Pub Date : 2015-07-27DOI: 10.1504/IJKL.2015.073456
Jongchang Ahn, Soon-Ki Jeong
The importance of knowledge management (KM) leads many companies to use a knowledge management system (KMS); however, users frequently do not make good use of KMS. There is a new view that knowledge market can be helpful to promote knowledge transfer by knowledge trade. Knowledge transfer could be activated through the items of knowledge organization, knowledge strategy, KMS, and knowledge reward via knowledge sharing culture and knowledge trade market. We have proposed that the framework be organically related to above factors in the prior research. This article examined various cases to analyse the effect of knowledge trade market and knowledge culture for knowledge transfer. We then considered real case researches of the Korean organizations and global firms in order to discuss each factor on how to activate knowledge transfer. This discussion suggests that organizations harmonize both knowledge culture and knowledge trade market for knowledge transfer.
{"title":"Knowledge trade and sharing in knowledge management system","authors":"Jongchang Ahn, Soon-Ki Jeong","doi":"10.1504/IJKL.2015.073456","DOIUrl":"https://doi.org/10.1504/IJKL.2015.073456","url":null,"abstract":"The importance of knowledge management (KM) leads many companies to use a knowledge management system (KMS); however, users frequently do not make good use of KMS. There is a new view that knowledge market can be helpful to promote knowledge transfer by knowledge trade. Knowledge transfer could be activated through the items of knowledge organization, knowledge strategy, KMS, and knowledge reward via knowledge sharing culture and knowledge trade market. We have proposed that the framework be organically related to above factors in the prior research. This article examined various cases to analyse the effect of knowledge trade market and knowledge culture for knowledge transfer. We then considered real case researches of the Korean organizations and global firms in order to discuss each factor on how to activate knowledge transfer. This discussion suggests that organizations harmonize both knowledge culture and knowledge trade market for knowledge transfer.","PeriodicalId":163161,"journal":{"name":"Int. J. Knowl. Learn.","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116054468","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-05-22DOI: 10.1504/IJKL.2014.069535
L. Briguglio, Paul K. D. Pacquing, S. Salza, Maria Guercio
Observation and experimental data have become a crucial asset for most scientific communities, which are bound to conveniently preserve them to allow reliable assessments on their provenance and integrity, based on suitable and well-documented evidence. On the other hand, these data often go through quite complex lifecycles that include both changes of custody and transformations of their representation. Managing authenticity has, therefore, become a central issue in long-term digital preservation (LTDP). In this paper, we present a model for the management of authenticity evidence, developed within two EU-funded projects, namely APARSEN and SCDIP-ES, that has led to the implementation of a modular framework, which may be exploited both in implementing new repositories and in improving existing ones. The infrastructure we propose is based on an open-source technology and specifically meant to guarantee a large degree of scalability and full interoperability among repositories that are based on it.
{"title":"A modular infrastructure for the management of authenticity and persistent identifiers in long-term digital preservation repositories","authors":"L. Briguglio, Paul K. D. Pacquing, S. Salza, Maria Guercio","doi":"10.1504/IJKL.2014.069535","DOIUrl":"https://doi.org/10.1504/IJKL.2014.069535","url":null,"abstract":"Observation and experimental data have become a crucial asset for most scientific communities, which are bound to conveniently preserve them to allow reliable assessments on their provenance and integrity, based on suitable and well-documented evidence. On the other hand, these data often go through quite complex lifecycles that include both changes of custody and transformations of their representation. Managing authenticity has, therefore, become a central issue in long-term digital preservation (LTDP). In this paper, we present a model for the management of authenticity evidence, developed within two EU-funded projects, namely APARSEN and SCDIP-ES, that has led to the implementation of a modular framework, which may be exploited both in implementing new repositories and in improving existing ones. The infrastructure we propose is based on an open-source technology and specifically meant to guarantee a large degree of scalability and full interoperability among repositories that are based on it.","PeriodicalId":163161,"journal":{"name":"Int. J. Knowl. Learn.","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126596396","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-05-22DOI: 10.1504/IJKL.2014.069534
Anila Angjeli
International Standard Name Identifier (ISNI) uniquely identifies the contributors to creative works to facilitate the seamless interconnection, discovery and aggregation of resources; and to build services around scientific and cultural contents. A certified global standard (ISO 27729), ISNI provides an operational response to a decades-long need in the digital information networks of media culture industries including libraries, rights management societies, publishers, etc. Uniqueness, persistence and trust are ensured by a central database managing identifiers for open, global use, governed by a registration authority, the ISNI-International Agency. ISNI relies on computational methods for disambiguating, matching, merging and splitting, augmented with human curation. ISNI is transforming ways of cooperatively consolidating identities by lifting national, cultural and community barriers.
{"title":"ISNI: consolidating identities, connecting nodes","authors":"Anila Angjeli","doi":"10.1504/IJKL.2014.069534","DOIUrl":"https://doi.org/10.1504/IJKL.2014.069534","url":null,"abstract":"International Standard Name Identifier (ISNI) uniquely identifies the contributors to creative works to facilitate the seamless interconnection, discovery and aggregation of resources; and to build services around scientific and cultural contents. A certified global standard (ISO 27729), ISNI provides an operational response to a decades-long need in the digital information networks of media culture industries including libraries, rights management societies, publishers, etc. Uniqueness, persistence and trust are ensured by a central database managing identifiers for open, global use, governed by a registration authority, the ISNI-International Agency. ISNI relies on computational methods for disambiguating, matching, merging and splitting, augmented with human curation. ISNI is transforming ways of cooperatively consolidating identities by lifting national, cultural and community barriers.","PeriodicalId":163161,"journal":{"name":"Int. J. Knowl. Learn.","volume":"148 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117278316","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-05-22DOI: 10.1504/IJKL.2014.069533
Juha Hakala
This paper provides a short overview of the on-going revision of the uniform resource names (URN) standard base, and its implications to other persistent identifier systems (PIDs), cool uniform resource identifiers (URIs) and URI generic syntax.
{"title":"Revision of the URN standards","authors":"Juha Hakala","doi":"10.1504/IJKL.2014.069533","DOIUrl":"https://doi.org/10.1504/IJKL.2014.069533","url":null,"abstract":"This paper provides a short overview of the on-going revision of the uniform resource names (URN) standard base, and its implications to other persistent identifier systems (PIDs), cool uniform resource identifiers (URIs) and URI generic syntax.","PeriodicalId":163161,"journal":{"name":"Int. J. Knowl. Learn.","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124231730","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-05-22DOI: 10.1504/IJKL.2014.069536
E. Bellini, G. Bergamin, Maurizio Messina, C. Cirinnà, Raffaele Messuti
This paper describes how the Italian national bibliography number (NBN) service has become a trusted infrastructure when it has been combined with digital stacks, the national digital preservation infrastructure. A suitable descriptive model, the bricks of trust, to assess the trustworthiness of the PI systems, has been provided. The Italian NBN has been positively assessed according to this model.
{"title":"NBN: IT The Italian trusted persistent identifier infrastructure","authors":"E. Bellini, G. Bergamin, Maurizio Messina, C. Cirinnà, Raffaele Messuti","doi":"10.1504/IJKL.2014.069536","DOIUrl":"https://doi.org/10.1504/IJKL.2014.069536","url":null,"abstract":"This paper describes how the Italian national bibliography number (NBN) service has become a trusted infrastructure when it has been combined with digital stacks, the national digital preservation infrastructure. A suitable descriptive model, the bricks of trust, to assess the trustworthiness of the PI systems, has been provided. The Italian NBN has been positively assessed according to this model.","PeriodicalId":163161,"journal":{"name":"Int. J. Knowl. Learn.","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121738253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-05-22DOI: 10.1504/IJKL.2014.069537
M. Fenner, Laurel L. Haak, Gudmundur A. Thorisson, Sergio Ruiz, T. Vision, Jan Brase
Research data is increasingly seen as the most significant untapped resource in scholarship. Awareness and practice of referencing and citing research data is increasing, and different initiatives to unambiguously identify datasets are in place. Steps are being taken to identify the individuals who created or contributed to research outputs. Lack of interoperability between the different initiatives to identify datasets and contributors remains a major hurdle. The ODIN project (ORCID and DataCite Interoperability Network) tries to address this need. ODIN builds on the ORCID and DataCite initiatives to uniquely identify scientists and data sets and connect this information across multiple services and infrastructures. It aims to address some of the critical open questions in the area. We describe a conceptual model to solve the interoperability between different identifiers for data and people.
{"title":"ODIN: the ORCID and DataCite interoperability network","authors":"M. Fenner, Laurel L. Haak, Gudmundur A. Thorisson, Sergio Ruiz, T. Vision, Jan Brase","doi":"10.1504/IJKL.2014.069537","DOIUrl":"https://doi.org/10.1504/IJKL.2014.069537","url":null,"abstract":"Research data is increasingly seen as the most significant untapped resource in scholarship. Awareness and practice of referencing and citing research data is increasing, and different initiatives to unambiguously identify datasets are in place. Steps are being taken to identify the individuals who created or contributed to research outputs. Lack of interoperability between the different initiatives to identify datasets and contributors remains a major hurdle. The ODIN project (ORCID and DataCite Interoperability Network) tries to address this need. ODIN builds on the ORCID and DataCite initiatives to uniquely identify scientists and data sets and connect this information across multiple services and infrastructures. It aims to address some of the critical open questions in the area. We describe a conceptual model to solve the interoperability between different identifiers for data and people.","PeriodicalId":163161,"journal":{"name":"Int. J. Knowl. Learn.","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121749758","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-02-01DOI: 10.1504/IJKL.2014.067149
Hanieh Azkia, N. Cuppens-Boulahia, F. Cuppens, G. Coatrieux
In some complex information systems, users do not undergo untimely access controls. Generally, whenever they perform an action, this action is logged by the target system. Based on these log les, a security control called a posteriori access control is made afterwards. The logged data can be recorded in dierent formats (Syslog, W3C extend log, specic domain log standard like IHE-ATNA, etc.). An a posteriori security control framework requires a log ltering engine which extracts useful information regardless of the log format used. In this paper, we dene and enforce this extraction function by building an ontology model of logs. This logs ontology is queried to check the compliance of actions performed by the users of the considered system with its access control policy (violations, anomalies, fulllments, etc.). We show how the a posteriori security controls are made eective and how security decisions are made easier based on this extraction function.
{"title":"Log content extraction engine based on ontology for the purpose of a posteriori access control","authors":"Hanieh Azkia, N. Cuppens-Boulahia, F. Cuppens, G. Coatrieux","doi":"10.1504/IJKL.2014.067149","DOIUrl":"https://doi.org/10.1504/IJKL.2014.067149","url":null,"abstract":"In some complex information systems, users do not undergo untimely access controls. Generally, whenever they perform an action, this action is logged by the target system. Based on these log les, a security control called a posteriori access control is made afterwards. The logged data can be recorded in dierent formats (Syslog, W3C extend log, specic domain log standard like IHE-ATNA, etc.). An a posteriori security control framework requires a log ltering engine which extracts useful information regardless of the log format used. In this paper, we dene and enforce this extraction function by building an ontology model of logs. This logs ontology is queried to check the compliance of actions performed by the users of the considered system with its access control policy (violations, anomalies, fulllments, etc.). We show how the a posteriori security controls are made eective and how security decisions are made easier based on this extraction function.","PeriodicalId":163161,"journal":{"name":"Int. J. Knowl. Learn.","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116543574","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-06-29DOI: 10.1504/IJKL.2012.047547
S. Valtolina, B. R. Barricelli, F. Ariano, M. Padula, P. L. Scala
This paper presents a workflow management system called task management system (TMS) devoted to help end users to combine and integrate distributed tasks through visual composition strategies. The TMS is devoted to support human resources in performing their working activities and in exploiting their knowledge and expertise. The TMS network allows employees, who are experts of a specific domain, to design a workflow, to visually validate its execution and to execute it at use time. In particular, the paper describes how workflow designers use TMS to transform the task analysis documents prepared by domain experts into a description of the workflow. The retrieved components are web services that are available in remote or local repositories representing distributed knowledge bases of business tasks. The TMS offers transparent invocation methods for invoking services by means of a semantic discovery engine designed for exploiting a taxonomy of web services.
{"title":"Knowledge management for designing business workflows through semantic compositions of web services","authors":"S. Valtolina, B. R. Barricelli, F. Ariano, M. Padula, P. L. Scala","doi":"10.1504/IJKL.2012.047547","DOIUrl":"https://doi.org/10.1504/IJKL.2012.047547","url":null,"abstract":"This paper presents a workflow management system called task management system (TMS) devoted to help end users to combine and integrate distributed tasks through visual composition strategies. The TMS is devoted to support human resources in performing their working activities and in exploiting their knowledge and expertise. The TMS network allows employees, who are experts of a specific domain, to design a workflow, to visually validate its execution and to execute it at use time. In particular, the paper describes how workflow designers use TMS to transform the task analysis documents prepared by domain experts into a description of the workflow. The retrieved components are web services that are available in remote or local repositories representing distributed knowledge bases of business tasks. The TMS offers transparent invocation methods for invoking services by means of a semantic discovery engine designed for exploiting a taxonomy of web services.","PeriodicalId":163161,"journal":{"name":"Int. J. Knowl. Learn.","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132790745","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-06-29DOI: 10.1504/IJKL.2012.047569
B. D. Waal, R. Batenburg
Under what conditions is end-user training (EUT) as part of the implementation of a business process management (BPM) system successful? This question is addressed in this paper. Based on the literature on EUT and implementation success, we first argue that user involvement with, and attitude towards, a BPM system, both have a conditional effect on the relationship between EUT and the implementation success of the system. Secondly, we investigated this expectation empirically, by measuring the practice of EUT as perceived by end-users. Using a mixed method approach, survey data was collected from 143 end-users of a BPM system in a large Dutch social insurance organisation, and by 49 additional semi-structured interviews. Regression analysis of the survey data shows that attitude variables indeed have a significant moderating influence on implementation success. In addition, the interviews revealed that specific attention must be paid to the arrangements for EUT when deploying BPM systems in this type of organisations. Arguments are given for a more comprehensive way of measuring and optimising EUT during the implementation of information systems/information technology in organisations.
{"title":"What makes end-user training successful? A mixed method study of a business process management system implementation","authors":"B. D. Waal, R. Batenburg","doi":"10.1504/IJKL.2012.047569","DOIUrl":"https://doi.org/10.1504/IJKL.2012.047569","url":null,"abstract":"Under what conditions is end-user training (EUT) as part of the implementation of a business process management (BPM) system successful? This question is addressed in this paper. Based on the literature on EUT and implementation success, we first argue that user involvement with, and attitude towards, a BPM system, both have a conditional effect on the relationship between EUT and the implementation success of the system. Secondly, we investigated this expectation empirically, by measuring the practice of EUT as perceived by end-users. Using a mixed method approach, survey data was collected from 143 end-users of a BPM system in a large Dutch social insurance organisation, and by 49 additional semi-structured interviews. Regression analysis of the survey data shows that attitude variables indeed have a significant moderating influence on implementation success. In addition, the interviews revealed that specific attention must be paid to the arrangements for EUT when deploying BPM systems in this type of organisations. Arguments are given for a more comprehensive way of measuring and optimising EUT during the implementation of information systems/information technology in organisations.","PeriodicalId":163161,"journal":{"name":"Int. J. Knowl. Learn.","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124835227","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-06-29DOI: 10.1504/IJKL.2012.047556
M. Tsubaki, Taro Oya, Takahiro Kobayashi
The learning-type PDCA cycle and the CAPD cycle are methods of managing the process of learning. In this paper, we examine the trends in the differences between self-evaluations and others’ evaluations of learners’ abilities, goals, and results as they learn improvement activities through the learning-type PDCA or CAPD cycle. In addition, using graphical modelling, we examine how to explain differences among evaluations according to the characteristics of individual students and how to design effective learning activities through the learning-type PDCA and CAPD cycles.
{"title":"Analysis of the design of effective learning activities using learning-type PDCA and CAPD cycles on the basis of the characteristics of individual students","authors":"M. Tsubaki, Taro Oya, Takahiro Kobayashi","doi":"10.1504/IJKL.2012.047556","DOIUrl":"https://doi.org/10.1504/IJKL.2012.047556","url":null,"abstract":"The learning-type PDCA cycle and the CAPD cycle are methods of managing the process of learning. In this paper, we examine the trends in the differences between self-evaluations and others’ evaluations of learners’ abilities, goals, and results as they learn improvement activities through the learning-type PDCA or CAPD cycle. In addition, using graphical modelling, we examine how to explain differences among evaluations according to the characteristics of individual students and how to design effective learning activities through the learning-type PDCA and CAPD cycles.","PeriodicalId":163161,"journal":{"name":"Int. J. Knowl. Learn.","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131202970","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}