Knowledge Management with Respect to Challenges Faced by the IT Departments in Supporting Social Network Sites and Smart Devices
ACKNOWLEDGEMENT
I would like to take this chance for thanking my research facilitator, friends & family for the support that they provided & their belief in me as well as guidance that they provided without which I would have never been able to do this research.
DECLARATION
I, (Your name), would like to declare that all contents included in this thesis/dissertation stand for my individual work without any aid, & this thesis/dissertation has not been submitted for any examination at academic as well as professional level previously. It is also representing my very own views & not essentially that are associated with university.
Signed __________________ Date _________________
TABLE OF CONTENTS
DECLARATIONIII
CHAPTER 1: INTRODUCTION1
Introduction to the Problem1
Background to the Study2
Statement of the Problem3
Purpose of the Study4
Rationale4
Research Questions5
Significance of the Study6
Definition of Terms7
Knowledge Management8
Information Security8
Social Network9
Social Networking Website10
Facebook10
LinkedIn11
Twitter11
WebEx12
Mobile Devices13
Personal Digital Assistant (PDA)14
Information Technology (IT)15
Assumptions of the Study15
Limitations of the Study15
Nature of the Study (or Theoretical/Conceptual Framework)17
Organization of the Remainder of the Study18
CHAPTER 2: LITERATURE REVIEW20
Social networks and their impact on businesses21
What is Social Networking?23
Show Ads33
Involving the interests of clients34
Dissemination of advertising34
Includes links to sites of e-commerce web34
Labeling of social media sites34
An integrated social media strategy37
The online hub and spoke model38
The power structure of social marketing39
Blogging39
RSS40
Social Search40
Social Bookmarking40
Social Networks40
Micro41
Some other direction to look at the pyramid42
Social networking and Data Security44
The various security problems faced by social networks and Mobile devices45
Secure profile on social networks46
Personal websites and databases48
Twitter allows direct access messages from its users without permission48
Security: social networking business concern50
Facebook: No. 1 threat50
Twitter: Vulnerable to Cyber attacks50
Security and rules of social networks51
Facebook has great privacy and security failures53
Learn more dangerous web applications54
Facebook face possible attack enhances the security of its web version55
The new risks with social networking56
Social network security: new challenges to IT departments58
Security threat vulnerabilities and their Exploitation67
Knowledge Management75
Knowledge management and information technology75
Social Roots of KM78
Economic roots of KM79
Technological roots of KM81
Technology for KM83
Mobile security: how vulnerable our Smartphones?83
Botnets84
Malicious applications85
Spyware86
Bluetooth87
Wi-Fi88
Phishing88
Traditional security89
Other security measures89
Trojan Horses, Malware, and Viruses91
Third-Party Apps That Share Too Much92
Which OS Is the Most Secure?93
Smartphone Security for the IT Crowd94
Secure instant messaging99
Smartphone security follies: A brief history100
RIM patches PDF vulnerability101
Skype springs leaks102
Secure instant messaging103
Smartphone security follies: A brief history104
RIM patches PDF vulnerability105
Skype springs leaks107
Why Smartphone Security Has to Come Front and Centre107
Smartphone security: Is mobile malware threat looming this year?110
Smartphone security: Is mobile malware threat looming this year?112
Cry wolf115
Human risk116
Low awareness117
Flaws118
What solutions?119
Theft of confidential data transmitted over the network122
Companies are wary of social networks127
The attitude of employers128
Knowledge129
Taxonomies of Knowledge130
Knowledge Management131
Knowledge Management Strategy133
Knowledge Management Enablers135
Technology135
Structure136
Organizational Culture137
Knowledge Management Process Capability138
Internal and External Knowledge Acquisition139
Knowledge Upgrade Capability140
Knowledge Protection Capability140
Knowledge Conversion Capability141
Knowledge Application Capability141
Companies that seem helpless in the face of the risks associated with new technology142
Impacts related to security incidents increased sharply143
Budget: between and increase stress while increasing the risks and incidents143
CHAPTER 3: METHODOLOGY148
Introduction148
Research Design150
The process of building grounded theory153
The generation of theory and inductive approach155