“…KS can help in the context of handling online identity theft (Feledi et al , 2013; He and Johnson, 2015; Liu et al , 2011; Safa et al , 2015). However, there is a lack of research on the effective sharing of knowledge on security and best practices (He and Johnson, 2015; Khakurel et al , 2018; Ochieng et al , 2018). The need for research into barriers to knowledge management in the context of information security has been highlighted by previous studies (Gal-Or and Ghose, 2005; Gordon et al , 2003; Liu et al , 2011; Tamjidyamcholo et al , 2014).…”