首页 | 官方网站   微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 62 毫秒
1.
Today IT security professionals are working hard to keep a high security standard for their information systems. In doing so, they often face similar problems, for which they have to create appropriate solutions. An exchange of knowledge between experts would be desirable in order to prevent developing always the same solutions by independent persons. Such an exchange could also lead to solutions of higher quality, as existing approaches could be advanced, instead of always reinventing the security wheel.This paper examines how information security knowledge can be shared between different organizations on the basis of a web portal utilizing Web-Protégé. It can be shown that through the use of ontologies the domain of information security can be modeled and stored in a human- and a machine-readable format, enabling both human editing and automation (e.g. for risk calculations). The evaluation of the web portal has shown that the most important challenge a tool for knowledge sharing has to face is the aspect of motivating users to participate in a knowledge exchange.Results from the evaluation have been used to further develop and enhance the web portal by implementing additional facilitating features. These features include a credit system, which rewards users for contributions, as well as the ability to select multiple entities, improving the system's usability.  相似文献   

2.
Organizations which have invested heavily in Enterprise Resource Planning (ERP) systems, intranets and Enterprise Information Portals (EIP) with standardized workflows, data definitions and a common data repository, have provided the technlogical capability to their workgroups to share information at the enterprise level. However, the responsibility of populating the repository with relevant and high quality data required for customized data analyses is spread across workgroups associated with specific business processes. In an information interdependent setting, factors such as short-term organizational focus and the lack of uniformity in information management skills across workgroups can act as impediments to information sharing. Using an analytical model of information exchange between two workgroups, we study the impact of measures (e.g., creating a perception of continuity and persistence in interactions, benefit sharing, etc.) on the performance of the workgroups and the organization. The model considers a setting we describe as information complementarity, where the payoff to a workgroup depends not only on the quality of its own information, but also on that of the information provided by other workgroups. We show how a long-term vision combined with homogeneity in information management capabilities across workgroups can lead to organizationally desirable levels of information exchange, and how benefit sharing can either help or hurt individual and organizational information exchange outcomes under different circumstances. Our analysis highlights the need for appropriate organizational enablers to realize the benefits of enterprise systems and related applications.
Andrew B. WhinstonEmail:
  相似文献   

3.
A network organization comprises a new type of environment around which people organize themselves so as to reach a common objective. A network organization enables the recommended interaction among people with different backgrounds, which happens when the problems they deal with are complex and multidisciplinary. Most network organizations require interactions in a geographically distributed fashion, fostering the serious challenge of displaying coherence of purpose necessary for global efficacy as from local activity: these features require an environment with special functionality. This paper describes and analyzes a collaborative environment for support to knowledge sharing and coordination of actions in geographically distributed network organizations. A case-study using the collaborative environment is presented, and the results obtained by using this environment are discussed.  相似文献   

4.
The process of knowledge sharing can be seen as the lifeblood for the establishment of a true Knowledge Society. Such a society must be grounded on an iterative process whereby existing knowledge is constantly shared, consolidated and – crucially – enriched with new knowledge. And knowledge sharing is the means by which that enrichment can take place. Without doubt, these processes play a vital role in the context of education, which ultimately has a strong bearing on the formation of the Knowledge Society. In this paper, knowledge sharing among educators is discussed within the context of long-term research work that the authors have carried out in the field. The paper reports on the design and development of a series of Information Systems conceived for the sharing of practices among educational practitioners. It discusses the thinking behind these different but related systems and examines how this is borne out in the implementation of key system features.  相似文献   

5.
Adopting diffusion theory and the concept of social value orientation, the effects of personality traits on knowledge sharing in a virtual open content community are investigated. In addition to the main effects of personality, it was hypothesized that intrinsic motivations would moderate the effects on knowledge sharing. A sample of N = 256 active users of Wikipedia provided measures of personality, motivation, and knowledge sharing. Latent regression analyses support the notion that authorship of Wikipedia is associated with higher levels of trendsetting and a prosocial value orientation. Moreover, moderation analyses demonstrate that the effect of the latter is moderated by individual differences in motivations to write. Differences with regard to opinion leadership could not be confirmed.  相似文献   

6.
This paper proposes a knowledge grid model for sharing and managing globally distributed knowledge resources. The model organizes knowledge in a three-dimensional knowledge space, and provides a knowledge grid operation language, KGOL. Internet users can use the KGOL to create their knowledge grids, to put knowledge to them, to edit knowledge, to partially or wholly open their grids to all or some particular grids, and to get the required knowledge from the open knowledge of all the knowledge grids. The model enables people to conveniently share knowledge with each other when they work on the Internet. A software platform based on the proposed model has been implemented and used for knowledge sharing in research teams.  相似文献   

7.
Knowledge sharing and investment decisions in information security   总被引:1,自引:0,他引:1  
We study the relationship between decisions made by two similar firms pertaining to knowledge sharing and investment in information security. The analysis shows that the nature of information assets possessed by the two firms, either complementary or substitutable, plays a crucial role in influencing these decisions. In the complementary case, we show that the firms have a natural incentive to share security knowledge and no external influence to induce sharing is needed. However, the investment levels chosen in equilibrium are lower than optimal, an aberration that can be corrected using coordination mechanisms that reward the firms for increasing their investment levels. In the substitutable case, the firms fall into a Prisoners' Dilemma trap where they do not share security knowledge in equilibrium, despite the fact that it is beneficial for both of them to do so. Here, the beneficial role of a social planner to encourage the firms to share is indicated. However, even when the firms share in accordance to the recommendations of a social planner, the level of investment chosen by the firms is sub-optimal. The firms either enter into an “arms race” where they over-invest or reenact the under-investment behavior found in the complementary case. Once again, this sub-optimal behavior can be corrected using incentive mechanisms that penalize for over-investment and reward for increasing the investment level in regions of under-investment. The proposed coordination schemes, with some modifications, achieve the socially optimal outcome even when the firms are risk-averse. Implications for information security vendors, firms, and social planner are discussed.  相似文献   

8.
In knowledge management (KM)-related research, effective knowledge sharing is considered to be one of the most critical components of KM success. For the present research, the authors conducted a longitudinal, two-phased study to evaluate if the Theory of Reasoned Action (TRA) and three variations of the Theory of Planned Behavior—namely, TPB, decomposed TPB (DTPB), and revised TPB (RTPB)—can adequately predict knowledge sharing behaviors. The first TRA-based study shows a severe limitation in the ability of the intention to predict actual knowledge sharing behaviors collected from a knowledge management platform. In a subsequent study, three variations of TPB-based models were employed to show that, although the independent variables (i.e., attitude, subjective norm, and perceived behavior control that is decomposed into controllability and self-efficacy) give satisfactory explanations of variance in intention (R2 > 42%), the intention–behavior gap still exists in each of the three models. Only the perceived self-efficacy in the revised TPB can directly predict knowledge sharing behaviors. This gap highlights the importance of knowledge sharing as a fundamentally social activity for which the actualization of intention into actions may be interrupted due to barriers such as a mistake-free culture or others’ deliberate misinterpretations that may in turn cause unanticipated negative consequences to the person. The theoretical implication of this study is that in applying TPB to study knowledge sharing practices, researchers must focus on control beliefs that reflect people’s capacity to overcome possible environmental challenges encountered in carrying out their knowledge sharing intentions.  相似文献   

9.
Space efficient secret sharing for implicit data security   总被引:1,自引:0,他引:1  
This paper presents a k-threshold computational secret sharing technique that distributes a secret S into shares of size , where ∣S∣ denotes the secret size. This bound is close to the space optimal bound of if the secret is to be recovered from k shares. In other words, our technique can be looked upon as a new information dispersal scheme that provides near optimal space efficiency. The proposed scheme makes use of repeated polynomial interpolation and has potential applications in secure information dispersal on the Web and in sensor networks.  相似文献   

10.
The aim of the present study is to investigate the impact of cultural collectivism on knowledge sharing among information technology majoring undergraduates in Turkey. The study proposes a research model based on the theory of reasoned action (TRA). A structural equation model was used to test the research model against the data collected by means of a self-report questionnaire. Results show that cultural collectivism has a positive and significant impact on attitudes toward and subjective norms with regard to knowledge sharing. Confirming the TRA, results also suggest that behavioral intentions are jointly determined by attitudes and subjective norms. Implications of these findings are discussed.  相似文献   

11.
鲁强  陈超  王智广 《计算机应用》2010,30(2):402-405
为了支持分布式环境下项目团队成员之间软件开发知识有效的共享,需要对软件开发知识以及它们之间的关系进行分析和定义。根据软件开发知识的内容、特点以及它们之间的关系,对软件开发知识进行了形式化的表示,并创建了软件开发知识本体和软件开发知识本体规则。通过protégé 和Jena实现对此本体的创建、存储和对此本体规则的SPARQL形式转换,据此形成知识本体库来支持软件开发知识共享。  相似文献   

12.
In the field of software architecture, a paradigm shift is occurring from describing the outcome of architecting process to describing the Architectural Knowledge (AK) created and used during architecting. Many AK models have been defined to represent domain concepts and their relationships, and they can be used for sharing and reusing AK across organizations, especially in geographically distributed contexts. However, different AK domain models can represent concepts that are different, thereby making effective AK sharing challenging. In order to understand the mapping quality from one AK model to another when more than one AK model coexists, AK sharing quality prediction based on the concept differences across AK models is necessary. Previous works in this area lack validation in the actual practice of AK sharing. In this paper, we carry out validation using four AK sharing case studies. We also improve the previous prediction models. We developed a new advanced mapping quality prediction model, this model (i) improves the prediction accuracy of the recall rate of AK sharing quality; (ii) provides a better balance between prediction effort and accuracy for AK sharing quality.  相似文献   

13.
In the past, the studies on knowledge sharing tended to be focused on the organization and few paid attention to the departments inside the organization. In this study, valid samples were collected from Taiwan’s 92 IC related firms in the high-tech industry through the Hierarchical Random Sampling method for empirical analysis. The non-linear fuzzy neural network is used due to its capacity in accepting errors and low limitation. This method enables researchers to accurately assess the relations between variables. The result of this study indicated that the degree of formalization and complexity of the organizational structure is negatively and significantly correlated with knowledge sharing. Similarly, motivation through material reward correlates positively and significantly with knowledge sharing with stronger intensity than that between motivation through non-material reward and knowledge sharing. The degree of integration between organizations correlates positively and significantly with knowledge sharing.  相似文献   

14.
A novel model of distributed knowledge recommender system is proposed to facilitate knowledge sharing among collaborative team members. Different from traditional recommender systems in the client-server architecture, our model is oriented to the peer-to-peer (P2P) environment without the centralized control. Among the P2P network of collaborative team members, each peer is deployed with one distributed knowledge recommender, which can supply proper knowledge resources to peers who may need them. This paper investigates the key techniques for implementing the distributed knowledge recommender model. Moreover, a series of simulation-based experiments are conducted by using the data from a real-world collaborative team in an enterprise. The experimental results validate the efficiency of the proposed model. This research paves the way for developing platforms that can share and manage large-scale distributed knowledge resources. This study also provides a new framework for simulating and studying individual or organizational behaviors of knowledge sharing in a collaborative team.  相似文献   

15.
Given there is a great deal of uncertainty in the process of information systems security (ISS) risk assessment, the handling of uncertainty is of great significance for the effectiveness of risk assessment. In this paper, we propose an ISS risk assessment model based on the improved evidence theory. Firstly, we establish the ISS index system and quantify index weights, based on which the evidential diagram is constructed. To deal with the uncertain evidence found in the ISS risk assessment, this model provides a new way to define the basic belief assignment in fuzzy measure. Moreover, the model also provides a method of testing the evidential consistency, which can reduce the uncertainty derived from the conflicts of evidence. Finally, the model is further demonstrated and validated via a case study, in which sensitivity analysis is employed to validate the reliability of the proposed model.  相似文献   

16.
In the current paper we report on a study regarding teachers’ sharing behavior regarding their Open Educational Resources (OER) in the Netherlands. Little is known about how many teachers actually share their learning materials and, therefore, an attempt was made to estimate the number of Dutch teachers and the types of OER they share. Second, we tried to find out whether knowledge sharing self-efficacy facilitated, and evaluation apprehension and trust inhibited teachers to share OER in two different contexts of sharing behavior; sharing with colleagues at their school (interpersonal sharing) and sharing with the public through Internet (Internet sharing). A survey among 1568 teachers from primary to higher education was undertaken to test the relative importance of knowledge sharing self-efficacy, evaluation apprehension and trust in determining Dutch teachers’ intention to share. The results showed that a large proportion of the Dutch teachers shared their OER, but that this sharing was limited to learning materials with low complexity (e.g., texts or images). Moreover, sharing occurred twice as much interpersonally than via websites. Our hypothesis that evaluation apprehension is significantly related to sharing behavior as well as the intention to share was not confirmed. Self-efficacy to share knowledge did, however, explain some of the differences in sharing behavior and in the intention to share of Dutch teachers, although the variables under study accounted only for a small amount of variance. Our findings should thus be replicated in further studies and other variables should be considered that could effectively predict OER sharing behavior of teachers.  相似文献   

17.
Organization scholars differ in their understanding and application of the construct of “knowledge” in theorizing and empirical research. Over the past years, two perspectives have become prevalent in organization science. The individualist perspective assumes the locus of knowledge is people who learn, and that knowledge cannot extend beyond the physical limits of human beings. The collectivist perspective assumes the locus of knowledge is collective. Collective entities accumulate knowledge through forms of social learning. Boundaries of knowledge are drawn around social entities—groups, communities, networks, and organizational units, etc. Recent work in management and organization science has accentuated the differences, and argued against the widespread adoption of a collectivist perspective. This argument holds implications for information systems research. The current paper reviews selected contributions on the locus of knowledge, presents an argument for a combined collectivist and individualist perspective, and outlines future directions for information systems research. Drawing on two significant examples, I show that information systems research has a strategic role to play in greatly advancing this combined perspective.  相似文献   

18.
Abstract.  Information system (IS) security continues to present a challenge for executives and professionals. A large part of IS security research is technical in nature with limited consideration of people and organizational issues. The study presented in this paper adopts a broader perspective and presents an understanding of IS security in terms of the values of people from an organizational perspective. It uses the value-focused thinking approach to identify 'fundamental' objectives for IS security and 'means' of achieving them in an organization. Data for the study were collected through in-depth interviews with 103 managers about their values in managing IS security. Interview results suggest 86 objectives that are essential in managing IS security. The 86 objectives are organized into 25 clusters of nine fundamental and 16 means categories. These results are validated by a panel of seven IS security experts. The findings suggest that for maintaining IS security in organizations, it is necessary to go beyond technical considerations and adopt organizationally grounded principles and values.  相似文献   

19.
Sharing sustainable and valuable knowledge among knowledge workers is a fundamental aspect of knowledge management. In organizations, knowledge workers usually have personal folders in which they organize and store needed codified knowledge (textual documents) in categories. In such personal folder environments, providing knowledge workers with needed knowledge from other workers’ folders is important because it increases the workers’ productivity and the possibility of reusing and sharing knowledge. Conventional recommendation methods can be used to recommend relevant documents to workers; however, those methods recommend knowledge items without considering whether the items are assigned to the appropriate category in the target user’s personal folders. In this paper, we propose novel document recommendation methods, including content-based filtering and categorization, collaborative filtering and categorization, and hybrid methods, which integrate text categorization techniques, to recommend documents to target worker’s personalized categories. Our experiment results show that the hybrid methods outperform the pure content-based and the collaborative filtering and categorization methods. The proposed methods not only proactively notify knowledge workers about relevant documents held by their peers, but also facilitate push-mode knowledge sharing.  相似文献   

20.
Previous studies have confirmed the knowledge sharing visibility (KSV) may ensure the incentive-sharing relationship within traditional organizations. However, considering high loafing tendency in IT-based and distributed environments, this effect should be re-examined. This study examines how KSV impacts on incentive-based relationship in IT-based knowledge management systems. The data were collected from real KM systems in an innovative service company. The results show that, in distributed environment, KSV was still a critical moderators in the prediction of employee’s knowledge sharing behaviors. In the electronic KMS environment, the positive relationship between incentive and KS is stronger when employees’ perceived KSV is higher. This research contributes theoretically to KS literature in examing the KSV as the three-way moderators on incentive-based relationship in IT-based environment, from real organizational samples.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号