Sie sind auf Seite 1von 7

1.

An innovation perspective of knowledge management in a


multinational subsidiary

Purpose
– This paper seeks to explore the implementation of knowledge management in
a telecommunication multinational subsidiary and to investigate factors that
affect the performance as well as the impacts.

Design/methodology/approach
– Innovation perspective informs the identification of the ways in which KM
strategies are devised and put into action. Using in ‐depth interviews and direct
observation, the paper maps some problems associated with the strategy and
implementation of KM.

Findings
– The case shows that the lack of organisation ‐wide integrated systems, which
is typical across different organisations, does contribute to this problem.
However, the main predicament lies with the fact that a KM ‐enabling scheme is
never explicitly prioritised in the organisation's information systems strategy.

Practical implications
– KM implementation should take into account both technological innovation
and organisational innovation. Neglecting one aspect poses apparent danger
that the implementation is unlikely to bring about benefit to the organisation.

Originality/value
– This paper presents the case of a multinational company subsidiary in a
developing economy, i.e. Indonesia. It is expected that this case will help
substantiate an instance of KM implementation in an emerging economy and
latecomer development, which might impact the operation and working of a
multinational subsidiary.

2. Social relationship and its role in knowledge management systems usage

The KMS has been widely implemented in organizations. However, its availability
does not guarantee that employees have been willing to spend time and effort using
it. We explored the use of KMS with emphasis on social relationship. Specifically,
social capital theory was employed to establish the social relationship construct
and its three dimensions: tie strength, shared norms, and trust. By studying a
company that had implemented a KMS, we explored the dimensions of social
relationship and its importance in the use of a KMS by employees. A theoretical
framework was used to depict the antecedents of employee's usage behavior.
Implications for both researchers and practitioners are discussed, especially for
companies expecting to exploit knowledge sharing in the Chinese business
environment.\

3. Knowledge management strategy and its link to knowledge creation


process

Abstract

Knowledge has become to be considered as valuable strategic assets that can


provide proprietary competitive advantages. It is more important for companies to
distinguish themselves through knowledge management strategies. Without a
constant creation of knowledge, a business is condemned to poor performance.
However, it is still unclear how these strategies affect knowledge creation.
Knowledge management strategies can be categorized as being either human or
system oriented. This paper proposes a model to illustrate the link between the
strategies and its creating process. The model is derived on the basis of samples
from 58 Korean firms. The model depicts how companies should align the
strategies with four knowledge creation modes such as socialization,
externalization, combination, and internalization. It is found that human strategy is
more likely to be effective for socialization while system strategy is more likely to
be effective for combination. Furthermore, the survey result suggests that
managers should adjust knowledge management strategies in view of the
characteristics of their departments.

4. Knowledge Discovery in distributed Social Web sharing activities.

ABSTRACT
Taking into consideration the steady shift towards informa- tion digitisation, an
increasing number of approaches are targeting the unification of the user’s digital
―Personal In- formation Sphere‖to increase user awareness, provide single- point
management, and enable context-driven recommenda- tion. The Personal
Information Sphere refers to both con- ventional information such as
semi/structured information on the user’s personal devices and online accounts,
but also in the form of more abstract personal information such as a user’s
presence and activities. Online activities consti- tute a rich source for mining this
type of personal infor- mation, since they are usually the only means by which a
typical user consciously puts effort into sharing their activi- ties. In view of this
opportunity, we present an approach to extract implicit presence knowledge
embedded in multiple streams of heterogeneous online posts. Semantic Web tech-
nologies are applied on top of syntactic analysis to extract and map entities onto a
personal knowledge base, itself in- tegrated within the wider context of the
Semantic Web. For the purpose, we introduce the DLPO ontology—a concise
ontology that captures all facets of dynamic personal infor- mation shared through
online posts, as well their various derived links to personal and global semantic
data clouds. Based on this conceptualisation, we outline the information
extraction techniques targeted by our approach and present an as yet theoretical
use-case to substantiate it.

5. Flink: Semantic Web technology for the extraction and analysis of social
networks

Abstract

We present the Flink system for the extraction, aggregation and visualization of
online social networks. Flink employs semantic technology for reasoning with
personal information extracted from a number of electronic information sources
including web pages, emails, publication archives and FOAF profiles. The
acquired knowledge is used for the purposes of social network analysis and for
generating a web-based presentation of the community. We demonstrate our novel
method to social science based on electronic data using the example of the
Semantic Web research community.

6. Churn Prediction in a Real Online Social Network Using Local


CommunIty Analysis
Prediction of user behavior in Social Networks is important for a lot of
applications, ranging from marketing to social community management. In this
paper, we develop and test a model to estimate the propensity of a user to stop
using the social platform in a near future. This problem is called churn prediction
and has been extensively studied in telecommunication networks. We focus here
on building a statistical model estimating the probability that a user will leave the
social network in the near future. The model is based on graph attributes extracted
in the user's vicinity. We present a novel algorithm to accurately detect overlapping
local communities in social graphs. Our algorithm outperforms the state of the art
methods and is able to deal with pathological cases which can occur in real
networks. We show that using attributes computed from the local community
around the user allows to build a robust statistical model to predict churn. Our
ideas are tested on one of the largest French social blog platform, Sky rock, where
millions of teenagers interact daily.

7. Overlapping community detection in networks with positive and


negative links
Complex networks considering both positive and negative links have gained
considerable attention during the past several years. Community detection is one of
the main challenges for complex network analysis. Most of the existing algorithms
for community detection in a signed network aim at providing a hard-partition of
the network where any node should belong to a community or not. However, they
cannot detect overlapping communities where a node is allowed to belong to
multiple communities. The overlapping communities widely exist in many real-
world networks. In this paper, we propose a signed probabilistic mixture (SPM)
model for overlapping community detection in signed networks. Compared with
the existing models, the advantages of our methodology are (i) providing soft-
partition solutions for signed networks; (ii) providing soft memberships of nodes.
Experiments on a number of signed networks show that our SPM model: (i) can
identify assortative structures or disassortative structures as the same as other state-
of-the-art models; (ii) can detect overlapping communities; (iii) outperforms other
state-of-the-art models at shedding light on the community detection in synthetic
signed networks.
8. Persona: an online social network with user-defined privacy

Online social networks (OSNs) are immensely popular, with some claiming over
200 million users. Users share private content, such as personal information or
photographs, using OSN applications. Users must trust the OSN service to protect
personal information even as the OSN provider benefits from examining and
sharing that information. We present Persona, an OSN where users dictate who
may access their information. Persona hides user data with attribute-based
encryption (ABE), allowing users to apply fine-grained policies over who may
view their data. Persona provides an effective means of creating applications in
which users, not the OSN, define policy over access to private data. We
demonstrate new cryptographic mechanisms that enhance the general applicability
of ABE. We show how Persona provides the functionality of existing online social
networks with additional privacy benefits. We describe an implementation of
Persona that replicates Facebook applications and show that Persona provides
acceptable performance when browsing privacy-enhanced web pages, even on
mobile devices

9. Some antecedents and effects of trust in virtual communities

Abstract

This study explores several downstream effects of trust in virtual communities and
the antecedents of trust in this unique type of environment. The data, applying an
existing scale to measure two dimensions of trust (ability and
benevolence/integrity), show that trust had a downstream effect on members'
intentions to both give information and get information through the virtual
community. Both these apparent dimensions of trust were increased through
perceived responsive relationships in the virtual community, by a general
disposition to trust, and by the belief that others confide personal information.

10.Data Mining: Practical Machine Learning Tools and Techniques (The


Morgan Kaufmann Series in Data Management Systems)

Data Mining: Practical Machine Learning Tools and Techniques, Third Edition,
offers a thorough grounding in machine learning concepts as well as practical
advice on applying machine learning tools and techniques in real-world data
mining situations. This highly anticipated third edition of the most acclaimed work
on data mining and machine learning will teach you everything you need to know
about preparing inputs, interpreting outputs, evaluating results, and the algorithmic
methods at the heart of successful data mining.

Thorough updates reflect the technical changes and modernizations that have taken
place in the field since the last edition, including new material on Data
Transformations, Ensemble Learning, Massive Data Sets, Multi-instance Learning,
plus a new version of the popular Weka machine learning software developed by
the authors. Witten, Frank, and Hall include both tried-and-true techniques of
today as well as methods at the leading edge of contemporary research

Das könnte Ihnen auch gefallen