Information Resources Management
Latest Publications


TOTAL DOCUMENTS

140
(FIVE YEARS 0)

H-INDEX

3
(FIVE YEARS 0)

Published By IGI Global

9781615209651, 9781615209668

2010 ◽  
pp. 2310-2325
Author(s):  
Adam Slagell ◽  
Kiran Lakkaraju

It is desirable for many reasons to share information, particularly computer and network logs. Researchers need it for experiments, incident responders need it for collaborative security, and educators need this data for real world examples. However, the sensitive nature of this information often prevents its sharing. Anonymization techniques have been developed in recent years that help reduce risk and navigate the trade-offs between privacy, security and the need to openly share information. This chapter looks at the progress made in this area of research over the past several years, identifies the major problems left to solve and sets a roadmap for future research.


2010 ◽  
pp. 2298-2309
Author(s):  
Justin Meza ◽  
Qin Zhu

Knowledge is the fact or knowing something from experience or via association. Knowledge organization is the systematic management and organization of knowledge (Hodge, 2000). With the advent of Web 2.0, Mashups have become a hot new thing on the Web. A mashup is a Web site or a Web application that combines content from more than one source and delivers it in an integrated way (Fichter, 2006). In this article, we will first explore the concept of mashups and look at the components of a mashup. We will provide an overview of various mashups on the Internet. We will look at literature about knowledge and the knowledge organization. Then, we will elaborate on our experiment of a mashup in an enterprise environment. We will describe how we mixed the content from two sets of sources and created a new source: a novel way of organizing and displaying HP Labs Technical Reports. The findings from our project will be included and some best practices for creating enterprise mashups will be given. The future of enterprise mashups will be discussed as well.


2010 ◽  
pp. 2226-2252
Author(s):  
Robin S. Poston ◽  
Cheri Speier

To solve complicated problems, people often seek input from others. Knowledge management systems (KMSs) provide help in this activity by offering a computer-mediated approach to information sharing. However, if the KMS contains content that is obsolete or incomplete, those using the system may expend greater amounts of effort to detect what content is worthwhile or they risk relying on poor inputs, which may lead to less accurate solutions to their problems. As a result, most KMSs include rating schemes as part of the user interface designed to help those using the system identify high-quality content. Rating schemes depend on current users rating the quality of the existing content, guiding subsequent users in future content searches. If specific ratings are low in validity, then they may not reflect the true content quality (unintentionally or intentionally). This chapter provides a robust summary of the KMS literature and draws on the effort-accuracy trade-off framework to offer the results of a research study. The research study examines how rating validity influences how KMS users employ their limited cognitive resources to search and evaluate KMS content, with the goal of finding and using the highest-quality content. Through an experimental design, the study described herein manipulates rating validity and content quality in a replicated KMS setting and examines how users trade off search and evaluation effort. The results of the study demonstrate that rating validity differentially influences how KMS search and evaluation effort relates to decision accuracy. The chapter concludes with a discussion of the study findings and ideas for future research.


2010 ◽  
pp. 2215-2225
Author(s):  
G. Scott Erickson ◽  
Helen N. Rothberg

Development of knowledge assets and protection of knowledge assets are both complementary and competing concerns for the contemporary business. Each has specific issues related to trust that need to be understood and addressed before an individual firm launches a knowledge management initiative. Further, with important contemporary trends such as enterprise systems, external knowledge management networks, and aggressive competitive intelligence efforts, decision-makers must increasingly evaluate their circumstances and establish the appropriate levels of trust between individuals and the organization and between cooperating organizations. This chapter reviews and elaborates on such issues. It then passes to a consideration of how these concerns might vary by industry, presenting selected data on knowledge development and knowledge protection conditions in a variety of industries.


2010 ◽  
pp. 2026-2045
Author(s):  
Ioannis Kostopoulos

This chapter highlights the need for using copyright protection tools in our digital transactions. The main tools of copyright protection, such as cryptography, data hiding, and watermarking, along with the security framework where these tools can be used is also presented. However, all these tools and methods can be used only inside a specific technological and legal framework. This gap between technology and traditional human activities is bridged by developing the Digital Rights Management systems which is presented as a necessary mechanism to provide integrated e-services over the Internet. The legal framework and the current activities of organizations as WIPO (World Intellectual Property Rights Organization) is also provided in this chapter with the existing DRM technologies and the future research directions in this field


2010 ◽  
pp. 1979-2004
Author(s):  
Bart H.M. Gerritsen

This chapter discusses the support of quality management by Enterprise Information Systems. After a brief introduction in ISO9001, one of the principle and widest-spread quality management frameworks, this chapter discusses the design and implementation of a typical QMS and in particular of key performance indicators, indicating the present state of performance in the organization. While analyzing design and implementation issues, requirements on the supporting EIS system will be derived. Finally, the chapter presents an outlook onto future developments, trends and research. This chapter reveals that key performance indicators can be well integrated in EIS systems, using either relational or objectoriented storage technology.


2010 ◽  
pp. 1779-1800
Author(s):  
Sandra K. Newton ◽  
J. Ellis Blanton ◽  
Richard Will

Little is known about the effects of the level of fulfillment of the IT professional’s psychological contract on their innovative work and organizational citizenship behaviors. Using psychological contract and social information processing theories, this article proposes to answer the research question: How does the level of fulfillment of the IT professionals’ psychological contract affect their organizational citizenship and innovative work behaviors? Survey data were collected from 209 IT professionals using groupadministered paper and online surveys. Results show positive relationships with the level of fulfillment of the IT professional’s psychological contract and their innovative work behavior, as well as four of their organizational citizenship behaviors, specifically loyalty, advocacy participation, obedience, and functional participation. Extending the body of knowledge, the dimensional approach of the psychological contract was used resulting in the scope, focus, and tangibility dimensions being the most significant predictors of the organizational behaviors.


2010 ◽  
pp. 1595-1616
Author(s):  
Fernando Garrigos

This chapter presents the interrelationships between professional virtual communities and social networks, and analyzes how, and in what ways, these communities play a crucial role in the creation and sharing of knowledge. The chapter begins by outlining how virtual communities are gaining importance in the new environment. It explains what we understand as a professional virtual community and its importance and also the relevance of social networks in today’s Knowledge Management age. The study then analyses how the development of social networks is crucial to the improvement of professional virtual communities, and also how virtual organizations can promote the improvement of social networks. Finally, the study examines how virtual communities are vital as mechanisms for creating and sharing knowledge.


2010 ◽  
pp. 1535-1551
Author(s):  
Salah Eldin Adam Hamza

This article studies the way tacit knowledge is dealt with in a high turnover business environment through a qualitative research approach in an engineering organization with respect to organizational culture and values and the effect in competitive stance. The study found peer review process and managerial/supervisory style to be effective in enabling new employees in a short time with knowledge critical for them to do a successful job, core values, and open-door policy to be necessary factors in forming a fertile environment for a quick tacit knowledge harvesting. The study also showed that a good competitive stance and customer satisfaction can be achieved and maintained through implementation of a rigorous peer review process. The study revealed noneffective utilization of knowledge management (KM) technical resources. The study directs future research towards evaluating possible objectives for utilization of KM technological resources, timeline for effective codification of tacit knowledge, and responsibilities for handling resources.


2010 ◽  
pp. 1506-1534
Author(s):  
Charles J. Kacmar ◽  
Susan S. Fiorito ◽  
Jane M. Carey

The nomological network of the technology acceptance model is expanded through the addition of affective and task-preparation variables as antecedents to traditional predictors of technology acceptance:output quality, result demonstrability, and ease of use. An empirical study involving a visual/simulation information system, set in the domain of retail merchandise planning, finds that negative affectivity (NA) is a consistent and strong negative antecedent to perceptions of output quality, result demonstrability, and ease of use. In contrast, positive affectivity (PA) is a significant and positive antecedent to ease of use, but not necessarily a significant antecedent to either output quality or result demonstrability. A new construct developed from the job characteristics literature—perceived task preparation—measured the subject’s perceptions of the pre-system usage training, which included task design and modeling instruction, scenarios of activities within the prospective information system, discussions and review of the system documentation, and highly structured, pre-task system use activities. Perceived task preparation was found to be a significant and strong positive indicator of computer self-efficacy.


Sign in / Sign up

Export Citation Format

Share Document