A conceptual model of tacit knowledge transfer in steganography

 
 
 
  • Abstract
  • Keywords
  • References
  • PDF
  • Abstract


    Steganography is a technique that involves a secret hidden message concealed inside the media cover using formats such as text, images, video or audio. Secret messages sent from the sender to the receiver are considered as knowledge being transferred from the expert to the novice. However, previous studies related to the knowledge transfer from experts to novices in the field of computer security, particularly in the field of steganography, are limited. Therefore, this study aims to investigate the knowledge transfer process occurring in steganography by using an information management transfer model. The methodology consists of theory development, model validation, instrument development, survey and model verification. This paper proposes a novel Stego-based SECI Model that demonstrates how the knowledge transfer process occurs in steganography.

     

     


  • Keywords


    Steganography is a technique that involves a secret hidden message concealed inside the media cover using formats such as text, images, video or audio. Secret messages sent from the sender to the receiver are considered as knowledge being transferred from

  • References


      [1] M. Arif and C. Egbu, “Measuring knowledge retention: A case study of a construction consultancy in the UAE,” Eng. Constr. …, 2009.

      [2] E. K. W. Lau, “Deploying the Measurement of Knowledge Management using the Balanced Scorecard,” KMO 2016, 2016.

      [3] S. Kesar, “Knowledge Management Within Information Security: the Case of Barings Bank,” Int. J. Bus. Inf. Syst., vol. 3, no. 6, pp. 652–667, 2008.

      [4] K. Jairak, P. Praneetpolgrang, K. Jairak, P. Praneetpolgrang, C. Security, D. Systems, and C. Security, “Information Management and Computer Security Article information,” 2013.

      [5] J. J. C. H. Ryan, “Knowledge management needs security too,” Vine, vol. 36, pp. 45–48, 2006.

      [6] F. A. P. Petitcolas, R. J. Anderson, and M. G. Kuhn, “Information hiding - a survey,” Proc. IEEE, vol. 87, no. 7, pp. 1062–1078, 1999.

      [7] L. Bloice, S. Burnett, L. Bloice, and S. Burnett, “Barriers to knowledge sharing in third sector social care: A case study,” J. Knowl. Manag., vol. 20, no. 1, pp. 125–145, 2016.

      [8] A. S. McCampbell, L. M. Clare, and S. H. Gitters, “Knowledge management: The new challenge for the 21st century,” J. Knowl. Manag., vol. 3, no. 3, pp. 172–179, 1999.

      [9] P. Massingham and P. Massingham, “An evaluation of knowledge management tools: Part 1 – managing knowledge resources,” 2014.

      [10] I. Nonaka and H. Takeuchi, The knowledge-creating company: How Japanese companies create the dynamics of innovation. 1995.

      [11] M. Nissen, “An extended model of knowledge-flow dynamics,” Commun. Assoc. Inf. …, 2002.

      [12] S. Chaudhary, M. Dave, A. Sanghi, and J. Manocha, “An Elucidation on Steganography and Cryptography,” Proc. Second Int. Conf. Inf. Commun. Technol. Compet. Strateg., pp. 1–6, 2016.

      [13] N. Hamid and J. Salim, “Exploring the role of transactive memory system (TMS) for knowledge transfer processes in Malaysia E-government IT outsourcing,” Inf. Retr. Knowl. …, 2010.

      [14] L. Argote and P. Ingram, “Knowledge transfer: A basis for competitive advantage in firms,” Organ. Behav. Hum. Decis. …, 2000.

      [15] M. Easterby‐Smith, “Inter‐organizational knowledge transfer: Current themes and future prospects,” J. Manag. …, 2008.

      [16] R. Williams, “Narratives of knowledge and intelligence beyond the tacit and explicit,” J. Knowl. Manag., 2006.

      [17] K. Thomson, R. von Solms, and L. Louw, “Cultivating an organizational information security culture,” Comput. Fraud Secur., 2006.

      [18] M. Siponen, “A conceptual foundation for organizational information security awareness,” Inf. Manag. Comput. Secur., 2000.

      [19] D. Mani, S. Mubarak, and K. Choo, “Understanding the Information Security Awareness Process in Real Estate Organizations Using the SECI Model,” 20th Am. Conf., 2014.

      [20] S. Kesh and P. Ratnasingam, “A knowledge architecture for IT security,” Commun. ACM, 2007.

      [21] S. Kumar, “Hiding the Text Messages of Variable Size using Encryption and Decryption Algorithms in Image Steganography,” vol. 61, no. 6, pp. 47–52, 2013.

      [22] M. G. Vennice, P. T. Rao, M. Swapna, and P. J. Sasi, “Hiding the Text Information using Stegnography,” vol. 2, no. 1, pp. 126–131, 2012.


 

View

Download

Article ID: 20957
 
DOI: 10.14419/ijet.v7i3.28.20957




Copyright © 2012-2015 Science Publishing Corporation Inc. All rights reserved.