Proceedings of the The 11th International Knowledge Management in Organizations Conference on The changing face of Knowledge Management Impacting Society最新文献
Jieyu Zhan, Xudong Luo, F. Ren, Minjie Zhang, Mukun Cao
The way in which negotiation issues are settled, called issue-settling procedure, is a crucial component in automated multi-issue negotiation models. In most models, the procedure is predefined before a negotiation and cannot be changed during the course of a negotiation. This lacks of flexibility and generosity, which causes difficulties for reaching efficient and effective outcomes, especially in open and dynamic environments. To this end, this paper proposes a procedure that can adaptively settle issues into small packages, in the light of new information, to balance trade-off and time costs. Moreover, we also develop a negotiation protocol that is equipped with our adaptive procedure. Finally, we conduct experiments to show that our adaptive procedure can significantly improve the expected utility and reduce the negotiation time.
{"title":"An Adaptive Procedure for Settling Multiple Issues in Bilateral Negotiation with Time Constraints","authors":"Jieyu Zhan, Xudong Luo, F. Ren, Minjie Zhang, Mukun Cao","doi":"10.1145/2925995.2925996","DOIUrl":"https://doi.org/10.1145/2925995.2925996","url":null,"abstract":"The way in which negotiation issues are settled, called issue-settling procedure, is a crucial component in automated multi-issue negotiation models. In most models, the procedure is predefined before a negotiation and cannot be changed during the course of a negotiation. This lacks of flexibility and generosity, which causes difficulties for reaching efficient and effective outcomes, especially in open and dynamic environments. To this end, this paper proposes a procedure that can adaptively settle issues into small packages, in the light of new information, to balance trade-off and time costs. Moreover, we also develop a negotiation protocol that is equipped with our adaptive procedure. Finally, we conduct experiments to show that our adaptive procedure can significantly improve the expected utility and reduce the negotiation time.","PeriodicalId":159180,"journal":{"name":"Proceedings of the The 11th International Knowledge Management in Organizations Conference on The changing face of Knowledge Management Impacting Society","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124390531","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The Factory Model of education in the early 1900s swept farmers from the fields and brought them into nondescript rooms, where they were lined up in rows, forced to face forward, graded like meat, and formally indoctrinated into the prevailing Industrial views of society. A century later, this consolidated model of learning is fracturing under the decentralizing forces of cloud-based Internet technologies, especially through networked smartphones with locative capabilities. As these devices better to get to know their users, and where their users are at, they also are opening up emerging informal learning opportunities. The potential for new forms of immersive and interactive place-based learning creates the sensation of embarking on a never-ending field trip with the Library of Alexandria in your pocket. The half-day workshop presented here will provide an overview of such mobile place-based learning developments, like a Locative 101 class, sharing a sampling of field studies, research projects, and apps, to provide grounding in the field, and direct experimentation with locative media in learning contexts as well as reflection and discussion about those experiences.
{"title":"Putting Education Back Into Place: Exploring the Potential of Locative Learning Through Mobile Technologies","authors":"Brett Oppegaard","doi":"10.1145/2925995.2926055","DOIUrl":"https://doi.org/10.1145/2925995.2926055","url":null,"abstract":"The Factory Model of education in the early 1900s swept farmers from the fields and brought them into nondescript rooms, where they were lined up in rows, forced to face forward, graded like meat, and formally indoctrinated into the prevailing Industrial views of society. A century later, this consolidated model of learning is fracturing under the decentralizing forces of cloud-based Internet technologies, especially through networked smartphones with locative capabilities. As these devices better to get to know their users, and where their users are at, they also are opening up emerging informal learning opportunities. The potential for new forms of immersive and interactive place-based learning creates the sensation of embarking on a never-ending field trip with the Library of Alexandria in your pocket. The half-day workshop presented here will provide an overview of such mobile place-based learning developments, like a Locative 101 class, sharing a sampling of field studies, research projects, and apps, to provide grounding in the field, and direct experimentation with locative media in learning contexts as well as reflection and discussion about those experiences.","PeriodicalId":159180,"journal":{"name":"Proceedings of the The 11th International Knowledge Management in Organizations Conference on The changing face of Knowledge Management Impacting Society","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121414885","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper, we describe a new approach in face recognition by which the recognition accuracy can be increased substantially. In our approach a detail correlation study has been made on standard database such as Yale face database. Based on correlation coefficient, face images of individuals are duplicated in train set or test set or in both category. Then face databases are tested with standard face recognition algorithms such as Eigen face, Fischer face, KPCA, ICA and 2DPCA. In all these methods, arrangement of faces based on our approach gives better result. The software used to test all these algorithms is open source Scilab.
{"title":"A New Approach in Face Recognition: Duplicating Facial Images Based on Correlation Study","authors":"R. Senthilkumar, R. K. Gnanamurthy","doi":"10.1145/2925995.2926032","DOIUrl":"https://doi.org/10.1145/2925995.2926032","url":null,"abstract":"In this paper, we describe a new approach in face recognition by which the recognition accuracy can be increased substantially. In our approach a detail correlation study has been made on standard database such as Yale face database. Based on correlation coefficient, face images of individuals are duplicated in train set or test set or in both category. Then face databases are tested with standard face recognition algorithms such as Eigen face, Fischer face, KPCA, ICA and 2DPCA. In all these methods, arrangement of faces based on our approach gives better result. The software used to test all these algorithms is open source Scilab.","PeriodicalId":159180,"journal":{"name":"Proceedings of the The 11th International Knowledge Management in Organizations Conference on The changing face of Knowledge Management Impacting Society","volume":"150 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122761070","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ankit Tripathi, Anant Maheshwari, K. Chandrasekaran
In this paper, we formulate a method to utilize n mobile agents to solve a variant of Ants Nearby Treasure Search problem (ANTS), where an adversary can place treasure at any cell at a distance D from the origin. We devise a method which finds the treasure with the time complexity of O(D + D2 /n + Df) where D is the Manhattan distance of the treasure from the source and f is the maximum number of failures such that f ∈ o(n). The algorithm is specially designed to reduce computation complexity of the distributed system as a whole by efficiently handling failures and also, introducing the elements of parallelism with respect to handling failures. Using our algorithm, we bring down the computation cost/complexity of the system by an order of n, when failures occur, where n is the total number of ants. ANTS problem utilizes the multi-agent system with self-organization and steering based on a control mechanism which is analogous to the problem of discovering resources that are available to the distributed system.
{"title":"Computationally Efficient Fault Tolerant ANTS","authors":"Ankit Tripathi, Anant Maheshwari, K. Chandrasekaran","doi":"10.1145/2925995.2926024","DOIUrl":"https://doi.org/10.1145/2925995.2926024","url":null,"abstract":"In this paper, we formulate a method to utilize n mobile agents to solve a variant of Ants Nearby Treasure Search problem (ANTS), where an adversary can place treasure at any cell at a distance D from the origin. We devise a method which finds the treasure with the time complexity of O(D + D2 /n + Df) where D is the Manhattan distance of the treasure from the source and f is the maximum number of failures such that f ∈ o(n). The algorithm is specially designed to reduce computation complexity of the distributed system as a whole by efficiently handling failures and also, introducing the elements of parallelism with respect to handling failures. Using our algorithm, we bring down the computation cost/complexity of the system by an order of n, when failures occur, where n is the total number of ants. ANTS problem utilizes the multi-agent system with self-organization and steering based on a control mechanism which is analogous to the problem of discovering resources that are available to the distributed system.","PeriodicalId":159180,"journal":{"name":"Proceedings of the The 11th International Knowledge Management in Organizations Conference on The changing face of Knowledge Management Impacting Society","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125812032","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper proposes a model that integrates the knowledge management to the business processes management in order to improve the process performance. The proposal defines the knowledge management flow as an element that interacts with part workflows and provides rules and actions in the BPMN elements in order to improve the BPM. To achieve the aim, first, a survey was made in forty Colombian' companies in order to identify the state of the practice about business process management, knowledge management and their use through the workflows; then, different elements were identified and characterized in order to achieve the integration model proposed. This was experimented in forty business workflows of the companies analyzed. A use case shows how the interactions among model elements are, and how these can improve the process performance. This experience allowed to measuring the effect that the integration had in the business process management by means of a new metric that involve the knowledge management in the workflow. Finally, it was possible conclude that the knowledge management must be part to the BPM impacting directly the workflow, in order to improve the result offered to the organizational actors and customers.
{"title":"Improving the Business Processes Management from the Knowledge Management","authors":"M. S. Tabares, L. M. Giraldo, L. Joyanes","doi":"10.1145/2925995.2925998","DOIUrl":"https://doi.org/10.1145/2925995.2925998","url":null,"abstract":"This paper proposes a model that integrates the knowledge management to the business processes management in order to improve the process performance. The proposal defines the knowledge management flow as an element that interacts with part workflows and provides rules and actions in the BPMN elements in order to improve the BPM. To achieve the aim, first, a survey was made in forty Colombian' companies in order to identify the state of the practice about business process management, knowledge management and their use through the workflows; then, different elements were identified and characterized in order to achieve the integration model proposed. This was experimented in forty business workflows of the companies analyzed. A use case shows how the interactions among model elements are, and how these can improve the process performance. This experience allowed to measuring the effect that the integration had in the business process management by means of a new metric that involve the knowledge management in the workflow. Finally, it was possible conclude that the knowledge management must be part to the BPM impacting directly the workflow, in order to improve the result offered to the organizational actors and customers.","PeriodicalId":159180,"journal":{"name":"Proceedings of the The 11th International Knowledge Management in Organizations Conference on The changing face of Knowledge Management Impacting Society","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125845669","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Literature posits that 30,000 SME websites are hacked daily. Thus it is acknowledged that web-based tools are essential to prevent cyber criminals hacking into online networks to comprise their services and gain access to confidential data for improper purposes. We consider the concept of Ethical Hacking where authorized hackers attempt to infiltrate a business's systems/networks on behalf of the owners with the intention of finding security weaknesses. However such security measures are costly and many SMEs lack the knowledge and resources to accomplish this. Utilizing an SME case study we provide insights into how Ethical Hacking, in the form of Penetration Testing using free open source tools, can be used by SMEs to protect their network's services/operations. Using Nmap, Google Hacking, Nessus and Brutus we uncovered 232 network vulnerabilities. Thus measures were put in to place to resolve these vulnerabilities and prevent the case study's sensitive data from future cyber threats.
{"title":"Cyber Security & Ethical Hacking For SMEs","authors":"H. Berger, Andrew Jones","doi":"10.1145/2925995.2926016","DOIUrl":"https://doi.org/10.1145/2925995.2926016","url":null,"abstract":"Literature posits that 30,000 SME websites are hacked daily. Thus it is acknowledged that web-based tools are essential to prevent cyber criminals hacking into online networks to comprise their services and gain access to confidential data for improper purposes. We consider the concept of Ethical Hacking where authorized hackers attempt to infiltrate a business's systems/networks on behalf of the owners with the intention of finding security weaknesses. However such security measures are costly and many SMEs lack the knowledge and resources to accomplish this. Utilizing an SME case study we provide insights into how Ethical Hacking, in the form of Penetration Testing using free open source tools, can be used by SMEs to protect their network's services/operations. Using Nmap, Google Hacking, Nessus and Brutus we uncovered 232 network vulnerabilities. Thus measures were put in to place to resolve these vulnerabilities and prevent the case study's sensitive data from future cyber threats.","PeriodicalId":159180,"journal":{"name":"Proceedings of the The 11th International Knowledge Management in Organizations Conference on The changing face of Knowledge Management Impacting Society","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127285373","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The implementation of Computer Supported Collaborative Work (CSCW) Environments scanning platform is not trivial because of the different stakeholders involved. The Tunisian ESAO in this paper is used as a case study to show that the failure of the implementation problems lie in the lack of taking contextual intelligence into consideration. There are several contextual issues that we have found impede its adoption. The major failure factors stated were the absence of a shared culture between different stakeholders in organization, structured materials and methods supporting the learning process of knowledge creation. This paper describes how contextual intelligence can be used as a lens to understand the failure of Computer Supported Collaborative Work (CSCW) implementation. To overcome the barriers, we also proposed a new framework for the design of an Environmental scanning platform based on the principles of co creation of value from marketing research.
{"title":"Co creation of value for Tunisian Environmental Scanning Agriculture Observator","authors":"Souad Kamoun-Chouk, L. Uden","doi":"10.1145/2925995.2926041","DOIUrl":"https://doi.org/10.1145/2925995.2926041","url":null,"abstract":"The implementation of Computer Supported Collaborative Work (CSCW) Environments scanning platform is not trivial because of the different stakeholders involved. The Tunisian ESAO in this paper is used as a case study to show that the failure of the implementation problems lie in the lack of taking contextual intelligence into consideration. There are several contextual issues that we have found impede its adoption. The major failure factors stated were the absence of a shared culture between different stakeholders in organization, structured materials and methods supporting the learning process of knowledge creation. This paper describes how contextual intelligence can be used as a lens to understand the failure of Computer Supported Collaborative Work (CSCW) implementation. To overcome the barriers, we also proposed a new framework for the design of an Environmental scanning platform based on the principles of co creation of value from marketing research.","PeriodicalId":159180,"journal":{"name":"Proceedings of the The 11th International Knowledge Management in Organizations Conference on The changing face of Knowledge Management Impacting Society","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130116154","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
With the rapid growth of online music market, online music providers are devoting on how to recommend suitable music for their customer to fit their interests. Music recommender system is therefore has been developed and researchers are focusing on how to improve the performance of music recommender system. Nowadays, social recommender system has been discussed widely, due to the growth of social networking website. Large amount of social data can be collected and which considered can be used to improve the recommendation quality due to the characteristics of social data. Thus, it is interesting to know the performance when adopting different kind of social data into music recommender system, including "Likes", "Check-in" and "Friends" in a fans page. A series of experiments have been conducted in the paper and to measure the rating of music recommendation by considering those kinds of social data. The experiment results show that the rating is the best when the recommendation that generated by considering all three kinds of social data.
{"title":"Measuring the Effect of Social Network Data on Music Recommendation","authors":"I. Ting, P. Yu","doi":"10.1145/2925995.2926022","DOIUrl":"https://doi.org/10.1145/2925995.2926022","url":null,"abstract":"With the rapid growth of online music market, online music providers are devoting on how to recommend suitable music for their customer to fit their interests. Music recommender system is therefore has been developed and researchers are focusing on how to improve the performance of music recommender system. Nowadays, social recommender system has been discussed widely, due to the growth of social networking website. Large amount of social data can be collected and which considered can be used to improve the recommendation quality due to the characteristics of social data. Thus, it is interesting to know the performance when adopting different kind of social data into music recommender system, including \"Likes\", \"Check-in\" and \"Friends\" in a fans page. A series of experiments have been conducted in the paper and to measure the rating of music recommendation by considering those kinds of social data. The experiment results show that the rating is the best when the recommendation that generated by considering all three kinds of social data.","PeriodicalId":159180,"journal":{"name":"Proceedings of the The 11th International Knowledge Management in Organizations Conference on The changing face of Knowledge Management Impacting Society","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122872102","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. T. Gouvêa, F. Santoro, C. Cappelli, M. Pimentel
Storytelling is an important tool to transfer tacit knowledge that has been increasing its usage in organizations and education. The externalization of knowledge (the conversion of tacit in explicit knowledge) is effectively one of the great challenges of knowledge management. Tacit knowledge is associated with personal experiences and represents the subjective knowledge that is often difficult to be formalized or explained. Group Storytelling is an important approach to help in externalization tacit knowledge through collaborative construction of stories. This paper presents an exploratory case study with tutors of an online course, whose results showed that it is possible to capture the tacit knowledge through this technique with computer system support.
{"title":"Knowledge Management in Distance Education: an Exploratory Case Study with Group Storytelling Approach","authors":"M. T. Gouvêa, F. Santoro, C. Cappelli, M. Pimentel","doi":"10.1145/2925995.2926000","DOIUrl":"https://doi.org/10.1145/2925995.2926000","url":null,"abstract":"Storytelling is an important tool to transfer tacit knowledge that has been increasing its usage in organizations and education. The externalization of knowledge (the conversion of tacit in explicit knowledge) is effectively one of the great challenges of knowledge management. Tacit knowledge is associated with personal experiences and represents the subjective knowledge that is often difficult to be formalized or explained. Group Storytelling is an important approach to help in externalization tacit knowledge through collaborative construction of stories. This paper presents an exploratory case study with tutors of an online course, whose results showed that it is possible to capture the tacit knowledge through this technique with computer system support.","PeriodicalId":159180,"journal":{"name":"Proceedings of the The 11th International Knowledge Management in Organizations Conference on The changing face of Knowledge Management Impacting Society","volume":"150 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123242320","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Discussions of technology and education often promise revolution, and freedom from the constraints of campuses and classrooms. There is less discussion of why such infrastructures were needed in the first place, or of the challenges facing learners when these are no longer available. In order to explore such critical alternatives, we can begin to ask different kinds of question. What is the cloud made of? What do learners work with, when they study? Where are they, and what places do they move between? From a sociomaterial perspective, such questions draw attention to the ways in which academic work is encoded, transmitted and stored; how the cloud, far from being nebulous, relies on undersea cables and server farms; and how learners try and coordinate all this as they take bus journeys, sit in class or meet with friends in the bar. These points will be illustrated with examples from a longitudinal study of University students' uses of technology, in which they recorded and described how, where and when they studied. This analysis has implications for the design of e-learning, raising questions about whose responsibility it is to build the infrastructure that students need to learn, and introducing a note of caution to discussions about the transformational potential of technology.
{"title":"Of clouds and cables: what do students need when they learn with technology?","authors":"M. Oliver","doi":"10.1145/2925995.2926051","DOIUrl":"https://doi.org/10.1145/2925995.2926051","url":null,"abstract":"Discussions of technology and education often promise revolution, and freedom from the constraints of campuses and classrooms. There is less discussion of why such infrastructures were needed in the first place, or of the challenges facing learners when these are no longer available. In order to explore such critical alternatives, we can begin to ask different kinds of question. What is the cloud made of? What do learners work with, when they study? Where are they, and what places do they move between? From a sociomaterial perspective, such questions draw attention to the ways in which academic work is encoded, transmitted and stored; how the cloud, far from being nebulous, relies on undersea cables and server farms; and how learners try and coordinate all this as they take bus journeys, sit in class or meet with friends in the bar. These points will be illustrated with examples from a longitudinal study of University students' uses of technology, in which they recorded and described how, where and when they studied. This analysis has implications for the design of e-learning, raising questions about whose responsibility it is to build the infrastructure that students need to learn, and introducing a note of caution to discussions about the transformational potential of technology.","PeriodicalId":159180,"journal":{"name":"Proceedings of the The 11th International Knowledge Management in Organizations Conference on The changing face of Knowledge Management Impacting Society","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131595246","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Proceedings of the The 11th International Knowledge Management in Organizations Conference on The changing face of Knowledge Management Impacting Society