1,714 research outputs found

    Reasoning on Multi-Relational Contextual Hierarchies via Answer Set Programming with Algebraic Measures (Extended Abstract)

    Get PDF
    This extended abstract summarizes our previous work on a defeasible extension of Description Logic (DL) for contextual reasoning. Here, we considered on the one hand the addition of multiple dimensions of defeasibility, allowing us to express for example that a rule has to be satisfied no matter the geographical context but that the rule can change in the next years. On the other hand, we showed that Answer Set Programming (ASP) especially when enhanced with algebraic measures provide a powerful tool to implement our framework and open up perspectives for the future

    Conference on Grey Literature and Repositories

    Get PDF

    Knowledge sharing in the context of mentoring

    Get PDF
    The research examines individual level horizontal knowledge sharing across MNC subsidiaries taking place in the context of mentoring. The aim is to look beyond traditional career related outcomes associated with mentoring and explore how it affects ability, motivation and opportunity to share knowledge. The theoretical review is guided by the knowledge governance approach and factors affecting knowledge sharing are discussed with the help of the AMO- framework. The research is a qualitative case study of a MNC’s international business unit. Data was collected by conducting structured theme interviews. The empirical part of the research is based on the integrative framework derived from existing scientific literature on the research topic. The data was first analyzed to form a comprehensive picture about the current state of knowledge sharing in the business unit. Then, knowledge sharing in the context of mentoring was taken under closer examination. In the end, factors affecting an individual’s motivation, opportunity and ability to share knowledge within and outside the mentoring relationship were compared with each other for conclusions to be drawn. The findings suggest that knowledge sharing at the local level is mostly affected by a siloing effect arising from internal competition and an entrepreneurial organizational culture, whereas cross-border sharing is still in its infancy and is characterized by lack of structures. Mentoring can be considered as a commitment-based knowledge governance mechanism, which improves individuals’ motivation, opportunity and ability to share knowledge by transcending barriers otherwise present in the business unit. Nevertheless, perceived organizational commitment, prior mentoring experience and a wide work related experience gap were shown to have a negative effect on knowledge sharing, even in the context of mentoring.fi=Opinnäytetyö kokotekstinä PDF-muodossa.|en=Thesis fulltext in PDF format.|sv=Lärdomsprov tillgängligt som fulltext i PDF-format

    HILT : High-Level Thesaurus Project. Phase IV and Embedding Project Extension : Final Report

    Get PDF
    Ensuring that Higher Education (HE) and Further Education (FE) users of the JISC IE can find appropriate learning, research and information resources by subject search and browse in an environment where most national and institutional service providers - usually for very good local reasons - use different subject schemes to describe their resources is a major challenge facing the JISC domain (and, indeed, other domains beyond JISC). Encouraging the use of standard terminologies in some services (institutional repositories, for example) is a related challenge. Under the auspices of the HILT project, JISC has been investigating mechanisms to assist the community with this problem through a JISC Shared Infrastructure Service that would help optimise the value obtained from expenditure on content and services by facilitating subject-search-based resource sharing to benefit users in the learning and research communities. The project has been through a number of phases, with work from earlier phases reported, both in published work elsewhere, and in project reports (see the project website: http://hilt.cdlr.strath.ac.uk/). HILT Phase IV had two elements - the core project, whose focus was 'to research, investigate and develop pilot solutions for problems pertaining to cross-searching multi-subject scheme information environments, as well as providing a variety of other terminological searching aids', and a short extension to encompass the pilot embedding of routines to interact with HILT M2M services in the user interfaces of various information services serving the JISC community. Both elements contributed to the developments summarised in this report

    The Internationalization of Small and Medium Enterprises in Regional and Global Value Chains

    Get PDF
    Production networks and the regional division of labor have been established in East Asia resulting in massive vertical intra-industry trade in parts and components within the region. This phenomenon is known as cross-border production sharing or the fragmentation of production processes into many stages across different countries. New development strategies claim that participation in international production and distribution networks is the key to accelerating economic development in the era of globalization. This process suggests that vertical input-output linkages between local firms and multinational corporations are the most powerful channels to accelerate technology transfers and spillovers. Given the trends of globalization and economic integration in East Asia, there is significant potential for the small and medium enterprise (SME) sector to increase its contribution to the region's development through greater participation in global value chains. However, multiple market failures exist with regard to the development of SMEs and local entrepreneurship. These risks can be mitigated by proper policy measures such as strengthening technological and human resource capabilities through better networking and facilitating access to financing for SMEs. Despite many distortions and inefficiencies in implementing regional economic integration schemes in East Asia, there are many cumulative positive effects contributing to the emerging trend internationalization of SMEs in the region. This process can be significantly strengthened by creating a positive business environment through the standardization of products and services, rules and regulations, and a seamless market infrastructure in the region.internationalization SMEs; regional development policies; regional market failure

    Validity Issues in the Use of Social Network Analysis with Digital Trace Data

    Get PDF
    There is an exciting natural match between social network analysis methods and the growth of data sources produced by social interactions via information technologies, from online communities to corporate information systems. Information Systems researchers have not been slow to embrace this combination of method and data. Such systems increasingly provide “digital trace data” that provide new research opportunities. Yet digital trace data are substantively different from the survey and interview data for which network analysis measures and interpretations were originally developed. This paper examines 10 validity issues associated with the combination of digital trace data and social network analysis methods, with examples from the IS literature, to provide recommendations for improving the validity of future research

    An identity- and trust-based computational model for privacy

    Get PDF
    The seemingly contradictory need and want of online users for information sharing and privacy has inspired this thesis work. The crux of the problem lies in the fact that a user has inadequate control over the flow (with whom information to be shared), boundary (acceptable usage), and persistence (duration of use) of their personal information. This thesis has built a privacy-preserving information sharing model using context, identity, and trust to manage the flow, boundary, and persistence of disclosed information. In this vein, privacy is viewed as context-dependent selective disclosures of information. This thesis presents the design, implementation, and analysis of a five-layer Identity and Trust based Model for Privacy (ITMP). Context, trust, and identity are the main building blocks of this model. The application layer identifies the counterparts, the purpose of communication, and the information being sought. The context layer determines the context of a communication episode through identifying the role of a partner and assessing the relationship with the partner. The trust layer combines partner and purpose information with the respective context information to determine the trustworthiness of a purpose and a partner. Given that the purpose and the partner have a known level of trustworthiness, the identity layer constructs a contextual partial identity from the user's complete identity. The presentation layer facilitates in disclosing a set of information that is a subset of the respective partial identity. It also attaches expiration (time-to-live) and usage (purpose-to-live) tags into each piece of information before disclosure. In this model, roles and relationships are used to adequately capture the notion of context to address privacy. A role is a set of activities assigned to an actor or expected of an actor to perform. For example, an actor in a learner role is expected to be involved in various learning activities, such as attending lectures, participating in a course discussion, appearing in exams, etc. A relationship involves related entities performing activities involving one another. Interactions between actors can be heavily influenced by roles. For example, in a learning-teaching relationship, both the learner and the teacher are expected to perform their respective roles. The nuances of activities warranted by each role are dictated by individual relationships. For example, two learners seeking help from an instructor are going to present themselves differently. In this model, trust is realized in two forms: trust in partners and trust of purposes. The first form of trust assesses the trustworthiness of a partner in a given context. For example, a stranger may be considered untrustworthy to be given a home phone number. The second form of trust determines the relevance or justification of a purpose for seeking data in a given context. For example, seeking/providing a social insurance number for the purpose of a membership in a student organization is inappropriate. A known and tested trustee can understandably be re-trusted or re-evaluated based on the personal experience of a trustor. In online settings, however, a software manifestation of a trusted persistent public actor, namely a guarantor, is required to help find a trustee, because we interact with a myriad of actors in a large number of contexts, often with no prior relationships. The ITMP model is instantiated as a suite of Role- and Relationship-based Identity and Reputation Management (RRIRM) features in iHelp, an e-learning environment in use at the University of Saskatchewan. This thesis presents the results of a two-phase (pilot and larger-scale) user study that illustrates the effectiveness of the RRIRM features and thus the ITMP model in enhancing privacy through identity and trust management in the iHelp Discussion Forum. This research contributes to the understanding of privacy problems along with other competing interests in the online world, as well as to the development of privacy-enhanced communications through understanding context, negotiating identity, and using trust
    • …
    corecore