首页 > 最新文献

Online Journal of Applied Knowledge Management最新文献

英文 中文
Applying machine learning and text analysis to identify factors that may predict hypertensive heart disease patient outcomes in home healthcare 应用机器学习和文本分析来识别可能在家庭保健中预测高血压心脏病患者结果的因素
Pub Date : 2022-09-06 DOI: 10.36965/ojakm.2022.10(1)24-42
D. Patrishkoff, S. Bronsburg, Mariah Ali
This research focuses on predicting the patient discharge disposition with initial patient assessment and therapy data as well as determining which therapy intervention text had positive impacts on hypertension heart disease patients in home healthcare environments. Older adults prefer to stay in their home, which is known as aging in place. Home healthcare is the last line of defense before advancing to other expensive healthcare options. This research used aggregate transactional data from 2,181 home healthcare patients in the United States (U.S.) from 2016-2022. We used the Centers for Disease Control and Prevention (CDC) Patient Driven Groupings Model and focused on the cardiac circulatory patient’s subcategory of hypertensive heart disease. Data was analyzed from Activity of Daily Life (ADL) assessment scores, the number of disease diagnosis codes per patient, the number of additional cardiac comorbidities, gender, age, standardized hospitalization risks, number of medications per patient, number of interventions per patient, and the length of stay in home healthcare. Machine learning and advanced text analysis were applied to determine which factors and therapy intervention text had the biggest impact on hypertensive heart disease patient outcomes. This research also identified those interventions with the best Signal to Noise (SN) ratios that are currently being piloted in home healthcare settings.
本研究的重点是通过初步的患者评估和治疗数据来预测患者的出院倾向,并确定哪种治疗干预文本对家庭保健环境下的高血压心脏病患者有积极的影响。老年人更喜欢呆在家里,这被称为原地衰老。家庭医疗保健是向其他昂贵的医疗保健选择前进之前的最后一道防线。本研究使用了2016-2022年美国2181名家庭医疗保健患者的总交易数据。我们使用疾病控制和预防中心(CDC)患者驱动分组模型,并专注于心脏循环患者的高血压心脏病亚类别。数据分析来自日常生活活动(ADL)评估得分、每位患者的疾病诊断代码数量、额外的心脏合并症数量、性别、年龄、标准化住院风险、每位患者的药物数量、每位患者的干预措施数量以及家庭保健的住院时间。应用机器学习和高级文本分析来确定哪些因素和治疗干预文本对高血压心脏病患者的预后影响最大。本研究还确定了目前正在家庭保健环境中试点的具有最佳信噪比(SN)的干预措施。
{"title":"Applying machine learning and text analysis to identify factors that may predict hypertensive heart disease patient outcomes in home healthcare","authors":"D. Patrishkoff, S. Bronsburg, Mariah Ali","doi":"10.36965/ojakm.2022.10(1)24-42","DOIUrl":"https://doi.org/10.36965/ojakm.2022.10(1)24-42","url":null,"abstract":"This research focuses on predicting the patient discharge disposition with initial patient assessment and therapy data as well as determining which therapy intervention text had positive impacts on hypertension heart disease patients in home healthcare environments. Older adults prefer to stay in their home, which is known as aging in place. Home healthcare is the last line of defense before advancing to other expensive healthcare options. This research used aggregate transactional data from 2,181 home healthcare patients in the United States (U.S.) from 2016-2022. We used the Centers for Disease Control and Prevention (CDC) Patient Driven Groupings Model and focused on the cardiac circulatory patient’s subcategory of hypertensive heart disease. Data was analyzed from Activity of Daily Life (ADL) assessment scores, the number of disease diagnosis codes per patient, the number of additional cardiac comorbidities, gender, age, standardized hospitalization risks, number of medications per patient, number of interventions per patient, and the length of stay in home healthcare. Machine learning and advanced text analysis were applied to determine which factors and therapy intervention text had the biggest impact on hypertensive heart disease patient outcomes. This research also identified those interventions with the best Signal to Noise (SN) ratios that are currently being piloted in home healthcare settings.","PeriodicalId":325473,"journal":{"name":"Online Journal of Applied Knowledge Management","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128130219","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cybersecurity capacity building of human capital: Nations supporting nations 人力资本的网络安全能力建设:国家支持国家
Pub Date : 2021-12-26 DOI: 10.36965/ojakm.2021.9(2)65-85
Mical Michelle Ramim, Angel Hueca
Capacity building of human capital can be described as the experience, knowledge, skill sets, and intangible assets that add economic value to individuals and the organizations they work for. With the ever-growing gap in cybersecurity skill sets, it is essential to have a shared understanding of the necessary current skills and what those skills represent in the form of human capital to not only individuals, but also the organizations they work for. As nations around the world are struggling with the increased dependencies on Information Systems (IS) and the massive cybersecurity incidents resulting from adversaries, it is evident that cybersecurity human capital is the key in overcoming such challenges. With that said, while major players fighting cyber adversaries such as the United States (U.S.) and other western nations are struggling with their own significant cybersecurity human capital shortage, less developed nations are even further challenged. For example, African nations continue to acquire and implement ISs, the pace in which these technologies are adopted outnumbers the rate at which the skills to protect these technologies are captured. In this study we introduce the concept of cybersecurity human capital at the national level in the African region, as well as specific steps necessary to develop and embed current cybersecurity skills in cybersecurity human capital. We discuss the challenges faced by Sub-Saharan African nations in the journey to develop their cybersecurity human capital at the national level. An overview of the programs developed by the U.S. Department of State’s Office of the Coordinator for Cyber Issues is provided across three case studies.
人力资本的能力建设可以被描述为为个人和他们工作的组织增加经济价值的经验、知识、技能和无形资产。随着网络安全技能的差距越来越大,对当前必要的技能以及这些技能对个人和组织的人力资本形式有共同的理解是至关重要的。随着世界各国对信息系统(IS)的依赖日益增加,以及对手造成的大规模网络安全事件,网络安全人力资本显然是克服这些挑战的关键。话虽如此,尽管美国和其他西方国家等主要网络对手正在努力解决自身严重的网络安全人力资本短缺问题,但欠发达国家面临的挑战甚至更大。例如,非洲国家继续获取和实施国际空间站,采用这些技术的速度超过了获取保护这些技术的技能的速度。在本研究中,我们在非洲地区的国家层面介绍了网络安全人力资本的概念,以及在网络安全人力资本中发展和嵌入当前网络安全技能所需的具体步骤。我们将讨论撒哈拉以南非洲国家在国家层面发展网络安全人力资本的过程中面临的挑战。通过三个案例研究,概述了由美国国务院网络问题协调员办公室开发的项目。
{"title":"Cybersecurity capacity building of human capital: Nations supporting nations","authors":"Mical Michelle Ramim, Angel Hueca","doi":"10.36965/ojakm.2021.9(2)65-85","DOIUrl":"https://doi.org/10.36965/ojakm.2021.9(2)65-85","url":null,"abstract":"Capacity building of human capital can be described as the experience, knowledge, skill sets, and intangible assets that add economic value to individuals and the organizations they work for. With the ever-growing gap in cybersecurity skill sets, it is essential to have a shared understanding of the necessary current skills and what those skills represent in the form of human capital to not only individuals, but also the organizations they work for. As nations around the world are struggling with the increased dependencies on Information Systems (IS) and the massive cybersecurity incidents resulting from adversaries, it is evident that cybersecurity human capital is the key in overcoming such challenges. With that said, while major players fighting cyber adversaries such as the United States (U.S.) and other western nations are struggling with their own significant cybersecurity human capital shortage, less developed nations are even further challenged. For example, African nations continue to acquire and implement ISs, the pace in which these technologies are adopted outnumbers the rate at which the skills to protect these technologies are captured. In this study we introduce the concept of cybersecurity human capital at the national level in the African region, as well as specific steps necessary to develop and embed current cybersecurity skills in cybersecurity human capital. We discuss the challenges faced by Sub-Saharan African nations in the journey to develop their cybersecurity human capital at the national level. An overview of the programs developed by the U.S. Department of State’s Office of the Coordinator for Cyber Issues is provided across three case studies.","PeriodicalId":325473,"journal":{"name":"Online Journal of Applied Knowledge Management","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134379719","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Development of an integrated knowledge management and quality management model for small and medium sized companies in Trinidad and Tobago 为特立尼达和多巴哥中小型公司制定综合知识管理和质量管理模式
Pub Date : 2021-12-22 DOI: 10.36965/ojakm.2021.9(2)28-45
Sandra Bissoon-Maharaj, R. Maharaj
There appears to exist limited research regarding the integration of Knowledge Management (KM) and International Organization for Standardization (ISO)’s ISO9001 Quality Management Systems (QMS) for Small and Medium Sized Enterprises (SMEs), for Trinidad and Tobago (TT) and the Caribbean Region. TT has over 16,000 SMEs and approximately 10,000 micro enterprises, representing over 70% of all registered businesses, that employs over 50% of the workforce. SMEs spark competition, create jobs, as well as promote innovation and knowledge transfer, thus are the engine of economic growth. SMEs in TT need to develop KM practices to compete regionally and globally, especially with the advent of the COVID-19 pandemic, which has triggered the deepest economic recession worldwide. Existing integrated KM models in other jurisdictions cannot be adopted in TT as KM is a culturally sensitive platform that needs to be customized to its applied environment. Results of a survey identified the Critical Success Factors (CSFs) for both Quality Management (QM) and KM required for the successful implementation of a Knowledge Management System (KMS). Data obtained showed that although the SMEs in TT demonstrated insignificant KM maturity, there is KM readiness, due to the existence of QMSs, significant information systems, human resource support, technical infrastructure, and senior management commitment. A five phase KM/QM integration model for SMEs in TT is proposed. Managers of SMEs and other similar operations may apply the findings of this study to develop strategies to integrate QM and KM to improve business results.
关于特立尼达和多巴哥(TT)及加勒比地区中小型企业的知识管理(KM)和国际标准化组织(ISO)的ISO9001质量管理体系(QMS)的整合的研究似乎有限。TT拥有16,000多家中小企业和约10,000家微型企业,占所有注册企业的70%以上,雇用了50%以上的劳动力。中小企业激发竞争、创造就业、促进创新和知识转移,是经济增长的引擎。TT行业的中小企业需要发展知识管理实践,以在区域和全球范围内竞争,特别是在2019冠状病毒病大流行的到来之际,这场大流行引发了全球最严重的经济衰退。由于知识管理是一个文化敏感的平台,需要根据其应用环境进行定制,因此其他司法管辖区现有的综合知识管理模式无法在TT中采用。一项调查的结果确定了成功实施知识管理系统(KMS)所需的质量管理(QM)和知识管理(KM)的关键成功因素(csf)。获得的数据显示,尽管TT地区的中小企业表现出不显著的知识管理成熟度,但由于存在质量管理体系、重要的信息系统、人力资源支持、技术基础设施和高级管理层的承诺,它们存在知识管理就绪度。提出了一种面向TT中小企业的五阶段KM/QM集成模型。中小企业和其他类似业务的管理者可以应用本研究的结果来制定整合质量管理和知识管理的战略,以改善业务结果。
{"title":"Development of an integrated knowledge management and quality management model for small and medium sized companies in Trinidad and Tobago","authors":"Sandra Bissoon-Maharaj, R. Maharaj","doi":"10.36965/ojakm.2021.9(2)28-45","DOIUrl":"https://doi.org/10.36965/ojakm.2021.9(2)28-45","url":null,"abstract":"There appears to exist limited research regarding the integration of Knowledge Management (KM) and International Organization for Standardization (ISO)’s ISO9001 Quality Management Systems (QMS) for Small and Medium Sized Enterprises (SMEs), for Trinidad and Tobago (TT) and the Caribbean Region. TT has over 16,000 SMEs and approximately 10,000 micro enterprises, representing over 70% of all registered businesses, that employs over 50% of the workforce. SMEs spark competition, create jobs, as well as promote innovation and knowledge transfer, thus are the engine of economic growth. SMEs in TT need to develop KM practices to compete regionally and globally, especially with the advent of the COVID-19 pandemic, which has triggered the deepest economic recession worldwide. Existing integrated KM models in other jurisdictions cannot be adopted in TT as KM is a culturally sensitive platform that needs to be customized to its applied environment. Results of a survey identified the Critical Success Factors (CSFs) for both Quality Management (QM) and KM required for the successful implementation of a Knowledge Management System (KMS). Data obtained showed that although the SMEs in TT demonstrated insignificant KM maturity, there is KM readiness, due to the existence of QMSs, significant information systems, human resource support, technical infrastructure, and senior management commitment. A five phase KM/QM integration model for SMEs in TT is proposed. Managers of SMEs and other similar operations may apply the findings of this study to develop strategies to integrate QM and KM to improve business results.","PeriodicalId":325473,"journal":{"name":"Online Journal of Applied Knowledge Management","volume":"7 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133411627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The critical factors for cloud computing adoption during SARS-CoV-2 pandemic 新冠肺炎大流行期间采用云计算的关键因素
Pub Date : 2021-12-22 DOI: 10.36965/ojakm.2021.9(2)46-64
Rodolfo Vareschi, W. Picoto
Due to the rapid global spread of the pandemic caused by the new coronavirus, companies and institutions adopted precautionary measures to reduce the risk of contagion, such as asking employees to work remotely from their homes. In this scenario, cloud computing technology has proven to be a great ally of companies to overcome the crisis caused by the pandemic as it provides the necessary infrastructure to access the organizational systems and resources from anyplace, anywhere, and anytime. Although current research identifies important factors for cloud computing adoption, none has yet analyzed whether those are the same given the crisis cause by the pandemic. For this purpose, 18 factors were identified and presented to experts in cloud computing technology, to seek a consensus regarding the order of importance of these factors. Using the Delphi method conducted with two rounds of questions, an ordered list according to the degree of importance of the main factors that influence the adoption of cloud computing was obtained. According to the results, the six most important factors are: (1) adoption, migration, and acquisition cost; (2) availability and accessibility; (3) scalability; (4) cost of data confidentiality and availability loss; (5) security, and (6) customization.
由于新型冠状病毒引起的大流行在全球迅速蔓延,公司和机构采取了预防措施,例如要求员工在家远程工作,以降低传染风险。在这种情况下,云计算技术已被证明是企业克服大流行造成的危机的重要盟友,因为它提供了从任何地方、任何地方、任何时间访问组织系统和资源的必要基础设施。虽然目前的研究确定了云计算采用的重要因素,但尚未有研究分析考虑到疫情造成的危机,这些因素是否相同。为此,确定了18个因素并将其提交给云计算技术专家,以就这些因素的重要性顺序寻求共识。采用两轮问题德尔菲法,根据影响云计算采用的主要因素的重要程度,得到了一个有序列表。根据结果,六个最重要的因素是:(1)采用、迁移和获取成本;(2)可获得性和可及性;(3)可伸缩性;(4)数据保密性和可用性损失成本;(5)安全性,(6)定制化。
{"title":"The critical factors for cloud computing adoption during SARS-CoV-2 pandemic","authors":"Rodolfo Vareschi, W. Picoto","doi":"10.36965/ojakm.2021.9(2)46-64","DOIUrl":"https://doi.org/10.36965/ojakm.2021.9(2)46-64","url":null,"abstract":"Due to the rapid global spread of the pandemic caused by the new coronavirus, companies and institutions adopted precautionary measures to reduce the risk of contagion, such as asking employees to work remotely from their homes. In this scenario, cloud computing technology has proven to be a great ally of companies to overcome the crisis caused by the pandemic as it provides the necessary infrastructure to access the organizational systems and resources from anyplace, anywhere, and anytime. Although current research identifies important factors for cloud computing adoption, none has yet analyzed whether those are the same given the crisis cause by the pandemic. For this purpose, 18 factors were identified and presented to experts in cloud computing technology, to seek a consensus regarding the order of importance of these factors. Using the Delphi method conducted with two rounds of questions, an ordered list according to the degree of importance of the main factors that influence the adoption of cloud computing was obtained. According to the results, the six most important factors are: (1) adoption, migration, and acquisition cost; (2) availability and accessibility; (3) scalability; (4) cost of data confidentiality and availability loss; (5) security, and (6) customization.","PeriodicalId":325473,"journal":{"name":"Online Journal of Applied Knowledge Management","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131532603","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Net generation in times of pandemic: Customers’ technology savviness and social media communication impact on customer-based brand equity 大流行时代的网络一代:客户的技术知识和社交媒体传播对基于客户的品牌资产的影响
Pub Date : 2021-12-20 DOI: 10.36965/ojakm.2021.9(2)1-27
Joanna Krywalski Santiago, Miguel Pimenta
This paper follows the recent areas of interest trucked by Google Trends to investigate the importance of the customers’ technological savviness and firm’s social media communication at creation of brand equity. A special attention is paid at the so called ‘Net generation’ and its behavior during COVID-19 pandemic. The data was collected through an online survey distributed in Portugal with the assistance of Qualtrics online survey platform and counted with respondents that had a prior experience in following or engaging with brands on social media. To understand the relationships between Customer Technology Savviness (CTS), firm’s Social Media Communication (SMC) and Customer-Based Brand Equity (CBBE), this study applies the Partial Last Squares method of Structural Equation Modeling (PLS-SEM). The results of the multigroup analysis show that customers who used social media more heavily during pandemic denoted a stronger relationship between CTS and CBBE, CTS and SMC and between SMC and CBBE, of which the last was not confirmed in case of customers who made less use of social media since the outbreak of COVID-19 pandemic.
本文遵循谷歌趋势最近的兴趣领域,调查客户的技术知识和公司的社交媒体沟通在创建品牌资产中的重要性。特别关注所谓的“网络一代”及其在COVID-19大流行期间的行为。这些数据是在Qualtrics在线调查平台的协助下,通过在葡萄牙分发的在线调查收集的,并与之前在社交媒体上关注或参与品牌的受访者进行统计。为了了解客户技术精明度(CTS)、企业的社交媒体传播(SMC)和基于客户的品牌资产(CBBE)之间的关系,本研究采用结构方程建模(PLS-SEM)的偏最后平方方法。多组分析结果显示,大流行期间更频繁使用社交媒体的客户表示CTS与CBBE, CTS与SMC以及SMC与CBBE之间的关系更强,而对于自COVID-19大流行以来较少使用社交媒体的客户,后者并未得到证实。
{"title":"The Net generation in times of pandemic: Customers’ technology savviness and social media communication impact on customer-based brand equity","authors":"Joanna Krywalski Santiago, Miguel Pimenta","doi":"10.36965/ojakm.2021.9(2)1-27","DOIUrl":"https://doi.org/10.36965/ojakm.2021.9(2)1-27","url":null,"abstract":"This paper follows the recent areas of interest trucked by Google Trends to investigate the importance of the customers’ technological savviness and firm’s social media communication at creation of brand equity. A special attention is paid at the so called ‘Net generation’ and its behavior during COVID-19 pandemic. The data was collected through an online survey distributed in Portugal with the assistance of Qualtrics online survey platform and counted with respondents that had a prior experience in following or engaging with brands on social media. To understand the relationships between Customer Technology Savviness (CTS), firm’s Social Media Communication (SMC) and Customer-Based Brand Equity (CBBE), this study applies the Partial Last Squares method of Structural Equation Modeling (PLS-SEM). The results of the multigroup analysis show that customers who used social media more heavily during pandemic denoted a stronger relationship between CTS and CBBE, CTS and SMC and between SMC and CBBE, of which the last was not confirmed in case of customers who made less use of social media since the outbreak of COVID-19 pandemic.","PeriodicalId":325473,"journal":{"name":"Online Journal of Applied Knowledge Management","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125908073","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Effects of employee monitoring notification policies on HR manager opinions 员工监控通知政策对人力资源经理意见的影响
Pub Date : 2021-11-23 DOI: 10.36965/ojakm.2021.9(1)62-81
G. Kaupins
As a variety of electronic monitoring methods such as global positioning systems are available, monitoring employees without notice is a consideration even though several laws ban it and ethical questions remain. Monitoring without notice has risks that Human Resources (HR) managers should consider when they set monitoring policies to enhance knowledge management. A total of 174 HR managers were asked about their top reasons to electronically monitor employees with or without notice. About half received information that a company did not notify employees of electronic monitoring and the other half received the opposite information. Prospect theory was the basis for collecting data to understand the importance of risk in setting policies. It states that people in perceived good conditions avoid risk because they feel there is more to lose than to gain. The leading reason to electronically monitor employees for both groups was computer virus and malware protection. Organizational threats associated with legal issues showed more HR support for monitoring without notice. Opportunities associated with employee productivity indicated relatively more support for monitoring with notice. As a result of this research, perceived threats in the workplace are significant reasons why HR managers might not provide notice of monitoring in the workplace. This has potential legal and ethical implications.
随着全球定位系统等多种电子监控手段的出现,在没有通知的情况下监控员工是一种考虑,尽管一些法律禁止这样做,但仍然存在道德问题。没有通知的监控存在风险,人力资源(HR)管理者在制定监控策略以加强知识管理时应该考虑到这一点。共有174名人力资源经理被问及他们在事先或不事先通知的情况下对员工进行电子监控的主要原因。大约一半的人收到了公司没有通知员工电子监控的信息,另一半则收到了相反的信息。前景理论是收集数据以理解风险在制定政策中的重要性的基础。它指出,处于良好状态的人会避免风险,因为他们觉得失去的比得到的要多。对这两组员工进行电子监控的主要原因是计算机病毒和恶意软件防护。与法律问题相关的组织威胁显示,人力资源部门更支持在不通知的情况下进行监控。与员工生产力相关的机会表明,对通知式监控的支持相对较多。这项研究的结果是,工作场所的感知威胁是人力资源经理可能不提供工作场所监控通知的重要原因。这有潜在的法律和伦理问题。
{"title":"Effects of employee monitoring notification policies on HR manager opinions","authors":"G. Kaupins","doi":"10.36965/ojakm.2021.9(1)62-81","DOIUrl":"https://doi.org/10.36965/ojakm.2021.9(1)62-81","url":null,"abstract":"As a variety of electronic monitoring methods such as global positioning systems are available, monitoring employees without notice is a consideration even though several laws ban it and ethical questions remain. Monitoring without notice has risks that Human Resources (HR) managers should consider when they set monitoring policies to enhance knowledge management. A total of 174 HR managers were asked about their top reasons to electronically monitor employees with or without notice. About half received information that a company did not notify employees of electronic monitoring and the other half received the opposite information. Prospect theory was the basis for collecting data to understand the importance of risk in setting policies. It states that people in perceived good conditions avoid risk because they feel there is more to lose than to gain. The leading reason to electronically monitor employees for both groups was computer virus and malware protection. Organizational threats associated with legal issues showed more HR support for monitoring without notice. Opportunities associated with employee productivity indicated relatively more support for monitoring with notice. As a result of this research, perceived threats in the workplace are significant reasons why HR managers might not provide notice of monitoring in the workplace. This has potential legal and ethical implications.","PeriodicalId":325473,"journal":{"name":"Online Journal of Applied Knowledge Management","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134461697","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Artificial intelligence for last-mile logistics - Procedures and architecture 最后一英里物流的人工智能。程序和架构
Pub Date : 2021-11-23 DOI: 10.36965/ojakm.2021.9(1)46-61
André Rosendorff, A. Hodes, Benjamin Fabian
Artificial Intelligence (AI) is becoming increasingly important in many industries due to its diverse areas of application and potential. In logistics in particular, increasing customer demands and the growth in shipment volumes are leading to difficulties in forecasting delivery times, especially for the last mile. This paper explores the potential of using AI to improve delivery forecasting. For this purpose, a structured theoretical solution approach and a method for improving delivery forecasting using AI are presented. In doing so, the important phases of the Cross-Industry Standard Process for Data Mining (CRISP-DM) framework, a standard process for data mining, are adopted and discussed in detail to illustrate the complexity and importance of each task such as data preparation or evaluation. Subsequently, by embedding the described solution into an overall system architecture for information systems, ideas for the integration of the solution into the complexity of real information systems for logistics are given.
人工智能(AI)由于其广泛的应用领域和潜力,在许多行业中变得越来越重要。特别是在物流方面,客户需求的增加和出货量的增长导致预测交货时间的困难,特别是最后一英里。本文探讨了使用人工智能改进交付预测的潜力。为此,提出了一种结构化的理论解决方法和一种利用人工智能改进交付预测的方法。在此过程中,采用了数据挖掘跨行业标准过程(CRISP-DM)框架(数据挖掘的标准过程)的重要阶段,并对其进行了详细讨论,以说明数据准备或评估等每个任务的复杂性和重要性。随后,通过将所描述的解决方案嵌入到信息系统的整体系统架构中,给出了将解决方案集成到实际物流信息系统复杂性中的思路。
{"title":"Artificial intelligence for last-mile logistics - Procedures and architecture","authors":"André Rosendorff, A. Hodes, Benjamin Fabian","doi":"10.36965/ojakm.2021.9(1)46-61","DOIUrl":"https://doi.org/10.36965/ojakm.2021.9(1)46-61","url":null,"abstract":"Artificial Intelligence (AI) is becoming increasingly important in many industries due to its diverse areas of application and potential. In logistics in particular, increasing customer demands and the growth in shipment volumes are leading to difficulties in forecasting delivery times, especially for the last mile. This paper explores the potential of using AI to improve delivery forecasting. For this purpose, a structured theoretical solution approach and a method for improving delivery forecasting using AI are presented. In doing so, the important phases of the Cross-Industry Standard Process for Data Mining (CRISP-DM) framework, a standard process for data mining, are adopted and discussed in detail to illustrate the complexity and importance of each task such as data preparation or evaluation. Subsequently, by embedding the described solution into an overall system architecture for information systems, ideas for the integration of the solution into the complexity of real information systems for logistics are given.","PeriodicalId":325473,"journal":{"name":"Online Journal of Applied Knowledge Management","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125422762","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A novel taxonomy of organizational learning contextual factors: Review of 2004–2020 top-ranked journals 组织学习情境因素的新分类:2004-2020年排名最高的期刊综述
Pub Date : 2021-08-26 DOI: 10.36965/ojakm.2021.9(1)16-30
S. Scipioni
As a dynamic phenomenon that interacts across different levels – individual, group, organizational, interorganizational – the development of a unique multilevel theory of Organizational Learning (OL) is absent and challenging. The intent of this paper is to contribute to the advancement of such a theory. In this context, a systematic review of the 2004-2020 literature was carried out, with analysis of 120 papers selected from management and organization science top-ranked journals. Based on the conceptualization of OL as multiple processes of knowledge creation, transfer, and retention, the reviewed papers highlight that internal and external environments, organizational culture, strategy, structure, leadership, technology, and shared environments need to be considered for a comprehensive understanding of vertical trickle-down OL processes, and of bottom-up emerging OL processes, in both single and multi-level OL analyses. This study contributes to the theory of OL with the presentation of a novel taxonomy of contextual factors that could help researchers in the development of comprehensive OL studies. The implications offered should support the definition of a multilevel theory for OL that embraces all the relevant factors that influence its processes across the different organizational levels. The review closes with specific recommendations for further studies in OL.
组织学习作为一种动态现象,在个体、群体、组织和组织间的不同层次上相互作用,其独特的多层次组织学习理论的发展缺乏且具有挑战性。本文的目的是促进这一理论的发展。在此背景下,对2004-2020年的文献进行了系统回顾,分析了从管理和组织科学排名最高的期刊中选择的120篇论文。基于对知识创造、转移和保留的多重过程的概念,综述论文强调,在单一和多层次的知识分析中,需要考虑内部和外部环境、组织文化、战略、结构、领导、技术和共享环境,以全面理解垂直滴入式的知识学习过程和自下而上的新兴知识学习过程。本研究提出了一种新的背景因素分类方法,有助于研究人员开展全面的OL研究,从而有助于OL理论的发展。所提供的含义应支持定义一种包含影响其跨不同组织层次的过程的所有相关因素的OL多层理论。该综述最后提出了进一步研究OL的具体建议。
{"title":"A novel taxonomy of organizational learning contextual factors: Review of 2004–2020 top-ranked journals","authors":"S. Scipioni","doi":"10.36965/ojakm.2021.9(1)16-30","DOIUrl":"https://doi.org/10.36965/ojakm.2021.9(1)16-30","url":null,"abstract":"As a dynamic phenomenon that interacts across different levels – individual, group, organizational, interorganizational – the development of a unique multilevel theory of Organizational Learning (OL) is absent and challenging. The intent of this paper is to contribute to the advancement of such a theory. In this context, a systematic review of the 2004-2020 literature was carried out, with analysis of 120 papers selected from management and organization science top-ranked journals. Based on the conceptualization of OL as multiple processes of knowledge creation, transfer, and retention, the reviewed papers highlight that internal and external environments, organizational culture, strategy, structure, leadership, technology, and shared environments need to be considered for a comprehensive understanding of vertical trickle-down OL processes, and of bottom-up emerging OL processes, in both single and multi-level OL analyses. This study contributes to the theory of OL with the presentation of a novel taxonomy of contextual factors that could help researchers in the development of comprehensive OL studies. The implications offered should support the definition of a multilevel theory for OL that embraces all the relevant factors that influence its processes across the different organizational levels. The review closes with specific recommendations for further studies in OL.","PeriodicalId":325473,"journal":{"name":"Online Journal of Applied Knowledge Management","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131296082","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An examination of historic data breach incidents: What cybersecurity big data visualization and analytics can tell us? 回顾历史数据泄露事件:网络安全大数据可视化和分析能告诉我们什么?
Pub Date : 2021-07-26 DOI: 10.36965/ojakm.2021.9(1)31-45
Emily Africk, Y. Levy
Data breach incidents are reported in the media to be on the rise with continuously increasing numbers. Additionally, data breaches serve a major negative impact to organizations. This study focuses on combining experience in data analytics, visualization, and quantitative analysis for business intelligence in the context of cybersecurity big-data over a period of 15-years. A large data set containing 9,015 data breaches was provided via the Privacy Rights Clearinghouse data breach database from the start of 2005 to the end of 2019. The aim of this work was to slice the data as well as represent it into a business-related visualization using time-series analysis that can help executives understand complex cybersecurity breaches, their impact, and their trend over time. We have created visualization figures along with explanations of what each visualization means in the context of cyber-attacks over time. This project was set to serve as a breakdown of the important findings from the Privacy Rights Clearinghouse data breach database of over 15-years. These findings are communicated through both key numbers and quantitative analyses for business intelligence. While our project does not cover every aspect of the dataset (due to its significant size), it serves more as a focus on one particular part of the data: incident types and their volume over the 15-year timeframe to help business executives visualize cybersecurity trends. This paper ends with a conclusion and discussion on how such cybersecurity visualizations can help industries along with future research needed.
媒体报道的数据泄露事件呈上升趋势,数量不断增加。此外,数据泄露会对组织产生重大的负面影响。本研究的重点是结合15年来网络安全大数据背景下商业智能的数据分析、可视化和定量分析经验。从2005年初到2019年底,Privacy Rights Clearinghouse数据泄露数据库提供了一个包含9015个数据泄露的大型数据集。这项工作的目的是对数据进行切片,并使用时间序列分析将其表示为与业务相关的可视化,这可以帮助高管了解复杂的网络安全漏洞、它们的影响以及它们随时间的趋势。随着时间的推移,我们创建了可视化图形,并解释了每种可视化在网络攻击背景下的含义。本项目旨在对隐私权信息交换所数据泄露数据库中超过15年的重要发现进行分类。这些发现通过关键数字和商业智能的定量分析来传达。虽然我们的项目没有涵盖数据集的每个方面(由于其规模很大),但它更多地关注数据的一个特定部分:事件类型及其在15年时间框架内的数量,以帮助企业高管可视化网络安全趋势。本文最后总结并讨论了网络安全可视化如何帮助各行业以及未来所需的研究。
{"title":"An examination of historic data breach incidents: What cybersecurity big data visualization and analytics can tell us?","authors":"Emily Africk, Y. Levy","doi":"10.36965/ojakm.2021.9(1)31-45","DOIUrl":"https://doi.org/10.36965/ojakm.2021.9(1)31-45","url":null,"abstract":"Data breach incidents are reported in the media to be on the rise with continuously increasing numbers. Additionally, data breaches serve a major negative impact to organizations. This study focuses on combining experience in data analytics, visualization, and quantitative analysis for business intelligence in the context of cybersecurity big-data over a period of 15-years. A large data set containing 9,015 data breaches was provided via the Privacy Rights Clearinghouse data breach database from the start of 2005 to the end of 2019. The aim of this work was to slice the data as well as represent it into a business-related visualization using time-series analysis that can help executives understand complex cybersecurity breaches, their impact, and their trend over time. We have created visualization figures along with explanations of what each visualization means in the context of cyber-attacks over time. This project was set to serve as a breakdown of the important findings from the Privacy Rights Clearinghouse data breach database of over 15-years. These findings are communicated through both key numbers and quantitative analyses for business intelligence. While our project does not cover every aspect of the dataset (due to its significant size), it serves more as a focus on one particular part of the data: incident types and their volume over the 15-year timeframe to help business executives visualize cybersecurity trends. This paper ends with a conclusion and discussion on how such cybersecurity visualizations can help industries along with future research needed.","PeriodicalId":325473,"journal":{"name":"Online Journal of Applied Knowledge Management","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115357720","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A cross-language study of speech recognition systems for English, German, and Hebrew 英语、德语和希伯来语语音识别系统的跨语言研究
Pub Date : 2021-07-26 DOI: 10.36965/ojakm.2021.9(1)1-15
Vered Silber Varod, Ingo Siegert, O. Jokisch, Yamini Sinha, N. Geri
Despite the growing importance of Automatic Speech Recognition (ASR), its application is still challenging, limited, language-dependent, and requires considerable resources. The resources required for ASR are not only technical, they also need to reflect technological trends and cultural diversity. The purpose of this research is to explore ASR performance gaps by a comparative study of American English, German, and Hebrew. Apart from different languages, we also investigate different speaking styles – utterances from spontaneous dialogues and utterances from frontal lectures (TED-like genre). The analysis includes a comparison of the performance of four ASR engines (Google Cloud, Google Search, IBM Watson, and WIT.ai) using four commonly used metrics: Word Error Rate (WER); Character Error Rate (CER); Word Information Lost (WIL); and Match Error Rate (MER). As expected, findings suggest that English ASR systems provide the best results. Contrary to our hypothesis regarding ASR’s low performance for under-resourced languages, we found that the Hebrew and German ASR systems have similar performance. Overall, our findings suggest that ASR performance is language-dependent and system-dependent. Furthermore, ASR may be genre-sensitive, as our results showed for German. This research contributes a valuable insight for improving ubiquitous global consumption and management of knowledge and calls for corporate social responsibility of commercial companies, to develop ASR under Fair, Reasonable, and Non-Discriminatory (FRAND) terms
尽管自动语音识别(ASR)越来越重要,但其应用仍然具有挑战性,局限性,语言依赖性,并且需要大量资源。ASR所需的资源不仅是技术资源,还需要反映技术趋势和文化多样性。本研究的目的是通过对美国英语、德语和希伯来语的比较研究来探讨ASR的表现差距。除了不同的语言,我们还研究了不同的说话风格——来自自发对话的话语和来自正面演讲的话语(类似ted的类型)。该分析包括使用四个常用指标对四个自动语音识别引擎(Google Cloud, Google Search, IBM Watson和WIT.ai)的性能进行比较:单词错误率(WER);字符错误率;单词信息丢失;和匹配错误率(MER)。正如预期的那样,研究结果表明英语ASR系统提供了最好的结果。与我们关于资源不足语言的ASR低性能的假设相反,我们发现希伯来语和德语ASR系统具有相似的性能。总的来说,我们的研究结果表明,ASR的表现依赖于语言和系统。此外,ASR可能是体裁敏感的,正如我们对德语的研究结果所显示的那样。本研究为改善全球无处不在的知识消费和管理提供了有价值的见解,并呼吁商业公司履行企业社会责任,在公平、合理和非歧视(FRAND)的条件下发展ASR
{"title":"A cross-language study of speech recognition systems for English, German, and Hebrew","authors":"Vered Silber Varod, Ingo Siegert, O. Jokisch, Yamini Sinha, N. Geri","doi":"10.36965/ojakm.2021.9(1)1-15","DOIUrl":"https://doi.org/10.36965/ojakm.2021.9(1)1-15","url":null,"abstract":"Despite the growing importance of Automatic Speech Recognition (ASR), its application is still challenging, limited, language-dependent, and requires considerable resources. The resources required for ASR are not only technical, they also need to reflect technological trends and cultural diversity. The purpose of this research is to explore ASR performance gaps by a comparative study of American English, German, and Hebrew. Apart from different languages, we also investigate different speaking styles – utterances from spontaneous dialogues and utterances from frontal lectures (TED-like genre). The analysis includes a comparison of the performance of four ASR engines (Google Cloud, Google Search, IBM Watson, and WIT.ai) using four commonly used metrics: Word Error Rate (WER); Character Error Rate (CER); Word Information Lost (WIL); and Match Error Rate (MER). As expected, findings suggest that English ASR systems provide the best results. Contrary to our hypothesis regarding ASR’s low performance for under-resourced languages, we found that the Hebrew and German ASR systems have similar performance. Overall, our findings suggest that ASR performance is language-dependent and system-dependent. Furthermore, ASR may be genre-sensitive, as our results showed for German. This research contributes a valuable insight for improving ubiquitous global consumption and management of knowledge and calls for corporate social responsibility of commercial companies, to develop ASR under Fair, Reasonable, and Non-Discriminatory (FRAND) terms","PeriodicalId":325473,"journal":{"name":"Online Journal of Applied Knowledge Management","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125040039","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
Online Journal of Applied Knowledge Management
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1