Securing Organizational Knowledge using Automated Annotation Savitha Kadiyala K.R. Namuduri Venu Dasigi.

Slides:



Advertisements
Similar presentations
What is Insider Threat? “Potential damage to the interests of an organization by a person(s) who is regarded, falsely, as loyally working for or on behalf.
Advertisements

1.Data categorization 2.Information 3.Knowledge 4.Wisdom 5.Social understanding Which of the following requires a firm to expend resources to organize.
Identity Management Based on P3P Authors: Oliver Berthold and Marit Kohntopp P3P = Platform for Privacy Preferences Project.
 DB&A, Knowledge Management Within and Across Projects June 15, 2012 INNOVATION for a better world.
Managing Knowledge in the Digital Firm (I)
Chapter 9 Knowledge Management
Introduction to knowledge management Lecture part 1 Pekka Makkonen References Turban et al., IT for management, 2004 & 2006 Riitta Partala’s lecture at.
Internet Resources Discovery (IRD) IBM DB2 Digital Library Thanks to Zvika Michnik and Avital Greenberg.
Information engineering and knowledge management Lecture part 1 Pekka Makkonen References Turban et al., IT for management, 2004 & 2006 Riitta Partala’s.
Introduction to knowledge management Lecture part 1 Pekka Makkonen References Turban et al., IT for management, 2004 & 2006 Riitta Partala’s lecture at.
Creating Collaborative Partnerships
7/2/12 Lecture 5 Term 2. Business value of customer relationship management Increased customer satisfaction Reduced direct-marketing costs More effective.
Libraries and Institutional Content Management Systems
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Secure Knowledge Management: and.
More than Knowing At Mercy College Karin Gilbert & Michelle Cotter.
Web-based Portal for Discovery, Retrieval and Visualization of Earth Science Datasets in Grid Environment Zhenping (Jane) Liu.
Business Driven Technology Unit 4
LÊ QU Ố C HUY ID: QLU OUTLINE  What is data mining ?  Major issues in data mining 2.
Cluj Napoca, 28 August IEEE International Conference on Intelligent Computer Communication and Processing Digital Libraries Workshop Towards.
KNOWLEDGE CREATION AND KNOWLEDGE MANAGEMENT ARCHITECTURE
1 Chapter 11 Developing The KM System The Knowledge Management Toolkit Amrit Tiwana.
Chapter 10 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.
CONTI’2008, 5-6 June 2008, TIMISOARA 1 Towards a digital content management system Gheorghe Sebestyen-Pal, Tünde Bálint, Bogdan Moscaliuc, Agnes Sebestyen-Pal.
Forethought Knowledge is our most important engine of production – Alfred Marshal Knowledge is the key resource of the 21st century Problem today is.
Module 3: Business Information Systems Chapter 11: Knowledge Management.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Chemical Toxicity and Safety Information System Shuanghui Luo Ying Li Jin Xu.
Human Resource Management Lecture 27 MGT 350. Last Lecture What is change. why do we require change. You have to be comfortable with the change before.
Knowledge Management By Dr.S.Sridhar,Ph.D., RACI(Paris),RZFM(Germany),RMR(USA),RIEEEProc. web-site :
IECM Briefing: XML Community of Practice Betsy Fanning AIIM.
Master Thesis Defense Jan Fiedler 04/17/98
Semantic Learning Instructor: Professor Cercone Razieh Niazi.
B. Information Technology (IS) CISB454: Introduction to Knowledge Management Knowledge Creation & KM Architecture.
PLoS ONE Application Journal Publishing System (JPS) First application built on Topaz application framework Web 2.0 –Uses a template engine to display.
Markup and Validation Agents in Vijjana – A Pragmatic model for Self- Organizing, Collaborative, Domain- Centric Knowledge Networks S. Devalapalli, R.
C11- Managing Knowledge.
Copyright © 2003 Sherif Kamel Issues in Knowledge Management Dr Sherif Kamel The American University in Cairo.
Chapter 6 Supporting Knowledge Management through Technology
B3AS Joseph Lewthwaite 1 Dec, 2005 ARL Knowledge Fusion COE Program.
Knowledge-based flexible workflow to support decision follow-ups Carla Valle Fraunhofer FIT - Germany.
Using Information Technology Knowledge & Knowledge Management Addendum to Class 4 Outline: What Is Knowledge? Types of Knowledge What is knowledge.
Chapter 12 Develop the Knowledge Management System.
Knowledge Management & Knowledge Management Systems By: Chad Thomison MIS 650.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #15 Secure Multimedia Data.
26/05/2005 Research Infrastructures - 'eInfrastructure: Grid initiatives‘ FP INFRASTRUCTURES-71 DIMMI Project a DI gital M ulti M edia I nfrastructure.
KNOWLEDGE CREATION AND KNOWLEDGE ARCHITECTURE CHAPTER 4.
Co-funded by the European Union Semantic CMS Community Reference Architecture for Semantic CMS Copyright IKS Consortium 1 Lecturer Organization Date of.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
McGraw-Hill/Irwin © 2008 The McGraw-Hill Companies, All Rights Reserved Chapter 15 Creating Collaborative Partnerships.
Knowledge Management. Concepts and methods for delivering knowledge in the digital age.
11.1 © 2010 by Prentice Hall 7 Chapter Managing Knowledge and Collaboration.
KNOWLEDGE CREATION AND KNOWLEDGE ARCHITECTURE CHAPTER 4.
1 2. Knowledge Management. 2  Structuring of knowledge enables effective and efficient problem solving dynamic learning strategic planning decision making.
WP5: Semantic Multimedia
Data and Applications Security Developments and Directions
Introduction Multimedia initial focus
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Knowledge Management Tools
Data and Applications Security Developments and Directions
Pilot project training
iECM Briefing: XML Community of Practice
Purpose Emerging from Knowledge, Technology and Innovation
Data and Applications Security Developments and Directions
KNOWLEDGE MANAGEMENT (KM) Session # 34
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Chapter 9 Knowledge Management
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Presentation transcript:

Securing Organizational Knowledge using Automated Annotation Savitha Kadiyala K.R. Namuduri Venu Dasigi

Outline Introduction Proposed model Relevant document retrieval System implementation Experiments Conclusions

Introduction Defining knowledge “Knowledge is a fluid mix of framed experience, values, contextual information, and expert insight that provides a framework for evaluating and incorporating new experiences and information” Davenport and Prusak Two basic types of knowledge Tacit knowledge: Uncodified knowledge deeply rooted in actions and is best described by the term “know-how.” Difficult and/or expensive to transfer and hence “sticky.” Explicit knowledge: Codified knowledge that can be easily communicated. Easy to transfer and hence “leaky.”

Introduction Safeguarding intellectual property Organizational efforts concentrate on safeguarding IP from external and intentional threats such as hacker attacks or insider betrayal. Patents, trademarks, copyrights, trade secrets and classifying documents. The current article addresses concerns related to intentional and unintentional threats to IP that are internal to the organization. System checks and balances Educate knowledge workers about protected IP. Alert supervisors of potential violation of IP rights.

Proposed model Automated annotation: involves Keyword extraction Conducted at two places: On protected documents residing in the knowledge base. Knowledge workers’ drafts Correlation analysis Between the keywords extracted from both of these places. Keyword extraction Categorizing IP related documents into clusters using standard document classification techniques. Vector Space Model (VSM) Latent Semantic Indexing (LSI) Indexing the clusters of documents using metadata. Extracting keyword from the drafted .

Fit with the seven-layered architecture for knowledge management systems Interface layer (Browser) Access and Authentication Layer (authentication, security, recognition) Collaborative Intelligence and Filtering Layer (keyword extraction tools, meta tagging tools) Application Layer (Skills directories, yellow pages, digital work rooms, video conferencing) Transport Layer (TCP/IP, Document exchange, , Video transport) Middleware and Legacy Integration Layer (tools that integrate data across platforms) Repositories (Knowledge bases storing IP protected documents)

Relevant document retrieval =

System Implementation

Experiments Compact representation of a sample patent application aqueous chloride crystals disintegrate dosage ethylcellulose granules invention milliequivalents potassium surfactants

Conclusion Automated annotation is used to recognize and alert knowledge workers about potential security threats to organizational knowledge. This model is implemented with the aid of a set of document processing tools and document search and retrieval tools. One of the challenges in implementing the system is to balance the knowledge workers’ need for privacy as well as the organizational need to safeguard its IP.