首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
Although knowledge management (KM) tools are well established in technical support organizations, health-care organizations have only recently become aware of their benefits. This research investigates whether health care should adopt the same tools taking into account the different KM requirements in the two industries. This study analyzes narratives from key personnel in a technical support organization and a health-care organization to understand and compare their KM process components and facilitating information technology. The empirical data reveal that health care needs a personalization approach to KM focusing on new problem identification using interactive knowledge webs, while technical support relies on a codification approach for problem resolution using interpretive knowledge and a chain structure.  相似文献   

2.
3.
Tacit knowledge of health-care experts is an important source of experiential know-how, yet due to various operational and technical reasons, such health-care knowledge is not entirely harnessed and put into professional practice. Emerging knowledge-management (KM) solutions suggest strategies to acquire the seemingly intractable and nonarticulated tacit knowledge of health-care experts. This paper presents a KM methodology, together with its computational implementation, to 1) acquire the tacit knowledge possessed by health-care experts; 2) represent the acquired tacit health-care knowledge in a computational formalism--i.e., clinical scenarios--that allows the reuse of stored knowledge to acquire tacit knowledge; and 3) crystallize the acquired tacit knowledge so that it is validated for health-care decision-support and medical education systems.  相似文献   

4.

The terminological composition of information management (IM) and knowledge management (KM) is described in order to evidence how much do these areas overlap within the library and information sciences (LIS) space. A term co-occurrence analysis is conducted as from documents extracted from Web of Science, covering the period 1980–2015. To examine the terminological (di) similarity two approaches are applied: ‘overlay visualization? and ‘topic detection?. The percentage of terminological similarity oscillates between 24% and 38% according to the ‘overlay visualization? and ‘topic detection? techniques. At the core of the terminological intersection between IM and KM lies the study around processes, technologies and information systems. However, they are semantically two separate areas that tend to address similar dimensions -such as the managerial, educational and medical, but emphasizing different approach. Moreover, IM refers to the library and information organizations, highlighting the focus on personal information management, human information behavior, health information management, and information resource management. Oppositely, KM highlights the business, management and accounting realms in which topics like knowledge sharing and social networks, knowledge management strategies, and knowledge management projects are prevailing. These results would help to (re) define curricular contents of LIS programs as well as research and practical activities conducted by academicians and managers. This is the most comprehensive quantitative study in examining the epistemic borders between IM and KM in the LIS research. The authors consider that the methodological procedures here employed might be suitable to understand the boundaries between similar fields.

  相似文献   

5.
The incremental adoption of electronic media in U.S. health care has created increased risk of security and privacy violations in provider organizations. Protective regulatory efforts have been proposed to address ineffective security of patient information, with severe noncompliance penalties. Using data from a nationwide survey of health information managers, this study examines how industry-wide knowledge management trends may influence the degree of security program adoption in health-care organizations. Results suggest that significant nonadoption of mandated security measures continues to occur across the health-care industry. Paper-based systems still prevail, and computerized settings tend to have less security measures. Implications for document management and knowledge policy are discussed.  相似文献   

6.
Explores factors affecting the implementation of intranets, which are the technology upon which many knowledge management (KM) systems are built. Because intranets facilitate the sharing of employee knowledge, many believe that organizational culture influences intranet implementation. The results of this study found that intranet implementation is facilitated by a culture that emphasizes an atmosphere of trust and concern for other people (ethical culture), flexibility and innovation (developmental culture), and policies, procedures and information management (hierarchical culture). Management should ensure that the proper values are in place to optimize intranet implementation and to facilitate knowledge sharing  相似文献   

7.
The importance of knowledge management (KM) efforts is well recognized in the popular and academic press. However, KM efforts do not always lead to improved firm performance. This paper argues that different kinds of KM efforts may be appropriate for firms pursuing different business strategies, and the impact of a KM effort on firm performance would depend on whether the effort is aligned with the firm's business strategy. Prior literature on organizational learning, KM, and business strategy is used to develop these arguments, and also to identify the nature of KM efforts that would be most appropriate for firms pursuing Defender, Analyzer, and Prospector business strategies. An event study is used to evaluate the stock market reaction to a firm's public announcement of the KM effort. The empirical results, based on 103 KM announcements from 1995 to 2002, are consistent with the theory-based expectations, showing alignment between the KM effort and business strategy to be positively associated with impact on firm value. Some of the implications of these results for practice and future research are examined.  相似文献   

8.
This study conducted a cross-cultural analysis of the impact of knowledge management (KM) practices on the acceptance of Massive Open Online Courses (MOOCs). The study extended the Technology Acceptance Model (TAM) with KM practices. A structural equation modeling (SEM) was employed to test the hypothesized relationships based on data collected from 540 engineering students in Malaysia and Turkey. The results indicated that KM practices, including knowledge access, knowledge storage, and knowledge application have a positive and significant impact on perceived usefulness (PU) of MOOCs. However, knowledge sharing has a positive and significant impact on perceived ease of use (PEOU) of MOOCs. Further, a SEM-based multi-group analysis was employed to identify the moderating role of culture in examining the impact of KM practices on MOOCs acceptance. The findings suggested cultural differences in patterns between acceptance behaviors of engineering students in Malaysia and Turkey.  相似文献   

9.
Based upon a research survey of 228 firms in five states, several generalizations are apparent from the survey findings: (1) the graphic management tools utilized by a majority of all firms included the breakeven chart and the learning curve; (2) a sizable majority of firms (74.0 percent) reported not using the Line of Balance chart; (3) there is a relatively low rate of experimental use for all the specific tools; (4) there are very few rejections once the tool is utilized; and (5) in every instance there was a discernable pattern showing that the larger firms make heavier use of the graphic management tools. Except for the low usage with the Line of Balance chart, the high use of all the other four graphic management tools is encouraging. The low rate of experimental use indicates that the rate of change is very slow; however, once the graphic management tools are accepted, users are apparently well satisfied with their use because very few are subsequently rejected. The graphic management tools discussed in this article are relatively basic. Their greater utilization could be helpful toward the improved planning, scheduling, and controlling of a firm's activities.  相似文献   

10.
In response to increased security concerns, biometrics is becoming more focused on overcoming or complementing conventional knowledge and possession‐based authentication. However, biometric authentication requires special care since the loss of biometric data is irrecoverable. In this paper, we present a biometric authentication framework, where several novel techniques are applied to provide security and privacy. First, a biometric template is saved in a transformed form. This makes it possible for a template to be canceled upon its loss while the original biometric information is not revealed. Second, when a user is registered with a server, a biometric template is stored in a special form, named a ‘soft vault’. This technique prevents impersonation attacks even if data in a server is disclosed to an attacker. Finally, a one‐time template technique is applied in order to prevent replay attacks against templates transmitted over networks. In addition, the whole scheme keeps decision equivalence with conventional face authentication, and thus it does not decrease biometric recognition performance. As a result, the proposed techniques construct a secure face authentication framework in open networks.  相似文献   

11.
12.
This paper analyzes the performance of concatenated coding systems operating over the binary-symmetric channel (BSC) by examining the loss of capacity resulting from each of the processing steps. The techniques described in this paper allow the separate evaluation of codes and decoders and thus the identification of where loss of capacity occurs. They are, moreover, very useful for the overall design of a communications system, e.g., for evaluating the benefits of inner decoders that produce side information. The first two sections of this paper provide a general technique (based on the coset weight distribution of a binary linear code) for calculating the composite capacity of the code and a BSC in isolation. The later sections examine the composite capacities of binary linear codes, the BSC, and various decoders. The composite capacities of the (8,4) extended Hamming, (24, 12) extended Golay, and (48, 24) quadratic residue codes appear as examples throughout the paper. The calculations in these examples show that, in a concatenated coding system, having an inner decoder provide more information than the maximum-likelihood (ML) estimate to an outer decoder is not a computationally efficient technique, unless generalized minimum-distance decoding of an outer code is extremely easy. Specifically, for the (8,4) extended Hamming and (24, 12) extended Golay inner codes, the gains from using any inner decoder providing side information, instead of a strictly ML inner decoder, are shown to be no greater than 0.77 and 0.34 dB, respectively, for a BSC crossover probability of 0.1 or less, However, if computationally efficient generalized minimum distance decoders for powerful outer codes, e.g., Reed-Solomon codes, become available, they will allow the use of simple inner codes, since both simple and complex inner codes have very similar capacity losses  相似文献   

13.
王春丽  吴晓富  朱卫平 《信号处理》2017,33(8):1115-1121
基于无线信道特征的密钥生成过程中,为了降低通信双方生成的密钥不一致率常采取的措施是密钥协商。通常的密钥协商过程是在BSC信道下进行密钥协商,但是协商的效率较低。为了提高密钥协商的效率,本文提出一种在等效信道下基于LDPC编译码的协议机制。在此协议机制中,无线信道下采用Mathur[1][2]等人提出的Level-Crossing算法(LCA)提取密钥的过程构成了本协议中的等效信道,该机制对LCA提取后的密钥协商信息进行建模,推导了等效信道的最佳似然比,并据此采用LDPC码简单的加权比特翻转等译码算法[3-5]来有效进行密钥协商。将等效信道下LDPC码加权比特译码算法用于协商过程的性能和BSC信道下协商后的性能进行仿真,在SNR大于6db的前提下,仿真结果表明:1)在相同低门限的条件下,和LCA算法生成的初始密钥相比较,利用LDPC码比特翻转译码等算法在等效信道下和在BSC信道下协商后的密钥不一致率比初始密钥不一致率降低1至2个数量级;2)在等效信道下利用简单加权比特翻转译码算法进行密钥协商后的密钥不一致率比BSC信道下协商后的密钥不一致率降低大约1个数量级。   相似文献   

14.
Heterogeneous cellular networks performance is usually analysed by taking several Key Performance Indicators (KPIs) into account, their proper balance being required in order to guarantee a desired Quality of Service (QoS). An approach to simplify and integrate a set of KPIs into a single one is presented, by using the proposed Cost Function model that includes these KPIs, providing a single evaluation parameter as output, and reflecting network conditions and Common Radio Resource Management (CRRM) strategies performance. This paper proposes a Cost Function that enables the implementation of different CRRM algorithms and policies, by manipulating KPIs according to user’s or operator’s perspectives, allowing for a better QoS. Results show that different policies can in fact be established, with a different impact on the network, e.g., with median values ranging by a factor higher than two.  相似文献   

15.
Next generation knowledge management   总被引:3,自引:0,他引:3  
  相似文献   

16.
Distributed hypermedia systems that support collaboration are important emerging tools for creation, discovery, management and delivery of information. These systems are becoming increasingly desired and practical as other areas of information technologies advance. A framework is developed for efficiently exploring the hypermedia design space while intelligently capitalizing on tradeoffs between performance and area. We focus on a category of processors that are programmable yet optimized to a hypermedia application.The key components of the framework presented in this paper are a retargetable instruction-level parallelism compiler, instruction level simulators, a set of complete media applications written in a high level language, and a media processor synthesis algorithm. The framework addresses the need for efficient use of silicon by exploiting the instruction-level parallelism found in media applications by compilers that target multiple-instruction-issue processors.Using the developed framework we conduct an extensive exploration of the design space for a hypermedia application. We find that there is enough instruction-level parallelism in the typical media and communication applications to achieve highly concurrent execution when throughput requirements are high. On the other hand, when throughput requirements are low, there is little value in multiple-instruction-issue processors. Increased area does not improve performance enough to justify the use of multiple-instruction-issue processors when throughput requirements are low.The framework introduced in this paper is valuable in making early architecture design decisions such as cache and issue width trade-off when area is constrained, and the number of branch units and instruction issue width.  相似文献   

17.
分析了PCB企业知识管理的必要性,它是PCB企业迎接挑战、提升竞争力的必然选择。进而分析了PCB企业知识的特点和PCB企业知识管理现状,在此基础上提出了PCB企业知识管理实施的关键因素包括领导、文化与制度三个方面,同时对PCB企业知识管理实施的步骤做了初步的探讨。  相似文献   

18.
This research is built on the belief that artificial intelligence estimations need to be integrated into clinical social context to create value for health-care decisions. In sophisticated neonatal intensive care units (NICUs), decisions to continue or discontinue aggressive treatment are an integral part of clinical practice. High-quality evidence supports clinical decision-making, and a decision-aid tool based on specific outcome information for individual NICU patients will provide significant support for parents and caregivers in making difficult "ethical" treatment decisions. In our approach, information on a newborn patient's likely outcomes is integrated with the physician's interpretation and parents' perspectives into codified knowledge. Context-sensitive content adaptation delivers personalized and customized information to a variety of users, from physicians to parents. The system provides structuralized knowledge translation and exchange between all participants in the decision, facilitating collaborative decision-making that involves parents at every stage on whether to initiate, continue, limit, or terminate intensive care for their infant.  相似文献   

19.
Although organizations have applied a variety of practices and tools to address information systems development (ISD) performance problems, most of these approaches have focused on controlling and improving predictability of the development process. There is growing recognition that ISD is a knowledge-intensive process that requires the integration of specialized stakeholder knowledge. We develop the perspective that integration of this specialized knowledge across knowledge boundaries in the ISD process drives ISD performance. We theorize that formal and informal organizational integrative practices influence ISD performance, because they facilitate the development of boundary objects that effectively span knowledge boundaries. Results from a field study of 110 firms provide considerable support for the proposed model. This paper makes three novel contributions to the technology management literature. First, it demonstrates that knowledge integration across knowledge boundaries through boundary objects improves ISD performance. Second, it shows how formal and informal organizational integrative practices enhance the integration of specialized knowledge within and across organizational subunits. Third, it shows that the positive influence of formal and informal organizational integrative practices on ISD performance is partially mediated by knowledge integration. For engineering and technology managers, the results highlight the centrality of knowledge integration for the management of technology development. Collectively, these findings offer a novel knowledge integration-based perspective that complements prior research on systems development and new product development  相似文献   

20.
知识被认为是企业最重要的战略资源,企业成功与否取决于知识管理的成败。知识共享是企业实施知识管理活动的重要议题。本文详细分析了软件企业员工知识的特点,识别出影响员工知识共享的关键因素,提出了影响软件企业知识共享的基本模式。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号