•  
  •  
 

Abstract

This article describes the distinct of privacy and security issues that are simultaneously operant in the KMS practices. It identifies several perceptions of privacy and security issues in the company’s KMS settings. By studying the perspective, authors provide a conceptual directions to the fog of misunderstandings around privacy and security in company’s KMS settings. An exploratory sequential mixed method research design was adopted. A questionnaire survey was administered by authors personally handing to KM staff in three companies, followed by semi-structure interviews with four KM staff. The findings of this study show that the employees were aware of the importance of KMS in the companies, and hence had a high awareness of personal information privacy and security issues. In short, the distinct perspective of privacy issue in companies can be distinguished from organizational layer of KMS through three dimensions; confidentiality, trust, and behavior. While the security aspects in KMS have complied with ICT layer which constructed by legal framework and KMS architecture.

Bahasa Abstract

Penelitian ini dimaksudkan untuk mengidentifikasi signifikasi diskursus KM di era digital dengan menitikberatkan pada hubungan antara perspektif konseptual KMS dengan privasi dan keamanan pengetahuan (secure knowledge) karyawan di perusahaan. Selain itu, studi ini mengkonseptualisasikan isu privasi dan keamanan di KMS berdasarkan landasan teoritis dengan kerangka acuan konseptual (conceptual directions) untuk pengembangan KMS di masa depan. Penelitian ini mengadopsi pendekatan exploratory sequential mixed method. Teknik pengambilan data pada penelitian menggunakan kuesioner dan wawancara tidak terstruktur di empat karyawan di tiga perusahaan di Jawa Timur. Hasil penelitian ini memberikan perspektif baru terhadap diskusi KMS dengan mengidentifikasi perspektif, konsep, dan strategi terkait dengan pengelolaan isu privasi dan keamanan di perusahaan. Perspektif karyawan terhadap isu privasi di dalam KMS perusahaan memiliki kesamaan dan cenderung menunjukkan respon positif. Hasil analisis data menunjukkan bahwa perspektif karyawan terhadap isu privasi dan keamanan di KMS dapat ditelaah dari sisi organisasional dan sisi ICT. Sisi organisasional mencakup tiga dimensi terkait dengan isu privasi, yaitu: kerahasiaan (confidentiality), kepercayaan (trust), dan perilaku (behavior). Sedangkan dari segi ICT, perusahaan dapat mempertimbangkan aspek kemanan terhadap data personal karyawan melalui dua aspek; legal framework dan arsitektur-infrastruktur KMS.

References

  1. Alavi, M., & Leidner, D. E. (2001). Review: Knowledge Management and Knowledge Management Systems: Conceptual Foundations and Research Issues. MIS Quarterly, 25(1), 107–136. https://doi.org/10.2307/3250961
  2. Aldi, E. B. (2005). Menjadikan Manajemen Pengetahuan Sebagai Keunggulan Kompetitif Perusahaan Melalui Strategi Berbasis Pengetahuan. Jurnal Studi Manajemen Dan Organisasi, 2(1), 58–68.
  3. Bajpai, K., & Weber, K. (2017). Privacy in Public: Translating the Category of Privacy to the Digital Age. In R. Durand, N. Granqvist, & A. Tyllström (Eds.), Research in the Sociology of Organizations (Vol. 51, pp. 223–258). Emerald Publishing Limited. https://doi.org/10.1108/S0733-558X20170000051006
  4. Ball, K., Daniel, E. M., & Stride, C. (2012). Dimensions of Employee Privacy: an Empirical Study. Information Technology & People, 25(4), 376–394. https://doi.org/10.1108/09593841211278785
  5. Baskaran, V., Davis, K., Bali, R. K., Naguib, R. N. G., & Wickramasinghe, N. (2013). Managing Information and Knowledge within Maternity Services: Privacy and Consent Issues. Informatics for Health and Social Care, 38(3), 196–210. https://doi.org/10.3109/17538157.2012.735732
  6. Becerra-Fernandez, I., & Sabherwal, R. (2015). Knowledge Management: Systems and Processes (Second edition). New York, NY: Routledge.
  7. Bertino, E., Khan, L. R., Sandhu, R., & Thuraisingham, B. (2006). Secure Knowledge Management: Confidentiality, Trust, and Privacy. IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans, 36(3), 429–438. https://doi.org/10.1109/TSMCA.2006.871796
  8. Budiyono, H. (2009). Implementation and Measurement of Knowledge Management (KM) in Indonesia, 3.
  9. Choe, J.-M. (2016). The Construction of an IT Infrastructure for Knowledge Management. Asian Academy of Management Journal, 21(1), 137–159.
  10. Creswell, J. W. (2014). Research design: qualitative, quantitative, and mixed methods approaches (4th ed). Thousand Oaks: SAGE Publications.
  11. Clobridge, A. (2016) Open Knowledge Versus Knowledge Management. Online Searcher, Vol 40, 68-70.
  12. Drachsler, H., & Greller, W. (2016). Privacy and Analytics: It’s a DELICATE Issue a Checklist for Trusted Learning Analytics. In Proceedings of the Sixth International Conference on Learning Analytics & Knowledge - LAK ’16 (pp. 89–98). Edinburgh, United Kingdom: ACM Press. https://doi.org/10.1145/2883851.2883893
  13. Evans, N. (2017). Virtue Ethics in Knowledge Management. In A. J. G. Sison, G. R. Beabout, & I. Ferrero (Eds.), Handbook of Virtue Ethics in Business and Management (pp. 1231–1243). Dordrecht: Springer Netherlands. https://doi.org/10.1007/978-94-007-6510-8_94
  14. Fishleigh, J. (2015). Is Someone Watching You? Data Privacy and Protection: Current Issues. Legal Information Management, 15(01), 61–69. https://doi.org/10.1017/S1472669615000183
  15. Fried, C. (1968). Privacy. The Yale Law Journal, 77(3), 475–493. https://doi.org/10.2307/794941
  16. Froomkin, A. M. (2017). Privacy Impact Notices to Address the Privacy Pollution of Mass Surveillance. Privacy in Public Space. Retrieved from https://www.elgaronline.com/view/edcoll/9781786435392/9781786435392.00015.xml
  17. Hartono, B., Ramadhani, V. S., Ratnadilla, Y., Indarti, N., & Chai, K. H. (2015). Knowledge Management Maturity and Organizational Performance in Project-based Organizations: Initial Evidence from Indonesia. In 2015 IEEE International Conference on Industrial Engineering and Engineering Management (IEEM) (pp. 656–660). Singapore, Singapore: IEEE. https://doi.org/10.1109/IEEM.2015.7385729
  18. He, W., Qiao, Q., & Wei, K.-K. (2009). Social Relationship and Its Role in Knowledge Kanagement Systems Usage. Information & Management, 46(3), 175–180. https://doi.org/10.1016/j.im.2007.11.005
  19. Surbakti. Herison. (2015). Web Technology Knowledge Management and its Privacy and Security Challenge. https://doi.org/10.13140/2.1.3178.2727
  20. Khiste, G. P., Maske, D. B., & Deshmukh, R. K. (2018). Knowledge Management Output in Scopus during 2007 to 2016. Asian Journal of Research in Social Sciences and Humanities, 8(1), 10. https://doi.org/10.5958/2249-7315.2018.00002.3
  21. Kokolakis, S. (2017). Privacy Attitudes and Privacy Behaviour: A Review of Current Research on the Privacy Paradox Phenomenon. Computers & Security, 64, 122–134. https://doi.org/10.1016/j.cose.2015.07.002
  22. Kurniawan, Y., Hardianto, A., Meylani, F., & Wandy. (2018). The Influence of Knowledge Management Capabilities on Organizational Effectiveness. Journal of Theoretical and Applied Information Technology, 96(18), 6150–6171.
  23. Liao, S. (2003). Knowledge Management Technologies and Applications—Literature Review from 1995 to 2002. Expert Systems with Applications, 25(2), 155–164. https://doi.org/10.1016/S0957-4174(03)00043-5
  24. Liu, C., Marchewka, J. T., Lu, J., & Yu, C.-S. (2005). Beyond Concern—a Privacy-Trust-Behavioral Intention Model of Electronic Eommerce. Information & Management, 42(2), 289–304. https://doi.org/10.1016/j.im.2004.01.003
  25. Maheswari, N., & Duraiswamy, K. (2009). PPKM: Preserving Privacy in Knowledge Management. International Business Research, 2(2). https://doi.org/10.5539/ibr.v2n2p182
  26. Maier, R. (2007). Knowledge Management Systems: Information And Communication Technologies for Knowledge Management (3rd ed). Berlin ; New York: Springer.
  27. Majumdar, D., Catherine, R., Ikbal, S., & Visweswariah, K. (2011). Privacy Protected Knowledge Management in Services with Emphasis on Quality Data. In Proceedings of the 20th ACM International Conference on Information and Knowledge Management (pp. 1889–1894). New York, NY, USA: ACM. https://doi.org/10.1145/2063576.2063848
  28. Matzner, T. (2014). Why Privacy is Not Enough Privacy in the Context of “ubiquitous computing” and “big data.” Journal of Information, Communication and Ethics in Society, 12(2), 93–106. https://doi.org/10.1108/JICES-08-2013-0030
  29. McDermott, R. (2000). Why information technology inspired but cannot deliver knowledge management. In Knowledge and communities (pp. 21-35).
  30. Mittal, Y. K., Roy, S., & Saxena, M. (2010). Role of Knowledge Management in Enhancing Information Security. IJCSI Int. J. Comput. Sci. Issues, 7(6).
  31. Moor, J. H. (1991). The Ethics of Privacy Protection. Retrieved from https://www.ideals.illinois.edu/handle/2142/7714
  32. Miltgen, C. L., & Smith, H. J. (2015). Exploring Information Privacy Regulation, Risks, Trust, and Behavior. Information & Management, 52(6), 741–759. https://doi.org/10.1016/j.im.2015.06.006
  33. Moharana, C. R., & Satapathy, S. K. (2017). Knowledge Management Effectiveness in Securing Information and Network Systems: A Study on Odisha. Asian Resonance, 6(3), 26–33.
  34. Moll, R., Pieschl, S., & Bromme, R. (2014). Competent or Clueless? Users’ Knowledge and Misconceptions About their Online Privacy Management. Computers in Human Behavior, 41, 212–219. https://doi.org/10.1016/j.chb.2014.09.033
  35. Muniraman, C., Damodaran, M., & Ryan, A. (2007). Security and privacy issues in a knowledge management system. In 6th Annual Security Conference.
  36. Rahim, F. A., Ismail, Z., & Samy, G. N. (2016). A Review on Influential Factors of Information Privacy Concerns in the Use of Electronic Medical Records. International Journal of Computer Science and Information Security, 14(7), 17.
  37. Republik Indonesia. (2016). Peraturan Menteri Komunikasi dan Informatika No. 20 Tahun 2016 tentang Perlindungan Data Pribadi Dalam Sistem Elektronik. Sekretariat Negara. Jakarta.
  38. Republik Indonesia. (2016). Undang-Undang No. 19 Tahun 2016 tentang Perubahan Undang-Undang No. 11 Tahun 2008 Tentang Informasi dan Transaksi Elektronik. Sekretariat Negara. Jakarta
  39. Park, S.-J., & Lee, M. H. (2008). Awareness of the Privacy Concerns in Knowledge Management in Sholarly Publishing from 200 to 2004. Journal of The Korea Society for Information Management, 25(2), 99–114. https://doi.org/10.3743/KOSIM. 2008.25.2.099
  40. Park, Y. J. (2013). Digital Literacy and Privacy Behavior Online. Communication Research, 40(2), 215–236. https://doi.org/10.1177/0093650211418338
  41. Privacy International. (n.d.). State of Privacy Indonesia. Retrieved November 14, 2018, from http://privacyinternational.org/state-privacy/1003/state-privacy-indonesia
  42. Ren, Y., Cheng, F., Peng, Z., Huang, X., & Song, W. (2011). A Privacy Policy Conflict Detection Method for Multi-Owner Privacy Data Protection. Electronic Commerce Research, 11(1), 103–121. https://doi.org/10.1007/s10660-010-9067-8
  43. Stalla-Bourdillon, S., Phillips, J., & Ryan, M. D. (2014). Privacy vs. security. London: Springer. Diambil dari http://public.eblib.com/choice/publicfullrecord.aspx?p=1802559
  44. Sundiman, D., & Putra, S. S. (2016). Knowledge Management Role on Creating Service Excellence: Case Study on Building Materials Supermarket In the city of Sampit - Indonesia. In Proceedings of the The 11th International Knowledge Management in Organizations Conference on The changing face of Knowledge Management Impacting Society - KMO ’16 (pp. 1–6). Hagen, Germany: ACM Press. https://doi.org/10.1145/2925995.2926044
  45. Susanty, A. I., & Salwa, M. (2017). Knowledge Management Practices and Organizational Learning Have Positive Impacts on Organizational Performance of State-Owned Enterprises in Indonesia. Mediterranean Journal of Social Sciences, 8(3), 281–292. https://doi.org/10.5901/mjss.2017.v8n3p281
  46. Skinner, G., Han, S., & Chang, E. (2006). An Information Privacy Taxonomy for Collaborative Environments. Information Management & Computer Security, 14(4), 382–394. https://doi.org/10.1108/09685220610690835
  47. Timan, T., Newell, B. C., & Koops, B.-J. (2017). Privacy in Public Space: Conceptual and Regulatory Challenges. Edward Elgar Publishing.
  48. Un Jan, A., & Contreras, V. (2016). Success Model for Knowledge Management Systems Used by Doctoral Researchers. Computers in Human Behavior, 59, 258–264. https://doi.org/10.1016/j.chb.2016.02.011
  49. Wang, S., Noe, R. A., & Wang, Z.-M. (2014). Motivating Knowledge Sharing in Knowledge Management Systems: A Quasi–Field Experiment. Journal of Management, 40(4), 978–1009. https://doi.org/10.1177/0149206311412192
  50. Wijayanti, D. P., & Sundiman, D. (2017). Pengaruh Knowledge Management Terhadap Kinerja Karyawan: Studi Empiris Pada PT. SMS Kabupaten Kotawaringin Timur [The Influence of Knowledge Management toward Employee Performance: An Empirical Study at PT. SMS Korawaringin Timur District]. DeReMa (Development Research of Management): Jurnal Manajemen, 12(1), 69. https://doi.org/10.19166/derema.v12i1.243
  51. Wilton, R. (2017). After Snowden – The Evolving Landscape of Privacy and Technology. Journal of Information, Communication and Ethics in Society, 15(3), 328–335. https://doi.org/10.1108/JICES-02-2017-0010

Share

COinS
 
 

To view the content in your browser, please download Adobe Reader or, alternately,
you may Download the file to your hard drive.

NOTE: The latest versions of Adobe Reader do not support viewing PDF files within Firefox on Mac OS and if you are using a modern (Intel) Mac, there is no official plugin for viewing PDF files within the browser window.