Skip to main content
Erschienen in: Information Systems Frontiers 4/2021

31.07.2021

Advances in Secure Knowledge Management in the Artificial Intelligence Era

verfasst von: Sanjay K. Sahay, Nihita Goel, Murtuza Jadliwala, Shambhu Upadhyaya

Erschienen in: Information Systems Frontiers | Ausgabe 4/2021

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Excerpt

Knowledge management and preservation started thousands of years ago from cave paintings, representing words by pictures, later moving to books through the invention of paper and printing in the 15th century (Wallace, 2007). Later with the development of computing systems, knowledge/information was stored in the form of computing documents. In the first decade of the 21st century there was an explosion of volume, velocity, and variety (3V) of data. In addition to the storage cost, extraction of information/knowledge was non-trivial and thus required the evolution of knowledge management tools. In the 2nd decade the Artificial Intelligence (AI) revolution started. Scientists started to work with big data to efficiently and effectively deal with the 3Vs. Data is scanned and AI software is used to extract knowledge/information. AI has revolutionized every sphere of life (OED Online, 2021; Russell & Norvig, 2010; Nilsson, 2014). For example, healthcare has changed because of image recognition, natural language processing, language modeling, as well as neural machine translation. Although use of AI for knolwedge management is still in the nascent stage, it is important to note that along with knowledge extraction, security and privacy protection are paramount. Secure Knowledge Management (SKM) deals with the science of security in the collection, organizing, and dissemination of knowledge. Hackers and malicious actors, either sponsored by an adversary state, a competitor, or those working independently, are always on the lookout for weak spots in knowledge management systems to perpetuate passive and active attacks which may range from activities leading to information theft to extortion via ransomware. Hence, security systems must avert malicious activities perpetuated on host systems that archive the important information. …

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
Zurück zum Zitat Nilsson, N.J. (2014). Principles of artificial intelligence. Morgan Kaufmann, ISBN 978-3-540-11340-9. Nilsson, N.J. (2014). Principles of artificial intelligence. Morgan Kaufmann, ISBN 978-3-540-11340-9.
Zurück zum Zitat Russell, S., & Norvig, P. (2010). Artificial Intelligence: A Modern Approach. Prentice Hall, 3rd edn. Russell, S., & Norvig, P. (2010). Artificial Intelligence: A Modern Approach. Prentice Hall, 3rd edn.
Zurück zum Zitat Wallace, D.P. (2007). Knowledge management: Historical and Cross-disciplinary Themes, Library Unlimited ISBN: 978-1-591-58502-2. Wallace, D.P. (2007). Knowledge management: Historical and Cross-disciplinary Themes, Library Unlimited ISBN: 978-1-591-58502-2.
Metadaten
Titel
Advances in Secure Knowledge Management in the Artificial Intelligence Era
verfasst von
Sanjay K. Sahay
Nihita Goel
Murtuza Jadliwala
Shambhu Upadhyaya
Publikationsdatum
31.07.2021
Verlag
Springer US
Erschienen in
Information Systems Frontiers / Ausgabe 4/2021
Print ISSN: 1387-3326
Elektronische ISSN: 1572-9419
DOI
https://doi.org/10.1007/s10796-021-10179-9

Weitere Artikel der Ausgabe 4/2021

Information Systems Frontiers 4/2021 Zur Ausgabe

Premium Partner