首页 > 最新文献

Online Journal of Applied Knowledge Management最新文献

英文 中文
Understanding knowledge hiding behaviors in the workplace using a serious game data collection approach 使用严肃的游戏数据收集方法理解工作场所的知识隐藏行为
Pub Date : 2022-12-18 DOI: 10.36965/ojakm.2022.10(3)27-45
Kaiyu Yang, V. Ribière, A. Bartel-Radic
Knowledge hiding, knowledge hoarding, and knowledge withholding have drawn increasing research attention in recent decades. Most researchers approached this topic by collecting quantitative data using questionnaires with self-reported scales. However, the underreporting nature of self-report measurement, particularly when studying sensitive and socially undesirable behavior, has been identified as a prominent limitation in extant research, which shows the urgent need for less biased and more innovative research methods. Scenarios incorporating critical incidents that represent a simulation of actual working conditions appear to be a relevant technique to address the above-mentioned shortcoming. Hence, an experimental design, adopting meticulously crafted scenarios, is worth investigating. This paper presents the value of using serious games/simulations to collect data related to knowledge hiding behaviors as well as the design stages of a knowledge hiding serious game
近几十年来,知识隐藏、知识囤积和知识隐瞒越来越受到人们的关注。大多数研究人员通过使用自我报告量表的问卷收集定量数据来研究这个主题。然而,自我报告测量的低报性质,特别是在研究敏感和社会不受欢迎的行为时,已被认为是现有研究的一个突出局限性,这表明迫切需要减少偏见和更具创新性的研究方法。将模拟实际工作条件的关键事件纳入场景似乎是解决上述缺点的相关技术。因此,采用精心设计的场景的实验设计是值得研究的。本文介绍了利用严肃游戏/模拟收集知识隐藏行为相关数据的价值,以及知识隐藏严肃游戏的设计阶段
{"title":"Understanding knowledge hiding behaviors in the workplace using a serious game data collection approach","authors":"Kaiyu Yang, V. Ribière, A. Bartel-Radic","doi":"10.36965/ojakm.2022.10(3)27-45","DOIUrl":"https://doi.org/10.36965/ojakm.2022.10(3)27-45","url":null,"abstract":"Knowledge hiding, knowledge hoarding, and knowledge withholding have drawn increasing research attention in recent decades. Most researchers approached this topic by collecting quantitative data using questionnaires with self-reported scales. However, the underreporting nature of self-report measurement, particularly when studying sensitive and socially undesirable behavior, has been identified as a prominent limitation in extant research, which shows the urgent need for less biased and more innovative research methods. Scenarios incorporating critical incidents that represent a simulation of actual working conditions appear to be a relevant technique to address the above-mentioned shortcoming. Hence, an experimental design, adopting meticulously crafted scenarios, is worth investigating. This paper presents the value of using serious games/simulations to collect data related to knowledge hiding behaviors as well as the design stages of a knowledge hiding serious game","PeriodicalId":325473,"journal":{"name":"Online Journal of Applied Knowledge Management","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121400641","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The impact of knowledge hiding and toxic leadership on knowledge worker productivity – Evidence from IT sector of Pakistan 知识隐藏和有毒领导对知识工作者生产力的影响——来自巴基斯坦IT部门的证据
Pub Date : 2022-12-18 DOI: 10.36965/ojakm.2022.10(3)46-67
Sameen Khalid, Yi-Yen Li, Khawaja Fawad Latif, Chunyong Tang
This study intends to identify the impact of Knowledge Hiding and Toxic Leadership on Knowledge Management Process at Information Technology (IT) companies of Pakistan and explore the overall impact on Knowledge Worker Productivity by keeping knowledge worker ambidexterity as mediator. Any factor that could negatively influence the knowledge management process would hamper employees’ productivity in that setup. The knowledge-based view is used as base theory which characterizes knowledge as the most significant strategic utensil for performance, however, the IT sector being a highly knowledge-intensive sector provides rationale for conducting study in this area. The study is quantitative and the sample size consists of 405 respondents selected based on convenience sampling. However, Analysis was performed using Structural Equation Modelling Software Smart Partial Least-Square (SEM-PLS). The findings show that evasive hiding, playing dumb and toxic leadership does not have any significant impact on knowledge management process, however, rationalized hiding was positively related to knowledge management process and knowledge worker productivity. Also, partial mediation of knowledge worker ambidexterity was observed. Furthermore, this study is a significant addition to the existing literature as to the best of our knowledge, it is one of the earlier contributions to explore knowledge hiding as a barrier to the knowledge management process along with toxic leadership introducing mediating role of knowledge worker ambidexterity. Theoretical contributions and practical implications are also discussed at the end.
本研究旨在找出巴基斯坦资讯科技(IT)公司的知识隐藏与有毒领导对知识管理过程的影响,并以知识工作者的双元性为中介,探讨其对知识工作者生产力的整体影响。在这种情况下,任何可能对知识管理过程产生负面影响的因素都会阻碍员工的生产力。以知识为基础的观点被用作基础理论,它将知识描述为绩效最重要的战略工具,然而,IT部门作为一个高度知识密集型的部门,为开展这一领域的研究提供了理论依据。本研究为定量研究,样本量为405人,采用方便抽样法。然而,使用结构方程建模软件智能偏最小二乘法(SEM-PLS)进行分析。研究发现,回避型隐藏、装聋作哑型和有毒型领导对知识管理过程无显著影响,而合理化隐藏对知识管理过程和知识员工生产率有显著的正向影响。研究还发现,知识工作者的双元性具有部分中介作用。此外,本研究是对现有文献的重要补充,就我们所知,它是早期探索知识隐藏作为知识管理过程障碍的贡献之一,以及引入知识工作者二元性中介作用的有毒领导。最后讨论了本文的理论贡献和现实意义。
{"title":"The impact of knowledge hiding and toxic leadership on knowledge worker productivity – Evidence from IT sector of Pakistan","authors":"Sameen Khalid, Yi-Yen Li, Khawaja Fawad Latif, Chunyong Tang","doi":"10.36965/ojakm.2022.10(3)46-67","DOIUrl":"https://doi.org/10.36965/ojakm.2022.10(3)46-67","url":null,"abstract":"This study intends to identify the impact of Knowledge Hiding and Toxic Leadership on Knowledge Management Process at Information Technology (IT) companies of Pakistan and explore the overall impact on Knowledge Worker Productivity by keeping knowledge worker ambidexterity as mediator. Any factor that could negatively influence the knowledge management process would hamper employees’ productivity in that setup. The knowledge-based view is used as base theory which characterizes knowledge as the most significant strategic utensil for performance, however, the IT sector being a highly knowledge-intensive sector provides rationale for conducting study in this area. The study is quantitative and the sample size consists of 405 respondents selected based on convenience sampling. However, Analysis was performed using Structural Equation Modelling Software Smart Partial Least-Square (SEM-PLS). The findings show that evasive hiding, playing dumb and toxic leadership does not have any significant impact on knowledge management process, however, rationalized hiding was positively related to knowledge management process and knowledge worker productivity. Also, partial mediation of knowledge worker ambidexterity was observed. Furthermore, this study is a significant addition to the existing literature as to the best of our knowledge, it is one of the earlier contributions to explore knowledge hiding as a barrier to the knowledge management process along with toxic leadership introducing mediating role of knowledge worker ambidexterity. Theoretical contributions and practical implications are also discussed at the end.","PeriodicalId":325473,"journal":{"name":"Online Journal of Applied Knowledge Management","volume":"128 7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131139509","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Special issue editorial: Knowledge hiding and knowledge hoarding in different environments 特刊社论:不同环境下的知识隐藏与知识囤积
Pub Date : 2022-12-18 DOI: 10.36965/ojakm.2022.10(3)1-5
This Special Issue contributes to a better understanding of knowledge hiding and knowledge hoarding. Articles illustrate what these behaviors are all about and how to move forward the research on these topics.
这期特刊有助于更好地理解知识隐藏和知识囤积。文章阐述了这些行为是什么,以及如何推进这些主题的研究。
{"title":"Special issue editorial: Knowledge hiding and knowledge hoarding in different environments","authors":"","doi":"10.36965/ojakm.2022.10(3)1-5","DOIUrl":"https://doi.org/10.36965/ojakm.2022.10(3)1-5","url":null,"abstract":"This Special Issue contributes to a better understanding of knowledge hiding and knowledge hoarding. Articles illustrate what these behaviors are all about and how to move forward the research on these topics.","PeriodicalId":325473,"journal":{"name":"Online Journal of Applied Knowledge Management","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123716964","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Knowledge hiding and knowledge hoarding: Using grounded theory for conceptual development 知识隐藏与知识囤积:运用扎根理论进行概念发展
Pub Date : 2022-12-18 DOI: 10.36965/ojakm.2022.10(3)6-26
Tiago Gonçalves
Knowledge hiding and knowledge hoarding define two organizational behaviors that integrate knowledge withholding related phenomena in organizations. Although recent literature presents efforts to conceptually differentiate knowledge hiding and knowledge hoarding, evidence shows that there are emerging gaps resulting from conceptual and empirical inconsistencies between the constructs. This paper addresses the need for theoretical and empirical clarification by developing on the use of Grounded Theory (GT) as a systematic methodology to expand knowledge on both phenomena. This work explores core characteristics and procedures related to GT that can support the pursuit of theoretical refinement behind knowledge hiding and knowledge hoarding as dimensions of knowledge withholding. It presents three philosophical rationales that can support knowledge hiding and knowledge hoarding conceptualization using Classic, Interpretivist and Constructivist GT. Specifically, it provides a conceptual framework that discusses concerns of the researcher, literature review processes, data collection methods, and data coding and analysis strategies that should be considered to ensure quality in GT research. Lastly, it discusses an integration of research using mixed methods GT to address quantitative concerns surrounding GT. This paper contributes to the theoretical and empirical development of knowledge hiding and knowledge hoarding related phenomena by suggesting research conducts and designs to support the usage of GT approaches in the study of both phenomena
知识隐藏和知识囤积是组织中整合了知识保留相关现象的两种组织行为。尽管最近的文献提出了从概念上区分知识隐藏和知识囤积的努力,但有证据表明,由于概念和经验上的不一致,这两个概念之间存在新的差距。本文通过发展扎根理论(GT)作为一种系统的方法来扩展对这两种现象的认识,从而解决了理论和实证澄清的需要。本研究探索了与GT相关的核心特征和程序,这些特征和程序可以支持知识隐藏和知识囤积背后的理论提炼,作为知识隐瞒的维度。它提出了三个哲学基础,可以支持知识隐藏和知识囤积概念化使用经典,解释主义和建构主义的GT。具体而言,它提供了一个概念框架,讨论了研究人员的关注点,文献综述过程,数据收集方法,以及数据编码和分析策略,应该考虑确保GT研究的质量。最后,本文讨论了使用混合方法的整合研究,以解决围绕GT的定量问题。本文通过提出研究行为和设计来支持在这两种现象的研究中使用GT方法,从而有助于知识隐藏和知识囤积相关现象的理论和实证发展
{"title":"Knowledge hiding and knowledge hoarding: Using grounded theory for conceptual development","authors":"Tiago Gonçalves","doi":"10.36965/ojakm.2022.10(3)6-26","DOIUrl":"https://doi.org/10.36965/ojakm.2022.10(3)6-26","url":null,"abstract":"Knowledge hiding and knowledge hoarding define two organizational behaviors that integrate knowledge withholding related phenomena in organizations. Although recent literature presents efforts to conceptually differentiate knowledge hiding and knowledge hoarding, evidence shows that there are emerging gaps resulting from conceptual and empirical inconsistencies between the constructs. This paper addresses the need for theoretical and empirical clarification by developing on the use of Grounded Theory (GT) as a systematic methodology to expand knowledge on both phenomena. This work explores core characteristics and procedures related to GT that can support the pursuit of theoretical refinement behind knowledge hiding and knowledge hoarding as dimensions of knowledge withholding. It presents three philosophical rationales that can support knowledge hiding and knowledge hoarding conceptualization using Classic, Interpretivist and Constructivist GT. Specifically, it provides a conceptual framework that discusses concerns of the researcher, literature review processes, data collection methods, and data coding and analysis strategies that should be considered to ensure quality in GT research. Lastly, it discusses an integration of research using mixed methods GT to address quantitative concerns surrounding GT. This paper contributes to the theoretical and empirical development of knowledge hiding and knowledge hoarding related phenomena by suggesting research conducts and designs to support the usage of GT approaches in the study of both phenomena","PeriodicalId":325473,"journal":{"name":"Online Journal of Applied Knowledge Management","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126478952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Assessing SMEs’ cybersecurity organizational readiness: Findings from an Italian survey 评估中小企业的网络安全组织准备:来自意大利调查的结果
Pub Date : 2022-09-15 DOI: 10.36965/ojakm.2022.10(2)1-22
Martina Neri, F. Niccolini, R. Pugliese
The Small and Medium-sized Enterprises’ (SMEs) level of organizational cybersecurity readiness has been poorly investigated to date. Currently, all SMEs need to maintain an adequate level of cybersecurity to run their businesses, not only those wishing to fully exploit digitalization’s benefits. Unfortunately, due to their lack of resources, skills, and their low level of cyber awareness, SMEs often seem unprepared. It is essential that they address the digital threats that they face by using technology and complementary (and not alternative) factors, such as guidelines, formal policies, and training. All these elements trigger development processes regarding skills, awareness, the organizational cybersecurity culture, and the organizational resilience. This paper describes Italy’s first multidisciplinary attempt to assess its SMEs’ overall cybersecurity readiness level. We used a survey as its initial quantitative assessment approach, although SMEs can also use it as a cyber self-assessment tool, which prepares them better to navigate the digital ecosystem. Thereafter, we held semi-structured interviews to explore the critical points that had emerged from the study’s first phase. The overall results show that SMEs have not yet achieved high levels of organizational readiness. SMEs are currently starting to set the stage for their organizational cyber readiness and will, therefore, have to take many more proactive steps to address their cyber challenges.
迄今为止,对中小企业(SMEs)组织网络安全准备水平的调查很少。目前,所有中小企业都需要保持足够的网络安全水平来开展业务,而不仅仅是那些希望充分利用数字化优势的中小企业。不幸的是,由于缺乏资源、技能和低水平的网络意识,中小企业往往似乎毫无准备。他们必须通过使用技术和互补(而不是替代)因素(如指导方针、正式政策和培训)来解决他们面临的数字威胁。所有这些元素都触发了有关技能、意识、组织网络安全文化和组织弹性的开发过程。本文描述了意大利首次多学科尝试评估其中小企业的整体网络安全准备水平。我们使用调查作为最初的定量评估方法,尽管中小企业也可以将其用作网络自我评估工具,这有助于他们更好地驾驭数字生态系统。此后,我们进行了半结构化访谈,以探索研究第一阶段出现的关键点。总体结果表明,中小企业尚未达到高水平的组织准备。中小企业目前正开始为其组织网络准备做好准备,因此必须采取更积极主动的措施来应对网络挑战。
{"title":"Assessing SMEs’ cybersecurity organizational readiness: Findings from an Italian survey","authors":"Martina Neri, F. Niccolini, R. Pugliese","doi":"10.36965/ojakm.2022.10(2)1-22","DOIUrl":"https://doi.org/10.36965/ojakm.2022.10(2)1-22","url":null,"abstract":"The Small and Medium-sized Enterprises’ (SMEs) level of organizational cybersecurity readiness has been poorly investigated to date. Currently, all SMEs need to maintain an adequate level of cybersecurity to run their businesses, not only those wishing to fully exploit digitalization’s benefits. Unfortunately, due to their lack of resources, skills, and their low level of cyber awareness, SMEs often seem unprepared. It is essential that they address the digital threats that they face by using technology and complementary (and not alternative) factors, such as guidelines, formal policies, and training. All these elements trigger development processes regarding skills, awareness, the organizational cybersecurity culture, and the organizational resilience. This paper describes Italy’s first multidisciplinary attempt to assess its SMEs’ overall cybersecurity readiness level. We used a survey as its initial quantitative assessment approach, although SMEs can also use it as a cyber self-assessment tool, which prepares them better to navigate the digital ecosystem. Thereafter, we held semi-structured interviews to explore the critical points that had emerged from the study’s first phase. The overall results show that SMEs have not yet achieved high levels of organizational readiness. SMEs are currently starting to set the stage for their organizational cyber readiness and will, therefore, have to take many more proactive steps to address their cyber challenges.","PeriodicalId":325473,"journal":{"name":"Online Journal of Applied Knowledge Management","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133462834","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Pilot testing of experimental procedures to measure user's judgment errors in simulated social engineering attacks 在模拟社会工程攻击中测量用户判断错误的实验程序的试点测试
Pub Date : 2022-09-15 DOI: 10.36965/ojakm.2022.10(2)23-40
Tommy Pollock, Y. Levy, Wei Li, Ajoy Kumar
Distracted users appear to have difficulties correctly distinguishing between legitimate and malicious emails or search engine results. Additionally, mobile phone users appear to have a more challenging time identifying malicious content due to the smaller screen size and the limited security features in mobile phone applications. Thus, the goal of this research study was to conduct a pilot test and validate a set of field experiments based on Subject Matter Experts (SMEs) feedback to assess users’ judgment when exposed to two types of simulated social engineering attacks: phishing and Potentially Malicious Search Engine Results (PMSER), based on the interaction of the environment (distracting vs. non-distracting) and type of device used (mobile vs. computer). This paper provides the results from the pilot test we conducted using recruited volunteers consisting of 10 participants out of 20 volunteers invited. Due to COVID-19 restrictions, all interactions in this pilot testing were conducted remotely. These restrictions somewhat limited our ability to control the testing environment to ensure a completely non-distractive environment during these parts of the study; however, a significant attempt was made to ensure such a non-distractive environment was genuinely adhered to during that part of the study. Our initial pilot testing results indicate that the findings were counterintuitive for the Phishing Intelligence Quotient (IQ) tests. In contrast, results of the PMSER were intuitive with improved detection on a computer compared to mobile. We conclude with a discussion on the study limitations and further research.
分心的用户似乎很难正确区分合法和恶意的电子邮件或搜索引擎结果。此外,由于手机屏幕尺寸较小,而且手机应用程序的安全功能有限,手机用户在识别恶意内容方面似乎面临着更大的挑战。因此,本研究的目标是根据主题专家(sme)的反馈进行试点测试并验证一组现场实验,以评估用户在暴露于两种类型的模拟社会工程攻击时的判断:网络钓鱼和潜在恶意搜索引擎结果(PMSER),基于环境的相互作用(分散与非分散)和使用的设备类型(移动与计算机)。本文提供了我们进行的试点测试的结果,我们从邀请的20名志愿者中招募了10名志愿者。由于COVID-19的限制,本次试点测试中的所有互动都是远程进行的。这些限制在一定程度上限制了我们控制测试环境的能力,以确保在研究的这些部分中完全没有分心的环境;然而,为了确保在这部分研究中真正坚持这样一个不分散注意力的环境,我们做出了重大的尝试。我们最初的试点测试结果表明,这些发现违反了网络钓鱼智商(IQ)测试的直觉。相比之下,PMSER的结果是直观的,与移动设备相比,在计算机上改进了检测。最后,我们讨论了研究的局限性和进一步的研究。
{"title":"Pilot testing of experimental procedures to measure user's judgment errors in simulated social engineering attacks","authors":"Tommy Pollock, Y. Levy, Wei Li, Ajoy Kumar","doi":"10.36965/ojakm.2022.10(2)23-40","DOIUrl":"https://doi.org/10.36965/ojakm.2022.10(2)23-40","url":null,"abstract":"Distracted users appear to have difficulties correctly distinguishing between legitimate and malicious emails or search engine results. Additionally, mobile phone users appear to have a more challenging time identifying malicious content due to the smaller screen size and the limited security features in mobile phone applications. Thus, the goal of this research study was to conduct a pilot test and validate a set of field experiments based on Subject Matter Experts (SMEs) feedback to assess users’ judgment when exposed to two types of simulated social engineering attacks: phishing and Potentially Malicious Search Engine Results (PMSER), based on the interaction of the environment (distracting vs. non-distracting) and type of device used (mobile vs. computer). This paper provides the results from the pilot test we conducted using recruited volunteers consisting of 10 participants out of 20 volunteers invited. Due to COVID-19 restrictions, all interactions in this pilot testing were conducted remotely. These restrictions somewhat limited our ability to control the testing environment to ensure a completely non-distractive environment during these parts of the study; however, a significant attempt was made to ensure such a non-distractive environment was genuinely adhered to during that part of the study. Our initial pilot testing results indicate that the findings were counterintuitive for the Phishing Intelligence Quotient (IQ) tests. In contrast, results of the PMSER were intuitive with improved detection on a computer compared to mobile. We conclude with a discussion on the study limitations and further research.","PeriodicalId":325473,"journal":{"name":"Online Journal of Applied Knowledge Management","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123746863","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Implementation of privacy by design model to an eHealth information system 隐私设计模型在电子健康信息系统中的实现
Pub Date : 2022-09-06 DOI: 10.36965/ojakm.2022.10(1)77-87
Matjaž Drev, D. Stanimirović, Boštjan Delak
This paper reports ongoing research on the process and results of implementing a conceptual model of privacy by design. The model is based on building blocks derived from a comparative analysis of approaches to privacy by design by different authors. We then implemented the model to the data processing operations of Slovenia's central health information system (eHealth). The main goal of our research was to ensure personal data processing compliance with the General Data Protection Regulation (GDPR) and privacy by design criteria set by the model. Findings were used to answer the research questions: whether the proposed conceptual model is general enough to be used in most personal data processing operations, regardless of context; does the successful implementation of conceptual model requirements in personal data processing operations lead to compliance with the GDPR and with the additional requirements of privacy by design, and is the efficiency of complying with personal data processing higher when using the conceptual model compared to other approaches. Current results show that the model is robust enough to be used in a complex system of personal data processing. It also enables a relatively quick assessment of the gap between the actual and target situation, while suggesting which measures should be taken to comply. However, the model still must be tested in several organizations and other contexts of personal data processing, as only a comparative meta-analysis can provide reliable answers to the questions posed.
本文报告了通过设计实现隐私概念模型的过程和结果。该模型基于不同作者对隐私设计方法的比较分析得出的构建块。然后,我们将该模型应用到斯洛文尼亚中央卫生信息系统(eHealth)的数据处理操作中。我们研究的主要目标是通过模型设定的设计标准确保个人数据处理符合通用数据保护条例(GDPR)和隐私。研究结果被用来回答研究问题:所提出的概念模型是否足够普遍,可以在大多数个人数据处理操作中使用,而不考虑上下文;在个人数据处理操作中成功实施概念模型要求是否会导致遵守GDPR和设计上的额外隐私要求,并且与其他方法相比,使用概念模型时遵守个人数据处理的效率是否更高。目前的结果表明,该模型具有足够的鲁棒性,可以用于复杂的个人数据处理系统。它还能够相对迅速地评估实际情况与目标情况之间的差距,同时建议应采取哪些措施予以遵守。然而,该模型仍然必须在几个组织和其他个人数据处理环境中进行测试,因为只有比较元分析才能为所提出的问题提供可靠的答案。
{"title":"Implementation of privacy by design model to an eHealth information system","authors":"Matjaž Drev, D. Stanimirović, Boštjan Delak","doi":"10.36965/ojakm.2022.10(1)77-87","DOIUrl":"https://doi.org/10.36965/ojakm.2022.10(1)77-87","url":null,"abstract":"This paper reports ongoing research on the process and results of implementing a conceptual model of privacy by design. The model is based on building blocks derived from a comparative analysis of approaches to privacy by design by different authors. We then implemented the model to the data processing operations of Slovenia's central health information system (eHealth). The main goal of our research was to ensure personal data processing compliance with the General Data Protection Regulation (GDPR) and privacy by design criteria set by the model. Findings were used to answer the research questions: whether the proposed conceptual model is general enough to be used in most personal data processing operations, regardless of context; does the successful implementation of conceptual model requirements in personal data processing operations lead to compliance with the GDPR and with the additional requirements of privacy by design, and is the efficiency of complying with personal data processing higher when using the conceptual model compared to other approaches. Current results show that the model is robust enough to be used in a complex system of personal data processing. It also enables a relatively quick assessment of the gap between the actual and target situation, while suggesting which measures should be taken to comply. However, the model still must be tested in several organizations and other contexts of personal data processing, as only a comparative meta-analysis can provide reliable answers to the questions posed.","PeriodicalId":325473,"journal":{"name":"Online Journal of Applied Knowledge Management","volume":"469 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122738149","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards the quantification of cybersecurity footprint for SMBs using the CMMC 2.0 使用CMMC 2.0对中小企业的网络安全足迹进行量化
Pub Date : 2022-09-06 DOI: 10.36965/ojakm.2022.10(1)43-61
Y. Levy, Ruti Gafni
Organizations, small and big, are faced with major cybersecurity challenges over the past several decades, as the proliferation of information systems and mobile devices expand. While larger organizations invest significant efforts in developing approaches to deal with cybersecurity incidents, Small and Medium Businesses (SMBs) are still struggling with ways to both keep their businesses alive and secure their systems to the best of their abilities. When it comes to critical systems, such as defense industries, the interconnectivities of organizations in the supply-chain have demonstrated to be problematic given the depth required to provide a high-level cybersecurity posture. The United States (U.S.) Department of Defense (DoD) with the partnership of the Defense Industry Base (DIB) have developed the Cybersecurity Maturity Model Certification (CMMC) in 2020 with a third-party mandate for Level 1 certification. Following an outcry from many DIB organizations, a newly revised CMMC 2.0 was introduced in late 2021 where Level 1 (Fundamental) was adjusted for annual self-assessment. CMMC 2.0 provides the 17 practices that organizations should self-assess. While these 17 practices provide initial guidance for assessment, the specific level of measurement and how it impacts their overall cybersecurity posture is vague. Specifically, many of these practices use non-quantifiable terms such as “limit”, “verify”, “control”, “identify”, etc. The focus of this work is to provide SMBs with a quantifiable method to self-assess their Cybersecurity Footprint following the CMMC 2.0 Level 1 practices. This paper outlines the foundational literature work conducted in support of the proposed quantification Cybersecurity Footprint Index (CFI) using 26 elements that correspond to the relevant CMMC 2.0 Level 1 practices.
在过去的几十年里,随着信息系统和移动设备的扩散,大大小小的组织都面临着重大的网络安全挑战。当大型组织投入大量精力开发处理网络安全事件的方法时,中小型企业(smb)仍在努力寻找既能保持业务活力又能尽其所能保护系统安全的方法。当涉及到关键系统时,例如国防工业,考虑到提供高水平网络安全态势所需的深度,供应链中组织的互连性已被证明是有问题的。美国(U.S.)美国国防部(DoD)与国防工业基地(DIB)合作,于2020年开发了网络安全成熟度模型认证(CMMC),并获得了第三方授权进行1级认证。在许多DIB组织的强烈抗议下,新修订的CMMC 2.0于2021年底推出,其中第1级(基础)调整为年度自我评估。CMMC 2.0提供了组织应该自我评估的17个实践。虽然这17个实践为评估提供了初步指导,但具体的测量水平以及它如何影响他们的整体网络安全态势是模糊的。具体地说,这些实践中有许多使用不可量化的术语,如“限制”、“验证”、“控制”、“识别”等。这项工作的重点是为中小企业提供一种可量化的方法,以根据CMMC 2.0 Level 1实践自我评估其网络安全足迹。本文概述了为支持拟议的量化网络安全足迹指数(CFI)而进行的基础文献工作,该指数使用了与相关CMMC 2.0 1级实践相对应的26个元素。
{"title":"Towards the quantification of cybersecurity footprint for SMBs using the CMMC 2.0","authors":"Y. Levy, Ruti Gafni","doi":"10.36965/ojakm.2022.10(1)43-61","DOIUrl":"https://doi.org/10.36965/ojakm.2022.10(1)43-61","url":null,"abstract":"Organizations, small and big, are faced with major cybersecurity challenges over the past several decades, as the proliferation of information systems and mobile devices expand. While larger organizations invest significant efforts in developing approaches to deal with cybersecurity incidents, Small and Medium Businesses (SMBs) are still struggling with ways to both keep their businesses alive and secure their systems to the best of their abilities. When it comes to critical systems, such as defense industries, the interconnectivities of organizations in the supply-chain have demonstrated to be problematic given the depth required to provide a high-level cybersecurity posture. The United States (U.S.) Department of Defense (DoD) with the partnership of the Defense Industry Base (DIB) have developed the Cybersecurity Maturity Model Certification (CMMC) in 2020 with a third-party mandate for Level 1 certification. Following an outcry from many DIB organizations, a newly revised CMMC 2.0 was introduced in late 2021 where Level 1 (Fundamental) was adjusted for annual self-assessment. CMMC 2.0 provides the 17 practices that organizations should self-assess. While these 17 practices provide initial guidance for assessment, the specific level of measurement and how it impacts their overall cybersecurity posture is vague. Specifically, many of these practices use non-quantifiable terms such as “limit”, “verify”, “control”, “identify”, etc. The focus of this work is to provide SMBs with a quantifiable method to self-assess their Cybersecurity Footprint following the CMMC 2.0 Level 1 practices. This paper outlines the foundational literature work conducted in support of the proposed quantification Cybersecurity Footprint Index (CFI) using 26 elements that correspond to the relevant CMMC 2.0 Level 1 practices.","PeriodicalId":325473,"journal":{"name":"Online Journal of Applied Knowledge Management","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131240694","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Testing the interaction effect of knowledge management and creative climate towards organizational innovation: Evidence from parastatal organizations in Uganda 检验知识管理和创新氛围对组织创新的交互作用:来自乌干达半国有组织的证据
Pub Date : 2022-09-06 DOI: 10.36965/ojakm.2022.10(1)1-23
Samuel Mafabi, Fred Lwanga
Extant literature shows that knowledge management needs the support of creative climate towards organizational innovation. However, existing studies have paid less attention regarding the interaction effect of knowledge management and creative climate on organizational innovation. This paper aims to clarify this relationship by examining the interaction effect of knowledge management and creative climate on organizational innovation in parastatal organizations in Uganda. This paper seeks to broaden the knowledge based innovation system domain by including the creative climate. This paper used an explanatory cross-sectional design where quantitative data were collected from 235 managers of 51 parastatals using a survey instrument. Data were aggregated to a parastatal level. Partial Least Squares Structural Equation Modeling (PLS-SEM) was used to test the interaction effect. This paper clarifies the interaction effect of knowledge management and creative climate towards organizational innovation. Knowledge management and creative climate independently rather than interactively enhance organizational innovation. The findings suggest that effective knowledge management practices and favorable creative climate are essential for organizational innovation. This paper suggests the adoption of an effective knowledge management system and a favorable creative climate as antecedents for organizational innovation. This paper makes a contribution on the question whether knowledge management interacts with creative climate to build organizational innovation, which seems to have been less studied.
现有文献表明,知识管理对组织创新需要创新氛围的支持。然而,现有研究较少关注知识管理和创新氛围对组织创新的交互作用。本文旨在通过研究乌干达半国有组织中知识管理和创造氛围对组织创新的相互作用来阐明这种关系。本文试图通过纳入创新环境来拓宽基于知识的创新系统领域。本文采用解释性横断面设计,使用调查工具从51家半国有企业的235名管理人员中收集定量数据。数据汇总到半官方水平。采用偏最小二乘结构方程模型(PLS-SEM)对相互作用效果进行检验。本文阐明了知识管理和创新氛围对组织创新的交互作用。知识管理与创新氛围相互独立而非相互作用,促进组织创新。研究结果表明,有效的知识管理实践和良好的创新氛围对组织创新至关重要。本文认为,有效的知识管理系统和良好的创新氛围是组织创新的前提。本文对知识管理是否与创新氛围相互作用以促进组织创新这一研究较少的问题做出了贡献。
{"title":"Testing the interaction effect of knowledge management and creative climate towards organizational innovation: Evidence from parastatal organizations in Uganda","authors":"Samuel Mafabi, Fred Lwanga","doi":"10.36965/ojakm.2022.10(1)1-23","DOIUrl":"https://doi.org/10.36965/ojakm.2022.10(1)1-23","url":null,"abstract":"Extant literature shows that knowledge management needs the support of creative climate towards organizational innovation. However, existing studies have paid less attention regarding the interaction effect of knowledge management and creative climate on organizational innovation. This paper aims to clarify this relationship by examining the interaction effect of knowledge management and creative climate on organizational innovation in parastatal organizations in Uganda. This paper seeks to broaden the knowledge based innovation system domain by including the creative climate. This paper used an explanatory cross-sectional design where quantitative data were collected from 235 managers of 51 parastatals using a survey instrument. Data were aggregated to a parastatal level. Partial Least Squares Structural Equation Modeling (PLS-SEM) was used to test the interaction effect. This paper clarifies the interaction effect of knowledge management and creative climate towards organizational innovation. Knowledge management and creative climate independently rather than interactively enhance organizational innovation. The findings suggest that effective knowledge management practices and favorable creative climate are essential for organizational innovation. This paper suggests the adoption of an effective knowledge management system and a favorable creative climate as antecedents for organizational innovation. This paper makes a contribution on the question whether knowledge management interacts with creative climate to build organizational innovation, which seems to have been less studied.","PeriodicalId":325473,"journal":{"name":"Online Journal of Applied Knowledge Management","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121619477","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Handling of “unknown unknowns” - classification of 3D geometries from CAD open set datasets using Convolutional Neural Networks 处理“未知的未知”-使用卷积神经网络对CAD开放集数据集中的3D几何图形进行分类
Pub Date : 2022-09-06 DOI: 10.36965/ojakm.2022.10(1)62-76
Georg Schmidt, S. Stüring, Norman Richnow, Ingo Siegert
This paper refers to the application of Convolutional Neural Networks (CNNs) for the classification of 3D geometries from Computer-Aided Design (CAD) datasets with a large proportion of unknown unknowns (classes unknown after training). The motivation of the work is the automatic recognition of standard parts in the large CAD-based image data set and thus, reducing the time required for the manual preparation of the data set. The classification is based on a threshold value of the Softmax output layer (first criterion), as well as on three different methods of a second criterion. The three methods for the second criterion are the comparison of metadata relating to the geometries, the comparison of feature vectors from previous dense layers of the CNN with a Spearman correlation, and the distance-based difference between multivariate Gaussian models of these feature vectors using Kullback-Leibler divergence. It is confirmed that all three methods are suitable to solve an open set problem in large 3D datasets (more than 1000 different geometries). Classification and training are image-based using different multi-view representations of the geometries.
本文将卷积神经网络(Convolutional Neural Networks, cnn)应用于含有大量未知未知数(训练后未知的类别)的计算机辅助设计(computer aided Design, CAD)数据集的三维几何分类。这项工作的动机是在基于cad的大型图像数据集中自动识别标准件,从而减少人工准备数据集所需的时间。分类基于Softmax输出层的阈值(第一个标准),以及第二个标准的三种不同方法。第二个标准的三种方法分别是:与几何图形相关的元数据的比较,使用Spearman相关的CNN先前密集层的特征向量的比较,以及使用Kullback-Leibler散度的这些特征向量的多元高斯模型之间基于距离的差异。结果表明,这三种方法都适用于求解大型三维数据集(超过1000种不同几何形状)中的开集问题。分类和训练是基于图像的,使用不同的几何图形的多视图表示。
{"title":"Handling of “unknown unknowns” - classification of 3D geometries from CAD open set datasets using Convolutional Neural Networks","authors":"Georg Schmidt, S. Stüring, Norman Richnow, Ingo Siegert","doi":"10.36965/ojakm.2022.10(1)62-76","DOIUrl":"https://doi.org/10.36965/ojakm.2022.10(1)62-76","url":null,"abstract":"This paper refers to the application of Convolutional Neural Networks (CNNs) for the classification of 3D geometries from Computer-Aided Design (CAD) datasets with a large proportion of unknown unknowns (classes unknown after training). The motivation of the work is the automatic recognition of standard parts in the large CAD-based image data set and thus, reducing the time required for the manual preparation of the data set. The classification is based on a threshold value of the Softmax output layer (first criterion), as well as on three different methods of a second criterion. The three methods for the second criterion are the comparison of metadata relating to the geometries, the comparison of feature vectors from previous dense layers of the CNN with a Spearman correlation, and the distance-based difference between multivariate Gaussian models of these feature vectors using Kullback-Leibler divergence. It is confirmed that all three methods are suitable to solve an open set problem in large 3D datasets (more than 1000 different geometries). Classification and training are image-based using different multi-view representations of the geometries.","PeriodicalId":325473,"journal":{"name":"Online Journal of Applied Knowledge Management","volume":"185 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132305992","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Online Journal of Applied Knowledge Management
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1