JIC papers that present research related to cyber security and IC, as part of the “fourth wave” of IC research described by Dal Mas (2019).…”
Section: Discussion and Future Research Avenuesmentioning
confidence: 99%
“…Dal Mas reports that a recently emergent fourth wave widens IC's perspective beyond organizations to the wider society. One societal area that has recently come to the fore is the interplay between IC and cyber Security (Renaud et al , 2019).…”
Section: Exploring Research At the Intersection Of Intellectual Capital And Cyber Securitymentioning
confidence: 99%
“…In this paper, we reveal connections between IC-related knowledge security and traditional information security, which is generally concerned with the preservation of data and information. The study of knowledge security (Desouza and Vanapalli, 2005), is relatively immature (Desouza, 2006;Renaud et al, 2019), and, given the importance of IC within universities, we believe greater insights into this topic would be valuable to the HE sector as a whole.…”
Section: Introductionmentioning
confidence: 99%
“…individual tacit knowledge), structural capital (SC) (organizational processes, systems and routines that structure intellectual assets into group property) and relational/customer capital (RC) (understanding of ex-firm intangibles) (Bontis, 1998). Knowledge is at the core of IC (Stewart, 1997; Renaud et al , 2019) with organizations being considered “repositories and coordinators of intellect” (Quinn, 1992, p. 241), this being intrinsically linked to organizations' economic wealth and value creation (Paloma Sánchez and Elena, 2006). There is a growing interest (in both research and practice) into the role of IC in educational institutions (Bisogno et al , 2018) and particularly in higher education (HE) (Paloma Sánchez et al , 2009), where IC management is crucially important, given the knowledge-focused nature of their activities (Secundo et al , 2015).…”
Section: Introductionmentioning
confidence: 99%