首页 > 最新文献

Online Journal of Applied Knowledge Management最新文献

英文 中文
A measurable approach for risk justification of explicit and tacit knowledge assessment 明确和隐性知识评估的风险证明的可测量方法
Pub Date : 2019-06-10 DOI: 10.36965/OJAKM.2019.7(1)67-85
Boštjan Delak, Christiaan Maasdorp
Knowledge has become a central organizing principle in society to the extent that knowledge management has become a mainstream activity in organizations. Nevertheless, knowledge-related risks remain relatively neglected in the risk management domain. Whilst knowledge reduces uncertainty and the associated risks, the increased knowledge intensity in organizations also represents a risk factor that has to be assessed. The paper describes and validates an organizational risk assessment approach that considers knowledge-related and knowledge management risks in an integrated manner. The approach makes it possible to calculate risk ratings in terms of vulnerability and likelihood for 50 threats to all activities and phases of the knowledge life cycle. These risk ratings are plotted against 24 potential risks in the human, organizational, and technical domains. To impress on management the significance of these knowledge-related risks, the risk ratings are transformed to approximated financial figures. The approach is applied to 10 Slovenian organizations, two of which are discussed in detail in the paper, to demonstrate that it can be successfully used in a wide variety of organizations. It is concluded that the approach offers a way to assess both knowledge-related and knowledge-management-related risks, that the costs that individual risks potentially hold can be approximated, and that for a diversity of organizations mitigation strategies can be suggested for the identified risks.
知识已成为社会的中心组织原则,知识管理已成为组织的主流活动。然而,与知识相关的风险在风险管理领域仍然相对被忽视。虽然知识减少了不确定性和相关的风险,但组织中增加的知识强度也代表了必须评估的风险因素。本文描述并验证了一种综合考虑知识相关风险和知识管理风险的组织风险评估方法。该方法可以根据所有活动和知识生命周期阶段的50种威胁的脆弱性和可能性来计算风险等级。这些风险等级是针对人员、组织和技术领域中的24个潜在风险绘制的。为了使管理层深刻认识到这些知识相关风险的重要性,风险评级被转换为近似的财务数字。该方法适用于10个斯洛文尼亚组织,其中两个在本文中进行了详细讨论,以证明它可以成功地用于各种组织。结论是,该方法提供了一种评估与知识相关和与知识管理相关风险的方法,可以近似估算单个风险可能带来的成本,并且可以为各种组织提出针对已确定风险的缓解战略建议。
{"title":"A measurable approach for risk justification of explicit and tacit knowledge assessment","authors":"Boštjan Delak, Christiaan Maasdorp","doi":"10.36965/OJAKM.2019.7(1)67-85","DOIUrl":"https://doi.org/10.36965/OJAKM.2019.7(1)67-85","url":null,"abstract":"Knowledge has become a central organizing principle in society to the extent that knowledge management has become a mainstream activity in organizations. Nevertheless, knowledge-related risks remain relatively neglected in the risk management domain. Whilst knowledge reduces uncertainty and the associated risks, the increased knowledge intensity in organizations also represents a risk factor that has to be assessed. The paper describes and validates an organizational risk assessment approach that considers knowledge-related and knowledge management risks in an integrated manner. The approach makes it possible to calculate risk ratings in terms of vulnerability and likelihood for 50 threats to all activities and phases of the knowledge life cycle. These risk ratings are plotted against 24 potential risks in the human, organizational, and technical domains. To impress on management the significance of these knowledge-related risks, the risk ratings are transformed to approximated financial figures. The approach is applied to 10 Slovenian organizations, two of which are discussed in detail in the paper, to demonstrate that it can be successfully used in a wide variety of organizations. It is concluded that the approach offers a way to assess both knowledge-related and knowledge-management-related risks, that the costs that individual risks potentially hold can be approximated, and that for a diversity of organizations mitigation strategies can be suggested for the identified risks.","PeriodicalId":325473,"journal":{"name":"Online Journal of Applied Knowledge Management","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125335640","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blockchain and mortgage lending process: A study of people, process, and technology involved 区块链和抵押贷款流程:对涉及的人员、流程和技术的研究
Pub Date : 2019-05-25 DOI: 10.36965/OJAKM.2019.7(1)53-66
Azad Ali, David T. Smith
Blockchain technology is on the rise and considered to be a revolutionary technology. It has been applied to many domains including personal health records, regulatory investigation, and global supply chain. Applications that may potentially benefit from blockchain technology are those, which involve multiple parties across the different organization, each performing a subset of many steps needed to complete a given transaction and involve different technologies. In addition, security and trust is a major concern. Given this, a good candidate for blockchain technology is mortgage lending. The purpose of this paper is to prepare a model that identifies different elements that are needed when applying blockchain technology in the mortgage origination process. This paper uses a popular framework used in customer relationship management (CRM) that combines three constructs: People, Process and Technology to develop the intended model.
区块链技术正在兴起,被认为是一项革命性的技术。它已被应用于许多领域,包括个人健康记录、监管调查和全球供应链。可能从区块链技术中受益的应用程序是那些涉及不同组织中的多方的应用程序,每个人执行完成给定交易所需的许多步骤的子集,并涉及不同的技术。此外,安全和信任也是一个主要问题。鉴于此,区块链技术的一个很好的候选者是抵押贷款。本文的目的是准备一个模型,该模型可以识别在抵押贷款发起过程中应用区块链技术时所需的不同元素。本文使用客户关系管理(CRM)中使用的流行框架,该框架结合了三个结构:人员、流程和技术来开发预期的模型。
{"title":"Blockchain and mortgage lending process: A study of people, process, and technology involved","authors":"Azad Ali, David T. Smith","doi":"10.36965/OJAKM.2019.7(1)53-66","DOIUrl":"https://doi.org/10.36965/OJAKM.2019.7(1)53-66","url":null,"abstract":"Blockchain technology is on the rise and considered to be a revolutionary technology. It has been applied to many domains including personal health records, regulatory investigation, and global supply chain. Applications that may potentially benefit from blockchain technology are those, which involve multiple parties across the different organization, each performing a subset of many steps needed to complete a given transaction and involve different technologies. In addition, security and trust is a major concern. Given this, a good candidate for blockchain technology is mortgage lending. The purpose of this paper is to prepare a model that identifies different elements that are needed when applying blockchain technology in the mortgage origination process. This paper uses a popular framework used in customer relationship management (CRM) that combines three constructs: People, Process and Technology to develop the intended model.","PeriodicalId":325473,"journal":{"name":"Online Journal of Applied Knowledge Management","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126010775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
How workplace satisfaction affects insider threat detection as a vital variable for the mitigation of malicious cyber insiders 工作场所满意度如何影响内部威胁检测作为减轻恶意网络内部人员的重要变量
Pub Date : 2019-05-22 DOI: 10.36965/OJAKM.2019.7(1)40-52
Karla Clarke, Y. Levy, L. Dringus, S. Brown
Insider threat mitigation is a growing challenge within organizations. The development of a novel alert visualization dashboard for the identification of potentially malicious cyber insider threats was identified as necessary to alleviate this challenge. This research developed a cyber insider threat dashboard visualization prototype for detecting potentially malicious cyber insider activities QUICK.v™. This study utilized Subject Matter Experts (SMEs) by applying the Delphi Method to identify the most critical cyber visualization variables and ranking. This paper contains the detailed results of a survey based experimental research study that identified the critical cybersecurity variables also referred to as cybersecurity vital signs. The identified vital signs will aid cybersecurity analysts with triage for potentially malicious insider threats. From a total of 45 analytic variables assessed by 42 cybersecurity SMEs, the top six variables were identified using a comprehensive data collection process. The results indicated that workplace satisfaction is one of the top critical cyber visualization variables that should be measured and visualized to aid cybersecurity analysts in the detection of potentially malicious cyber insider threat activities. The process of the data collection to identify and rank critical cyber visualization variables are described.
缓解内部威胁是组织内部日益严峻的挑战。开发一种新的警报可视化仪表板来识别潜在的恶意网络内部威胁是缓解这一挑战的必要条件。本研究开发了一个网络内部威胁仪表板可视化原型,用于检测潜在的恶意网络内部活动QUICK.v™。本研究利用主题专家(sme)运用德尔菲法来确定最关键的网络可视化变量和排名。本文包含了一项基于调查的实验研究的详细结果,该研究确定了关键网络安全变量,也称为网络安全生命体征。识别出的生命体征将帮助网络安全分析师对潜在的恶意内部威胁进行分类。从42家网络安全中小企业评估的总共45个分析变量中,通过全面的数据收集过程确定了前六个变量。结果表明,工作场所满意度是最重要的网络可视化变量之一,应该进行测量和可视化,以帮助网络安全分析师检测潜在的恶意网络内部威胁活动。描述了数据收集的过程,以识别和排序关键的网络可视化变量。
{"title":"How workplace satisfaction affects insider threat detection as a vital variable for the mitigation of malicious cyber insiders","authors":"Karla Clarke, Y. Levy, L. Dringus, S. Brown","doi":"10.36965/OJAKM.2019.7(1)40-52","DOIUrl":"https://doi.org/10.36965/OJAKM.2019.7(1)40-52","url":null,"abstract":"Insider threat mitigation is a growing challenge within organizations. The development of a novel alert visualization dashboard for the identification of potentially malicious cyber insider threats was identified as necessary to alleviate this challenge. This research developed a cyber insider threat dashboard visualization prototype for detecting potentially malicious cyber insider activities QUICK.v™. This study utilized Subject Matter Experts (SMEs) by applying the Delphi Method to identify the most critical cyber visualization variables and ranking. This paper contains the detailed results of a survey based experimental research study that identified the critical cybersecurity variables also referred to as cybersecurity vital signs. The identified vital signs will aid cybersecurity analysts with triage for potentially malicious insider threats. From a total of 45 analytic variables assessed by 42 cybersecurity SMEs, the top six variables were identified using a comprehensive data collection process. The results indicated that workplace satisfaction is one of the top critical cyber visualization variables that should be measured and visualized to aid cybersecurity analysts in the detection of potentially malicious cyber insider threat activities. The process of the data collection to identify and rank critical cyber visualization variables are described.","PeriodicalId":325473,"journal":{"name":"Online Journal of Applied Knowledge Management","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126035896","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Revisiting automated project management in the digital age – a survey of AI approaches 重新审视数字时代的自动化项目管理——对人工智能方法的调查
Pub Date : 2019-05-21 DOI: 10.36965/OJAKM.2019.7(1)27-39
Gunnar Auth, O. Jokisch, Christian Dürk
In this decade, remarkable progress has been made in the field of artificial intelligence (AI). Inspired by well-known services of cognitive assistance systems such as IBM Watson, Apple's Siri or Google Duplex, AI concepts and algorithms are widely discussed regarding their automation potentials in business, politics and society. At first glance, project management (PM) seems to be less suitable for automation due to the inherent uniqueness of projects by definition. However, AI is also creating new application possibilities in the PM area, which will be explored in this contribution by involving an extensive literature review as well as real-world examples. The objective of this article is to provide a current overview of AI approaches and available tools that can be used for automating tasks in business project management.
在这十年中,人工智能(AI)领域取得了令人瞩目的进展。受IBM沃森、苹果Siri或谷歌Duplex等知名认知辅助系统服务的启发,人工智能概念和算法在商业、政治和社会中的自动化潜力被广泛讨论。乍一看,由于项目定义的固有独特性,项目管理(PM)似乎不太适合自动化。然而,人工智能也在项目管理领域创造了新的应用可能性,这将通过涉及广泛的文献回顾以及现实世界的例子来探讨。本文的目标是提供AI方法和可用工具的当前概述,这些方法和工具可用于业务项目管理中的自动化任务。
{"title":"Revisiting automated project management in the digital age – a survey of AI approaches","authors":"Gunnar Auth, O. Jokisch, Christian Dürk","doi":"10.36965/OJAKM.2019.7(1)27-39","DOIUrl":"https://doi.org/10.36965/OJAKM.2019.7(1)27-39","url":null,"abstract":"In this decade, remarkable progress has been made in the field of artificial intelligence (AI). Inspired by well-known services of cognitive assistance systems such as IBM Watson, Apple's Siri or Google Duplex, AI concepts and algorithms are widely discussed regarding their automation potentials in business, politics and society. At first glance, project management (PM) seems to be less suitable for automation due to the inherent uniqueness of projects by definition. However, AI is also creating new application possibilities in the PM area, which will be explored in this contribution by involving an extensive literature review as well as real-world examples. The objective of this article is to provide a current overview of AI approaches and available tools that can be used for automating tasks in business project management.","PeriodicalId":325473,"journal":{"name":"Online Journal of Applied Knowledge Management","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125266452","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
The invisible hole of information on SMB's cybersecurity 中小企业网络安全中的信息隐形漏洞
Pub Date : 2019-05-07 DOI: 10.36965/OJAKM.2019.7(1)14-26
Ruti Gafni, Tal Pavel
Small and Medium Businesses (SMB) use Internet and computer-based tools in their daily processes, sometimes without being aware to the cyber threats, or without knowing how to be prepared in case of a cyber-attack, although they are a major target for cyber-attacks. Specific information about cybersecurity needed by SMBs, in order to cope with cyber threats, is not always available or easily accessible. In this study, a vast search of different types of information about SMBs’ cybersecurity was performed, in order to find whether a hole of accessible information exists in this area. This exploratory research covered general mass communication media channels, technological and professional cybersecurity websites, and academic journals, and found that indeed very few studies, articles and news items were published in this matter. Leveraging knowledge and awareness, diminishing the shame for reporting cyber-attacks, and increasing mass communication media interest and public attention, may be activities to cover this “invisible hole”.
中小型企业(SMB)在日常工作中使用互联网和基于计算机的工具,有时没有意识到网络威胁,或者不知道如何应对网络攻击,尽管它们是网络攻击的主要目标。中小企业为应对网络威胁而需要的具体网络安全信息并不总是可用或容易获取。在本研究中,我们对有关中小企业网络安全的不同类型的信息进行了大量的搜索,以发现该领域是否存在可访问信息漏洞。本探索性研究覆盖了一般的大众传播媒体渠道、科技与专业网络安全网站、学术期刊,发现在这方面的研究、文章和新闻确实很少。利用知识和意识,减少报道网络攻击的羞耻感,增加大众传播媒体的兴趣和公众的关注,可能是掩盖这一“看不见的漏洞”的活动。
{"title":"The invisible hole of information on SMB's cybersecurity","authors":"Ruti Gafni, Tal Pavel","doi":"10.36965/OJAKM.2019.7(1)14-26","DOIUrl":"https://doi.org/10.36965/OJAKM.2019.7(1)14-26","url":null,"abstract":"Small and Medium Businesses (SMB) use Internet and computer-based tools in their daily processes, sometimes without being aware to the cyber threats, or without knowing how to be prepared in case of a cyber-attack, although they are a major target for cyber-attacks. Specific information about cybersecurity needed by SMBs, in order to cope with cyber threats, is not always available or easily accessible. In this study, a vast search of different types of information about SMBs’ cybersecurity was performed, in order to find whether a hole of accessible information exists in this area. This exploratory research covered general mass communication media channels, technological and professional cybersecurity websites, and academic journals, and found that indeed very few studies, articles and news items were published in this matter. Leveraging knowledge and awareness, diminishing the shame for reporting cyber-attacks, and increasing mass communication media interest and public attention, may be activities to cover this “invisible hole”.","PeriodicalId":325473,"journal":{"name":"Online Journal of Applied Knowledge Management","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131051137","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Social media privacy concerns and risk beliefs 社交媒体隐私担忧和风险信念
Pub Date : 2019-04-02 DOI: 10.36965/OJAKM.2019.7(1)1-13
Johnathan Yerby, A. Koohang, J. Paliszkiewicz
The purpose of this study was to investigate the link between users’ risk beliefs and social media privacy concerns (concerns users express regarding social media sites’ practices as to how they collect and use personal information). A Likert-type instrument with seven constructs, six of which described the social media privacy concerns and the seventh construct defined users’ risk beliefs, was used to collect data from students who were studying at a university in the southeastern United States. All students (N = 138) used Facebook as their major social networking site. Collected data were analyzed via multiple regression analysis. The results indicated that subjects’ risk beliefs are influenced by three social media privacy concerns (i.e., collection, error, and awareness). The Findings and their implications are discussed. Recommendations for future research are made.
本研究的目的是调查用户的风险信念与社交媒体隐私问题之间的联系(用户对社交媒体网站如何收集和使用个人信息的做法所表达的担忧)。李克特类型的工具有七个构念,其中六个描述社交媒体隐私问题,第七个构念定义用户的风险信念,用于收集在美国东南部一所大学学习的学生的数据。所有学生(N = 138)使用Facebook作为他们的主要社交网站。对收集到的数据进行多元回归分析。结果表明,被试的风险信念受到三种社交媒体隐私关注(即收集、错误和意识)的影响。讨论了研究结果及其意义。并对今后的研究提出了建议。
{"title":"Social media privacy concerns and risk beliefs","authors":"Johnathan Yerby, A. Koohang, J. Paliszkiewicz","doi":"10.36965/OJAKM.2019.7(1)1-13","DOIUrl":"https://doi.org/10.36965/OJAKM.2019.7(1)1-13","url":null,"abstract":"The purpose of this study was to investigate the link between users’ risk beliefs and social media privacy concerns (concerns users express regarding social media sites’ practices as to how they collect and use personal information). A Likert-type instrument with seven constructs, six of which described the social media privacy concerns and the seventh construct defined users’ risk beliefs, was used to collect data from students who were studying at a university in the southeastern United States. All students (N = 138) used Facebook as their major social networking site. Collected data were analyzed via multiple regression analysis. The results indicated that subjects’ risk beliefs are influenced by three social media privacy concerns (i.e., collection, error, and awareness). The Findings and their implications are discussed. Recommendations for future research are made.","PeriodicalId":325473,"journal":{"name":"Online Journal of Applied Knowledge Management","volume":"89 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124319521","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Assessing the effectiveness of IPTEACES e-learning framework in higher education: Fundação Dom Cabral - a Brazilian perspective 评估IPTEACES在高等教育中的电子学习框架的有效性:funda <s:1> o Dom Cabral——一个巴西的视角
Pub Date : 2018-11-19 DOI: 10.36965/OJAKM.2018.6(2)92-112
N. Pena, P. Simões, Lília Mascarenhas, F. Alvim
E-learning’s quality has become an issue of increasing importance in both researchers’ and practitioners’ communities. Involvement, Preparation, Transmission, Exemplification, Application, Connection, Evaluation and Simulation (IPTEACES) is an e-learning framework, primarily developed through a pedagogical benchmarking. It addresses an assorted social-demography and geographically dispersed variety of attendees. Fundacão Dom Cabral (FDC) is a prestigious Brazilian business school with international standards and procedures. This study reports the application of the IPTEACES e-learning framework in higher education in Fundação Dom Cabral’s Master of Business Administration (MBA) program. An experiment has been put into place to measure ‘quality’ through the assessment of the effectiveness of the e-learning program using IPTEACES e-learning framework, and more specifically, (i) to evaluate how the IPTEACES e-learning framework can promote students’ learning; (ii) to assess its effectiveness and determine specific quality improvement measures’; and (iii) to evaluate how the IPTEACES e-learning framework enhances organizational learning approach for enhanced knowledge sharing. Qualitative and quantitative techniques were utilized to collect the data to address the research questions proposed in this study. Results showed that the application of the IPTEACES e-Learning framework to this new course has reached high effectiveness.
在线学习的质量已经成为研究者和实践者越来越重视的问题。参与、准备、传递、举例、应用、连接、评估和模拟(IPTEACES)是一个电子学习框架,主要通过教学基准测试开发。它解决了各种各样的社会人口和地理上分散的各种与会者。fundac o Dom Cabral (FDC)是一所享有声望的巴西商学院,拥有国际标准和程序。本研究报告了IPTEACES电子学习框架在高等教育中应用于Dom Cabral基金会的工商管理硕士(MBA)项目。一项实验已经到位,通过使用IPTEACES电子学习框架评估电子学习计划的有效性来衡量“质量”,更具体地说,(i)评估IPTEACES电子学习框架如何促进学生的学习;(ii)评估其有效性并确定具体的质量改进措施;(iii)评估IPTEACES电子学习框架如何增强组织学习方法以增强知识共享。采用定性和定量技术收集数据,以解决本研究提出的研究问题。结果表明,IPTEACES网络学习框架在新课程中的应用取得了良好的效果。
{"title":"Assessing the effectiveness of IPTEACES e-learning framework in higher education: Fundação Dom Cabral - a Brazilian perspective","authors":"N. Pena, P. Simões, Lília Mascarenhas, F. Alvim","doi":"10.36965/OJAKM.2018.6(2)92-112","DOIUrl":"https://doi.org/10.36965/OJAKM.2018.6(2)92-112","url":null,"abstract":"E-learning’s quality has become an issue of increasing importance in both researchers’ and practitioners’ communities. Involvement, Preparation, Transmission, Exemplification, Application, Connection, Evaluation and Simulation (IPTEACES) is an e-learning framework, primarily developed through a pedagogical benchmarking. It addresses an assorted social-demography and geographically dispersed variety of attendees. Fundacão Dom Cabral (FDC) is a prestigious Brazilian business school with international standards and procedures. This study reports the application of the IPTEACES e-learning framework in higher education in Fundação Dom Cabral’s Master of Business Administration (MBA) program. An experiment has been put into place to measure ‘quality’ through the assessment of the effectiveness of the e-learning program using IPTEACES e-learning framework, and more specifically, (i) to evaluate how the IPTEACES e-learning framework can promote students’ learning; (ii) to assess its effectiveness and determine specific quality improvement measures’; and (iii) to evaluate how the IPTEACES e-learning framework enhances organizational learning approach for enhanced knowledge sharing. Qualitative and quantitative techniques were utilized to collect the data to address the research questions proposed in this study. Results showed that the application of the IPTEACES e-Learning framework to this new course has reached high effectiveness.","PeriodicalId":325473,"journal":{"name":"Online Journal of Applied Knowledge Management","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126442431","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The use and benefits of information communication technology by Polish small and medium sized enterprises 波兰中小型企业对信息通信技术的使用和收益
Pub Date : 2018-10-22 DOI: 10.36965/OJAKM.2018.6(1)211-225
C. Sołek-Borowska
Despite the significant contribution that information communication technology (ICT) has made to business, prior studies indicated that there is a large number of unsuccessful ICT implementations in small and medium sized enterprises (SMEs). Moreover, literature also indicated that SMEs’ utilization of ICT tools is reported to be low worldwide, while that is also the case with Polish SMEs. This paper was aim to identify the ICT tools used by Polish SMEs, the areas in which they are used, and the benefits companies perceive from such use. Findings of this research study with 153 Polish SMEs suggest that the most popular ICT tool is email, used by 88% of surveyed entities. Emails contain knowledge and information that is not codified in any knowledge repository. The main area of enterprise where employees use new technologies is marketing, as confirmed by 44% of the surveyed entities. About 59% of the companies surveyed recognize that the use of new technologies brings benefits, which translate into an increase in the company's profits. To stimulate the development of SMEs Polish companies, this study found that it is important to support the development of modern ICT tools for economic growth.
尽管信息通信技术(ICT)对商业做出了重大贡献,但先前的研究表明,在中小型企业(SMEs)中存在大量不成功的ICT实施。此外,文献还表明,据报道,在世界范围内,中小企业对信息通信技术工具的利用率很低,波兰中小企业也是如此。本文旨在确定波兰中小企业使用的信息通信技术工具,它们使用的领域,以及公司从这种使用中感受到的好处。这项对153家波兰中小企业的研究结果表明,最受欢迎的信息通信技术工具是电子邮件,88%的被调查实体使用。电子邮件包含的知识和信息没有在任何知识库中编码。44%的受访企业确认,员工使用新技术的主要领域是营销。约59%的受访公司认识到使用新技术带来的好处,这转化为公司利润的增加。为了刺激波兰中小企业的发展,本研究发现,支持现代信息通信技术工具的发展对经济增长至关重要。
{"title":"The use and benefits of information communication technology by Polish small and medium sized enterprises","authors":"C. Sołek-Borowska","doi":"10.36965/OJAKM.2018.6(1)211-225","DOIUrl":"https://doi.org/10.36965/OJAKM.2018.6(1)211-225","url":null,"abstract":"Despite the significant contribution that information communication technology (ICT) has made to business, prior studies indicated that there is a large number of unsuccessful ICT implementations in small and medium sized enterprises (SMEs). Moreover, literature also indicated that SMEs’ utilization of ICT tools is reported to be low worldwide, while that is also the case with Polish SMEs. This paper was aim to identify the ICT tools used by Polish SMEs, the areas in which they are used, and the benefits companies perceive from such use. Findings of this research study with 153 Polish SMEs suggest that the most popular ICT tool is email, used by 88% of surveyed entities. Emails contain knowledge and information that is not codified in any knowledge repository. The main area of enterprise where employees use new technologies is marketing, as confirmed by 44% of the surveyed entities. About 59% of the companies surveyed recognize that the use of new technologies brings benefits, which translate into an increase in the company's profits. To stimulate the development of SMEs Polish companies, this study found that it is important to support the development of modern ICT tools for economic growth.","PeriodicalId":325473,"journal":{"name":"Online Journal of Applied Knowledge Management","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128694523","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Prosumers knowledge sharing to develop and manage products 产消知识共享,开发和管理产品
Pub Date : 2018-09-08 DOI: 10.36965/OJAKM.2018.6(2)72-91
E. Ziemba, Monika Eisenbardt, Roisin Mullins, Dariusz Grabara
The purpose of this paper is to advance research on prosumers knowledge sharing with enterprises and public organizations by examining as well as improve the understanding of what knowledge about products, prosumers share and would like to share in order to improve products. This paper provides and verifies a new theoretical framework depicting prosumers knowledge about products, which they can share with business and public organizations. The reported outcomes are the result of a questionnaire survey that yielded responses from 783 Poland and 171 United Kingdom (UK) based prosumers. The research findings reveal that prosumers mainly share their knowledge about products functionality, ease and intuitiveness of use, as well as a products reliability and durability, whereas they rarely share knowledge related to products design or the packaging of products. It is also found that there are significant differences between knowledge about products that prosumers share and would like to share. In addition, Poland prosumers share and would like to share various kinds of knowledge about products more frequently than UK based prosumers.
本文的目的是通过考察和提高对产消者分享和想要分享哪些关于产品的知识以改进产品的理解,从而推进产消者与企业和公共组织知识共享的研究。本文提供并验证了一个新的理论框架,描述了生产消费者关于产品的知识,他们可以与企业和公共组织共享。报告的结果是一项问卷调查的结果,该调查获得了783名波兰和171名英国(UK)产消者的回应。研究发现,产消者分享的知识主要集中在产品的功能性、易用性和直观性,以及产品的可靠性和耐用性方面,而很少分享与产品设计或产品包装相关的知识。研究还发现,产消者分享的产品知识与愿意分享的产品知识之间存在显著差异。此外,波兰的专业消费者比英国的专业消费者更频繁地分享和愿意分享各种关于产品的知识。
{"title":"Prosumers knowledge sharing to develop and manage products","authors":"E. Ziemba, Monika Eisenbardt, Roisin Mullins, Dariusz Grabara","doi":"10.36965/OJAKM.2018.6(2)72-91","DOIUrl":"https://doi.org/10.36965/OJAKM.2018.6(2)72-91","url":null,"abstract":"The purpose of this paper is to advance research on prosumers knowledge sharing with enterprises and public organizations by examining as well as improve the understanding of what knowledge about products, prosumers share and would like to share in order to improve products. This paper provides and verifies a new theoretical framework depicting prosumers knowledge about products, which they can share with business and public organizations. The reported outcomes are the result of a questionnaire survey that yielded responses from 783 Poland and 171 United Kingdom (UK) based prosumers. The research findings reveal that prosumers mainly share their knowledge about products functionality, ease and intuitiveness of use, as well as a products reliability and durability, whereas they rarely share knowledge related to products design or the packaging of products. It is also found that there are significant differences between knowledge about products that prosumers share and would like to share. In addition, Poland prosumers share and would like to share various kinds of knowledge about products more frequently than UK based prosumers.","PeriodicalId":325473,"journal":{"name":"Online Journal of Applied Knowledge Management","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126871270","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
An investigation of knowledge brokering during service encounters 服务过程中知识中介的研究
Pub Date : 2018-09-03 DOI: 10.36965/OJAKM.2018.6(1)187-210
Nayel Al Hawamdeh, R. Hackney
Service encounters present excellent opportunities for obtaining and exchanging so called tacit and explicit knowledge between customers and organisations. Recently, the role of frontline employees as knowledge brokers between organisations and their customers has received attention from scholars and practitioners. Despite the significant role played by frontline employees in obtaining knowledge from customers and sharing it during service encounters, there is a lack of research that provides a comprehensive framework intended to explain their role during such engagements. Following an extensive literature review we developed a research model that identifies (1) the role of frontline employees as knowledge brokers for customers and organisations and (2) the factors that influence their roles as knowledge brokers during service encounters. In total, 30 semi-structured interviews with different informants (i.e. managers & employees) from three top commercial banks in Jordan (X, Y, & Z) were administered through three case studies. We adopted a qualitative ‘interpretative’ methodological approach to the analysis of the empirical data. Our findings from an evidence-based analysis suggest that the knowledge brokering engaged in by frontline employees during service encounters is affected by four sets of factors (organisational–level, individual-level, technology-level, & knowledge–level).
服务接触为客户和组织之间获取和交换所谓的隐性和显性知识提供了极好的机会。最近,一线员工作为组织和客户之间的知识中间人的角色受到了学者和实践者的关注。尽管一线员工在从客户那里获取知识并在服务接触中分享知识方面发挥了重要作用,但缺乏研究提供一个全面的框架,旨在解释他们在此类接触中的作用。在广泛的文献回顾之后,我们开发了一个研究模型,该模型确定了(1)一线员工作为客户和组织的知识经纪人的角色,以及(2)在服务接触中影响他们作为知识经纪人角色的因素。通过三个案例研究,总共对来自约旦三家顶级商业银行(X、Y和Z)的不同线人(即经理和员工)进行了30次半结构化访谈。我们采用了定性的“解释性”方法来分析经验数据。基于证据的分析结果表明,一线员工在服务过程中的知识中介行为受到四组因素(组织层面、个人层面、技术层面和知识层面)的影响。
{"title":"An investigation of knowledge brokering during service encounters","authors":"Nayel Al Hawamdeh, R. Hackney","doi":"10.36965/OJAKM.2018.6(1)187-210","DOIUrl":"https://doi.org/10.36965/OJAKM.2018.6(1)187-210","url":null,"abstract":"Service encounters present excellent opportunities for obtaining and exchanging so called tacit and explicit knowledge between customers and organisations. Recently, the role of frontline employees as knowledge brokers between organisations and their customers has received attention from scholars and practitioners. Despite the significant role played by frontline employees in obtaining knowledge from customers and sharing it during service encounters, there is a lack of research that provides a comprehensive framework intended to explain their role during such engagements. Following an extensive literature review we developed a research model that identifies (1) the role of frontline employees as knowledge brokers for customers and organisations and (2) the factors that influence their roles as knowledge brokers during service encounters. In total, 30 semi-structured interviews with different informants (i.e. managers & employees) from three top commercial banks in Jordan (X, Y, & Z) were administered through three case studies. We adopted a qualitative ‘interpretative’ methodological approach to the analysis of the empirical data. Our findings from an evidence-based analysis suggest that the knowledge brokering engaged in by frontline employees during service encounters is affected by four sets of factors (organisational–level, individual-level, technology-level, & knowledge–level).","PeriodicalId":325473,"journal":{"name":"Online Journal of Applied Knowledge Management","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131440733","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
Online Journal of Applied Knowledge Management
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1