International Journal of Arts and Humanities
Submit Paper

Title:
WHY THE ZEBRA'S STRIPES ARE IMPORTANT: PROTECTING ORGANIZATION INTELLECTUAL ASSETS

Authors:
Abigail Opoku Mensah

Volume:2 Issue: 8

|| ||

Abigail Opoku Mensah (Ph.D)
Department of Management, School of Business, University of Cape Coast Ghana, Cape Coast, Ghana

MLA 8
Mensah, Abigail Opoku. "WHY THE ZEBRA'S STRIPES ARE IMPORTANT: PROTECTING ORGANIZATION INTELLECTUAL ASSETS." Int. J. Arts&Humanities, vol. 2, no. 8, Aug. 2018, pp. 477-491, ijah.org/more2018.php?id=31. Accessed Aug. 2018.
APA
Mensah, A. (2018, August). WHY THE ZEBRA'S STRIPES ARE IMPORTANT: PROTECTING ORGANIZATION INTELLECTUAL ASSETS. Int. J. Arts&Humanities, 2(8), 477-491. Retrieved from ijah.org/more2018.php?id=31
Chicago
Mensah, Abigail Opoku. "WHY THE ZEBRA'S STRIPES ARE IMPORTANT: PROTECTING ORGANIZATION INTELLECTUAL ASSETS." Int. J. Arts&Humanities 2, no. 8 (August 2018), 477-491. Accessed August, 2018. ijah.org/more2018.php?id=31.

References
[1]. Curtis, P., & Carey, M. (2012). Risk Assessment in Practice. Retrieved from http://www.coso.org/documents/COSOAnncsOnlineSurvy2GainInpt4Updt2IntrnlCntrlInt gratdFrmwrk%20-%20for%20merge_files/COSOERM%
[2]. Deller, R (2017). Influences from Cyberspace and terrorism on social and cultural perspectives of IT influencers. European Journal of Cross-cultural Competence and Management, 4 (3/4), 294-315.
[3]. Espionage Act (1917). Espionage Act of June 15, 1917, c.30, 40 Stat. 217, 50 U.S.C. & 31. As amended. Washington DC: Supreme Court
[4]. Fagade, T., Konstantinos, M. & Theo, T. (2018). Towards effective cybersecurity resource allocation: The Monte Carlo Predictive Modeling Approach. International Journal of Critical Infrastructures, 13(2/3), 152-167.
[5]. Gentile, M.C. (1996). Managerial Excellence through Diversity. Prospect Heights, Illinois; Wavelength Press
[6]. Giaglis, G.M.; Paul, R.J. (2012). It's Time to Engineer Re-engineering: Investigating the Potential of Simulation Modelling for Business Process Redesign. In Scholz-Reiter, B.;
[7]. Stickel, E.(Eds), Business Process. New York: Springer Science & Business Media. pp. 313-329
[8]. Hallikas, J., Karvonen, I., Pulkkinen, U.,Virolainen, V. M., & T uominen, M. (2004). Risk management processes in supplier networks. International Journal of Production Economics, 90(1), 47-58.
[9]. Investopedia (2018). Monte Carlo Simulation Accessed 05/16/18 https://www.investopedia.com/terms/m/montecarlosimulation.asp#ixzz5FeGh0IZ3
[10]. Mupepi, M.G. (2014). Can the Division of Labor Be Re-Engineered to Advance Organizational Dynamism? Sage Open
[11]. Mupepi, M., Modak, A., Motwani, J. & Mupepi, S. (2017). Shielding the Corporation's Raison d'etre: Talent Management in Ubiquitous Value Creation Systems. In M. Mupepi (Ed.), Effective Talent Management Strategies for Organizational Success (pp. 121-133). Hershey, PA: IGI Global.
[12]. Mupepi, G. M., Essila, J., Opoku Mensah, A., & Mupepi, S. C. (2017). Asking questions: Applying survey techniques in building successful enterprise. International Journal of Systems and service-oriented engineering, 7 (4), 44-55. Hershey, PA: IGI Global.
[13]. Nonaka, I., Toyama, R., & Konno, N. (2000). SECI, Ba and leadership: a unified model of dynamic knowledge creation. Long range planning, 33(1), 5-34.
[14]. Palmer, C. & Shenoi, S. (2009). Critical Infrastructure Protection III: Third IFIP WG 11.10 International Conference, Hanover, New Hampshire, USA, March 23-25, 2009, Revised Selected in Information and Communication Technology 9th Edition. New York: Springer
[15]. Parker, H. (2012). Knowledge acquisition and leakage in inter-firm relationships involving new technology-based firms. Management Decision, 50(9), 1618-1633.
[16]. Rogerson, A. (1969). Millions Now Living Will Never Die. London, UK; ISBN 0-09-455940-6
[17]. Seeley, M. S. (1986). An evaluation of organizational development studies using the MyersBriggs Type Indicator in the Arlington County, Virginia Fire Department. New York: New School for Social Research.
[18]. Soliman, F. (2014). Learning Models for Innovation in Organizations: Examining roles of knowledge Transfer and Human Resources Management. Hershey, PA; IGI Global Premier Reference Source
[19]. Sperling, M. (2015). There's a Difference Between: "Confidential and Proprietary Information" and a Trade Secret Accessed 05/13/2018 thttps://www.lexisnexis.com/legalnewsroom/corporate/b/business/archive/2015/07/07/the re-39-s-a-difference-between-quot-confidential-and-proprietary-information-quot-and-atrade-secret.aspx
[20]. TechTarget (2018). Industrial Espionage. Accessed 5/15/18 https://whatis.techtarget.com/definition/industrial-espionage
[21]. Thakur, D. (2018). Cryptography - What is Cryptography? Accessed 5/13/18 http://ecomputernotes.com/computernetworkingnotes/security/cryptography
[22]. Tsang, H. W. C, Wing, B, L. & Tsui, E. (2016). Risk Assessment Model: A Construct-ApplyControl Cycle Approach. International Journal of Knowledge and Systems Science. 7 (3), 1-18.
[23]. Williams, T. (1993). Risk-management infrastructures. International Journal of Project Management, 11(1), 5-10.
[24]. Zhi, H. (1995). Risk management for overseas construction projects. International Journal of Project Management, 13(4), 231-237.

Keywords:
Cryptography software, Encryption, Historical data, Industrial espionage, Intellectual property, Ubiquitous

Abstract:
This article discusses a framework to protect proprietary information drawing upon the Zebra as a metaphor to protect the information that matters to a business. The discourse to shield proprietary information in successful enterprises is divided in four parts in this paper. The first part deliberates about the nature and description of knowhow and how it can be protected from intrusion. Knowhow can be safe by limiting the number of personnel with access to proprietary data within an organization. The second portion debates about recruitment and selection of potential candidates to work in know-intensive value creation system. Background checks can be supported with personality assessments to limit the appointment of those who are not qualified. The third segment examines the importance of historical data which can be analyzed and interpreted in loss control efforts. The fourth section discusses the know-how and how it is ubiquitous in most value creation systems. All practices procedures and tooling should be patented and only selected key personnel should be allowed into the company's data bases to protect the company's competitive advantage all the time.

Download Full Text