The influence of shadow IT usage on knowledge sharing

2018 ◽  
Vol 35 (1) ◽  
pp. 17-28 ◽  
Author(s):  
Gabriela L Mallmann ◽  
Antonio Carlos Gastaud Maçada ◽  
Mírian Oliveira

Employees increasingly use unauthorized technologies at the workplace, which is referred to as shadow IT. Previous research identifies that shadow IT is often collaborative systems used by employees to collaborate, communicate, and share content with coworkers, clients, or external partners. Based on these previous findings, we propose that shadow IT usage may positively influence organizational knowledge sharing (KS), which is central to knowledge management practices. Thus, this research aims to (1) identify the types and occurrences of shadow IT used by employee in the workplace, (2) investigate how KS (donation and collection) occurs via shadow IT, and (3) investigate how shadow IT influences KS. This is an exploratory study based on a qualitative approach. We performed interviews with IT users to answer the research question. Our findings identify that most of the interviewees use collaborative systems and mobile devices unauthorized by the IT department to share knowledge and communicate with their coworkers. The most common IT cited are WhatsApp and Skype, as well as solutions to store and share content, like Google Drive. In addition, several employees reported using shadow IT mainly because organizations do not provide suitable tools to communicate efficiently. We conclude that shadow IT can facilitate KS, primarily when people are geographically distributed since these unauthorized systems provide real-time communication. Our theoretical contribution is to expand current knowledge about shadow IT and reinforce the importance and prevalence of informal and decentralized KS within organizations. As for the practical implications, our article can help IT managers to better understand the usage of shadow IT and how they can balance the risk and benefits of this phenomenon.

2019 ◽  
Vol 12 (4) ◽  
pp. 821
Author(s):  
Gabriela Labres Mallmann ◽  
Antonio Carlos Gastaud Maçada

The use of unauthorized technologies in the workplace, called shadow IT (SIT), is increasing within organizations. Previous research identified that Shadow technologies are often collaborative systems used by employees to communicate and share content with colleagues, clients, or external partners. Therefore, we aim to develop a framework for the influence of shadow IT usage on computer-mediated collaboration based on Social Presence Theory. We conducted a literature review that resulted in a framework and the development of research propositions. The literature suggests that there is a positive influence of shadow IT usage on employee collaboration and communications. This paper presents theoretical and practical contributions. Analyzing shadow IT and collaboration through a theoretical lens makes progress on the discussion about the consequences of these unauthorized technologies for individuals and organizations. It is important for organizations to comprehend these impacts, such as on collaboration, which, in turn, can facilitate improvements in employee productivity.


Author(s):  
Sergio Evangelista Silva ◽  
Luciana Paula Reis ◽  
Alana Deusilan Sester Pereira ◽  
June Marques Fernandes

Knowledge is one of the most important assets in organizations. While there are several studies about knowledge management, there are few texts dedicated to classifying the existing types of knowledge. As such, the concept of knowledge is overlooked in the literature. Hence, this situation poses a dilemma: how could a thing that is not well understood be adequately managed? Drawing on current knowledge taxonomies and the organizational routines concept, we address this gap by outlining a taxonomy of how knowledge is manifested in the execution and structuration of organizational routines. This taxonomy is generated through the grounding process of examining the organizational routines of an academic department in a public university. As the main result, it was identified four basic types of knowledge: stable-reproducible, problem-solving, incremental-shift, and paradigmatic-shift. As main theoretical contribution, this paper introduces a knowledge taxonomy, which is an alternative view in relation to the current taxonomies. As a practical implication, these four types of knowledge presented point out to the necessity of the development of specific knowledge management practices for each type of knowledge.


Plants ◽  
2019 ◽  
Vol 8 (11) ◽  
pp. 469 ◽  
Author(s):  
Vila-Aiub

Herbicide resistance is the ultimate evidence of the extraordinary capacity of weeds to evolve under stressful conditions. Despite the extraordinary plant fitness advantage endowed by herbicide resistance mutations in agroecosystems under herbicide selection, resistance mutations are predicted to exhibit an adaptation cost (i.e., fitness cost), relative to the susceptible wild-type, in herbicide untreated conditions. Fitness costs associated with herbicide resistance mutations are not universal and their expression depends on the particular mutation, genetic background, dominance of the fitness cost, and environmental conditions. The detrimental effects of herbicide resistance mutations on plant fitness may arise as a direct impact on fitness-related traits and/or coevolution with changes in other life history traits that ultimately may lead to fitness costs under particular ecological conditions. This brings the idea that a “lower adaptive value” of herbicide resistance mutations represents an opportunity for the design of resistance management practices that could minimize the evolution of herbicide resistance. It is evident that the challenge for weed management practices aiming to control, minimize, or even reverse the frequency of resistance mutations in the agricultural landscape is to “create” those agroecological conditions that could expose, exploit, and exacerbate those life history and/or fitness traits affecting the evolution of herbicide resistance mutations. Ideally, resistance management should implement a wide range of cultural practices leading to environmentally mediated fitness costs associated with herbicide resistance mutations.


2020 ◽  
Vol 20 (6) ◽  
Author(s):  
Abeysinghe Mudiyanselage Prabodha Sammani ◽  
Dissanayaka Mudiyanselage Saman Kumara Dissanayaka ◽  
Leanage Kanaka Wolly Wijayaratne ◽  
William Robert Morrison

Abstract The almond moth Cadra cautella (Walker), a key pest of storage facilities, is difficult to manage using synthetic chemicals. Pheromone-based management methods remain a high priority due to advantages over conventional management practices, which typically use insecticides. Cadra cautella females release a blend of pheromone including (Z, E)-9,12-tetradecadienyl acetate (ZETA) and (Z)-9-tetradecadien-1-yl acetate (ZTA). The effect of these components on mating of C. cautella and how response varies with the population density and sex ratio remain unknown. In this study, the mating status of C. cautella was studied inside mating cages under different ratios of ZETA and ZTA diluted in hexane and at different population sizes either with equal or unequal sex ratio. The lowest percentage of mated females (highest mating disruption [MD] effects), corresponding to roughly 12.5%, was produced by a 5:1 and 3.3:1 ratio of ZETA:ZTA. Populations with equal sex ratio showed the lowest percentage of mated females, at 20% and 12.5% under lower and higher density, respectively. The next lowest percentage of mated females was produced when the sex ratio was set to 1: 2 and 2:1 male:female, with just 25% and 22.5% of moths mated, respectively. This study shows that mating status of C. cautella is influenced by ZETA:ZTA ratio, sex ratio, and population size. This current knowledge would have useful implications for mating disruption programs.


2021 ◽  
Vol 1 (4) ◽  
Author(s):  
Katerina Caskova ◽  
Stefan Chudy

AbstractStudents undergo a demanding socialization process at the beginning of their practice, which they subjectively perceive. At the time of this socialization process, the process of knowledge sharing begins, and this process must include reflection on and explanation of new pedagogical experience if students are to establish suitable conditions for practice. Not only the training teacher but also others who form the so-called school culture may neglect to address new experiences and provide sufficient support. This research aimed to explore the effects of the school culture on a student’s career at the beginning of her teaching and pedagogical knowledge sharing. Based on the results of the analysis, we answered the following research question: “How does the school culture influence a student’s pedagogical knowledge sharing with her training teacher?” We found that the student’s subjective theories should correspond with the school culture; otherwise, the student may leave the profession earlier. In addition, support from colleagues and sufficient explanation (modelling of the teacher’s thoughts) in school practice create a space to share pedagogical knowledge and clarify the student’s doubts about education. We identified the teacher's career, the school culture, and the training teacher as sources of support for the education student. The data were collected via interviews with the use of the “clean language” method and analysed through open coding.


2021 ◽  
pp. 152483802110572
Author(s):  
Juliane A. Kloess ◽  
Madeleine van der Bruggen

The increased potential and speed of the Internet has changed the nature of sexual crimes against children. It enables individuals with a sexual interest in children to meet, interact, and engage in illegal activities. The literature review presented here aims to provide an overview of the current knowledge and understanding of trust and relationship development among users of online networks that are dedicated to the sexual exploitation and abuse of children. A systematic search using six databases was conducted to identify relevant literature from a psychological and a criminological perspective. Twenty-one studies met the inclusion criteria that centered around the key aspects of the literature review’s research question, namely, (i) child sexual exploitation and abuse, (ii) Dark Web platforms, (iii) online forums and networks, and (iv) trust and relationship development. Our findings reveal that the engagement in interpersonal communication and interactions with like-minded others serves various functions, including validation, normalization, and support, as well as access to expert advice, information, and material. Dark Web networks are high-stake and risky environments, where users have to manage a continuous flow of threats, with information about others and their trustworthiness being limited. The establishment and maintenance of trust is of social and technical relevance, and users have to navigate a number of demands and commitments. Findings are discussed in relation to theoretical and practical implications, as well as directions for future research.


2012 ◽  
Vol 67 (2) ◽  
pp. 304-324 ◽  
Author(s):  
Esther Cloutier ◽  
Élise Ledoux ◽  
Pierre-Sébastien Fournier

In a context of changing demographics and transformations to the world of work, concerns about age management are gradually turning into concerns about knowledge management. The vast experiential knowledge and diverse skills developed by workers to cope with the numerous situations encountered in the course of their work and to protect themselves against risks to their health and safety constitute part of the intangible assets vital to the sustainability of worker expertise and even the survival of the organization. Management practices play an important role in helping safeguard experiential knowledge in organizations. However, the transformations that have been taking place in recent years in response to an unstable economic climate have driven organizations to introduce a number of changes in workplaces. Three case studies, conducted in Quebec, each focused on the study of a specific occupation (film technicians, food service helpers, and homecare nurses), and based on interviews and observations made in the field, will be presented in an effort to describe the impact of some of these changes, namely precarious employment, flexible management practices and work intensification, on knowledge sharing in real work situations. The results suggest that by undermining work teams and increasing the workload of experienced workers, these changes actually hinder the knowledge sharing process. In fact, in such a context, the work teams are continually being reconfigured, which can demotivate experienced workers who constantly have to initiate new recruits despite already having a work overload. Possible avenues for research are proposed with a view to helping organizations cope with these changes in a way that supports the experiential knowledge transfer and sharing process so vital to organizational performance and the preservation of worker health.


2005 ◽  
Vol 2 (2) ◽  
pp. 99-114 ◽  
Author(s):  
Thierry Nabeth ◽  
Liana Razmerita ◽  
Albert Angehrn ◽  
Claudia Roda

This paper presents a cognitive multi-agents architecture called Intelligent Cognitive Agents (InCA) that was elaborated for the design of Intelligent Adaptive Learning Systems. The InCA architecture relies on a personal agent that is aware of the user's characteristics, and that coordinates the intervention of a set of expert cognitive agents (such as story telling agents, assessment agents, stimulation agents or help agents). This InCA architecture has been applied for the design of K"InCA, an e-learning system aimed at helping people to learn and adopt knowledge-sharing management practices.


Sign in / Sign up

Export Citation Format

Share Document