449 research outputs found

    Teaching MBA Students the Use of Web2.0: The Knowledge Management Perspective

    Get PDF
    The new concepts and technologies of Web 2.0 attract researches in a variety of fields including education, business and knowledge management. However, while the Web 2.0 potential in the education discipline has been widely studied, in the management discipline the Web 2.0 business value has not been fully acknowledged. This research suggests an approach for teaching Web 2.0 concepts in a Knowledge Management (KM) course for MBA students, introducing the Web 2.0 potential within business context. The paper describes MBA students’ perceptions and attitudes regarding Web 2.0 concepts and how they evolved while being engaged in Web 2.0 practices. The findings indicate that most of the students were only partly aware of the Web 2.0 environments benefits at first, especially within organizational context. Moreover, for some of them, participating in the course’s social website required overcoming personal barriers. During the course, students gained new perspectives of the Web 2.0 phenomenon beyond its technological merits. Most of them acknowledged the potential of Web 2.0 within organizational context and embedded Web 2.0 principles in their KM final projects

    Do You Know Your Terms? - A Procedure Model for Terminology Management

    Get PDF
    Due to the extensive development und use of information technology, a lot of companies gained access to vast internal and external information sources. Yet nonetheless, efficiency when dealing with information and trying to find the right content is not on an appropriate level. Managing terms and classifying information has a long tradition in Knowledge Management, namely by the usage of glossaries and taxonomies as two instruments of Terminology Management. But even with today’s portals, search engines and auto-classifiers, it does not work without human interaction and high costs. Therefore, we propose a procedure model for Terminology Management to build up and maintain glossaries and taxonomies. To discover the evidence of our approach three action research cases have been analysed. The first focuses on the introduction of a glossary for a Swiss insurance company whereas the second case illustrates the initial activities and results for setting up a corporate taxonomy at an international professional services firm. Based on the learnings we developed a prototype (third case) which combines glossary and taxonomy for document classification and retrieval. We conclude that only a well suited trade-off between centralized and decentralized Terminology Management activities will be sustainable

    Managing Open Innovation: An Exploration of Information Technologies and Open Search Patterns

    Get PDF
    Product presentation in e-commerce has gained substantial attention from disciplines including information systems, marketing, psychology and management. Many studies compare newly emerging technologies and innovative presentation formats to traditional use of two-dimensional text and pictures. However, the emergent nature of these new technologies, like consumer focused virtual reality, results in instability of form and function in three-dimensional environments. This literature review synthesises the findings of extant literature, discusses important theoretical foundations and identifies the most popular research theories and research methods utilised. Additionally, it classifies constructs used to capture characteristics of presentation formats, consumers’ reactions and performance, as well as marketing-related effects (e.g. attitudes to product and purchase intention). Furthermore, some potential misinterpretation of terms used to describe product presentation have been identified. The literature review concludes with a discussion of implications and suggestions for future research of product presentation in e-commerce contexts

    P2P Web service based system for supporting decision-making in cellular manufacturing scheduling

    Get PDF
    With the increase of the Internet and Virtual Enterprises (VEs), interfaces for web systems and automated services are becoming an emergent necessity. In this paper we propose a Peer-to-peer (P2P) web-based decision-support system for enabling access to different manufacturing scheduling methods, which can be remotely available and accessible from a distributed knowledge base. The XML-based modeling and communication is applied to manufacturing scheduling. Therefore, manufacturing scheduling problems and methods are modeled using XML. The proposed P2P web-based system works as web services, under the SOAP protocol. The system’s distributed knowledge base enables sharing information about scheduling problems and corresponding solving methods in a widened search space, through a scheduling community, integrating a VE. Running several methods enables different results for a given problem, consequently, contributing for a better decision-making. An important aspect is that this knowledge base can be easily and continuously updated by any contributor through the VE. Moreover, through this system once suitable available methods, for a given problem, are identified, it enables running one or more of them, for enabling a better manufacturing scheduling support, enhanced though incorporated fuzzy decision-making proceduresAichi Science and Technology Foundation(PTDC/EME-GIN/102143/2008)info:eu-repo/semantics/publishedVersio

    An Institutional Approach To Operations Management In Internet Based Production Concepts

    Get PDF
    An important change in the socio-economic environment of industrial firms is the increasing dif­fusion of Internet Technologies in production processes. Applications of Internet Technologies may be directly implemented on the shop floor, e.g. in networking dislocated assembly lines, as well as in assisting management processes, e.g. in production planning and control. This leads to a strong approximation of the traditional production and operation systems and the Internet Technologies. While traditional production concepts, such as Lean Production, World Class Manufacturing and Agile Manufacturing, inevitably disregard this development, new production concepts arise that fundamentally consider the application of Internet Technologies on the shop floor. However, from a business management perspective, industrial firms have to accomplish new operating requirements deriving from this technological change. This paper provides a discussion of the consequences of Internet Technologies on operations management, as well as of production concepts based on Internet Technologies from an institutional point of view

    The Development of a graduate course on identity management for the Department of Networking, Security, and Systems Administration

    Get PDF
    Digital identities are being utilized more than ever as a means to authenticate computer users in order to control access to systems, web services, and networks. To maintain these digital identities, administrators turn to Identity Management solutions to offer protection for users, business partners, and networks. This paper proposes an analysis of Identity Management to be accomplished in the form of a graduate level course of study for a ten-week period for the Networking, Security, and Systems Administration department at Rochester Institute of Technology. This course will be designed for this department because of its emphasis on securing, protecting, and managing the identities of users within and across networks. Much of the security-related courses offered by the department focus primarily on security within enterprises. Therefore, Identity Management, a topic that is becoming more popular within enterprises each day, would compliment these courses. Students that enroll in this course will be more equipped to satisfy the needs of modern enterprises when they graduate because they will have a better understanding of how to address security issues that involve managing user identities across networks, systems, and enterprises. This course will focus on several aspects of Identity Management and its use in enterprises today. Covered during the course will be the frameworks of Identity Management, for instance, Liberty Identity Federation Framework and OASIS SAML 2.0; the Identity Management models; and some of the major Identity Management solutions that are in use today such as Liberty Alliance, Microsoft Passport, and Shibboleth. This course will also provide the opportunity to gain hands on experience by facilitating exemplar technologies used in laboratory investigations

    Modelling Sociotechnical Change in IS with a Quantitative Longitudinal Approach: The PPR Method.

    Get PDF
    The following article suggests a critical realistic framework, which aims at modeling sociotechnical change linked to end-users' IT appropriation: the "archetypal approach". The basic situations it includes (the "sociotechnical archetypes"), and the possible appropriative trajectories that combine them, together with three propositions linked to the model, are developed. They are illustrated by means of a case study describing the implementation of an e-learning system within a French university. The paper then presents an instrumentation of the theoretical framework, based on a quantitative longitudinal approach: the Process Patterns Recognition (PPR) method. This one draws mainly on Doty, Glick and Huber (1993, 1994) who propose to evaluate the distance between organizational archetypes and empirical configurations by means of Euclidean distance calculus. The adaptation consists in evaluating the distance between appropriative trajectories (embodied by series of theoretically specified vectors) and empirical processes linked to the implementation of computerized tools in organizations. The PPR method is then applied to the same organizational setting as the one related to the case study. It validates the relevance of this type of a research strategy, which makes it possible to model sociotechnical dynamics related to end-users' IT appropriations.Technology-organization interaction; sociotechnical process modelling; Process Patterns Recognition; critical realism; Structuration; methodology of research; longitudinal methods; e-learning;

    Information and communication technologies for knowledge management processes in the public sector in Kenya : a case study of the State Department of Infrastructure

    Get PDF
    Information and Communication Technologies (ICTs) are considered facilitators of knowledge management processes in organizations. This study investigated ICTs for knowledge management processes at the State Department of Infrastructure in Kenya. The study’s objectives were to: establish the level of knowledge management awareness, find out knowledge management processes, identify types of ICTs used for knowledge management processes, and identify challenges experienced by State Department of Infrastructure in the use of ICTs for knowledge management processes. The study findings were determined after applying a qualitative research approach and a case study research design. A purposive sampling technique was used to select 21 participants who were heads of sections at the State Department of Infrastructure in Kenya. Data were collected through semi-structured interviews, analyzed and interpreted thematically according to the objectives of the study. Findings of the study revealed that most participants were aware of the meanings of the concepts of knowledge and knowledge management, types of knowledge and importance of knowledge management in the department. Knowledge management processes in the State Department of Infrastructure entail knowledge creation, codification, retention, sharing and storage. ICTs mostly used for knowledge management processes in the department include: emails, mobile phones, desktop computers, computer servers, and flash disks. The department is faced with the challenges of lack of knowledge management strategies, policies and adequate staff awareness on the use of ICTs for knowledge management processes. In conclusion, the State Department of Infrastructure has a functional ICT infrastructure. However, the department is not using ICTs provided by this study’s Web 2.0 driven SECI model for knowledge management processes such as blogs, wikis, LinkedIn, Facebook, and Twitter. The study therefore proposes that the State Department of Infrastructure should increase its use of Web 2.0 technologies, collaborative content systems and e-learning technologies. The department should also digitize its records; automate its library services; set up intranet, and adopt a centralized knowledge-based system. Further, Public Service Commission of Kenya should formulate a knowledge management strategy and policy to guide on the use of ICTs for knowledge management processes. This strategy and policy can then be cascaded to public sector organizations such as the State Department of Infrastructure.Information ScienceM.A. (Information Science

    Reengineering DoD through enterprise-wide migration to open systems

    Get PDF
    The Department of Defense cannot afford to develop and deploy information systems that have no growth potential. Legacy systems must be replaced with flexible, highly interoperable systems that produce high residual values. With shrinking budgets, depreciation of existing hardware, and rising maintenance of legacy systems, organizations must deploy systems that are capable of evolving with changing business requirements. The Department of Defense enterprise vision for information management (IM) emphasizes integration, interoperability, flexibility, and efficiency through the development of a common, multipurpose, standards-based technical infrastructure. This vision requires a new paradigm for building information systems. The new paradigm relies on open systems, which make it easier, less expensive, and faster to develop and change applications and to employ new technology features. This research examines open systems and provides a strategy for organizations to migrate to them. A case study of the Naval Postgraduate School illustrates the strategy. Provisionally, a prototype application models the desired characteristics of an open system.http://archive.org/details/reengineeringdod1094532221NAU.S. Navy (USN) authorU.S. Army (USA) authorApproved for public release; distribution is unlimited
    • …
    corecore