Online Journal of Applied Knowledge Management
Latest Publications


TOTAL DOCUMENTS

94
(FIVE YEARS 34)

H-INDEX

3
(FIVE YEARS 1)

Published By International Institute For Applied Knowledge Management - IIAKM

2325-4688

2021 ◽  
Vol 9 (1) ◽  
pp. 46-61
Author(s):  
André Rosendorff ◽  
Alexander Hodes ◽  
Benjamin Fabian

Artificial Intelligence (AI) is becoming increasingly important in many industries due to its diverse areas of application and potential. In logistics in particular, increasing customer demands and the growth in shipment volumes are leading to difficulties in forecasting delivery times, especially for the last mile. This paper explores the potential of using AI to improve delivery forecasting. For this purpose, a structured theoretical solution approach and a method for improving delivery forecasting using AI are presented. In doing so, the important phases of the Cross-Industry Standard Process for Data Mining (CRISP-DM) framework, a standard process for data mining, are adopted and discussed in detail to illustrate the complexity and importance of each task such as data preparation or evaluation. Subsequently, by embedding the described solution into an overall system architecture for information systems, ideas for the integration of the solution into the complexity of real information systems for logistics are given.


2021 ◽  
Vol 9 (1) ◽  
pp. 62-81
Author(s):  
Gundars Kaupins

As a variety of electronic monitoring methods such as global positioning systems are available, monitoring employees without notice is a consideration even though several laws ban it and ethical questions remain. Monitoring without notice has risks that Human Resources (HR) managers should consider when they set monitoring policies to enhance knowledge management. A total of 174 HR managers were asked about their top reasons to electronically monitor employees with or without notice. About half received information that a company did not notify employees of electronic monitoring and the other half received the opposite information. Prospect theory was the basis for collecting data to understand the importance of risk in setting policies. It states that people in perceived good conditions avoid risk because they feel there is more to lose than to gain. The leading reason to electronically monitor employees for both groups was computer virus and malware protection. Organizational threats associated with legal issues showed more HR support for monitoring without notice. Opportunities associated with employee productivity indicated relatively more support for monitoring with notice. As a result of this research, perceived threats in the workplace are significant reasons why HR managers might not provide notice of monitoring in the workplace. This has potential legal and ethical implications.


2021 ◽  
Vol 9 (1) ◽  
pp. 16-30
Author(s):  
Sara Scipioni

As a dynamic phenomenon that interacts across different levels – individual, group, organizational, interorganizational – the development of a unique multilevel theory of Organizational Learning (OL) is absent and challenging. The intent of this paper is to contribute to the advancement of such a theory. In this context, a systematic review of the 2004-2020 literature was carried out, with analysis of 120 papers selected from management and organization science top-ranked journals. Based on the conceptualization of OL as multiple processes of knowledge creation, transfer, and retention, the reviewed papers highlight that internal and external environments, organizational culture, strategy, structure, leadership, technology, and shared environments need to be considered for a comprehensive understanding of vertical trickle-down OL processes, and of bottom-up emerging OL processes, in both single and multi-level OL analyses. This study contributes to the theory of OL with the presentation of a novel taxonomy of contextual factors that could help researchers in the development of comprehensive OL studies. The implications offered should support the definition of a multilevel theory for OL that embraces all the relevant factors that influence its processes across the different organizational levels. The review closes with specific recommendations for further studies in OL.


2021 ◽  
Vol 9 (1) ◽  
pp. 31-45
Author(s):  
Emily Africk ◽  
Yair Levy

Data breach incidents are reported in the media to be on the rise with continuously increasing numbers. Additionally, data breaches serve a major negative impact to organizations. This study focuses on combining experience in data analytics, visualization, and quantitative analysis for business intelligence in the context of cybersecurity big-data over a period of 15-years. A large data set containing 9,015 data breaches was provided via the Privacy Rights Clearinghouse data breach database from the start of 2005 to the end of 2019. The aim of this work was to slice the data as well as represent it into a business-related visualization using time-series analysis that can help executives understand complex cybersecurity breaches, their impact, and their trend over time. We have created visualization figures along with explanations of what each visualization means in the context of cyber-attacks over time. This project was set to serve as a breakdown of the important findings from the Privacy Rights Clearinghouse data breach database of over 15-years. These findings are communicated through both key numbers and quantitative analyses for business intelligence. While our project does not cover every aspect of the dataset (due to its significant size), it serves more as a focus on one particular part of the data: incident types and their volume over the 15-year timeframe to help business executives visualize cybersecurity trends. This paper ends with a conclusion and discussion on how such cybersecurity visualizations can help industries along with future research needed.


2021 ◽  
Vol 9 (1) ◽  
pp. 1-15
Author(s):  
Vered Silber Varod ◽  
Ingo Siegert ◽  
Oliver Jokisch ◽  
Yamini Sinha ◽  
Nitza Geri

Despite the growing importance of Automatic Speech Recognition (ASR), its application is still challenging, limited, language-dependent, and requires considerable resources. The resources required for ASR are not only technical, they also need to reflect technological trends and cultural diversity. The purpose of this research is to explore ASR performance gaps by a comparative study of American English, German, and Hebrew. Apart from different languages, we also investigate different speaking styles – utterances from spontaneous dialogues and utterances from frontal lectures (TED-like genre). The analysis includes a comparison of the performance of four ASR engines (Google Cloud, Google Search, IBM Watson, and WIT.ai) using four commonly used metrics: Word Error Rate (WER); Character Error Rate (CER); Word Information Lost (WIL); and Match Error Rate (MER). As expected, findings suggest that English ASR systems provide the best results. Contrary to our hypothesis regarding ASR’s low performance for under-resourced languages, we found that the Hebrew and German ASR systems have similar performance. Overall, our findings suggest that ASR performance is language-dependent and system-dependent. Furthermore, ASR may be genre-sensitive, as our results showed for German. This research contributes a valuable insight for improving ubiquitous global consumption and management of knowledge and calls for corporate social responsibility of commercial companies, to develop ASR under Fair, Reasonable, and Non-Discriminatory (FRAND) terms


2020 ◽  
Vol 8 (2) ◽  
pp. 107-121
Author(s):  
Molly Cooper ◽  
Yair Levy ◽  
Ling Wang ◽  
Laurie Dringus

Phishing emails, also defined as email spam messages, present a threat to both personal and organizational data loss. About 93% of cybersecurity incidents are due to phishing and/or social engineering. Users are continuing to click on phishing links in emails even after phishing awareness training. Thus, it appears that there is a strong need for creative ways to alert and warn users to signs of phishing in emails. ‘System 2 Thinking Mode’ (S2) describes an individual in a more aware state of mind when making important decisions. Ways to trigger S2 include audio alerts, visual alerts, and haptic/vibrations. Assisting the user in noticing signs of phishing in emails could possibly be studied through the delivery of audio, visual, and haptic (vibration) alerts and warnings. This study outlines the empirical results from 32 Subject Matter Experts (SMEs) on an initial prototype design and development of an email phishing alert and warning system. The prototype will be developed to alert and warn users to the signs of phishing in emails in an attempt to switch them to an S2 state of mind. The preliminary results of the SMEs indicated that several features for a phishing alert and warning system could be assembled, resulting in a mobile phishing alert and warning prototype. Visual icons were chosen for each sign of phishing used in the prototype, as well as voice over warnings and haptic vibrations. The preliminary results also determined task measurements, ‘ability to notice’, and ‘time to notice’ signs of phishing in emails.


2020 ◽  
Vol 8 (2) ◽  
pp. 91-106
Author(s):  
Orna Kopolovich

Massive Open Online Courses (MOOCs), growing in number in recent years, occupy a significant place as an open educational resource, and provide insights into the development process as well as offer an innovative educational experience. This reflective article examines insights gathered during the development and offering of two sessions of a Negotiation Management MOOC. The article reviews the development process of the course which is built as a series of situations that simulate real-life moments. The episodes are displayed in a mini case format, based on the principle of sitcoms and the 'edutainment' (educational entertainment) approach. The video clips combine the simulations with the lecturer's analysis, using theories, models, and concepts from their course and training. This is intended to produce a strong emotional engagement in the course content and to motivate the students to continue learning. The developmental stages raised pedagogical questions around content and training, relating to the length of the video clips, interactive learning, and communication. Those stages are presented in the first part of this article. In addition, in its second part, the article offers insights from two target audiences as reported in the student experience reports. The surveys refer to the teaching method, the length of the videos, interactive learning and the unique integration of lecturers and actors in the videos. The student surveys and the lecturer's perspective give insights concerning course development and teaching approach for the Edutainment MOOC approach. These insights will assist other MOOC development and teaching teams, specifically soft skill MOOCs.


2020 ◽  
Vol 8 (2) ◽  
pp. 71-90
Author(s):  
Roisin Mullins ◽  
Sandra Dettmer ◽  
Monika Eisenbardt ◽  
Ewa Ziemba

The prosumer engagement conceptual model was considered in light of the Process Classification Framework and how results from Poland and United Kingdom (UK) survey data informed design of the combined prosumer engagement and knowledge exchange conceptual model. The desk literature method was used to review the papers in answering the research propositions. The revised model contains the constructs for supporting prosumer engagement to include sustainability and describes the flow of knowledge sharing and knowledge exchange. Knowledge exchange is the method used to capture and improve enterprise analysis of prosumer knowledge sharing. The sustainability construct includes circular economy philosophy where enterprises evaluate their product and service designs in terms of process stages. The findings confirm the need for increased prosumer engagement as enterprises strive to adopt ways of limiting negative impacts on the environment and improving ethical and responsible business practices. The circular economy is having an impact on all industrial sectors requiring them to evaluate and rethink their processes. The enhancement of the role of prosumers in the circular economy could act as a positive driver for business process changes and aid enterprises in meeting carbon neutral plans. The main contribution of this paper is to offer a novel concept that explains how enterprises can capture and translate prosumer knowledge to inform business strategy within a circular economy setting.


2020 ◽  
Vol 8 (2) ◽  
pp. 53-70
Author(s):  
Patrick Fonseca ◽  
Winnie Ng Picoto

Due to advanced technologies, companies currently face massive changes in their work. The ability to connect with and to satisfy their customers through software-based experiences is even more important. This study contributes to the literature by helping companies rethink their strategies on the development of competencies to respond to the challenges of the current digital transformation. It further contributes by identifying the digital competencies, which are important in the companies’ workplace environment of today. This study used a panel of 16 professionals to create an ordering rank according to the degree of importance of digital competencies. This ranking provides an updated overview of the challenge from the gap in digital competencies that has resulted from the digital transformation. We used the Delphi method to divide this process into two phases with two rounds. According to the results, the most important digital competencies are related with data analysis, use, and collaboration through digital technologies.


2020 ◽  
Vol 8 (2) ◽  
pp. 17-30
Author(s):  
Michelle Jordan ◽  
Gunnar Auth ◽  
Oliver Jokisch ◽  
Jens-Uwe Kühl

Software systems for the Configure Price Quote (CPQ) process of complex product portfolios have emerged in the sales function of companies recently. A flexible quote of complex products, in particular for a Business-to-Business (B2B) customer requires a wide variability of product features and configurations, along with the ability to deliver competitive quotes in short time. The CPQ system aims to reduce the process time, to increase the process quality by integrating information and data stored in several enterprise systems with codified explicit and implicit knowledge from individuals. As in most of the knowledge management systems, the openness of the knowledge holders to share and codify their individual knowledge is a critical success factor. In this case study, we look at the CPQ system implementation of a multinational Information Technology (IT) solution provider from a process perspective and with regard to both the technical and organizational challenges in a holistic approach. The article starts with an introduction to CPQ systems based on works from the Knowledge Management (KM) domain. After outlining our research methodology, we present the case together with a generalization of the CPQ implementation process. Our findings from the investigated scenario indicate positive influence of 1) the internal promotion of CPQ systems as technology innovation for motivating expert knowledge holders to collaborate; 2) an active preparation of the organizational environment for the upcoming changes; and 3) a hybrid agile implementation process.


Sign in / Sign up

Export Citation Format

Share Document