首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 0 毫秒
1.
Group support systems in Hong Kong: an action research project   总被引:4,自引:0,他引:4  
The last dozen years have seen a considerable investment of resources into the research and development of group support systems (GSS) technology. This paper describes how GSS was used to support a process improvement project in a Hong Kong accounting firm. Although the project encountered many difficulties, the application of action research facilitated the adaptation of the GSS to the shifting circumstances, and the project was successfully completed. A variety of lessons concerning the use of GSS are presented, while increased use of action research in complex organizational contexts is recommended.  相似文献   

2.
By virtue of the non-profit nature of school education, a professional virtual community composed of teachers provides precious data to understand the processes of knowledge sharing and creation. Guided by grounded theory, the authors conducted a three-phased study on a teachers’ virtual community in order to understand the knowledge flows among community members from different organizations. This study also portrays the process of knowledge sharing and creation for teachers participating in virtual teams of a teachers’ professional community. The resulting model articulates causal conditions, action/interaction strategies, consequence, and contextual environments. The concept of knowledge buckle is derived to connect the knowledge transfer among socialization, externalization, and combination activities.  相似文献   

3.
Knowledge sharing and investment decisions in information security   总被引:1,自引:0,他引:1  
We study the relationship between decisions made by two similar firms pertaining to knowledge sharing and investment in information security. The analysis shows that the nature of information assets possessed by the two firms, either complementary or substitutable, plays a crucial role in influencing these decisions. In the complementary case, we show that the firms have a natural incentive to share security knowledge and no external influence to induce sharing is needed. However, the investment levels chosen in equilibrium are lower than optimal, an aberration that can be corrected using coordination mechanisms that reward the firms for increasing their investment levels. In the substitutable case, the firms fall into a Prisoners' Dilemma trap where they do not share security knowledge in equilibrium, despite the fact that it is beneficial for both of them to do so. Here, the beneficial role of a social planner to encourage the firms to share is indicated. However, even when the firms share in accordance to the recommendations of a social planner, the level of investment chosen by the firms is sub-optimal. The firms either enter into an “arms race” where they over-invest or reenact the under-investment behavior found in the complementary case. Once again, this sub-optimal behavior can be corrected using incentive mechanisms that penalize for over-investment and reward for increasing the investment level in regions of under-investment. The proposed coordination schemes, with some modifications, achieve the socially optimal outcome even when the firms are risk-averse. Implications for information security vendors, firms, and social planner are discussed.  相似文献   

4.
Knowledge management is the process of capturing, sharing, developing, and using the knowledge efficiently. Knowledge sharing as one of the important parts of the knowledge management system means that an individual, team, and the organization share the knowledge with other members in the form of activities through the various ways. On the other hand, a project team is a team whose members usually belongs to different departments and are assigned to join the same project. In a project team, knowledge sharing is very important because it provides a link between the member and the project team by sharing knowledge to reduce cost and increase the performance. However, despite the importance of the knowledge sharing mechanisms and techniques in the project teams, to the best of our knowledge, the comprehensive and systematic research and study about the antecedents and backgrounds of knowledge sharing mechanisms between project teams is rare. Therefore, the main aim of this paper is to provide the comprehensive and detailed review of the state-of-the-art knowledge sharing mechanisms in the project team as well as directions for future research. Also, this paper presents a systematic literature review (SLR) on the knowledge sharing mechanisms in project teams up to the end of 2015. We identified 71 papers, which are reduced to 28 primary studies through our paper selection process. By providing the state-of-the-art information and the challenges issues, this survey will directly support academics, researchers and practicing professionals in their understanding of developments in knowledge sharing mechanisms and techniques in project teams.  相似文献   

5.
Previous studies have confirmed the knowledge sharing visibility (KSV) may ensure the incentive-sharing relationship within traditional organizations. However, considering high loafing tendency in IT-based and distributed environments, this effect should be re-examined. This study examines how KSV impacts on incentive-based relationship in IT-based knowledge management systems. The data were collected from real KM systems in an innovative service company. The results show that, in distributed environment, KSV was still a critical moderators in the prediction of employee’s knowledge sharing behaviors. In the electronic KMS environment, the positive relationship between incentive and KS is stronger when employees’ perceived KSV is higher. This research contributes theoretically to KS literature in examing the KSV as the three-way moderators on incentive-based relationship in IT-based environment, from real organizational samples.  相似文献   

6.
This paper discusses how research with practitioners can help reconcile the top‐down requirements of headquarters with the bottom‐up local needs in the context of global information systems. Based on a 12‐month canonical action research project that took place at the Chinese branches of a French multinational corporation, our research revealed and addressed workarounds that the Chinese users of a company‐wide global enterprise resource planning system had put in place that were not expected nor desired by company headquarters. From the local users' point of view, they were necessary to deal with Chinese legislation and cultural practices, but from the French headquarters' point of view, they meant that many of the potential gains of global standards were lost. Activity theory was used as a focal theory to analyse each of these workarounds and business process management as an instrumental theory to design solutions to the workarounds. We describe in detail how we used canonical action research to successfully deal with exemplars of each of the three types of workaround identified (data adjustments, process adjustments and parallel‐system adjustments). Unusually, the research relates to post‐implementation change rather than to that looking at change occurring before and during implementation. We argue that canonical action research and the particular combination of activity theory and business process management are appropriate for dealing with workarounds and this has not been demonstrated previously. Further, our research – deemed successful by managers, users and researchers alike – took place in China where previous literature suggests only limited success with such global systems.  相似文献   

7.
This article applies reflexive and dialogue oriented approaches to municipal planning. Experience from the dialogical development process in Vennesla is discussed, highlighting the potential of collaborative work in a development coalition. Dialogue and democracy in the coalition are discussed, emphasising the social construction of meaning and knowledge.
Jens Kristian FosseEmail: Phone: +47-48-010520Fax: +47-38-142201
  相似文献   

8.
The success of information system development involving multi-organizational collaboration can depend heavily on effective knowledge sharing across boundaries. This paper reports on a comparative examination of knowledge sharing in two separate networks of public sector organizations participating in information technology innovation projects in New York State. As is typical of innovations resulting from recent government reforms, the knowledge sharing in these cases is a critical component of the information system development, involving a mix of tacit, explicit, and interactional forms of sharing across organizational boundaries. In one case the sharing is among state agencies and in the other across state and local government agencies. Using interviews, observations and document analysis, the longitudinal case studies follow knowledge sharing and other interactions in the interorganizational networks of these two distinct settings. Results confirm the difficulty of sharing knowledge across agencies, and further reveal the influences of several relevant factors—incentives, risks and barriers for sharing, and trust—on the effectiveness of knowledge sharing. The results contribute to theory on knowledge sharing processes in multi-organizational public sector settings and provide practice guidance for developing effective sharing relationships in collaborative cross-boundary information system initiatives. The research reported here is supported by the National Science Foundation grant #SES-9979839. The views and conclusions expressed in this report are those of the authors alone and do not reflect the views or policies of the National Science Foundation.  相似文献   

9.
In knowledge management (KM)-related research, effective knowledge sharing is considered to be one of the most critical components of KM success. For the present research, the authors conducted a longitudinal, two-phased study to evaluate if the Theory of Reasoned Action (TRA) and three variations of the Theory of Planned Behavior—namely, TPB, decomposed TPB (DTPB), and revised TPB (RTPB)—can adequately predict knowledge sharing behaviors. The first TRA-based study shows a severe limitation in the ability of the intention to predict actual knowledge sharing behaviors collected from a knowledge management platform. In a subsequent study, three variations of TPB-based models were employed to show that, although the independent variables (i.e., attitude, subjective norm, and perceived behavior control that is decomposed into controllability and self-efficacy) give satisfactory explanations of variance in intention (R2 > 42%), the intention–behavior gap still exists in each of the three models. Only the perceived self-efficacy in the revised TPB can directly predict knowledge sharing behaviors. This gap highlights the importance of knowledge sharing as a fundamentally social activity for which the actualization of intention into actions may be interrupted due to barriers such as a mistake-free culture or others’ deliberate misinterpretations that may in turn cause unanticipated negative consequences to the person. The theoretical implication of this study is that in applying TPB to study knowledge sharing practices, researchers must focus on control beliefs that reflect people’s capacity to overcome possible environmental challenges encountered in carrying out their knowledge sharing intentions.  相似文献   

10.
Abstract This paper raises general issues about the way computer systems are developed and relates them to education, in particular the role of teachers in research into classroom applications. The views expressed arise from research into the use of wordprocessors in secondary schools. The broad framework of the research work undertaken has been the relationship between the introduction of computers, the perception of users and the conditions for genuine change in practice. Curriculum research is a necessary part of the process of change but it must address the practical context through those most directly involved in it. The introduction of computers across the curriculum has raised questions about their impact on learning and teaching. The key question is how teachers might be active participants in such a process. Using a simplified representation of the innovation process, issues are raised about the development and evaluation of computer systems, the context into which they are introduced, the people who use them and the interrelationship between those elements.  相似文献   

11.
Global virtual teams (GVTs) allow organizations to improve productivity, procure global knowledge, and transfer best practice information instantaneously among team members. GVTs rely heavily on IT and have little face-to-face interaction, thereby increasing problems resulting from geographic barriers, time language, and cultural differences, and inter-personal relationships. The purpose of our study was to design a normative framework that would assist organizations in understanding the relationship between diversity, mutual trust, and knowledge sharing among GVTs, with additional focus on understanding the moderating impact of collaborative technology and task characteristics. Empirical data was collected from 58 GVTs and analyzed using a Hierarchical Multiple Regression technique. Results showed that in GVTs, deep level diversity has a more significant relationship with team processes of mutual trust and knowledge sharing than visible functional level diversity. This relationship is moderated by the collaborative capabilities of available technology and levels of interdependence of the task. Furthermore, knowledge sharing and mutual trust mediate the relationship between diversity levels and team effectiveness.  相似文献   

12.
It is well known that medical knowledge is growing so rapidly that it is difficult or impossible for healthcare professionals to keep up. More and more techniques for diagnosing and treating diseases are becoming available, yet new research findings and clinical practices are slow to spread. Information technology and the internet are providing important new ways of disseminating knowledge in healthcare as in many other domains. Knowledge engineering techniques for supporting decision-making and process management are also becoming available, and can be used to support busy clinicians, helping to ensure that their decisions are consistent with current knowledge and clinical procedures are carried out in a timely, efficient and safe way. The OpenClinical.net project is building on these techniques to demonstrate a new paradigm for disseminating knowledge and promoting best practice. The key idea is that much professional expertise can be modelled as computer-interpretable knowledge and used to assist decision-making, workflow management, communication and coordination of care and many other professional tasks. The central goal of OpenClinical.net is to demonstrate how this might be done at scale, through a form of “crowd sourcing”, in order to create and maintain a sharable knowledge base that is available in an open access and open source repository. This paper provides an overview of the project and a summary of progress to date.  相似文献   

13.
In this paper, we study how the firm share the special knowledge of two knowledge-complementarity clients by implementing a large and complex project which the firm out-sourced. Firstly, incentive mechanism for complementarity special knowledge sharing are designed for clients being risk-neutral and risk-averse respectively under the asymmetric information. Further, knowledge complementary effects and other relevant factors on the optimal incentive coefficient are analyzed. Lastly, the numerical results are reported.  相似文献   

14.
Tsung-Yi   《Computers in Industry》2008,59(5):502-519
Collaborating throughout a product life cycle via virtual enterprise (VE) is one of the most promising strategies for enhancing global competitiveness. Efficient and secure knowledge sharing is critical to the success of a VE. This study presents a novel approach, model and technology for knowledge access control and sharing across enterprises. First, this study proposes an ontology-based knowledge sharing model and a multiple-layer knowledge representation framework on which a knowledge access control model for knowledge sharing in a VE is proposed. In the proposed model, user authorizations permitting access to knowledge in a VE are classified into two levels: (1) basic privileges and (2) extended privileges. The former is evaluated from four dimensions, i.e. who, what, when and where, while the latter is determined by considering how three domain ontologies, i.e., product, organization and activity, are related. This study then develops a knowledge access control policy (KACP) language model which is used to identify the knowledge access control and sharing rules of a VE and all its enterprise members. The knowledge access control model proposed in this study can facilitate VE Knowledge management and sharing across enterprises, enhance knowledge sharing security and flexibility and regulate knowledge sharing to expeditiously reflect changes in the business environment.  相似文献   

15.
We explore the role of knowledge sharing within a downstream two-echelon supply chain. Drawing on chaos theory and the literature on knowledge management, we contrasted the information and knowledge sharing contexts. More specifically, we have provided a real-world case study of knowledge management practice at a U.S. Fortune 40 firm. We reviewed the major issues in this firm's downstream supply chain operations and have described its knowledge management initiative. Finally, we discuss the implications of knowledge management on managerial practice.  相似文献   

16.
17.
The article reflects on experience of action research in the context of regional development, where there has been pressure to produce practical results. The epistemological status of Action Research is explored, in contrast to conventional social science research. The article concludes that an ongoing relationship with conventional social research is necessary.An earlier version of this paper has been presented at the workshop: Innovation and Regional Development Kingston University 10th December 2004  相似文献   

18.
Knowledge sharing plays an important role in the domain of information security, due to its positive effect on employees' information security awareness. It is acknowledged that security awareness is the most important factor that mitigates the risk of information security breaches in organizations. In this research, a model has been presented that shows how information security knowledge sharing (ISKS) forms and decreases the risk of information security incidents. The Motivation Theory and Theory of Planned Behavior besides Triandis model were applied as the theoretical backbone of the conceptual framework. The results of the data analysis showed that earning a reputation, and gaining promotion as an extrinsic motivation and curiosity satisfaction as an intrinsic motivation have positive effects on employees' attitude toward ISKS. However, self-worth satisfaction does not influence ISKS attitude. In addition, the findings revealed that attitude, perceived behavioral control, and subjective norms have positive effects on ISKS intention and ISKS intention affects ISKS behavior. The outcomes also showed that organizational support influences ISKS behavior more than trust. The results of this research should be of interest to academics and practitioners in the domain of information security.  相似文献   

19.
《Information & Management》2016,53(5):643-653
Online health communities (OHC) are becoming valuable platforms for patients to communicate and find support. These communities are different from general online communities. The knowledge shared in an OHC can be categorized as either general (public) or specific (private), and each category is shared in vastly different ways. Using the social exchange theory, we propose a benefit vs. cost knowledge sharing model for OHCs. The benefits are mainly based on Maslow's hierarchy of needs, and the cost includes cognitive and executional costs. We use this benefit vs. cost model to examine how OHC members share general and specific knowledge. Data were collected from 323 users of two well-known OHCs in China and were analyzed using the structural equation model. The results demonstrate that three factors positively impact the sharing of both general and specific knowledge: a sense of self-worth, members’ perceived social support, and reputation enhancement. Another factor, face concern, has a negative influence on specific knowledge sharing and a positive influence on general knowledge sharing. Executional cost only negatively impacts general knowledge sharing, and cognitive cost only negatively impacts specific knowledge sharing. This study of OHCs reveals that personal benefits promote knowledge sharing and costs prohibit it. These impacts vary between general knowledge and specific knowledge sharing.  相似文献   

20.
The success of virtual enterprises (VEs) depends on the effective sharing of related resources between various enterprises or workers who perform related activities. Specifically, VE success hinges on the integration and sharing of information and knowledge. Trust is an important facilitator of knowledge sharing. However, the trustworthiness of a peer is a vague concept that is dynamic and that often shifts over time or with environmental changes. This study designs a trust-based knowledge-sharing model based on characteristics of VEs and the knowledge structure model to express knowledge associated with VE activities. Subsequently, the factors that affect the trust evaluation are identified based on the characteristics of trust and VEs. Finally, this study develops a knowledge sharing, decision-making framework in which a fuzzy trust evaluation method for sharing knowledge is proposed based on VE activities and the interactions among workers in allied enterprises. The method consists of three sub-methods, including an activity correlation evaluation method, a current trust evaluation method, and an integral trust evaluation method. Under the premises of secure VE knowledge and reasonable access authorization, the proposed knowledge-sharing method provides the trust level between a knowledge-requesting enterprise and a knowledge-supplying enterprise to improve the willingness of the latter to share more valuable knowledge, ultimately increasing the efficiency and competitiveness of VEs.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号