首页 > 最新文献

Int. J. Knowl. Learn.最新文献

英文 中文
Knowledge trade and sharing in knowledge management system 知识贸易与知识管理系统共享
Pub Date : 2015-07-27 DOI: 10.1504/IJKL.2015.073456
Jongchang Ahn, Soon-Ki Jeong
The importance of knowledge management (KM) leads many companies to use a knowledge management system (KMS); however, users frequently do not make good use of KMS. There is a new view that knowledge market can be helpful to promote knowledge transfer by knowledge trade. Knowledge transfer could be activated through the items of knowledge organization, knowledge strategy, KMS, and knowledge reward via knowledge sharing culture and knowledge trade market. We have proposed that the framework be organically related to above factors in the prior research. This article examined various cases to analyse the effect of knowledge trade market and knowledge culture for knowledge transfer. We then considered real case researches of the Korean organizations and global firms in order to discuss each factor on how to activate knowledge transfer. This discussion suggests that organizations harmonize both knowledge culture and knowledge trade market for knowledge transfer.
知识管理的重要性促使许多企业采用知识管理系统(KMS);然而,用户经常不能很好地利用KMS。有一种新的观点认为,知识市场有助于通过知识贸易促进知识转移。通过知识共享文化和知识交易市场,知识组织、知识战略、知识管理系统和知识奖励可以激活知识转移。我们在之前的研究中提出了框架与上述因素有机关联。本文通过案例分析,分析了知识交易市场和知识文化对知识转移的影响。然后,我们考虑了韩国组织和全球公司的真实案例研究,以讨论如何激活知识转移的每个因素。本文认为,组织应协调知识文化和知识交易市场,以促进知识转移。
{"title":"Knowledge trade and sharing in knowledge management system","authors":"Jongchang Ahn, Soon-Ki Jeong","doi":"10.1504/IJKL.2015.073456","DOIUrl":"https://doi.org/10.1504/IJKL.2015.073456","url":null,"abstract":"The importance of knowledge management (KM) leads many companies to use a knowledge management system (KMS); however, users frequently do not make good use of KMS. There is a new view that knowledge market can be helpful to promote knowledge transfer by knowledge trade. Knowledge transfer could be activated through the items of knowledge organization, knowledge strategy, KMS, and knowledge reward via knowledge sharing culture and knowledge trade market. We have proposed that the framework be organically related to above factors in the prior research. This article examined various cases to analyse the effect of knowledge trade market and knowledge culture for knowledge transfer. We then considered real case researches of the Korean organizations and global firms in order to discuss each factor on how to activate knowledge transfer. This discussion suggests that organizations harmonize both knowledge culture and knowledge trade market for knowledge transfer.","PeriodicalId":163161,"journal":{"name":"Int. J. Knowl. Learn.","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116054468","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A modular infrastructure for the management of authenticity and persistent identifiers in long-term digital preservation repositories 用于管理长期数字保存存储库中的真实性和持久标识符的模块化基础设施
Pub Date : 2015-05-22 DOI: 10.1504/IJKL.2014.069535
L. Briguglio, Paul K. D. Pacquing, S. Salza, Maria Guercio
Observation and experimental data have become a crucial asset for most scientific communities, which are bound to conveniently preserve them to allow reliable assessments on their provenance and integrity, based on suitable and well-documented evidence. On the other hand, these data often go through quite complex lifecycles that include both changes of custody and transformations of their representation. Managing authenticity has, therefore, become a central issue in long-term digital preservation (LTDP). In this paper, we present a model for the management of authenticity evidence, developed within two EU-funded projects, namely APARSEN and SCDIP-ES, that has led to the implementation of a modular framework, which may be exploited both in implementing new repositories and in improving existing ones. The infrastructure we propose is based on an open-source technology and specifically meant to guarantee a large degree of scalability and full interoperability among repositories that are based on it.
观测和实验数据已成为大多数科学界的一项重要资产,它们必然会方便地保存这些数据,以便根据适当和有充分文件的证据,对它们的来源和完整性进行可靠的评估。另一方面,这些数据通常要经历相当复杂的生命周期,其中包括保管变更和表示转换。因此,管理真实性已成为长期数字保存(LTDP)的中心问题。在本文中,我们提出了一个真实性证据管理模型,该模型是在两个欧盟资助的项目(即APARSEN和SCDIP-ES)中开发的,该模型导致了模块化框架的实施,该框架可用于实施新的存储库和改进现有的存储库。我们提出的基础设施是基于开源技术的,并且专门用于保证基于它的存储库之间具有很大程度的可伸缩性和完全的互操作性。
{"title":"A modular infrastructure for the management of authenticity and persistent identifiers in long-term digital preservation repositories","authors":"L. Briguglio, Paul K. D. Pacquing, S. Salza, Maria Guercio","doi":"10.1504/IJKL.2014.069535","DOIUrl":"https://doi.org/10.1504/IJKL.2014.069535","url":null,"abstract":"Observation and experimental data have become a crucial asset for most scientific communities, which are bound to conveniently preserve them to allow reliable assessments on their provenance and integrity, based on suitable and well-documented evidence. On the other hand, these data often go through quite complex lifecycles that include both changes of custody and transformations of their representation. Managing authenticity has, therefore, become a central issue in long-term digital preservation (LTDP). In this paper, we present a model for the management of authenticity evidence, developed within two EU-funded projects, namely APARSEN and SCDIP-ES, that has led to the implementation of a modular framework, which may be exploited both in implementing new repositories and in improving existing ones. The infrastructure we propose is based on an open-source technology and specifically meant to guarantee a large degree of scalability and full interoperability among repositories that are based on it.","PeriodicalId":163161,"journal":{"name":"Int. J. Knowl. Learn.","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126596396","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ISNI: consolidating identities, connecting nodes ISNI:整合身份,连接节点
Pub Date : 2015-05-22 DOI: 10.1504/IJKL.2014.069534
Anila Angjeli
International Standard Name Identifier (ISNI) uniquely identifies the contributors to creative works to facilitate the seamless interconnection, discovery and aggregation of resources; and to build services around scientific and cultural contents. A certified global standard (ISO 27729), ISNI provides an operational response to a decades-long need in the digital information networks of media culture industries including libraries, rights management societies, publishers, etc. Uniqueness, persistence and trust are ensured by a central database managing identifiers for open, global use, governed by a registration authority, the ISNI-International Agency. ISNI relies on computational methods for disambiguating, matching, merging and splitting, augmented with human curation. ISNI is transforming ways of cooperatively consolidating identities by lifting national, cultural and community barriers.
国际标准名称标识符(ISNI)唯一标识创造性作品的贡献者,以促进资源的无缝互连、发现和聚合;围绕科技文化内容打造服务。作为经过认证的全球标准(ISO 27729), ISNI为媒体文化产业(包括图书馆、版权管理协会、出版商等)的数字信息网络提供了长达数十年的运营响应。唯一性、持久性和信任度由一个中央数据库来保证,该数据库管理着开放的、全球使用的标识符,由注册机构ISNI-International Agency管理。ISNI依靠计算方法来消除歧义、匹配、合并和分裂,并辅以人工管理。ISNI正在通过消除国家、文化和社区障碍,改变合作巩固身份的方式。
{"title":"ISNI: consolidating identities, connecting nodes","authors":"Anila Angjeli","doi":"10.1504/IJKL.2014.069534","DOIUrl":"https://doi.org/10.1504/IJKL.2014.069534","url":null,"abstract":"International Standard Name Identifier (ISNI) uniquely identifies the contributors to creative works to facilitate the seamless interconnection, discovery and aggregation of resources; and to build services around scientific and cultural contents. A certified global standard (ISO 27729), ISNI provides an operational response to a decades-long need in the digital information networks of media culture industries including libraries, rights management societies, publishers, etc. Uniqueness, persistence and trust are ensured by a central database managing identifiers for open, global use, governed by a registration authority, the ISNI-International Agency. ISNI relies on computational methods for disambiguating, matching, merging and splitting, augmented with human curation. ISNI is transforming ways of cooperatively consolidating identities by lifting national, cultural and community barriers.","PeriodicalId":163161,"journal":{"name":"Int. J. Knowl. Learn.","volume":"148 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117278316","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Revision of the URN standards 修订URN标准
Pub Date : 2015-05-22 DOI: 10.1504/IJKL.2014.069533
Juha Hakala
This paper provides a short overview of the on-going revision of the uniform resource names (URN) standard base, and its implications to other persistent identifier systems (PIDs), cool uniform resource identifiers (URIs) and URI generic syntax.
本文简要概述了统一资源名(URN)标准基的持续修订,以及它对其他持久标识符系统(pid)、统一资源标识符(URI)和URI通用语法的影响。
{"title":"Revision of the URN standards","authors":"Juha Hakala","doi":"10.1504/IJKL.2014.069533","DOIUrl":"https://doi.org/10.1504/IJKL.2014.069533","url":null,"abstract":"This paper provides a short overview of the on-going revision of the uniform resource names (URN) standard base, and its implications to other persistent identifier systems (PIDs), cool uniform resource identifiers (URIs) and URI generic syntax.","PeriodicalId":163161,"journal":{"name":"Int. J. Knowl. Learn.","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124231730","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
NBN: IT The Italian trusted persistent identifier infrastructure NBN: IT意大利可信持久标识符基础设施
Pub Date : 2015-05-22 DOI: 10.1504/IJKL.2014.069536
E. Bellini, G. Bergamin, Maurizio Messina, C. Cirinnà, Raffaele Messuti
This paper describes how the Italian national bibliography number (NBN) service has become a trusted infrastructure when it has been combined with digital stacks, the national digital preservation infrastructure. A suitable descriptive model, the bricks of trust, to assess the trustworthiness of the PI systems, has been provided. The Italian NBN has been positively assessed according to this model.
本文介绍了意大利国家书目编号(NBN)服务如何与国家数字保存基础设施——数字堆栈相结合,成为一种值得信赖的基础设施。本文提出了一个合适的描述模型,即“信任的砖块”,用于评估个人信息系统的可信度。根据这一模式,意大利的NBN得到了积极的评价。
{"title":"NBN: IT The Italian trusted persistent identifier infrastructure","authors":"E. Bellini, G. Bergamin, Maurizio Messina, C. Cirinnà, Raffaele Messuti","doi":"10.1504/IJKL.2014.069536","DOIUrl":"https://doi.org/10.1504/IJKL.2014.069536","url":null,"abstract":"This paper describes how the Italian national bibliography number (NBN) service has become a trusted infrastructure when it has been combined with digital stacks, the national digital preservation infrastructure. A suitable descriptive model, the bricks of trust, to assess the trustworthiness of the PI systems, has been provided. The Italian NBN has been positively assessed according to this model.","PeriodicalId":163161,"journal":{"name":"Int. J. Knowl. Learn.","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121738253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
ODIN: the ORCID and DataCite interoperability network ODIN: ORCID和DataCite互操作性网络
Pub Date : 2015-05-22 DOI: 10.1504/IJKL.2014.069537
M. Fenner, Laurel L. Haak, Gudmundur A. Thorisson, Sergio Ruiz, T. Vision, Jan Brase
Research data is increasingly seen as the most significant untapped resource in scholarship. Awareness and practice of referencing and citing research data is increasing, and different initiatives to unambiguously identify datasets are in place. Steps are being taken to identify the individuals who created or contributed to research outputs. Lack of interoperability between the different initiatives to identify datasets and contributors remains a major hurdle. The ODIN project (ORCID and DataCite Interoperability Network) tries to address this need. ODIN builds on the ORCID and DataCite initiatives to uniquely identify scientists and data sets and connect this information across multiple services and infrastructures. It aims to address some of the critical open questions in the area. We describe a conceptual model to solve the interoperability between different identifiers for data and people.
研究数据越来越被视为学术界最重要的未开发资源。参考和引用研究数据的意识和实践正在增加,明确识别数据集的不同举措已经到位。正在采取步骤确定创造或贡献研究成果的个人。在识别数据集和贡献者的不同举措之间缺乏互操作性仍然是一个主要障碍。ODIN项目(ORCID和DataCite互操作性网络)试图解决这一需求。ODIN建立在ORCID和DataCite计划的基础上,可以唯一地识别科学家和数据集,并将这些信息跨多个服务和基础设施连接起来。它旨在解决该领域一些关键的开放性问题。我们描述了一个概念模型来解决数据和人的不同标识符之间的互操作性。
{"title":"ODIN: the ORCID and DataCite interoperability network","authors":"M. Fenner, Laurel L. Haak, Gudmundur A. Thorisson, Sergio Ruiz, T. Vision, Jan Brase","doi":"10.1504/IJKL.2014.069537","DOIUrl":"https://doi.org/10.1504/IJKL.2014.069537","url":null,"abstract":"Research data is increasingly seen as the most significant untapped resource in scholarship. Awareness and practice of referencing and citing research data is increasing, and different initiatives to unambiguously identify datasets are in place. Steps are being taken to identify the individuals who created or contributed to research outputs. Lack of interoperability between the different initiatives to identify datasets and contributors remains a major hurdle. The ODIN project (ORCID and DataCite Interoperability Network) tries to address this need. ODIN builds on the ORCID and DataCite initiatives to uniquely identify scientists and data sets and connect this information across multiple services and infrastructures. It aims to address some of the critical open questions in the area. We describe a conceptual model to solve the interoperability between different identifiers for data and people.","PeriodicalId":163161,"journal":{"name":"Int. J. Knowl. Learn.","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121749758","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Log content extraction engine based on ontology for the purpose of a posteriori access control 基于本体的日志内容提取引擎,用于事后访问控制
Pub Date : 2014-02-01 DOI: 10.1504/IJKL.2014.067149
Hanieh Azkia, N. Cuppens-Boulahia, F. Cuppens, G. Coatrieux
In some complex information systems, users do not undergo untimely access controls. Generally, whenever they perform an action, this action is logged by the target system. Based on these log les, a security control called a posteriori access control is made afterwards. The logged data can be recorded in dierent formats (Syslog, W3C extend log, specic domain log standard like IHE-ATNA, etc.). An a posteriori security control framework requires a log ltering engine which extracts useful information regardless of the log format used. In this paper, we dene and enforce this extraction function by building an ontology model of logs. This logs ontology is queried to check the compliance of actions performed by the users of the considered system with its access control policy (violations, anomalies, fulllments, etc.). We show how the a posteriori security controls are made eective and how security decisions are made easier based on this extraction function.
在一些复杂的信息系统中,用户不会受到不及时的访问控制。通常,无论何时执行操作,目标系统都会记录该操作。基于这些日志,之后会进行称为事后访问控制的安全控制。日志数据可以以不同的格式记录(Syslog、W3C扩展日志、特定的域日志标准,如IHE-ATNA等)。后验安全控制框架需要一个日志过滤引擎,无论使用何种日志格式,它都可以提取有用的信息。在本文中,我们通过建立日志的本体模型来确定和实现这个提取功能。查询该日志本体是为了检查所考虑的系统的用户执行的操作是否符合其访问控制策略(违规、异常、完成等)。我们将展示如何使后验安全控制有效,以及如何基于此提取函数更容易地做出安全决策。
{"title":"Log content extraction engine based on ontology for the purpose of a posteriori access control","authors":"Hanieh Azkia, N. Cuppens-Boulahia, F. Cuppens, G. Coatrieux","doi":"10.1504/IJKL.2014.067149","DOIUrl":"https://doi.org/10.1504/IJKL.2014.067149","url":null,"abstract":"In some complex information systems, users do not undergo untimely access controls. Generally, whenever they perform an action, this action is logged by the target system. Based on these log les, a security control called a posteriori access control is made afterwards. The logged data can be recorded in dierent formats (Syslog, W3C extend log, specic domain log standard like IHE-ATNA, etc.). An a posteriori security control framework requires a log ltering engine which extracts useful information regardless of the log format used. In this paper, we dene and enforce this extraction function by building an ontology model of logs. This logs ontology is queried to check the compliance of actions performed by the users of the considered system with its access control policy (violations, anomalies, fulllments, etc.). We show how the a posteriori security controls are made eective and how security decisions are made easier based on this extraction function.","PeriodicalId":163161,"journal":{"name":"Int. J. Knowl. Learn.","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116543574","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Knowledge management for designing business workflows through semantic compositions of web services 通过web服务的语义组合设计业务工作流的知识管理
Pub Date : 2012-06-29 DOI: 10.1504/IJKL.2012.047547
S. Valtolina, B. R. Barricelli, F. Ariano, M. Padula, P. L. Scala
This paper presents a workflow management system called task management system (TMS) devoted to help end users to combine and integrate distributed tasks through visual composition strategies. The TMS is devoted to support human resources in performing their working activities and in exploiting their knowledge and expertise. The TMS network allows employees, who are experts of a specific domain, to design a workflow, to visually validate its execution and to execute it at use time. In particular, the paper describes how workflow designers use TMS to transform the task analysis documents prepared by domain experts into a description of the workflow. The retrieved components are web services that are available in remote or local repositories representing distributed knowledge bases of business tasks. The TMS offers transparent invocation methods for invoking services by means of a semantic discovery engine designed for exploiting a taxonomy of web services.
本文提出了一个工作流管理系统任务管理系统(TMS),旨在帮助终端用户通过可视化组合策略对分布式任务进行组合和集成。TMS致力于支持人力资源开展工作活动,并利用他们的知识和专长。TMS网络允许作为特定领域专家的员工设计工作流,可视化地验证其执行,并在使用时执行它。特别地,本文描述了工作流设计者如何使用TMS将领域专家准备的任务分析文档转换成工作流的描述。检索的组件是在表示业务任务的分布式知识库的远程或本地存储库中可用的web服务。TMS通过为利用web服务分类而设计的语义发现引擎,为调用服务提供了透明的调用方法。
{"title":"Knowledge management for designing business workflows through semantic compositions of web services","authors":"S. Valtolina, B. R. Barricelli, F. Ariano, M. Padula, P. L. Scala","doi":"10.1504/IJKL.2012.047547","DOIUrl":"https://doi.org/10.1504/IJKL.2012.047547","url":null,"abstract":"This paper presents a workflow management system called task management system (TMS) devoted to help end users to combine and integrate distributed tasks through visual composition strategies. The TMS is devoted to support human resources in performing their working activities and in exploiting their knowledge and expertise. The TMS network allows employees, who are experts of a specific domain, to design a workflow, to visually validate its execution and to execute it at use time. In particular, the paper describes how workflow designers use TMS to transform the task analysis documents prepared by domain experts into a description of the workflow. The retrieved components are web services that are available in remote or local repositories representing distributed knowledge bases of business tasks. The TMS offers transparent invocation methods for invoking services by means of a semantic discovery engine designed for exploiting a taxonomy of web services.","PeriodicalId":163161,"journal":{"name":"Int. J. Knowl. Learn.","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132790745","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
What makes end-user training successful? A mixed method study of a business process management system implementation 是什么使最终用户培训成功?一个业务流程管理系统实现的混合方法研究
Pub Date : 2012-06-29 DOI: 10.1504/IJKL.2012.047569
B. D. Waal, R. Batenburg
Under what conditions is end-user training (EUT) as part of the implementation of a business process management (BPM) system successful? This question is addressed in this paper. Based on the literature on EUT and implementation success, we first argue that user involvement with, and attitude towards, a BPM system, both have a conditional effect on the relationship between EUT and the implementation success of the system. Secondly, we investigated this expectation empirically, by measuring the practice of EUT as perceived by end-users. Using a mixed method approach, survey data was collected from 143 end-users of a BPM system in a large Dutch social insurance organisation, and by 49 additional semi-structured interviews. Regression analysis of the survey data shows that attitude variables indeed have a significant moderating influence on implementation success. In addition, the interviews revealed that specific attention must be paid to the arrangements for EUT when deploying BPM systems in this type of organisations. Arguments are given for a more comprehensive way of measuring and optimising EUT during the implementation of information systems/information technology in organisations.
作为业务流程管理(BPM)系统实现的一部分,终端用户培训(EUT)在什么条件下是成功的?本文讨论了这个问题。基于相关文献,我们首先论证了用户对BPM系统的参与和态度对用户体验和系统实施成功之间的关系有条件影响。其次,我们通过测量终端用户感知的EUT实践,实证地调查了这一期望。使用混合方法方法,调查数据从一家大型荷兰社会保险组织的BPM系统的143个最终用户和49个额外的半结构化访谈中收集。对调查数据的回归分析表明,态度变量确实对实施成功有显著的调节作用。此外,访谈显示,在这类组织中部署BPM系统时,必须特别注意EUT的安排。在组织中实施信息系统/信息技术期间,给出了一种更全面的测量和优化EUT的方法。
{"title":"What makes end-user training successful? A mixed method study of a business process management system implementation","authors":"B. D. Waal, R. Batenburg","doi":"10.1504/IJKL.2012.047569","DOIUrl":"https://doi.org/10.1504/IJKL.2012.047569","url":null,"abstract":"Under what conditions is end-user training (EUT) as part of the implementation of a business process management (BPM) system successful? This question is addressed in this paper. Based on the literature on EUT and implementation success, we first argue that user involvement with, and attitude towards, a BPM system, both have a conditional effect on the relationship between EUT and the implementation success of the system. Secondly, we investigated this expectation empirically, by measuring the practice of EUT as perceived by end-users. Using a mixed method approach, survey data was collected from 143 end-users of a BPM system in a large Dutch social insurance organisation, and by 49 additional semi-structured interviews. Regression analysis of the survey data shows that attitude variables indeed have a significant moderating influence on implementation success. In addition, the interviews revealed that specific attention must be paid to the arrangements for EUT when deploying BPM systems in this type of organisations. Arguments are given for a more comprehensive way of measuring and optimising EUT during the implementation of information systems/information technology in organisations.","PeriodicalId":163161,"journal":{"name":"Int. J. Knowl. Learn.","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124835227","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Analysis of the design of effective learning activities using learning-type PDCA and CAPD cycles on the basis of the characteristics of individual students 基于学生个体特点,运用学习型PDCA和CAPD循环进行有效学习活动的设计分析
Pub Date : 2012-06-29 DOI: 10.1504/IJKL.2012.047556
M. Tsubaki, Taro Oya, Takahiro Kobayashi
The learning-type PDCA cycle and the CAPD cycle are methods of managing the process of learning. In this paper, we examine the trends in the differences between self-evaluations and others’ evaluations of learners’ abilities, goals, and results as they learn improvement activities through the learning-type PDCA or CAPD cycle. In addition, using graphical modelling, we examine how to explain differences among evaluations according to the characteristics of individual students and how to design effective learning activities through the learning-type PDCA and CAPD cycles.
学习型的PDCA循环和CAPD循环是管理学习过程的方法。在本文中,我们通过学习型PDCA或CAPD循环研究了自我评价和他人对学习者能力、目标和结果的评价之间的差异趋势。此外,我们利用图形化建模,研究了如何根据学生个体的特点来解释评价之间的差异,以及如何通过学习型PDCA和CAPD循环来设计有效的学习活动。
{"title":"Analysis of the design of effective learning activities using learning-type PDCA and CAPD cycles on the basis of the characteristics of individual students","authors":"M. Tsubaki, Taro Oya, Takahiro Kobayashi","doi":"10.1504/IJKL.2012.047556","DOIUrl":"https://doi.org/10.1504/IJKL.2012.047556","url":null,"abstract":"The learning-type PDCA cycle and the CAPD cycle are methods of managing the process of learning. In this paper, we examine the trends in the differences between self-evaluations and others’ evaluations of learners’ abilities, goals, and results as they learn improvement activities through the learning-type PDCA or CAPD cycle. In addition, using graphical modelling, we examine how to explain differences among evaluations according to the characteristics of individual students and how to design effective learning activities through the learning-type PDCA and CAPD cycles.","PeriodicalId":163161,"journal":{"name":"Int. J. Knowl. Learn.","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131202970","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
Int. J. Knowl. Learn.
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1