Análise bibliométrica sobre a gestão do conhecimento no contexto da segurança cibernética
DOI:
https://doi.org/10.22478/ufpb.2236-417X.2024v14n1.69337Resumo
O estudo investiga a produção científica relacionada com a gestão do conhecimento nas organizações no contexto da segurança cibernética. Em um trabalho inédito, são fornecidas implicações para as organizações à medida que desenvolvem capacidades relacionadas à segurança cibernética e à gestão do conhecimento para competir de forma eficaz na economia digital. Utilizou-se a metodologia da análise bibliométrica que aborda a pesquisa em um modelo predominante quantitativo, demonstrando a importância da análise do tema abordado. Como resultados são apresentadas as principais características da literatura, possibilitando identificar temas que podem ser aprofundados em estudos futuros, como a colaboração e o compartilhamento de conhecimento. São apresentadas ainda lacunas relacionadas ao tema de gestão de identidade digital, com seus impactos e consequências relacionadas ao indivíduo e à gestão do conhecimento, tratando também de barreiras como os preconceitos organizacionais quanto ao compartilhamento de conhecimento entre os stakeholders.
Downloads
Referências
AGRAFIOTIS, Ioannis; NURSE, Jason R. C., GOLDSMITH, Michael; CREESE, Sadie; UPTON, David. A taxonomy of cyber-harms: Defining the impacts of cyber-attacks and understanding how they propagate. Journal of Cybersecurity, v. 4, n. 1, p. 1–15, 2018.
ALAVI, M.; LEIDNER, D. E. Knowledge management and knowledge management systems: Conceptual foundations and research issues. MIS Quarterly, v. 25, n. 1, p. 107, mar. 2001.
ALRIMAWI, F. et al. Incidents are meant for learning, not repeating: Sharing knowledge about security incidents in cyber-physical systems. IEEE Transactions on Software Engineering, v. 48, n. 1, p. 120–134, 2020.
ANDRADE, R. O.; YOO, S. G. Cognitive security: A comprehensive study of cognitive science in cybersecurity. Journal of Information Security and Applications, v. 48, p. 102352, 2019.
ARIA, Massimo; CUCCURULLO, Corrado. bibliometrix: An R-tool for comprehensive science mapping analysis. Journal of informetrics, v. 11, n. 4, p. 959-975, 2017. DOI: https://doi.org/10.1016/j.joi.2017.08.007.
AUFFRET, Jean-Pierre et al. Cybersecurity Leadership: Competencies, Governance, and Technologies for Industrial Control Systems. Journal of Interconnection Networks, v. 17, n. 01, p. 1740001, 5 mar. 2017.
BABICEANU, R. F.; SEKER, R. Big Data and virtualization for manufacturing cyber-physical systems: A survey of the current status and future outlook. Computers in Industry, v. 81, p. 128–137, 1 set. 2016.
BAKER, H. K.; KUMAR, S.; PANDEY, N. Thirty years of the Global Finance Journal: A bibliometric analysis. Global Finance Journal, v. 47, n. September 2019, p. 100492, 2021.
BUOGO, Mateus; FACHINELLI, Ana Cristina; GIACOMELLO, Cíntia Paese. Gestão do conhecimento e segurança da informação. AtoZ: novas práticas em informação e conhecimento, v. 8, n. 2, p. 49-59, 2020. DOI: http://dx.doi.org/10.5380/atoz.v8i2.69867.
CHEN, C.-J.; HUANG, J.-W. Strategic human resource practices and innovation performance — The mediating role of knowledge management capacity. Journal of Business Research, v. 62, n. 1, p. 104–114, jan. 2009.
COBO, M. J., LÓPEZ-HERRERA, A. G., HERRERA-VIEDMA, E., HERRERA, F. An approach for detecting, quantifying, and visualizing the evolution of a research feld: A practical application to the fuzzy sets theory feld. Journal of Informetrics, v. 5, n. 1, p. 146-166, 2011.
DAVENPORT, T. H.; DE LONG, D. W.; BEERS, M. C. Successful knowledge management projects. Sloan Management Review, v. 39, n. 2, 1998.
FISCHER, E. A. Cybersecurity issues and challenges: In Brief. Cyberspace Threat Landscape: Overview, Response Authorities, and Capabilities, p. 45–54, 2015.
GAN, Y.; ZHU, Z. A learning framework for knowledge building and collective wisdom advancement in virtual learning communities. Journal of Educational Technology & Society, v. 10, n. 1, p. 206–226, 2007.
HEINRICH, P.; UHL, A.; JOSI, M. Designing for knowledge based cyber-security-episode 1: What should we teach? AIS electronic library (AISeL), p. 11–28, 2018.
HOUSEN-COURIEL, D. Information sharing for the mitigation of outer space–related cybersecurity threats. Acta Astronautica, v. 203, p. 546–550, 1 fev. 2023.
JOSHI, A. Comparison Between Scopus & ISI Web of Science. Journal Global Values ISSN, v. VII, n. 1, p. 976–9447, 2016.
LECHNER, N. H. An Overview of Cybersecurity Regulations and Standards for Medical Device Software. Central European Conference on Information and Intelligent Systems, p. 237–249, 2017.
LEE, H.; CHOI, B. Knowledge management enablers, processes, and organizational performance: An integrative view and empirical examination. Journal of Management Information Systems, v. 20, n. 1, p. 179–228, 2003.
LETTIERI, S. Segurança cibernética e inovação aliadas para uma transformação digital. 2021. Disponível em: https://politica.estadao.com.br/blogs/fausto-macedo/seguranca-cibernetica-e-inovacao-aliadas-para-uma-transformacao-digital/. Acesso em: 2 jul. 2023.
LEZZI, M.; LAZOI, M.; CORALLO, A. Computers in industry cybersecurity for industry 4.0 in the current literature: A reference framework. Computers in Industry, 103, 97–110, 2018.
LYKOU, G.; ANAGNOSTOPOULOU, A.; GRITZALIS, D. Smart airport cybersecurity: Threat mitigation and cyber resilience controls. Sensors (Switzerland), v. 19, n. 1, 2019.
MADNICK, S. et al. Measuring stakeholders’ perceptions of cybersecurity for renewable energy systems. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), v. 10097 LNAI, p. 67–77, 2017.
MCGRIFF, S. J. Um modelo de gestão do conhecimento corporativo. Sistemas Instrucionais Corporativos, 2000.
MCTI. Programa Hackers do Bem vai fortalecer a cibersegurança no país. 2023. Disponível em: https://www.gov.br/mcti/pt-br/acompanhe-o-mcti/noticias/2023/05/programa-hackers-do-bem-vai-fortalecer-a-ciberseguranca-no-pais. Acesso em: 14 jul. 2023.
OBITADE, P. O. Big data analytics: A link between knowledge management capabilities and superior cyber protection. Journal of Big Data, v. 6, n. 1, p. 71, 2019.
PADILHA, L. Thales assume o controle do satélite de demonstração da ESA no primeiro exercício de segurança cibernética do seu tipo. 2023. Disponível em: https://www.defesaaereanaval.com.br/espaco/thales-assume-o-controle-do-satelite-de-demonstracao-da-esa-no-primeiro-exercicio-de-seguranca-cibernetica-do-seu-tipo. Acesso em: 14 jul. 2023.
PATNAYAKUNI, n.; PATNAYAKUNI, r.; GUPTA, J. N. D. Towards a model of social media impacts on cybersecurity knowledge transfer. Em: Harnessing social media as a Knowledge Management tool. [s.l.] IGI Global, 2017. p. 249–271.
PATTERSON, C. M.; NURSE, J. R. C.; FRANQUEIRA, V. N. L. Learning from cyber security incidents: A systematic review and future research agenda. Computers & Security, v. 132, p. 103309, 1 set. 2023.
RADOVAN, M.; GOLUB, B. Trends in IoT security. 2017 40th International Convention on Information and Communication Technology, Electronics and Microelectronics, MIPRO 2017 - Proceedings. Anais [...] Institute of Electrical and Electronics Engineers Inc., 10 jul. 2017.
RUSS, M. Knowledge management for sustainable development in the era of continuously accelerating technological revolutions: A framework and models. Sustainability, v. 13, n. 6, p. 3353, 18 mar. 2021.
SAMTANI, S.; ZHAO, Z.; KRISHNAN, R. Secure knowledge management and cybersecurity in the era of artificial intelligence. Information Systems Frontiers, v. 25, n. 2, p. 425–429, 18 fev. 2023.
SANCHEZ, R.; MAHONEY, J. T. Modularity, flexibility, and knowledge management in product and organization design. Strategic Management Journal, v. 17, n. S2, p. 63–76, dez. 1996.
SARKER, I. H. et al. Cybersecurity data science: an overview from machine learning perspective. Journal of Big Data, v. 7, n. 1, 1 dez. 2020.
SOLMS, R. Von; NIEKERK, J. Van. From information security to cyber security. Computers and Security, v. 38, p. 97–102, 2013.
TAKAHASHI, T.; KADOBAYASHI, Y. Reference ontology for cybersecurity operational information. The Computer Journal, v. 58, n. 10, p. 2297–2312, 1 out. 2015.
TAKEUCHI, H.; NONAKA, I. Gestão do conhecimento. Bookman Editora, 2009.
URSACHE, V.-M. Cybersecurity challenges in the knowledge economy. Proceedings of the International Conference on Business Excellence, v. 16, n. 1, p. 121–129, 1 ago. 2022.
VASILEVA, V. Application of a Human-Centric Approach in Security by Design for IoT Architecture Development. Em: Communications in Computer and Information Science. [s.l.] Springer Science and Business Media Deutschland GmbH, v. 1596 Cusp. 13–22. 2022.
WANG, S.; WANG, H. A sociotechnical systems analysis of knowledge management for cybersecurity. International Journal of Sociotechnology and Knowledge Development, v. 13, n. 3, p. 77–94, 1 jul. 2021.
WARE, W. H. Security and Privacy in Computer Systems. The Rand Corporation, 1967.
WARE, W. H. Security Controls for Computer Systems (U): Report of Defense Science Board Task Force on Computer Security. The Rand Corporation, 1970.
XIN, Y. et al. Machine Learning and Deep Learning Methods for Cybersecurity. IEEE Access, v. 6, p. 35365–35381, 2018.
ZHENG, W.; YANG, B.; MCLEAN, G. N. Linking organizational culture, structure, strategy, and organizational effectiveness: Mediating role of knowledge management. Journal of Business Research, v. 63, n. 7, p. 763–771, jul. 2010.