knowledge protection
Recently Published Documents


TOTAL DOCUMENTS

133
(FIVE YEARS 35)

H-INDEX

15
(FIVE YEARS 2)

2021 ◽  
Vol 13 (20) ◽  
pp. 11313
Author(s):  
Martine Gadille ◽  
Juan Ramón Gallego-Bono

Most of SMEs are engaged in open innovation practices, but they do not benefit from open innovation or from patenting in the same way as larger firms do. At the same time SMEs, as territorialized suppliers, play a crucial role within evolving regional specialization. In this context the purpose of our study is to examine how low and medium technology supplier SMEs learn and organize themselves at a territorial level to address the challenge of IP protection in an open innovation paradigm. We used a qualitative method with a longitudinal multi-case study involving 27 companies with a historical lance to compare the territorial dynamics of knowledge protection within clustered supplier SMEs in two European regions. The results show they protect their knowledge by learning how to design, in a direct relationship with clients, customized complex technological products to develop a new organizational matrix of multidisciplinary knowledge that reveals itself difficult to imitate within the clusters. They also cope with other supplier firms across sectors even if they show societal path dependencies in the way to build cooperation. This dynamic has given birth to changing structural relationships among regionally clustered SMEs and between them and large firms.


Author(s):  
Joy Wachinga ◽  
Jared Deya

With intensifying rivalry in the mobile telephone industry, mobile telephone firms are finding knowledge management capabilities as vital resource for ensuring their performance. However, there is scanty empirical literature to help these firm associate knowledge management capabilities to their performance, hence this study which sought to ascertain the inspiration of knowledge management capabilities on the performance of mobile telephone firms in Kenya. it objectives were to; establish the influence of knowledge acquisition, find out the influence of knowledge application, determine the role of knowledge transfer, ascertain how knowledge protection influence, and stablish the joint effect of knowledge management capabilities (knowledge acquisition, knowledge application, knowledge transfer and knowledge protection) on the performance of the mobile telephone firms in Kenya. This study adopted descriptive survey design where it used a target population of the 63 heads of human resources, information marketing and finance from the 21 telephone firms operating in Kenya. Since the target population was easily manageable and readily accessible, census was used. The data which was collected data from primary sources using questionnaires was analysed using quantitative approach to produce descriptive and inferential statistics. In addition, the study tested for its hypothesis testing using; t-test,. F test and Analysis of Variance. The study found that each of; knowledge acquisition, knowledge application, knowledge transfer and knowledge protection have a positive significant effect of performance. The study concluded that on embracing knowledge management capabilities; knowledge acquisition; knowledge application; knowledge transfer; and knowledge protection, mobile telephone firms in Kenya experienced significant improved in performance and as they also gained competitive advantage over their competitors.


2021 ◽  
pp. 107780042110218
Author(s):  
Sweeney Windchief ◽  
Jason Cummins

As part of a continuing conversation related to Indigenous methodologies in Western academic contexts, this manuscript includes a summary of the scholarly dialogue by providing background information and situatedness to an exchange that is positioned in the academy and Indigenous community simultaneously. The dialogue thus far includes a keynote presentation and a series of manuscripts that collectively help explain Indigenous research methodologies (IRMs) and delineates important considerations for practitioners and communities who relate to Indigenous research. The authors share where they agree, and where they diverge as well as their rationale for continuing the discourse in an academic forum. The paper concludes with an alternative method for dissemination (a winter count), that reimagines epistemological pluralism and knowledge protection through bicultural accountability. We consider the repatriation of Indigenous knowledge to be paramount in this process.


2021 ◽  
Vol 13 (17) ◽  
pp. 9791
Author(s):  
Shiaw Tong Ha ◽  
May Chiun Lo ◽  
Mohamad Kadim Suaidi ◽  
Abang Azlan Mohamad ◽  
Zaidi Bin Razak

Knowledge management (KM), a process of acquiring, converting, applying, and protecting knowledge assets, is crucial for value creation. The purpose of this research is to empirically test the relationship between KM processes (knowledge acquisition, knowledge conversion, knowledge application, and knowledge protection), entrepreneurial orientation (EO), and firm performance. Data were collected from 159 small- and medium-sized enterprises (SMEs) in Malaysia using a cross-sectional survey. This research uses partial least squares structural equation modeling (PLS-SEM) and WarpPLS version 7.0 to test the model. The results show that three of four KM dimensions: knowledge acquisition, knowledge conversion, and knowledge protection are positively related to performance. Moreover, EO has been found to moderate the relationship between knowledge application and performance positively.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Mohammed Abbas ◽  
Adnan Alghail

Purpose The mobile shadow information technology (IT) phenomenon is both completely misunderstood and negatively explored by those participating inside the organizational ecosystem. It represents all internet-based software, any other solutions for communications or employees’ sharing without any formal authorization or approval from the IT department. Such behavior can lead to a security breach of the organization’s data privacy, as these risks could disseminate it without the organization fully knowing. Recent research identifies that shadow IT is rarely covered from the knowledge sharing and knowledge protection (KP) perspective. This paper aims to provide an insight on how mobile shadow IT as a phenomenon could impact KP of an organization as a whole. Design/methodology/approach This is an exploratory study based on a qualitative approach. The authors conducted interviews with 11 IT users to answer the main research question. The interview guidelines were divided into three parts: types of mobile shadow IT and occurrence; KP nature in the workplace; and mobile shadow IT impact on KP. Findings The research findings identified that most interviewees use mobile shadow IT without any notice or permission from their IT departments. This sharing also negatively impacts the KP in the organization. The most common mobile shadow IT applications are the clouded type like Dropbox, Google Drive and WhatsApp. Interviewees are using mobile shadow IT mainly because organizations do not provide suitable tools to communicate efficiently. The authors concluded that mobile shadow IT harms KP with no security and privacy on what is being shared because this process is unmonitored by the organization. Practical implications For adequate knowledge and data protection, IT departments need to take more actions and efforts. This study can help IT decision-makers cope with the technology changes while understanding mobile shadow IT impacts. This study also offers insight regarding types of applications that can be used as an alternative tool for employees rather than using unauthorized applications. This research shows that medium-sized organizations are free to use these applications, which can cause damage to organizations. Originality/value This research is arguably among the first to explore the interviewees’ perspectives on how mobile shadow IT impacts KP. This paper also provides theoretical and practical insights by identifying the three primary constructs and how mobile shadow IT usage can affect KP.


2021 ◽  
Vol 2 (1) ◽  
pp. 14-26
Author(s):  
John Githii

Purpose: The underlying rationale for learning organizations is that in circumstances of quick change just those that are adaptable, versatile and gainful will exceed expectations. For this to happen, it is contended, associations need to find how to tap individuals' responsibility and ability to learn at all levels. The general objective of the study was to evaluate effect of knowledge management on organization performance. Methodology: The paper used a desk study review methodology where relevant empirical literature was reviewed to identify main themes and to extract knowledge gaps. Findings: The study concludes that knowledge protection had the greatest effect on the performance of microfinance organizations, followed by knowledge acquisition, then knowledge conversion while knowledge application had the least effect to the performance. The study found out that the organizations have impressed attributes of knowledge applications such as individuals, organization culture, and identity, policies and documents in their organization which had resulted in improved performance. However, routines and systems were found to have less influence on the performance of these organizations. Recommendations: There is a need for managers also need to take advantage of the technological capability to support knowledge application processes. In particular, organizations should use technology to map the location of specific types of knowledge, thereby facilitating the application and sharing of knowledge. Technology also should be connected to encourage individuals in different areas to take in as a gathering from a solitary or numerous assets and a single or various focuses in time. Thusly, social and specialized infrastructural components can supplement each other and meet up to improve learning focused procedures.  


2021 ◽  
Vol 2021 (1) ◽  
pp. 11361
Author(s):  
Tatbeeq Raza Ullah ◽  
Lea Stadtler ◽  
Anne-Sophie Fernandez

2021 ◽  
Vol 14 (2) ◽  
pp. 349-368
Author(s):  
Rosangela Fritscher Santos ◽  
Mirian Oliveira ◽  
Marcirio Silveira Chaves

Purpose - The social media have become powerful tools that can be used to do much more than connecting relatives and friends, helping find a job or providing advertising space. This study aims to present the benefits of combining the subjects related to Knowledge Sharing, Social Media and Social Capital theory.Design/methodology/approach – Literature review of 22 papers identified as relevant when combining the subjects Social Media, Social Capital and Knowledge Sharing. The 22 documents were subjected of content analysis.Findings – The analysis of the literature revealed two fundamental roles for social media within organizations – an operational role – working as a channel or tool; a transformative role – used to support organizational strategy.Research limitations/implications - The limitation of this study is related to the limited number of papers that resulted from the search.Practical implications – The benefits of combining the three subjects include improvements on informal communication, better collaboration and cooperation, and a positive influence on job performance and innovation.Originality/value - The proposed research agenda highlights the importance of future investigations into the sharing of tacit knowledge through Social Media; focusing on how to generate trust via Social Media and suggests research attention related to knowledge protection.


Author(s):  
Elena Fioretto ◽  
Nora Lombardini ◽  
Cristiana Achille ◽  
Cinzia Tommasi

Given the growing relevance, at national and international levels, of restoration and conservation interventions on existing buildings, the Universities have developed degree courses with specific addresses in “Conservation of Architectural and Environmental Heritage”. The students that attend this course become a graduate with specific, extensive, and updated skills in the field of knowledge, protection, conservation, reuse, and enhancement of architectural and environmental heritage. The complexity of the intervention is faced through the contribution of the various disciplines that contribute to the training of the architect, at the same time they studied modern instruments and tools for collecting and managing data, from on-field survey to sharing projects and ideas. The goal is to learn to manage, in its entirety, the project and the range of possible interventions with deep conservative sensitivity, with skills ranging from maintenance to restoration and redevelopment, both in the dimension of the single building and at the urban and landscape scale.


Sign in / Sign up

Export Citation Format

Share Document