Ultimately, security is about controlling access to data, information, and knowledge while KM is about getting needed data, information, and knowledge to the right people at the right time.
Given the competitive
value this data, information, and knowledge has to the
organizations possessing it, it is only natural that
organizations would want to take steps to protect these
assets. The review of the academic research literature
found that there is a small body of literature that is
addressing the key issues of showing the linkage
between IS Security and KM success; applying risk
management approaches managing KM activities, and
applying Information Security technologies to
addressing issues such as access control, secure
communications, and secure storage. This is a good
finding but the research needs to continue. 2012 was
the year of Big Data, 2013 may well be the year of the
Persistent Threat. Cybercrime, cyber espionage, cyber
war, and cyber terrorism are in the 2013 headlines.
Additionally, the development and adoption of cloud
and mobile technologies all lead to the volatility of
security approaches, making this an area needing
further research. Interestingly enough Information
Security practitioners are investigating the use of KM
as a way improving overall Information Security
through the sharing of attack methods and defense
approaches.