One of very important activities in an Information Security course is the case analysis of information security violations. This paper addresses several aspects of knowledge security violations. The case study describes the type of knowledge that was stolen and the process of knowledge security violations. The meta-knowledge about knowledge security violation is also identified.
CITATION STYLE
Czejdo, B. D., & Morzy, T. (2008). Knowledge, knowledge security, and meta-knowledge. In Communications in Computer and Information Science (Vol. 19, pp. 245–252). Springer Verlag. https://doi.org/10.1007/978-3-540-87783-7_31
Mendeley helps you to discover research relevant for your work.