In this present economy that is wholly centered on knowledge and skill, knowledge sharing (KS) is gradually regarded as an important factor in organizational effectiveness and an innovative mechanism to cope with challenges [1]. Therefore, for organizations to create new knowledge sharing strategies are essentials to align to the knowledge economy to overcome business challenges [2, 3]. A preliminary investigation was conducted by focusing on the Critical Success Factors (CSF) to promote knowledge sharing at the organizational level and to examine the employees’ perception towards the types of knowledge sharing tools in the construction trading industry. This paper proposes several dimensions for knowledge strategy to manage knowledge assets that can be used as the key foundation to many organizations to stay competitive especially the construction trading industry.
Employees’ Perceptions towards the Knowledge Management Practices: An Empiric...AkashSharma618775
This present study is aimed to understand the implementation of knowledge management process in
Bharat Heavy Electricals Limited – Hyderabad. In order to examine this, various knowledge management subdimensions such as acquisition of information, information dissemination, knowledge storage, knowledge transfer,
team work, empowerment and commitment to knowledge. These concerned sub-dimensions are able to determine
the various knowledge management dimensions like, knowledge creation, knowledge transfer and storage and
application and usage of knowledge. The study is also aimed to understand the role of organizational culture in
deriving the firms sustainability.
KNOWLEDGE MANAGEMENT AND ORGANIZATIONAL PERFORMANCE IN ENGINEERING ORGANIZATIONIAEME Publication
The purpose of this study is to identify and understand the various knowledge management practices (KMP) and its influence on Organisational Performance (OP) in the engineering organization. The study has been undertaken with an aim to examine the role of knowledge management practices in enhancing the performance of an organization. A sample of 125 engineers were drawn using structured questionnaire. The responses were analysed using a statistical technique viz., Partial Least Square -Path Modelling (PLS-PM). The results of the analysis revealed that Knowledge Management Practices such as Knowledge Diagnosing, Knowledge Acquisition, Knowledge Generation, Knowledge Sharing, Knowledge Storing, Knowledge Application, have significant effect on financial, non-financial and operational performance of the organization.
Employees’ Perceptions towards the Knowledge Management Practices: An Empiric...AkashSharma618775
This present study is aimed to understand the implementation of knowledge management process in
Bharat Heavy Electricals Limited – Hyderabad. In order to examine this, various knowledge management subdimensions such as acquisition of information, information dissemination, knowledge storage, knowledge transfer,
team work, empowerment and commitment to knowledge. These concerned sub-dimensions are able to determine
the various knowledge management dimensions like, knowledge creation, knowledge transfer and storage and
application and usage of knowledge. The study is also aimed to understand the role of organizational culture in
deriving the firms sustainability.
KNOWLEDGE MANAGEMENT AND ORGANIZATIONAL PERFORMANCE IN ENGINEERING ORGANIZATIONIAEME Publication
The purpose of this study is to identify and understand the various knowledge management practices (KMP) and its influence on Organisational Performance (OP) in the engineering organization. The study has been undertaken with an aim to examine the role of knowledge management practices in enhancing the performance of an organization. A sample of 125 engineers were drawn using structured questionnaire. The responses were analysed using a statistical technique viz., Partial Least Square -Path Modelling (PLS-PM). The results of the analysis revealed that Knowledge Management Practices such as Knowledge Diagnosing, Knowledge Acquisition, Knowledge Generation, Knowledge Sharing, Knowledge Storing, Knowledge Application, have significant effect on financial, non-financial and operational performance of the organization.
The main goal of this presentation is to draw the roadmap of the methodology of implementing the Knowledge Management at the HCL’s prospective customersTaking advantage of longexperience and HCL developed KM tools .
A Model Examining the Knowledge Management Process in the Construction Organi...inventionjournals
Construction organisations are becoming more conscious that the knowledge management process is the key and supreme in attaining reasonable, efficiency and innovations in businesses. This research investigates the significant ways and method in which knowledge management process in the multinational construction organisation acquired, create, disseminate and re-acquire available knowledge in their projectbased activities. This research was carried out in the multinational construction organisation because of their innovative progression on knowledge management adoption. The research study established a hypothetical framework that links adopted empirically validated variables of the knowledge management process. The study investigated thirty three multinational construction organisation with two hundred and ten survey questionnaires distributed to their knowledge workers. The study adopted quantitative research method of approach using structural equation modeling (SEM) to validate the research framework with the factor loadings for the variables been significant. Cronbash Alpha factors of 0.800, 0.855, 0.808, 0.807 and 0.799 for knowledge acquisition, creation, sharing, storing and reuse respectively were achieved. The research finding display that management of knowledge in construction projects is a chain. Also, the study serves as a guide to the construction industry on the effect KM Process in deepened reflectiveness of the surpassing role of effective knowledge management in the construction organisation.
The New-Normal of Talent & Knowledge Management – A Framework towards Virtual...Dr. Amarjeet Singh
Indian economy since the pre and post-independence period has witnessed a drastic transformation from an agrarian economy to a knowledge-based economy thus creating a knowledge-based workforce and organisations. With the change of time, the learning became more complex and necessity thus creating havoc and high-pace change in the character of the job in an organisation even creating a situation where artificial intelligence is replacing human intelligence.
Today’s employees are more competitive in terms of skills, pay-packages, and also work challenges. Amidst of all these changes, the present uncertainty and crisis hovering the entire world i.e .the Corona Virus pandemic which has forced almost all organizations to accept virtual learning and virtual knowledge sharing as a competitive edge and adapting virtual-cost-effective learning and communication system. It is prime time when the management of the organisation has to initiate a holistic approach towards virtual learning and knowledge sharing with a clear objective of up-skilling its workforce to new normals during and post-pandemic. The new normal norms will bring in new challenges of a new set of skills and competencies and operational processes to revive the broken economy and business setbacks.
This paper further concentrates and focuses on applying and improving virtual knowledge management practices in organisation. It also focuses on effective talent up-gradation and management systems which most important in the present scenario to have a ‘Fact-Based Communication' And 'Virtual Connectivity'.
Here, Descriptive Research is adopted for the study. Literature review of articles and research papers is analytically conducted to develop a significant process for crucial talent management systems that will aid in the up-skilling workforce through virtual mode to combat and resurgence the Post- COVID-19.
Effectiveness of knowledge management depends on how knowledge management process are aligned with an organizations infrastructure and processes that supports the achievement of organizations goals. To understand and represent relationships a simple list of elements and process is scanty, we need a holistic framework where all are integrated into a dynamic framework. The proposed framework is particularly focused on dividing the identified organizational building blocks into their constituent elements along both time and content dimensions to define characteristics of these elements, and it also define the relationships between the organizations to form a social ecology in which people effectively create share and use knowledge in business management. In this way, the developed framework can assist management to understand the true nature of the relationship that exist between an organization and knowledge management process, and exploit them for an organizations success.
Introduction
Why knowledge and knowledge management
What is KM
Knowledge Evolution Process
Types of Knowledge
KM Approaches – Overview
Knowledge Creation Model
Monitoring And Evaluation Of Knowledge Management ElbEwen Le Borgne
Presentation from the IKM-Emergent group presenting work on M&E of knowledge management. Presentation given during the KMIC webinar organised by USAID.
knowledge management and school libraries and information center support. types of knowledge. what is knowledge management. advantages and barriers of knowledge management. knowledge management in school libraries.
This paper focuses on organizational joint consultative machinery by job instruction and communication strategic approach implemented in high-performance organizations. It is argued that organizational empowerment has resulted in rapid diffusion of high performance practices Strategic approach especially those organizations functioning in the international area. The form and joint consultative machinery of an organization's Job instruction and communication strategic approach can affect employee motivation levels in several ways. Organizations can adopt various strategic approach practices to enhance employee satisfaction. Recognizing the importance of strategic approach in achieving flexibility in an international context expands the types of research questions related to the role of strategic approach functions in organizational performance, such as selection of job instruction and communication strategic approach, training, and compensation and performance appraisal
Origins and domain of Knowledge Management
Technological development
Characteristics of knowledge
Knowledge Management as a Management Tool
Critical elements of Knowledge Management strategy
Tactic Knowledge Management
Knowledge Management and Process Performance
Outsourcing Concept
STAFFS MOTIVATIONAL IN KNOWLEDGE TRANSFER BEHAVIOURijcsit
Previous have highlighted knowledge transfer behaviour (KTB) for an increase organization performance,
however an obstacle from the perspective among staffs still exists. The problem is still difficult because
staffs will not share their knowledge as they thinking their knowledge is important. This paper investigated
factors of staffs motivational that influence KTB among staffs in Riau Province of Indonesia. The survey
400 respondents were used, 325 were returned, and 75 were not returned. Likert and smart PLS to
confirmation the conceptual model. This paper conclude factors that reward, trust, and an enjoyment
helping colleagues of staffs motivation are factors which influencing the KTB. The results and conclusions
are discussed.
The main goal of this presentation is to draw the roadmap of the methodology of implementing the Knowledge Management at the HCL’s prospective customersTaking advantage of longexperience and HCL developed KM tools .
A Model Examining the Knowledge Management Process in the Construction Organi...inventionjournals
Construction organisations are becoming more conscious that the knowledge management process is the key and supreme in attaining reasonable, efficiency and innovations in businesses. This research investigates the significant ways and method in which knowledge management process in the multinational construction organisation acquired, create, disseminate and re-acquire available knowledge in their projectbased activities. This research was carried out in the multinational construction organisation because of their innovative progression on knowledge management adoption. The research study established a hypothetical framework that links adopted empirically validated variables of the knowledge management process. The study investigated thirty three multinational construction organisation with two hundred and ten survey questionnaires distributed to their knowledge workers. The study adopted quantitative research method of approach using structural equation modeling (SEM) to validate the research framework with the factor loadings for the variables been significant. Cronbash Alpha factors of 0.800, 0.855, 0.808, 0.807 and 0.799 for knowledge acquisition, creation, sharing, storing and reuse respectively were achieved. The research finding display that management of knowledge in construction projects is a chain. Also, the study serves as a guide to the construction industry on the effect KM Process in deepened reflectiveness of the surpassing role of effective knowledge management in the construction organisation.
The New-Normal of Talent & Knowledge Management – A Framework towards Virtual...Dr. Amarjeet Singh
Indian economy since the pre and post-independence period has witnessed a drastic transformation from an agrarian economy to a knowledge-based economy thus creating a knowledge-based workforce and organisations. With the change of time, the learning became more complex and necessity thus creating havoc and high-pace change in the character of the job in an organisation even creating a situation where artificial intelligence is replacing human intelligence.
Today’s employees are more competitive in terms of skills, pay-packages, and also work challenges. Amidst of all these changes, the present uncertainty and crisis hovering the entire world i.e .the Corona Virus pandemic which has forced almost all organizations to accept virtual learning and virtual knowledge sharing as a competitive edge and adapting virtual-cost-effective learning and communication system. It is prime time when the management of the organisation has to initiate a holistic approach towards virtual learning and knowledge sharing with a clear objective of up-skilling its workforce to new normals during and post-pandemic. The new normal norms will bring in new challenges of a new set of skills and competencies and operational processes to revive the broken economy and business setbacks.
This paper further concentrates and focuses on applying and improving virtual knowledge management practices in organisation. It also focuses on effective talent up-gradation and management systems which most important in the present scenario to have a ‘Fact-Based Communication' And 'Virtual Connectivity'.
Here, Descriptive Research is adopted for the study. Literature review of articles and research papers is analytically conducted to develop a significant process for crucial talent management systems that will aid in the up-skilling workforce through virtual mode to combat and resurgence the Post- COVID-19.
Effectiveness of knowledge management depends on how knowledge management process are aligned with an organizations infrastructure and processes that supports the achievement of organizations goals. To understand and represent relationships a simple list of elements and process is scanty, we need a holistic framework where all are integrated into a dynamic framework. The proposed framework is particularly focused on dividing the identified organizational building blocks into their constituent elements along both time and content dimensions to define characteristics of these elements, and it also define the relationships between the organizations to form a social ecology in which people effectively create share and use knowledge in business management. In this way, the developed framework can assist management to understand the true nature of the relationship that exist between an organization and knowledge management process, and exploit them for an organizations success.
Introduction
Why knowledge and knowledge management
What is KM
Knowledge Evolution Process
Types of Knowledge
KM Approaches – Overview
Knowledge Creation Model
Monitoring And Evaluation Of Knowledge Management ElbEwen Le Borgne
Presentation from the IKM-Emergent group presenting work on M&E of knowledge management. Presentation given during the KMIC webinar organised by USAID.
knowledge management and school libraries and information center support. types of knowledge. what is knowledge management. advantages and barriers of knowledge management. knowledge management in school libraries.
This paper focuses on organizational joint consultative machinery by job instruction and communication strategic approach implemented in high-performance organizations. It is argued that organizational empowerment has resulted in rapid diffusion of high performance practices Strategic approach especially those organizations functioning in the international area. The form and joint consultative machinery of an organization's Job instruction and communication strategic approach can affect employee motivation levels in several ways. Organizations can adopt various strategic approach practices to enhance employee satisfaction. Recognizing the importance of strategic approach in achieving flexibility in an international context expands the types of research questions related to the role of strategic approach functions in organizational performance, such as selection of job instruction and communication strategic approach, training, and compensation and performance appraisal
Origins and domain of Knowledge Management
Technological development
Characteristics of knowledge
Knowledge Management as a Management Tool
Critical elements of Knowledge Management strategy
Tactic Knowledge Management
Knowledge Management and Process Performance
Outsourcing Concept
STAFFS MOTIVATIONAL IN KNOWLEDGE TRANSFER BEHAVIOURijcsit
Previous have highlighted knowledge transfer behaviour (KTB) for an increase organization performance,
however an obstacle from the perspective among staffs still exists. The problem is still difficult because
staffs will not share their knowledge as they thinking their knowledge is important. This paper investigated
factors of staffs motivational that influence KTB among staffs in Riau Province of Indonesia. The survey
400 respondents were used, 325 were returned, and 75 were not returned. Likert and smart PLS to
confirmation the conceptual model. This paper conclude factors that reward, trust, and an enjoyment
helping colleagues of staffs motivation are factors which influencing the KTB. The results and conclusions
are discussed.
EMPLOYEES CHARACTERISTICS IN KNOWLEDGE TRANSFER AND PERFORMANCEcsandit
While most studies are concerned with the industry, but for non-profit organizations has not
received much attention. Various have highlighted knowledge transfer (KT) for creates value,
however an obstacle from the perspective among employees still exists. The main problem is
still difficult because employees will not share their knowledge. This study investigated factors
and develop that influence KT among employees of non-profit organizations in Indonesia. The
survey 364 respondents were used, 325 were returned, and 39 were not returned. Likert and
smart PLS to confirm construct. This paper conclude factors that helping others, trust, soft
reward, and personality of employees motivation are factors which influencing the KT
behaviour. Finally, the findings were discussed.
KNOWLEDGE MANAGEMENT: WHY DO WE NEED IT FOR CORPORATESBhojaraju Gunjal
Gunjal, Bhojaraju (2006). Knowledge Management: Why Do We Need It for Corporates. Malaysian Journal of Library & Information Science, 10 (2) Pp. 37-50. ISSN 1394-6234. http://myais.fsktm.um.edu.my/573/
Study of Knowledge Management Articles:
Part 1: A Critical Review Of Knowledge Management As A Management Tool.
Part 2: The Use Of Tacit Knowledge Within Innovative Companies: Knowledge Management In Innovative Enterprises.
Part 3: Knowledge Management and Process Performance.
Part 4: Knowledge Outsourcing.
Influence of Knowledge Management Processes on Organizational Performance in ...inventionjournals
This research attempts to establish a link between knowledge management processes and organizational performance in knowledge intensive service sectors. The key dimensions of knowledge management processes have been identified which could influence the organizational performance. Metric has been developed for the empirical investigation of the relationships between these research constructs. Structural Equation Modelling (SEM) using partial least square techniques has been used to test these hypotheses with a sample size of 491 knowledge workers (330 - Higher educational institutions and 161 from the IT companies) to investigate the empirical relationships between the factors. All the four hypotheses were supported. The testing of the hypotheses justified the identification of the key dimensions of KM as the critical success factors in terms of the organizational performance. Implications of the study would enable the strategic planning managers to make their knowledge management processes more effective so as to enhance the organizational performance
ASSESSING THE ORGANIZATIONAL READINESS FOR IMPLEMENTING KNOWLEDGE MANAGEMENT ...ijitcs
The growing importance of business analytics and its increasing influence on the competitive advantage of
organizations leads to the necessity of knowledge management systems, which complex and needs
organizational readiness that has been the subject of earlier research. This study aims to examine whether
the affective factors on the assessment of the readiness for implementation of the knowledge management
system in all organizations are identical. Hence, first by a comprehensive study of literature, readiness
factors of the knowledge management system implementation including six factors of organizational
culture, individuals, information technology infrastructure, knowledge process, senior management
commitment, and strategy were extracted and have been tested in three different organizations of IT
services, educational and commerce. Based on the founding, different factors affect various organizations
and using a general model should not be advised.
ANSWER THE FOLLOWING QUESTIONS AFTER YOU PAPER BELOWQUESTIONS.docxYASHU40
ANSWER THE FOLLOWING QUESTIONS AFTER YOU PAPER BELOW
QUESTIONS
1. Was there a clear and concise thesis statement? Explain.
2. Was there a clear and concise problem statement?
3. Was the problem statement supported by evidence? Explain.
4. Was there a clear and concise research question(s)? Explain.
5. Was the body of research organized and easy to understand? Explain.
6. Did the author answer the research question(s) clearly in the discussion section? Explain.
7. Were inferences drawn from the body of research? Explain.
8. Did the paper use proper APA formatting? Explain.
9. Did the author support assertions with in-text citations and references? Explain.
10. What areas need improvement? Explain. What areas were strongest? Explain.
11. Do you have any other constructive feedback or recommendations to help your peer improve? Explain.
12. How did reviewing this paper help you with your own research paper? Explain.
Economic Benefits of Knowledge Management
Database Management and Communications are two fields of study that can be taken at a lot of higher learning institutions today. These fields play a major role in business and its sustainability. The developments in information and communications technologies which have made knowledge production and exchange easier and further enhanced the methodologies of knowledge discovery are the major factors for the amount of scientific knowledge produced in the last 30 years and continues to grow rapidly.(Kaniki & Mphahlele, 2002) The practice of Knowledge Management as a field is relatively new in the U.S but has been in use by European companies for quite some time.
Human capital as an asset is slowly being realized by companies as a major contributor to maintaining the accounting bottom line and even remaining relevant. There has been a recent boom in technological tools that promote knowledge shares such as Microsoft SharePoint. Coupled with the new field of Knowledge Management, is this a viable resource to improve a company's productivity and profitability? Businesses should adopt a knowledge management process and collaborative technologies to be innovative and competitive in today’s market.
Statement of the Problem
It has become important in today’s workplace to take inventory of a business’s knowledge assets to include both tacit and explicit to increase equity, innovation and competitiveness. In today's free market and ever-changing economy, businesses understand the need to manage proprietary knowledge or “in house” knowledge to maintain competitiveness. How this is done and fostered in a way that it is embraced by the employees is the challenge realized by those who understand the need for knowledge management. For this reason, many business managers are seeking a solution. (Carlucci, 2006)
Purpose of the Study
The purpose of this study is to research different methods of knowledge management strategies to inform on how business can become more competit.
An Exploratory Study on the Practices of Knowledge Management in Software Dev...ijcnes
This study explores the current trends of knowledge management system and its practices in software development organizations. This Paper identifies the approaches towards KM for knowledge acquisition, representation and sharing. Application of KM practices in the software development work are stated and analyzed. These Case studies shows current KM practices and KM implementations that are followed in software development organizations. And also specifies the KT activities involved in Knowledge sharing. Organizations follow either codification or personalization [1] strategy. Most of the Organizations mix and match the KT techniques from the KM strategies and follow their own strategy according to their convenience. Here, to implement KM strategies, how KM portals and KM systems are utilized for shortening the skill gaps among employees is also mentioned. These findings identified that organizations understand the need of knowledge sharing but knowledge acquisition, representation and sharing is not organized clearly. Few organizations are successful in knowledge management implementation.
Thriving information system through business intelligence knowledge managemen...IJECEIAES
In the current digitalization dilemma of an organization, there is a need for the business intelligence and knowledge management element for enhancing a perspective of learning and strategic management. These elements will comprise a significant evolution of learning, insight gained, experiences and knowledge through compelling theoretical impact for practitioners, academicians, and scholars in the pertinent field of interest. This phenomenon occurs due to digitalization transformation towards industry revolution 5.0 and organizational excellence in the information system area. This research focuses on the characteristic of a comprehensive performance measure perspective in an organization that conceives information assessment and key challenges of Business Intelligence and Knowledge Management in perceiving a relevant organizational excellence framework. The dynamic research focusing on the decision-making process and leveraging better knowledge creation. The future of organization excellence seemed to be convergent in determining the holistic performance measure perspective and its factors towards industry revolution 5.0. The research ends up with a typical basic excellence framework that will mash up some characteristics in designing an organizational strategic performance framework. The output is a conceptual performance measure framework for a typical decision-making application for organizational strategic performance management dashboarding.
Knowledge-Oriented in the Claim Management (Providing a documentation proces...inventionjournals
International Journal of Business and Management Invention (IJBMI) is an international journal intended for professionals and researchers in all fields of Business and Management. IJBMI publishes research articles and reviews within the whole field Business and Management, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
Critical Review of Success Factors of Knowledge Management System (KMS) on Co...ijsrd.com
This research paper is based on extensive research work on success factors and framework of knowledge management in competency building of business organization. In this research paper the researcher analyzed the success factors, which are enablers towards decision making process and explore the knowledge management in every phases of the organizational decision making process. The researcher is also tried to optimize the decision making capabilities in competency building on decision making platform towards business optimization. This paper is also emphasized the success factors which directly affected to decision making capabilities in competency building of business organization.
Post 1 response with references separately.The value proposit.docxstilliegeorgiana
Post 1: response with references separately.
The value proposition in investing in IT Leadership development:
Leadership is one of the important aspects in any organization. A good leader leads the organization from front to the success. The success of the organization depends on the performance of the leaders. But nowadays, many organizations have reduced the budget for leadership development, although leadership development is very important to the organization. For developing, training plays a vital role in an effective way. Along with all those, it is equally essential to articulate the value proposition for this initiative and experts have suggested the following elements for value can be achieved by implementing a leadership development program.
· Value: Every people and every organization perceive the value in different way. Those value can be achieved by successfully implementing the development program (Chase, 2016). Improving future and current leadership qualities are included on those development program along with improving innovation, business strategy, teamwork, decision making etc. After these values are understood, metrics can be developed to determine whether the program is successful or not.
· Delivery of the value: Human Resource and IT both are responsible for the leadership development equally. HR should distinguish the role of IT and Business so that they can move forward to achieve the organizational goals and objectives. The top level manages acts as a coach in both department where they share their knowledge and experience. Senior manager must clarify the roles and responsibilities for successful leadership development.
· Realization of the value: There are both short-term and long-term benefits in leadership development program. If the trainings are effective, then the result can be visible through behavioral change. The initial impacts of a comprehensive leadership initiative should be visible in-house within a year and to business units and vendors within eighteen to twenty-four months (Payne, Frow, & Eggert, 2017). Metrics is used to determine the success of the leadership program so this is very important. These methods can be used to demonstrate value to IT managers, who may be skeptical, and to HR and senior management.
· Delivery of the Value: Firstly, it is important for IT to determine what to accomplish with leadership development which will make easier to design effective program to deliver it.
Qualities of good IT Leadership:
All it takes to be a leader, in name at least, is to hold the dominant position in a group, organization or location. However, this is a very simplified definition for a what a leader should be, let alone what a great leader is. Because the measure of a great leader has much less to do with how we define their role and more about their actual impact on others.
The qualities of a good leader are divided into two categories:
· Personal mastery: This includes collection of behavior t ...
Similar to Strategies to Improve Knowledge Sharing in Trading Construction Organization (20)
Securing Cloud Computing Through IT GovernanceITIIIndustries
Lack of alignment between information technology (IT) and the business is a problem facing many organizations. Most organizations, today, fundamentally depend on IT. When IT and the business are aligned in an organization, IT delivers what the business needs and the business is able to deliver what the market needs. IT has become a strategic function for most organizations, and it is imperative that IT and business are aligned. IT governance is one of the most powerful ways to achieve IT to business alignment. Furthermore, as the use of cloud computing for delivering IT functions becomes pervasive, organizations using cloud computing must effectively apply IT governance to it. While cloud computing presents tremendous
opportunities, it comes with risks as well. Information security
is one of the top risks in cloud computing. Thus, IT governance must be applied to cloud computing information security to help manage the risks associated with cloud computing information security. This study advances knowledge by extending IT governance to cloud computing and information security governance.
Information Technology in Industry(ITII) - November Issue 2018ITIIIndustries
IT Industry publishes original research articles, review articles, and extended versions of conference papers. Articles resulting from research of both theoretical and/or practical natures performed by academics and/or industry practitioners are welcome. IT in Industry aims to become a leading IT journal with a high impact factor.
Design of an IT Capstone Subject - Cloud RoboticsITIIIndustries
This paper describes the curriculum of the three year IT undergraduate program at La Trobe University, and the faculty requirements in designing a capstone subject, followed by the ACM’s recommended IT curriculum covering the five pillars of the IT discipline. Cloud robotics, a broad multidisciplinary research area, requiring expertise in all five pillars with mechatronics, is an ideal candidate to offer capstone experiences to IT students. Therefore, in this paper, we propose a long term
master project in developing a cloud robotics testbed, with many capstone sub-projects spanning across the five IT pillars, to meet the objectives of capstone experience. This paper also describes the design and implementation of the testbed, and proposes potential capstone projects for students with different interests.
Dimensionality Reduction and Feature Selection Methods for Script Identificat...ITIIIndustries
The goal of this research is to explore effects of dimensionality reduction and feature selection on the problem of script identification from images of printed documents. The kadjacent segment is ideal for this use due to its ability to capture visual patterns. We have used principle component analysis to reduce the size of our feature matrix to a handier size that can be trained easily, and experimented by including varying combinations of dimensions of the super feature set. A modular
approach in neural network was used to classify 7 languages – Arabic, Chinese, English, Japanese, Tamil, Thai and Korean.
Image Matting via LLE/iLLE Manifold LearningITIIIndustries
Accurately extracting foreground objects is the problem of isolating the foreground in images and video, called image matting which has wide applications in digital photography. This problem is severely ill-posed in the sense that, at each pixel, one must estimate the foreground and background pixels and the so-called alpha value from only pixel information. The most recent work in natural image matting rely on local smoothness assumptions about foreground and background colours on which a cost function has been established. In this paper, we propose an extension to the class of affinity based matting techniques by incorporating local manifold structural
information to produce both a smoother matte based on the socalled improved Locally Linear Embedding. We illustrate our new algorithm using the standard benchmark images and very comparable results have been obtained.
Annotating Retina Fundus Images for Teaching and Learning Diabetic Retinopath...ITIIIndustries
With the improvement in IT industry, more and more application of computer software is introduced in teaching and learning. In this paper, we discuss the development process of such software. Diabetic Retinopathy is a common complication for diabetic patients. It may cause sight loss if not treated early. There are several stages of this disease. Fundus imagery is required to identify the stage and severity of the disease. Due to the lack of proper dataset of the fundus images and proper annotation, it is very difficult to perform research on this topic. Moreover, medical students are often facing difficulty with identifying the diseases in later stage of their practice as they may not have seen a sample of all of the stages of Diabetic Retinopathy problems. To mitigate the problem, we have collected fundus images from different geographic area of Bangladesh and designed an annotation software to store information about the patient, the infection level and their locations in the images. Sometimes, it is difficult to select all appropriate pixels of the infected region. To resolve the issue, we have introduced a K nearest neighbor (KNN) based technique to accurately select the region of interest (ROI). Once an expert (ophthalmologist) has annotated the images, the software can be used by the students for learning.
A Framework for Traffic Planning and Forecasting using Micro-Simulation Calib...ITIIIndustries
This paper presents the application of microsimulation for traffic planning and forecasting, and proposes a new framework to model complex traffic conditions by calibrating and adjusting traffic parameters of a microsimulation model. By using an open source micro-simulator package, TRANSIMS, in this study, animated and numerical results were produced and analysed. The framework of traffic model calibration was evaluated for its usefulness and practicality. Finally, we discuss future applications such as providing end users with real time traffic information through Intelligent Transport System (ITS) integration.
Investigating Tertiary Students’ Perceptions on Internet SecurityITIIIndustries
Internet security threats have grown from just simple viruses to various forms of computer hacking, scams, impersonation, cyber bullying, and spyware. The Internet has great influence on most people. It has profound influence and one can spend endless hours on internet activities. In particular, youth engage in more online activities than any other age group. Excessive internet usage is an emerging threat that has negative impacts on these youth; hence it is vital to investigate youths' online behavior. This work studies tertiary students’ risk awareness, and provides some findings that allow us to understand their knowledge on risks and their behavior towards online activities. It reveals several important online issues amongst tertiary students; Firstly, the lack of online security awareness; second, a lack of awareness and information about the dangers of rootkits, internet cookies and spyware; thirdly, female students are more unflinching than male students when commenting on social networking sites; fourthly, students are cautious only when obvious security warnings are present; and finally, their usage of internet hotspots is common without fully understanding its associated danger. These findings enable us to recommend types of internet security habits and safety practices that students should adopt in future when they are exposed to online activities. A more holistic approach was considered which aims to minimize any future risks and dangers with online activities involving students.
Blind Image Watermarking Based on Chaotic MapsITIIIndustries
Security of a watermark refers to its resistance to unauthorized detecting and decoding, while watermark robustness refers to the watermark’s resistance against common processing. Many watermarking schemes emphasize robustness more than security. However, a robust watermark is not enough to accomplish protection because the range of hostile attacks is not limited to common processing and distortions. In this paper, we give consideration to watermark security. To achieve this, we employ chaotic maps due to their extreme sensitivity to the initial values. If one fails to provide these values, the watermark will be wrongly extracted. While the chaotic maps provide perfect watermarking security, the proposed scheme is also intended to achieve robustness.
Programmatic detection of spatial behaviour in an agent-based modelITIIIndustries
The automated detection of aspects of spatial behaviour in an agent-based model is necessary for model testing and analysis. In this paper we compare four predictors of herding behaviour in a model of a grazing herbivore. We find that a) the mean number of neighbours adjusted to account for population variation and b) the mean Hamming distance between rows of the two-dimensional environment can be used to detect herding. Visual inspection of the model behaviour revealed that herding occurs when the herbivore mobility reaches a threshold level. Using this threshold we identify a limits for these predictors to use in the program code. These results apply only to one set of parameters and environment size; future research will involve a wider parameter space.
Design of an IT Capstone Subject - Cloud RoboticsITIIIndustries
This paper describes the curriculum of the three year IT undergraduate program at La Trobe University, and the faculty requirements in designing a capstone subject, followed by the ACM’s recommended IT curriculum covering the five pillars of the IT discipline. Cloud robotics, a broad multidisciplinary research area, requiring expertise in all five pillars with mechatronics, is an ideal candidate to offer capstone experiences to IT students. Therefore, in this paper, we propose a long term master project in developing a cloud robotics testbed, with many capstone sub-projects spanning across the five IT pillars, to meet the objectives of capstone experience. This paper also describes the design and implementation of the testbed, and proposes potential capstone projects for students with different interests.
A Smart Fuzzing Approach for Integer Overflow DetectionITIIIndustries
Fuzzing is one of the most commonly used methods to detect software vulnerabilities, a major cause of information security incidents. Although it has advantages of simple design and low error report, its efficiency is usually poor. In this paper we present a smart fuzzing approach for integer overflow detection and a tool, SwordFuzzer, which implements this approach. Unlike standard fuzzing techniques, which randomly change parts of the input file with no information about the underlying syntactic structure of the file, SwordFuzzer uses online dynamic taint analysis to identify which bytes in the input file are used in security sensitive operations and then focuses on mutating such bytes. Thus, the generated inputs are more likely to trigger potential vulnerabilities. We evaluated SwordFuzzer with an example program and a number of real-world applications. The experimental results show that SwordFuzzer can accurately locate the key bytes of the input file and dramatically improve the effectiveness of fuzzing in detecting real-world vulnerabilities
The banking experience for many people today is fundamentally an application of technology to be able to carry out their financial tasks. While the need to visit a bank branch remains essential for a number of activities, increasingly the need to support mobile usage is becoming the central focus of many bank strategies. The core banking systems that process financial transactions must remain highly available and able to support large volumes of activity. These systems represent a long term investment for banks and when the need arises to modernize these large systems, the transformation initiative is often very expensive and of high risk. We present in this paper our experiences in bank modernization and transformation, and outline the strategies for rolling out these large programs. As banking institutions embark upon transformation programs to upgrade their banking channels and core banking systems, it is hoped that the insights presented here are useful as a framework to support these initiatives.
Detecting Fraud Using Transaction Frequency DataITIIIndustries
Despite all attempts to prevent fraud, it continues to be a major threat to industry and government. In this paper, we present a fraud detection method which detects irregular frequency of transaction usage in an Enterprise Resource Planning (ERP) system. We discuss the design, development and empirical evaluation of outlier detection and distance measuring techniques to detect frequency-based anomalies within an individual user’s profile, relative to other similar users. Primarily, we propose three automated techniques: a univariate method, called Boxplot which is based on the sample’s median; and two multivariate methods which use Euclidean distance, for detecting transaction frequency anomalies within each transaction profile. The two multivariate approaches detect potentially fraudulent activities by identifying: (1) users where the Euclidean distance between their transaction-type set is above a certain threshold and (2) users/data points that lie far apart from other users/clusters or represent a small cluster size, using k-means clustering. The proposed methodology allows an auditor to investigate the transaction frequency anomalies and adjust the different parameters, such as the outlier threshold and the Euclidean distance threshold values to tune the number of alerts. The novelty of the proposed technique lies in its ability to automatically trigger alerts from transaction profiles, based on transaction usage performed over a period of time. Experiments were conducted using a real dataset obtained from the production client of a large organization using SAP R/3 (presently the most predominant ERP system), to run its business. The results of this empirical research demonstrate the effectiveness of the proposed approach.
Mapping the Cybernetic Principles of Viable System Model to Enterprise Servic...ITIIIndustries
This paper describes the results of a theoretical mapping of the cybernetic principles of the Viable System Model (VSM) to an Enterprise Service Bus (ESB) model, with the aim to identify the management principles for the integration of services at all levels in the enterprise. This enrichment directly contributes to the viability of service-oriented systems and the justification of Business/IT alignment within enterprise. The model was identified to be suitable for further adaption in the industrial setting planned within Australian governmental departments.
Using Watershed Transform for Vision-based Two-Hand Occlusion in an Interacti...ITIIIndustries
To achieve a natural interaction in augmented reality environment, we have suggested to use markerless visionbased two-handed gestures for the interaction; with an outstretched hand and a pointing hand used as virtual object registration plane and pointing device respectively. However, twohanded interaction always causes mutual occlusion which jeopardizes the hand gesture recognition. In this paper, we present a solution for two-hand occlusion by using watershed transform. The main idea is to start from a two-hand occlusion image in binary format, then form a grey-scale image based on the distance of each non-object pixel to object pixel. The watershed algorithm is applied to the negation of the grey scaled image to form watershed lines which separate the two hands. Fingertips are then identified and each hand is recognized based on the number of fingertips on each hand. The outstretched hand is assumed to contain 5 fingertips and the pointing device contains less than 5 fingertips. An example of applying our result in hand and virtual object interaction is displayed at the end of the paper.
Speech Feature Extraction and Data VisualisationITIIIndustries
—This paper presents a signal processing approach to analyse and identify accent discriminative features of four groups of English as a second language (ESL) speakers, including Chinese, Indian, Japanese, and Korean. The features used for speech recognition include pitch, stress, formant frequencies, the Mel frequency coefficient, log frequency coefficient, and the intensity and duration of vowels spoken. This paper presents our study using the Matlab Speech Analysis Toolbox, and highlights how data processing can be automated and results visualised. The proposed algorithm achieved an average success rate of 57.3% in identifying vowels spoken in a speech by the four nonnative English speaker groups.
Bayesian-Network-Based Algorithm Selection with High Level Representation Fee...ITIIIndustries
A real-world intelligent system consists of three basic modules: environment recognition, prediction (or estimation), and behavior planning. To obtain high quality results in these modules, high speed processing and real time adaptability on a case by case basis are required. In the environment recognition module many different algorithms and algorithm networks exist with varying performance. Thus, a mechanism that selects the best possible algorithm is required. To solve this problem we are using an algorithm selection approach to the problem of natural image understanding. This selection mechanism is based on machine learning; a bottom-up algorithm selection from real-world image features and a top-down algorithm selection using information obtained from a high level symbolic world description and algorithm suitability. The algorithm selection method iterates for each input image until the high-level description cannot be improved anymore. In this paper we present a method of iterative composition of the high level description. This step by step approach allows us to select the best result for each region of the image by evaluating all the intermediary representations and finally keep only the best one.
Instance Selection and Optimization of Neural NetworksITIIIndustries
Credit scoring is an important tool in financial institutions, which can be used in credit granting decision. Credit applications are marked by credit scoring models and those with high marks will be treated as “good”, while those with low marks will be regarded as “bad”. As data mining technique develops, automatic credit scoring systems are warmly welcomed for their high efficiency and objective judgments. Many machine learning algorithms have been applied in training credit scoring models, and ANN is one of them with good performance. This paper presents a higher accuracy credit scoring model based on MLP neural networks trained with back propagation algorithm. Our work focuses on enhancing credit scoring models in three aspects: optimize data distribution in datasets using a new method called Average Random Choosing; compare effects of training-validation-test instances numbers; and find the most suitable number of hidden units. Another contribution of this paper is summarizing the tendency of scoring accuracy of models when the number of hidden units increases. The experiment results show that our methods can achieve high credit scoring accuracy with imbalanced datasets. Thus, credit granting decision can be made by data mining methods using MLP neural networks.
Signature Forgery and the Forger – An Assessment of Influence on Handwritten ...ITIIIndustries
Signatures are widely used as a form of personal authentication. Despite ubiquity in deployment, individual signatures are relatively easy to forge, especially when only the static ‘pictorial’ outcome of the signature is considered at verification time. In this study, we explore opinions on signature usage for verification purposes, and how individuals rate a particular third-party signature in terms of ease of forgeability and their own ability to forge. We examine responses with respect to an individual’s experience of the forgeability/complexity of their own signature. Our study shows that past experience does not generally have an effect on perceived signature complexity nor the perceived effectiveness of an individual to themselves forge a signature. In assessing forgeability, most subjects cite the overall signature complexity and distinguishing features in reaching this decision. Furthermore, our research indicates that individuals typically vary their signature according to the scenario but generally little effort into the production of the signature.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!