13,769 research outputs found
Recommended from our members
Integrating information and knowledge for enterprise innovation
It has widely been accepted that enterprise integration, can be a source of socio-technical and cultural problems within organisations wishing to provide a focussed end-to-end business service. This can cause possible âstraitjacketingâ of business process architectures, thus suppressing responsive business re-engineering and competitive advantage for some companies. Accordingly, the current typology and emergent forms of Enterprise Resource Planning (ERP) and Enterprise Application Integration (EAI) technologies are set in the context of understanding information and knowledge integration philosophies. As such, key influences and trends in emerging IS integration choices, for end-to-end, cost-effective and flexible knowledge integration, are examined. As touch points across and outside organisations proliferate, via work-flow and relationship management-driven value innovation, aspects of knowledge refinement and knowledge integration pose challenges to maximising the potential of innovation and sustainable success, within enterprises. This is in terms of the increasing propensity for data fragmentation and the lack of effective information management, in the light of information overload. Furthermore, the nature of IS mediation which is inherent within decision making and workflow-based business processes, provides the basis for evaluation of the effects of information and knowledge integration. Hence, the authors propose a conceptual, holistic evaluation framework which encompasses these ideas. It is thus argued that such trends, and their implications regarding enterprise IS integration to engender sustainable competitive advantage, require fundamental re-thinking
KEMNAD: A Knowledge Engineering Methodology for Negotiating Agent Development
Automated negotiation is widely applied in various domains. However, the development of such systems is a complex knowledge and software engineering task. So, a methodology there will be helpful. Unfortunately, none of existing methodologies can offer sufficient, detailed support for such system development. To remove this limitation, this paper develops a new methodology made up of: (1) a generic framework (architectural pattern) for the main task, and (2) a library of modular and reusable design pattern (templates) of subtasks. Thus, it is much easier to build a negotiating agent by assembling these standardised components rather than reinventing the wheel each time. Moreover, since these patterns are identified from a wide variety of existing negotiating agents(especially high impact ones), they can also improve the quality of the final systems developed. In addition, our methodology reveals what types of domain knowledge need to be input into the negotiating agents. This in turn provides a basis for developing techniques to acquire the domain knowledge from human users. This is important because negotiation agents act faithfully on the behalf of their human users and thus the relevant domain knowledge must be acquired from the human users. Finally, our methodology is validated with one high impact system
Fraction auctions: the tradeoff between effciency and running time
This paper studies the sales of a single indivisible object where bidders have continuous valuations. In Grigorieva et al. [13] it was shown that, in this setting, query auctions necessarily allocate inefficiently in equilibrium. In this paper we propose a new sequential auction, called the c-fraction auction. We show c-fraction auctions guarantee approximate efficiency at any desired level of accuracy, independent of the number of bidders. We discuss the running time and the efficiency in the ex-post equilibrium of the auction. We show that by changing the parameter c of the auction we can trade off efficiency against running time.operations research and management science;
Unleashing the Potential of Argument Mining for IS Research: A Systematic Review and Research Agenda
Argument mining (AM) represents the unique use of natural language processing (NLP) techniques to extract arguments from unstructured data automatically. Despite expanding on commonly used NLP techniques, such as sentiment analysis, AM has hardly been applied in information systems (IS) research yet. Consequentially, knowledge about the potentials for the usage of AM on IS use cases appears to be still limited. First, we introduce AM and its current usage in fields beyond IS. To address this research gap, we conducted a systematic literature review on IS literature to identify IS use cases that can potentially be extended with AM. We develop eleven text-based IS research topics that provide structure and context to the use cases and their AM potentials. Finally, we formulate a novel research agenda to guide both researchers and practitioners to design, compare and evaluate the use of AM for text-based applications and research streams in IS
The Value of User-Visible Internet Cryptography
Cryptographic mechanisms are used in a wide range of applications, including
email clients, web browsers, document and asset management systems, where
typical users are not cryptography experts. A number of empirical studies have
demonstrated that explicit, user-visible cryptographic mechanisms are not
widely used by non-expert users, and as a result arguments have been made that
cryptographic mechanisms need to be better hidden or embedded in end-user
processes and tools. Other mechanisms, such as HTTPS, have cryptography
built-in and only become visible to the user when a dialogue appears due to a
(potential) problem. This paper surveys deployed and potential technologies in
use, examines the social and legal context of broad classes of users, and from
there, assesses the value and issues for those users
In the eye of Apollo: world literature from Goethe to Google
âNational literature is now a rather unmeaning term; the epoch of world literature is at hand, and everyone must strive to hasten its approach.â Thus the Olympian poet Goethe spoke to his young disciple Johann Peter Eckermann in Weimar in 1827. In Copenhagen, 1899, the great European critic Georg Brandes revived the term as a response to the surge of nationalism in European literature and culture; and in 1952, the emigrant critic, Erich Auerbach, turned to Goetheâs enduring concept as a framework for the emerging future of philology and humanism after WWII.
Recent years have witnessed yet another revival of interest in world literature fuelled by a growing concern with a globalized marketplace, migration and new modes of communication. Goetheâs conversations with Eckermann, from which the concept was popularized, inaugurated a dialogue, based on a new cultural awareness of a global modernity, in which we still take part today.
This seminar will introduce to the shifting meanings and applications of the concept of world literature, especially as it relates to changing conceptions of international and national cultures and literatures, in order to suggest productive perspectives on the conditions of literature in a transnational space of globalized cultures and media
An E-Business Model Facilitating Service Provider Selection in B2C E-Commerce
The advent and expansion of the Internet and its applications, among them e-commerce, has provided new opportunities for the emergence of novel e-business models. A portion of these models are in the form of performing a mediatory role to provide some services for customers or businesses, and to facilitate transactions between them. In B2C e-commerce, often, a service consumer may supply his service demand from a range of providers and when he doesn\u27t have any transaction with many of them making an accurate decision becomes challenging. Therefore, he would need to interact with others to acquire relevant information. Current approaches for addressing this issue are generally rating-based and perform poorly. Recently, an experience-based approach has been proposed by ensoy et al [1]. This paper reviews this approach, analyzes its weaknesses and problems and proposes a new model to eliminate those problems, in which a third party assists the consumers in choosing their desired service providers
Recommended from our members
Exploiting tacit knowledge through knowledge management technologies
The purpose of this paper is to examine the contributions and suitability of the available knowledge management (KM) technologies, including the Web 2.0 for exploiting tacit knowledge. It proposes an integrated framework for extracting tacit knowledge in organisations, which includes Web 2.0 technologies, KM tools, organisational learning (OL) and Community of Practice (CoP). It reviews a comprehensive literature covering overview of KM theories, KM technologies and OL and identifies the current state of knowledge relating to tacit knowledge exploitation. The outcomes of the paper indicate that Internet and Web 2.0 technologies have stunning prospects for creating learning communities where tacit knowledge can be extracted from people. The author recommends that organisations should design procedures and embed them in their Web 2.0 collaborative platforms persuading employees to record their ideas and share them with other members. It is also recommended that no idea should be taken for granted in a learning community where tacit knowledge exploitation is pursued. It is envisaged that future research should adopt empirical approach involving Complex Adaptive Model for Tacit Knowledge Exploitation (CAMTaKE) and the Theory of Deferred Action in examining the effectiveness of KM technologies including Web 2.0 tools for tacit knowledge exploitation
- âŠ