This study aims to investigate awareness of the privacy concerns in knowledge management in scholarly publications. As theoretical background, understandings of privacy and practices of knowledge management for privacy are discussed. Content analysis of scholarly publications which are limited to the period from 2000 to 2004 is used for examining the awareness. Result of this study shows that there is not much scholarly discussion on the privacy concerns in knowledge management during the period. Reasons for the result are identified, based on the theoretical understandings. This study is expected not only to investigate the research topic but also to bring attention to the necessity of discussions of the topic.
Adar, Eytan. (2003). Shock: aggregating information while preserving privacy. Information Systems Frontiers, 5, 15-28.
Albert, Judith. (1999). Is knowledge management really the future for information professionals in: In Knowledge Management for the Information Professional:Information Today, Inc..
Ariss, S. S.. (2001). Computer monitoring: benefits and pitfalls facing management. Information & Management, 39, 553-558.
Cohen, Alan. (2001). Worker watcher. Fortune, 143(13), 70-78.
Fried, C.. (1970). An anatomy of values:Harvard University Press.
Gavison, R.. (1980). Privacy and the limits of law. Yale Law Journal, 89, 421-471.
Gupta, Babita. (2000). Knowledge management: practices and challenges. Industrial Management & Data Systems, 100(1), 17-21.
Hartman, Laura P.. (2001). Technology and ethics: Privacy in the workplace. Business and Society Review, 106, 1-27.
Karasik, Eve H.. (1990). normative analysis of disclosure, privacy, ad computers: The state cases. Computer/Law Journal, 10, 603-634.
Linowes, David F.. (1996). Privacy in workplace in perspective. Human Resource Management Review, 6(3), 165-181.
McAdam, Rodney. (1999). A critical review of knowledge management models. The Learning Organization, 6(3), 91-100.
Organization for Economic Cooperation and Development. (2002). OECD guidelines on the protection of privacy and transborder flows of personal data:OECD.
Prosser, W.. (1955). Handbook of the law of torts. 2nd ed:West Pub. Co..
Prusak, L.. (2001). Where did knowledge management come from?. IBM System Journal, 40(4), 1002-1007.
Rachels, J.. (1975). Why privacy is important. Philosophy and Public Affairs, 4, 323-333.
Schirmer, A. L.. (2003). Privacy and knowledge management: challenges in the design of the Lotus Discovery Server. IBM Systems Journal, 42(3), 519-531.
Scott, W. Richard. (2001). Institutions and organiza- tions. 2nd ed:Sage Publication.
Sipior, Janice. (1999). Recom- mendations for managing employee e-mail. Journal of Computer Information Systems, , 34-39.
Stanford Encyclopedia of Philosophy. Privacy. http://plato.stanford.edu/entries/privacy.
Stanton, Jeffrey M.. (2003). Effects on workplace monitoring policies on potential employment discrimination and organizational attractiveness for African Americans in the technical professions. Journal of Black Psychology, 29(3), 257-274.
Warren, S.. (2000). The right to privacy. Harvard Law Review, 4, 193-220.
Weisband, Suzanne P.. (1995). Managing user perceptions of email privacy. Communications of the ACM, 38(12), 40-47.
Westin, A.. (1967). Privacy and freedom. New York: Atheneum (-). Cited in Stanford Encyclopedia of Philosophy 2002.