An overview of industrial Knowledge Management System and a review of Access Control Methods / Putri Norlyana Mustafa Kamal, Azmi Osman and Norlida Buniyamin
Companies are now realizing the importance of retaining and sharing organizational knowledge, this paper presents the need for a secure and reliable Knowledge Management System (KMS) for manufacturing organisations. Although previous researches have mentioned that KMS security is important, it has n...
Saved in:
Main Authors: | , , |
---|---|
Format: | Book |
Published: |
Universiti Teknologi MARA Press (Penerbit UiTM),
2020.
|
Subjects: | |
Online Access: | Link Metadata |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
MARC
LEADER | 00000 am a22000003u 4500 | ||
---|---|---|---|
001 | repouitm_42160 | ||
042 | |a dc | ||
100 | 1 | 0 | |a Mustafa Kamal, Putri Norlyana |e author |
700 | 1 | 0 | |a Osman, Azmi |e author |
700 | 1 | 0 | |a Buniyamin, Norlida |e author |
245 | 0 | 0 | |a An overview of industrial Knowledge Management System and a review of Access Control Methods / Putri Norlyana Mustafa Kamal, Azmi Osman and Norlida Buniyamin |
260 | |b Universiti Teknologi MARA Press (Penerbit UiTM), |c 2020. | ||
500 | |a https://ir.uitm.edu.my/id/eprint/42160/1/42160.pdf | ||
520 | |a Companies are now realizing the importance of retaining and sharing organizational knowledge, this paper presents the need for a secure and reliable Knowledge Management System (KMS) for manufacturing organisations. Although previous researches have mentioned that KMS security is important, it has not been a focus in previous researches in this area. Previous research in the areas of KMS & Access Control Method (ACM) is summarized in this paper. A literature review was conducted to study the relationship between KMS and ACM, and also to find a research gap in ACM. This paper introduces an ongoing research conducted in a manufacturing company in Malaysia. The aim of the research is to develop and implement a KMS with ACM for security by applying an improved version of Role-Based Access Control (RBAC). The improved RBAC is expected to overcome current RBAC's weakness which is rigidity and requirement for complex management. | ||
546 | |a en | ||
690 | |a Knowledge management. Organizational learning | ||
655 | 7 | |a Article |2 local | |
655 | 7 | |a PeerReviewed |2 local | |
787 | 0 | |n https://ir.uitm.edu.my/id/eprint/42160/ | |
787 | 0 | |n https://jeesr.uitm.edu.my | |
856 | 4 | 1 | |u https://ir.uitm.edu.my/id/eprint/42160/ |z Link Metadata |