top of page

Cybersecurity in Knowledge Management: Cyberthreats and Solutions
ISBN: 9781032802312

Assoc. Prof. Narasimha Rao Vajjhala
Dean, Faculty of Engineering and Architecture,
University of New York Tirana
kenneth_edited.jpg
Prof. Dr. Kenneth David Strang
W3 Research, USA
RMIT, Australia

About the Book

This book will explore the convergence between cybersecurity and knowledge management (KM), bridging two critical disciplines in the digital age. This book will have detailed case studies and real-world examples so that readers can understand the immediate relevance of cybersecurity in knowledge management. In addition to addressing current challenges, this book will also discuss future threats and opportunities, such as the role of Artificial Intelligence (AI) and the potential challenges posed by quantum computing. Beyond technical aspects, this book will also delve into human factors, organizational culture, and the importance of training and awareness programs, providing a 360-degree view of the subject matter. This edited book will present actionable strategies, best practices, and hands-on tools to empower professionals and organizational leadership to implement. While there are several books on either cybersecurity or knowledge management individually, our book occupies a niche space that combines the two. This book will address the increasing recognition that as knowledge becomes more digital and cloud-based, its security becomes paramount. The book will be essential for IT professionals, knowledge managers, and organizational leaders. In summary, our book is designed as a theoretical guide and a practical handbook for professionals at the intersection of knowledge management and cybersecurity.

Note: There are NO submission or acceptance fees for manuscripts submitted to this book publication. This book will be submitted for possible indexation to Scopus, Web of Science, and major indices.

Topics (Suggestive but not limited to)

The proposed tentative content for this book is given below:

  1. Introduction

    • The Convergence of Knowledge Management and Cybersecurity

    • The Value of Knowledge in the Digital Age

  2. Understanding Knowledge Management (KM)

    • Definitions and Components of KM

    • KM Systems and Technologies

    • Organizational Knowledge Flows

    • Strategies and Techniques to Discover Organizational Knowledge

  3. The Landscape of Cyber Threats

    • Current Cybersecurity Threats and Trends

    • Specific Threats to KM Systems

    • Case Studies: KM Breaches and Their Impact

  4. Foundational Cybersecurity Principles

    • The CIA Triad: Confidentiality, Integrity, and Availability

    • Risk Management in Cybersecurity

  5. Designing Secure KM Systems

    • Security by Design: KM System Architecture

    • Access Control Mechanisms

    • Encryption and Data Protection Techniques

  6. KM in the Cloud

    • Cloud-based KM Systems and Their Security Concerns

    • Mitigating Risks in Cloud Deployments

  7. Human Factors in KM Security

    • The Role of Organizational Culture and Behavior

    • Social Engineering: A Threat to Knowledge Assets

    • Training and Awareness Programs

  8. Incident Response and Knowledge Recovery

    • Developing an Incident Response Plan

    • Disaster Recovery and Knowledge Continuity

  9. KM Security Policies and Compliance

    • Developing and Implementing KM Security Policies

    • Regulatory Frameworks and Compliance Issues

  10. Monitoring and Auditing KM Systems

    • Tools and Techniques for Continuous Monitoring

    • Periodic Audits and Their Role

  11. Case Studies on Real-world Cybersecurity Breaches in Knowledge Management

    • The Vulnerability of Legacy Systems

    • Understanding Insider Threats

    • Supply Chain Vulnerabilities in Knowledge Systems

    • Cloud Security in Knowledge Management

  12. Future Challenges and Opportunities

    • The Role of AI and Machine Learning in KM and Cybersecurity

    • Potential Threats from Quantum Computing

    • Embracing Innovation While Managing Risks

  13. Conclusion

    • The Continuous Evolution of Cybersecurity in KM

    • Emphasizing a Proactive and Holistic Approach

Submission Guidelines

All papers must be original and not simultaneously submitted to another book, journal, or conference.

Kindly note the following when submitting your book chapter:

  • Submit an initial proposal through the EasyChair submission system, including the chapter title and the problem/purpose statement explaining the proposed chapter:

       

      https://easychair.org/conferences/?conf=ckm2024​

  • The length of the chapter should be 5,000-7,000 words.

  • Paper should be formatted as per the template provided.

  • The paper should be formatted per the template provided, and APA 7th Edition style of references should be used in the chapter. The template will be sent to the authors after the acceptance of the initial proposal.

  • Ensure that the paper adheres to Taylor and Francis’s book chapter formatting guidelines.​

Chapter Template

Chapter Formatting Guidelines 

Referencing and Citation Guidelines

Feel free to email us if you have questions or want feedback on your proposed research question (narasimharaonarasimha@gmail.com). You may also contact us via professional social media at:

 

http://linkedin.com/in/kennethdavidstrang

https://www.researchgate.net/profile/Kenneth_David_Strang

 

https://www.linkedin.com/in/drvajjhala/

https://www.researchgate.net/profile/Narasimha-Vajjhala

Important Dates

Expression of Interest              -    April 15, 2024

Draft chapter due date             -    June 30, 2024 

Peer review period                   -    July 1- August 30, 2024

Finalized chapter due              -    September 15, 2024

Final acceptance notification   -    October 1, 2024

Book publication date              -    November 2024

bottom of page