WorldWideScience

Sample records for secure knowledge management

  1. 21st Century Security Manager

    Directory of Open Access Journals (Sweden)

    Stelian ARION

    2010-11-01

    Full Text Available We live in world of uncertainty that generates major paradigms changing that affect security risk management. Modern organization’s security risks management can’t be done without a profound knowlegde and daily practice for security governance, security risk management and resilience. 21st Century security manager need to deal with several areas of konwledge in order to succesfully manage security risks. The document presents the advantages, disadvantages and challenges for security managers thah have government backgroud, or IT security backgroud, or are promoted from organization’s inside leaders. There are six different areas of knowledge that successful security programs of the future must incorporate, either in the knowledge base of their leaders or in the collective knowledge of the leading staff. They are government elements, security organization, emerging issue awareness, IT security, business elements and executive leadership.

  2. Obtaining Knowledge for Innovation: Benefits and Harms of Procedures for Managing Information Security

    Directory of Open Access Journals (Sweden)

    José Geraldo Pereira Barbosa

    2012-06-01

    Full Text Available The research reported in this article aims to describe how the processes of information security used in a manufacturing and packaging paper company influenced the attainment of knowledge on two innovations. The study was conducted through field research, using interviews, narratives, direct observation and thematic analysis for data collection and data processing. The research started from the assumption that even considering the importance of managing information security and its benefits to an organization, the processes of logical security, and physical access controls, would undermine the process of obtaining and transference of knowledge required by innovations. It was observed the presence of five instruments of physical and logical security: "confidentiality", "general control of protection", "antivirus", "backups" and "facility security procedures" which did not interfere negatively in obtaining knowledge. The single barrier identified for the transfer of knowledge was the lack of absorptive capacity of knowledge workers. Therefore, the case describes a situation where a clearly and consistent information security policy allowed the obtaining and transferring of knowledge necessary for innovation. In other words, the assumption of the research was rejected by the findings.

  3. Information and Knowledge Management in the Scope of the Information Security practices: the human factor within Organizations

    Directory of Open Access Journals (Sweden)

    Luciana Emirena Santos Carneiro

    2013-08-01

    Full Text Available The security of informational assets has always been a corporate requirement. These assets can be scaled in three main spheres, namely, people, organizational processes and technologies. The internet, the web, the broadcast of networks, and the growing presence of technology both in people's lives and in organizational contexts have caused profound transformations in the intrinsic processes that constitute personal and organizational routines. On the one hand, these changes provided by the technological progress have fostered competitiveness and decentralization; on the other hand, they require better management, control, security and protection for information and knowledge. This article presents the results of an investigation within information security realm, focusing on the human aspects of knowledge and information management related to security practices. Using a quality-quantitative approach, we identify behavioral actions and profiles of employees of a company in the field of healthcare, which reveal some connections with information security failures. We conclude that the human element is a relevant variable, even a critical one, for the management of information security in organizations.

  4. Nuclear knowledge management

    International Nuclear Information System (INIS)

    2007-01-01

    The management of nuclear knowledge has emerged as a growing challenge in recent years. The need to preserve and transfer nuclear knowledge is compounded by recent trends such as ageing of the nuclear workforce, declining student numbers in nuclear-related fields, and the threat of losing accumulated nuclear knowledge. Addressing these challenges, the IAEA promotes a 'knowledge management culture' through: - Providing guidance for policy formulation and implementation of nuclear knowledge management; - Strengthening the contribution of nuclear knowledge in solving development problems, based on needs and priorities of Member States; - Pooling, analysing and sharing nuclear information to facilitate knowledge creation and its utilization; - Implementing effective knowledge management systems; - Preserving and maintaining nuclear knowledge; - Securing sustainable human resources for the nuclear sector; and - Enhancing nuclear education and training

  5. Building organisational cyber resilience: A strategic knowledge-based view of cyber security management.

    Science.gov (United States)

    Ferdinand, Jason

    The concept of cyber resilience has emerged in recent years in response to the recognition that cyber security is more than just risk management. Cyber resilience is the goal of organisations, institutions and governments across the world and yet the emerging literature is somewhat fragmented due to the lack of a common approach to the subject. This limits the possibility of effective collaboration across public, private and governmental actors in their efforts to build and maintain cyber resilience. In response to this limitation, and to calls for a more strategically focused approach, this paper offers a knowledge-based view of cyber security management that explains how an organisation can build, assess, and maintain cyber resilience.

  6. Managing Cisco network security

    CERN Document Server

    Knipp, Eric

    2002-01-01

    An in-depth knowledge of how to configure Cisco IP network security is a MUST for anyone working in today''s internetworked world"There''s no question that attacks on enterprise networks are increasing in frequency and sophistication..."-Mike Fuhrman, Cisco Systems Manager, Security ConsultingManaging Cisco Network Security, Second Edition offers updated and revised information covering many of Cisco''s security products that provide protection from threats, detection of network security incidents, measurement of vulnerability and policy compliance and management of security policy across an extended organization. These are the tools that network administrators have to mount defenses against threats. Chapters also cover the improved functionality and ease of the Cisco Secure Policy Manger software used by thousands of small-to-midsized businesses and a special section on the Cisco Aironet Wireless Security Solutions.Security from a real-world perspectiveKey coverage of the new technologies offered by the Cisc...

  7. Leveraging Knowledge Management Tools to Support Security Risk Management in the Department of Homeland Security

    Science.gov (United States)

    2011-12-01

    Clarke, S., Coakes, E., & Jack, G. 2004). The following list of KM objectives from KPMG The Power of Knowledge: A Business Guide to Knowledge Management...emerging as the pre-eminent economic resource above raw materials , and often money…fundamental sources of wealth are knowledge and communication...learned: What works and what doesn’t. Medford: Information Today, Inc. KPMG . (1999). The power of knowledge. A business guide to knowledge management

  8. Knowledge Management Challenges For Global Business

    OpenAIRE

    Veli Denizhan Kalkan

    2011-01-01

    Managing organizational knowledge effectively is a prerequisite for securing competitive advantages in the global marketplace. The field of knowledge management brings out important challenges for global business practices. Based on a comprehensive academic and popular literature review, this paper identifies six main knowledge management challenges faced by global business today. These are developing a working definition of knowledge, dealing with tacit knowledge and utilization of informati...

  9. Information security management handbook, v.7

    CERN Document Server

    O'Hanley, Richard

    2013-01-01

    Updated annually, the Information Security Management Handbook, Sixth Edition, Volume 7 is the most comprehensive and up-to-date reference available on information security and assurance. Bringing together the knowledge, skills, techniques, and tools required of IT security professionals, it facilitates the up-to-date understanding required to stay one step ahead of evolving threats, standards, and regulations. Reporting on the latest developments in information security and recent changes to the (ISC)2(R) CISSP Common Body of Knowledge (CBK(R)), this volume features 27 new chapters on topics

  10. Information security management handbook

    CERN Document Server

    Tipton, Harold F

    2003-01-01

    Since 1993, the Information Security Management Handbook has served not only as an everyday reference for information security practitioners but also as an important document for conducting the intense review necessary to prepare for the Certified Information System Security Professional (CISSP) examination. Now completely revised and updated and in its fifth edition, the handbook maps the ten domains of the Information Security Common Body of Knowledge and provides a complete understanding of all the items in it. This is a ...must have... book, both for preparing for the CISSP exam and as a c

  11. Nuclear Knowledge Management: the IAEA Approach

    International Nuclear Information System (INIS)

    Sbaffoni, M.; De Grosbois, J.

    2015-01-01

    Knowledge in an organization is residing in people, processes and technology. Adequate awareness of their knowledge assets and of the risk of losing them is vital for safe and secure operations of nuclear installations. Senior managers understand this important linkage, and in the last years there is an increasing tendency in nuclear organizations to implement knowledge management strategies to ensure that the adequate and necessary knowledge is available at the right time, in the right place. Specific and advanced levels of knowledge are clearly required to achieve and maintain technical expertise, and experience must be developed and be available throughout the nuclear technology lifecycle. If a nuclear organization does not possess or have access to the required technical knowledge, a full understanding of the potential consequences of decisions and actions may not be possible, and safety, security and safeguards might be compromised. Effective decision making during design, licencing, procurement, construction, commissioning, operation, maintenance, refurbishment, and decommissioning of nuclear facilities needs to be risk-informed and knowledge-driven. Nuclear technology is complex and brings with it inherent and unique risks that must be managed to acceptably low levels. Nuclear managers have a responsibility not only to establish adequate technical knowledge and experience in their nuclear organizations but also to maintain it. The consequences of failing to manage the organizations key knowledge assets can result in serious degradations or accidents. The IAEA Nuclear Knowledge Management (NKM) sub-programme was established more than 10 years ago to support Nuclear Organizations, at Member States request, in the implementation and dissemination of the NKM methodology, through the development of guidance and tools, and by providing knowledge management services and assistance. The paper will briefly present IAEA understanding of and approach to knowledge

  12. Knowledge-based computer security advisor

    International Nuclear Information System (INIS)

    Hunteman, W.J.; Squire, M.B.

    1991-01-01

    The rapid expansion of computer security information and technology has included little support to help the security officer identify the safeguards needed to comply with a policy and to secure a computing system. This paper reports that Los Alamos is developing a knowledge-based computer security system to provide expert knowledge to the security officer. This system includes a model for expressing the complex requirements in computer security policy statements. The model is part of an expert system that allows a security officer to describe a computer system and then determine compliance with the policy. The model contains a generic representation that contains network relationships among the policy concepts to support inferencing based on information represented in the generic policy description

  13. Understanding the security management practices of humanitarian organizations.

    Science.gov (United States)

    Bollettino, Vincenzo

    2008-06-01

    Humanitarian organisations operate in increasingly hostile environments. Although authoritative statistics are scarce, anecdotal evidence suggests that aid workers face life-threatening risks that are exacerbated by the growing number of humanitarian organisations operating in the field, the diversity of their mandates, the lack of common professional security standards, and limited success in inter-agency security coordination. Despite broad acceptance of the need for better security management and coordination, many humanitarian organisations remain ambivalent about devoting increased resources to security management and security coordination. A critical lack of basic empirical knowledge of the field security environment hampers efforts to enhance security management practices. The absence of a systematic means of sharing incident data undermines the capacity of the humanitarian community to address proactively security threats. In discussions about humanitarian staff safety and security, the least common denominator remains cumulative anecdotal evidence provided by the many security personnel working for humanitarian organisations in the feld.

  14. Asset Management as a Precondition for Knowledge Management

    International Nuclear Information System (INIS)

    Bajramovic, E.; Waedt, K.; Gupta, D.; Gao, Y.; Parekh, M.

    2016-01-01

    Full text: Smart sensors and extensively configurable devices are gradually imposed by the automation market. Except for safety systems, they find their way into the next instrumentation and control (I&C) generation. The understanding and handling of these devices require an extensive knowledge management (KM). This will be outlined for security, testing and training. For legacy systems, security often relates to vetting and access control. For digital devices, a refined asset management is needed, e.g., down to board-level support chipsets. Firmware and system/application software have their own configurations, versions and patch levels. So, here, as a first step of the KM, a user needs to know the firmware configurability. Then, trainings can address when to apply patches, perform regression tests and on what to focus, based on accumulated experience. While assets are often addressed implicitly, this document justifies an explicit and semiformal representation of primary and supporting assets (the asset portfolio) and the establishment of an asset management system as a basis for a robust knowledge management. (author

  15. Scientific forum during the 46th regular session of the IAEA General Conference. Topical issues: Nuclear Power - Life Cycle Management; Managing Nuclear Knowledge; Nuclear Security. Programme and synopses

    International Nuclear Information System (INIS)

    2002-01-01

    In response to the recommendations of several Agency advisory committees, to address issues related to nuclear power life cycle management, knowledge management in the field of nuclear power, and security of radiation sources and other nuclear material the IAEA is organizing the scientific forum to be held during the General Conference. The purpose of the meeting is to sharpen awareness and understanding of the emerging concerns about the aging of nuclear power plants, maintenance and preservation of knowledge and expertise in nuclear science, technology and applications, to emphasise the significance of security and physical protection of radiation sources and other radioactive material, and to better comprehend the role of the Agency in these processes

  16. Moving beyond probabilities – Strength of knowledge characterisations applied to security

    International Nuclear Information System (INIS)

    Askeland, Tore; Flage, Roger; Aven, Terje

    2017-01-01

    Many security experts avoid the concept of probability when assessing risk and vulnerabilities. Their main argument is that meaningful probabilities cannot be determined and they are consequently not useful for decision-making and security management. However, to give priority to some measures and not others, the likelihood dimension needs to be addressed in some way; the question is how. One approach receiving attention recently is to add strength of knowledge judgements to the probabilities and probability intervals generated. The judgements provide a qualitative labelling of how strong the knowledge supporting the probability assignments is. Criteria for such labelling have been developed, but not for a security setting. The purpose of this paper is to develop such criteria specific to security applications and, using some examples, to demonstrate their suitability. - Highlights: • The concept of probability is often avoided in security risk assessments. • We argue that the likelihood/probability dimension needs to be somehow addressed. • Probabilities should be supplemented by qualitative strength-of-knowledge scores. • Such criteria specific to security applications are developed. • Two examples are used to demonstrate the suitability of the suggested criteria.

  17. Nuclear power life cycle management, managing nuclear knowledge, and nuclear security. Introductory statement to the 5th scientific forum during the 46th session of the IAEA General Conference. Vienna, 17 September 2002

    International Nuclear Information System (INIS)

    ElBaradei, M.

    2002-01-01

    The document reproduces the text of the introductory statement made by the Director General of the IAEA at the 5th scientific forum organized during the 46th session of the IAEA General Conference, Vienna, 17 september 2002, on the nuclear power life cycle management, managing nuclear knowledge, and nuclear security. In the area of nuclear power life cycle management two aspects were emphasized: licence extension and facility decommissioning. Nuclear knowledge management includes ensuring the continued availability of the qualified personnel. Nuclear security must be considered for all nuclear applications, in a manner that encompasses all phases of nuclear activity - the use, storage and transport of nuclear and other radioactive material, as well as the design, operation, and decommissioning of nuclear facilities

  18. Secure Transportation Management

    International Nuclear Information System (INIS)

    Gibbs, P. W.

    2014-01-01

    Secure Transport Management Course (STMC) course provides managers with information related to procedures and equipment used to successfully transport special nuclear material. This workshop outlines these procedures and reinforces the information presented with the aid of numerous practical examples. The course focuses on understanding the regulatory framework for secure transportation of special nuclear materials, identifying the insider and outsider threat(s) to secure transportation, organization of a secure transportation unit, management and supervision of secure transportation units, equipment and facilities required, training and qualification needed.

  19. 21st Century Security Manager

    OpenAIRE

    Stelian ARION

    2010-01-01

    We live in world of uncertainty that generates major paradigms changing that affect security risk management. Modern organization’s security risks management can’t be done without a profound knowlegde and daily practice for security governance, security risk management and resilience. 21st Century security manager need to deal with several areas of konwledge in order to succesfully manage security risks. The document presents the advantages, disadvantages and challenges for security managers ...

  20. Contemporary security management

    CERN Document Server

    Fay, John

    2010-01-01

    Contemporary Security Management, 3rd Edition teaches security professionals how to operate an efficient security department and how to integrate smoothly with other groups inside and outside their own organizations. Fay demonstrates the specifics of security management: * how to organize, plan, develop and manage a security operation. * how to identify vulnerabilities. * how to determine the protective resources required to offset threats. * how to implement all necessary physical and IT security measures. Security professionals share the responsibility for mitigating damage, serving as a resource to an Emergency Tactical Center, assisting the return of business continuity, and liaising with local response agencies such as police and fire departments, emergency medical responders, and emergency warning centers. At the organizational level, the book addresses budgeting, employee performance, counseling, hiring and termination, employee theft and other misconduct, and offers sound advice on building constructi...

  1. Security Engine Management of Router based on Security Policy

    OpenAIRE

    Su Hyung Jo; Ki Young Kim; Sang Ho Lee

    2007-01-01

    Security management has changed from the management of security equipments and useful interface to manager. It analyzes the whole security conditions of network and preserves the network services from attacks. Secure router technology has security functions, such as intrusion detection, IPsec(IP Security) and access control, are applied to legacy router for secure networking. It controls an unauthorized router access and detects an illegal network intrusion. This paper re...

  2. Nurse managers' work life quality and their participation in knowledge management: a correlational study.

    Science.gov (United States)

    Hashemi Dehaghi, Zahra; Sheikhtaheri, Abbas; Dehnavi, Fariba

    2015-01-01

    The association between quality of work life and participation in knowledge management is unknown. This study aimed to discover the association between quality of work life of nurse managers and their participation in implementing knowledge management. This was a correlational study. All nurse managers (71 people) from 11 hospitals affiliated with the Social Security Organization in Tehran, Iran, were included. They were asked to rate their participation in knowledge management and their quality of work life. Data was gathered by a researcher-made questionnaire (May-June 2012). The questionnaire was validated by content and construct validity approaches. Cronbach's alpha was used to evaluate reliability. Finally, 50 questionnaires were analyzed. The answers were scored and analyzed using mean of scores, T-test, ANOVA (or nonparametric test, if appropriate), Pearson's correlation coefficient and linear regression. Nurse managers' performance to implement knowledge management strategies was moderate. A significant correlation was found between quality of work life of nurse managers and their participation in implementing knowledge management strategies (r = 0.82; P The strongest correlations were found between implementation of knowledge management and participation of nurse managers in decision making (r = 0.82; P knowledge management.

  3. Information security cost management

    CERN Document Server

    Bazavan, Ioana V

    2006-01-01

    While information security is an ever-present challenge for all types of organizations today, most focus on providing security without addressing the necessities of staff, time, or budget in a practical manner.Information Security Cost Management offers a pragmatic approach to implementing information security, taking budgetary and real-world constraints into consideration. By providing frameworks, step-by-step processes, and project management breakdowns, this book demonstrates how to design the best security strategy with the resources you have available. Organized into five sections, the book-Focuses on setting the right road map so that you can be most effective in your information security implementationsDiscusses cost-effective staffing, the single biggest expense to the security organizationPresents practical ways to build and manage the documentation that details strategy, provides resources for operating annual audits, and illustrates how to advertise accomplishments to senior management effectivelyI...

  4. Nuclear Knowledge Management

    International Nuclear Information System (INIS)

    Hanamitsu, K.

    2015-01-01

    Knowledge is a strategic asset in every business. It should be actively managed by creating, acquiring, sharing, transferring and retaining among workers. Leaders and managers have to understand the significance of knowledge management (KM), recognise the risks of knowledge loss and gaps, and its impact on their working environment. Nuclear industry appears to be behind other industries in KM. This is firstly attributed to the nature of business which deals with sensitive data on nuclear materials and prioritises safety and security over information sharing. Second, it faces strong competition over the operational life-cycle, which discourages to exchange know-how and experiences. Third, nuclear industry is highly technology-oriented with homogeneous form, which misleads people to believe that KM has been already in place. Those factors could be barriers to establish nuclear KM culture on the basis of corporate core value and safety culture. Practical example of KM in business includes codification of particular skills into knowledge repository such as manual, handbook and database, and implicit knowledge transfer from experts to successors through apprenticeship and mentoring programmes. The examples suggest that KM applications closely link to information technology (IT) and human resource development (HRD) strategies, which results in effective integration of all available resources: people, process, and technology. Globalization and diversity is another dimension where KM can contribute to the solution. Global companies have to achieve a common goal beyond cultural, racial and gender differences. KM helps reduce the gaps, identify the core competence, and increase flexibility in workplace. Working women have been developing their professional career while adapting to situational changes in their lives. It might be easier for them to understand the importance of KM and develop KM practices in the organizations. KM will help nuclear industry to respond to the

  5. Once more unto the breach managing information security in an uncertain world

    CERN Document Server

    Simmons, Andrea C

    2012-01-01

    In Once more unto the Breach, Andrea C Simmons speaks directly to information security managers and provides an insider's view of the role, offering priceless gems from her extensive experience and knowledge. Based on a typical year in the life of an information security manager, the book examines how the general principles can be applied to all situations and discusses the lessons learnt from a real project.

  6. Information security management handbook

    CERN Document Server

    Tipton, Harold F

    2006-01-01

    Access Control Systems and Methodology. Telecommunications and Network Security. Security Management Practices. Application Program Security. Cryptography. Computer, System, and Security Architecture. Operations Security. Business Continuity Planning and Disaster Recovery Planning. Law, Investigation and Ethics. Physical Security.

  7. Managing knowledge management

    DEFF Research Database (Denmark)

    Lystbæk, Christian Tang

    2016-01-01

    today is that knowledge about health and health care is generated from a multitude of sources and circulated rapidly across professional and Karin Knorr Cetina (2006, 2007) stresses that to understand knowledge management practices we need to magnify the space of knowledge in action and consider......This work-in-progress focuses on the management of knowledge management and its socio-material implications. More specifically, it focuses on the management of epistemic objects and objectives in professional health care organisations. One of the main characteristics of professional health care...... the presentation and circulation of epistemic objects in extended contexts. In other words, we need to consider that the routes from research to practice – and the relation between knowledge and management – is not straightforward. First epistemic objects and objectives may lead to contrasting results...

  8. System Security Management in SNMP

    OpenAIRE

    P. Deivendran; Dr. R. Dhanapal Ph.D

    2010-01-01

    We present a framework for managing system security, based on a SNMP Management Information Base (MIB), namely the System Security MIB (SSEC MIB), We have defined managed objects and completed the ASN.1 description of the MIB that embeds them. The related security management functions are mainly focused on monitoring external script execution for system security scanning and access control. The main goal of this work is to introduce the semantics and a standard interface that will allow the r...

  9. Information security management handbook

    CERN Document Server

    2002-01-01

    The Information Security Management Handbook continues its tradition of consistently communicating the fundamental concepts of security needed to be a true CISSP. In response to new developments, Volume 4 supplements the previous volumes with new information covering topics such as wireless, HIPAA, the latest hacker attacks and defenses, intrusion detection, and provides expanded coverage on security management issues and applications security. Even those that don't plan on sitting for the CISSP exam will find that this handbook is a great information security reference.The changes in the tech

  10. ICT security management

    OpenAIRE

    SCHREURS, Jeanne; MOREAU, Rachel

    2007-01-01

    Security becomes more and more important and companies are aware that it has become a management problem. It’s critical to know what are the critical resources and processes of the company and their weaknesses. A security audit can be a handy solution. We have developed BEVA, a method to critically analyse the company and to uncover the weak spots in the security system. BEVA results also in a general security score and security scores for each security factor. These will be used in the risk ...

  11. Enterprise security IT security solutions : concepts, practical experiences, technologies

    CERN Document Server

    Fumy, Walter

    2013-01-01

    Addressing IT managers and staff, as well as CIOs and other executives dealing with corporate IT security, this book provides a broad knowledge on the major security issues affecting today's corporations and organizations, and presents state-of-the-art concepts and current trends for securing an enterprise.Areas covered include information security management, network and system security, identity and access management (IAM), authentication (including smart card based solutions and biometrics), and security certification. In-depth discussion of relevant technologies and standards (including cr

  12. Managing knowledge management

    DEFF Research Database (Denmark)

    Lystbæk, Christian Tang

    ) and colleagues, who stresses that to understand knowledge management practices we need to magnify the space of knowledge in action and consider the presentation and circulation of epistemic objects in extended contexts. In other words, we need to consider that the routes from research to practice......The work-in-progress that I would like to present and discuss in the workshop focuses on the management of knowledge management and its socio-material implications. More specifically, my work focuses on how epistemic objects and objectives are managed in professional health care organisations. One...... of the characteristics of professional health care today is that knowledge is generated from a multitude of sources and circulated rapidly across organizational boundaries. This derives not only from a growth in knowledge production within many organizations, but also from the emergence of agencies that specialize...

  13. Knowledge management

    DEFF Research Database (Denmark)

    Foss, Nicolai Juul; Mahnke, Volker

    2003-01-01

    Knowledge management has emerged as a very successful organization practice and has beenextensively treated in a large body of academic work. Surprisingly, however, organizationaleconomics (i.e., transaction cost economics, agency theory, team theory and property rightstheory) has played no role...... in the development of knowledge management. We argue thatorganizational economics insights can further the theory and practice of knowledge managementin several ways. Specifically, we apply notions of contracting, team production,complementaries, hold-up, etc. to knowledge management issues (i.e., creating...... and integrationknowledge, rewarding knowledge workers, etc.) , and derive refutable implications that are novelto the knowledge management field from our discussion....

  14. The Latent Structure of Secure Base Script Knowledge

    Science.gov (United States)

    Waters, Theodore E. A.; Fraley, R. Chris; Groh, Ashley M.; Steele, Ryan D.; Vaughn, Brian E.; Bost, Kelly K.; Veríssimo, Manuela; Coppola, Gabrielle; Roisman, Glenn I.

    2015-01-01

    There is increasing evidence that attachment representations abstracted from childhood experiences with primary caregivers are organized as a cognitive script describing secure base use and support (i.e., the "secure base script"). To date, however, the latent structure of secure base script knowledge has gone unexamined--this despite…

  15. Information security knowledge sharing in organizations : Investigating the effect of behavioral information security governance and national culture

    OpenAIRE

    Rocha Flores, Waldo; Antonsen, Egil; Ekstedt, Mathias

    2014-01-01

    This paper presents an empirical investigation on what behavioral information security governance factors drives the establishment of information security knowledge sharing in organizations. Data was collected from organizations located in different geographic regions of the world, and the amount of data collected from two countries – namely, USA and Sweden – allowed us to investigate if the effect of behavioral information security governance factors on the establishment of security knowledg...

  16. A Security Audit Framework to Manage Information System Security

    Science.gov (United States)

    Pereira, Teresa; Santos, Henrique

    The widespread adoption of information and communication technology have promoted an increase dependency of organizations in the performance of their Information Systems. As a result, adequate security procedures to properly manage information security must be established by the organizations, in order to protect their valued or critical resources from accidental or intentional attacks, and ensure their normal activity. A conceptual security framework to manage and audit Information System Security is proposed and discussed. The proposed framework intends to assist organizations firstly to understand what they precisely need to protect assets and what are their weaknesses (vulnerabilities), enabling to perform an adequate security management. Secondly, enabling a security audit framework to support the organization to assess the efficiency of the controls and policy adopted to prevent or mitigate attacks, threats and vulnerabilities, promoted by the advances of new technologies and new Internet-enabled services, that the organizations are subject of. The presented framework is based on a conceptual model approach, which contains the semantic description of the concepts defined in information security domain, based on the ISO/IEC_JCT1 standards.

  17. Knowledge Management.

    Science.gov (United States)

    1999

    The first of the four papers in this symposium, "Knowledge Management and Knowledge Dissemination" (Wim J. Nijhof), presents two case studies exploring the strategies companies use in sharing and disseminating knowledge and expertise among employees. "A Theory of Knowledge Management" (Richard J. Torraco), develops a conceptual…

  18. Project Management with IT Security Focus

    OpenAIRE

    Felician Alecu; Paul Pocatilu; Sergiu Capisizu

    2011-01-01

    The paper focus on the main key points related to the IT security project management. The most important lifecycle stages are identified: IT security project proposal definition, project organization, project planning, quality planning, project team organization, IT security project activities management and project closing. The most important success factors for IT security projects are the support of top-management, customer satisfaction, prevention over remediation and continuous progress....

  19. An XML Based Knowledge Management System for e-Collaboration and e-Learning

    Directory of Open Access Journals (Sweden)

    Varun Gopalakrishna

    2004-02-01

    Full Text Available This paper presents the development, key features, and the implementation principles of a sustainable and scaleable knowledge management system (KMS prototype for creating, capturing, organizing, and managing digital information in the form of Extensible Markup Language (XML documents and other popular file formats. It is aimed to provide a platform for global, instant, and secure access to and dissemination of information within a knowledge-intensive organization or a cluster of organizations through Internet or intranet. A three-tier system architecture was chosen for the KMS to provide performance and scalability while enabling future development that supports global, secure, real-time, and multi-media communication of information and knowledge among team members separated by great distance. An XML Content Server has been employed in this work to store, index, and retrieve large volumes of XML and binary content.

  20. IT–Enabled Knowledge Management System for Nuclear R&D Organization

    International Nuclear Information System (INIS)

    Jehadeesan, R.

    2016-01-01

    Full text: A knowledge management (KM) system for codification, preservation and utilization of all multi-disciplinary knowledge assets accumulated over several decades of nuclear research, development and operation is essential for improved organizational productivity, new insights and high-levels of innovation. IGCAR’s Nuclear Knowledge Management System deployed with IT-as-enabler addresses various challenges related to people, process, technology and resources and provides a technology platform to leverage the collective knowledge of the organization. This paper describes the strategic action plan and structured approach followed for building IT-enabled knowledge management system to acquire, store, share and utilize the organizational knowledge assets in the explicit form of publications, technical reports, presentations, projects, activities, facilities etc., along with the tacit knowledge multi-media modules. It highlights the salient features of the in-house-developed advanced KM portal deployed for facilitating the creation, archival, retrieval, sharing and dissemination of knowledge assets originating from diverse domains, in an organized and secured way. The paper also underlines the application of semantic technologies, tools and standards in implementing a robust KM technology infrastructure with enhanced functionalities. (author

  1. Managing information technology security risk

    Science.gov (United States)

    Gilliam, David

    2003-01-01

    Information Technology (IT) Security Risk Management is a critical task for the organization to protect against the loss of confidentiality, integrity and availability of IT resources. As systems bgecome more complex and diverse and and attacks from intrusions and malicious content increase, it is becoming increasingly difficult to manage IT security risk. This paper describes a two-pronged approach in addressing IT security risk and risk management in the organization: 1) an institutional enterprise appraoch, and 2) a project life cycle approach.

  2. Information Security Management - Part Of The Integrated Management System

    Science.gov (United States)

    Manea, Constantin Adrian

    2015-07-01

    The international management standards allow their integrated approach, thereby combining aspects of particular importance to the activity of any organization, from the quality management systems or the environmental management of the information security systems or the business continuity management systems. Although there is no national or international regulation, nor a defined standard for the Integrated Management System, the need to implement an integrated system occurs within the organization, which feels the opportunity to integrate the management components into a cohesive system, in agreement with the purpose and mission publicly stated. The issues relating to information security in the organization, from the perspective of the management system, raise serious questions to any organization in the current context of electronic information, reason for which we consider not only appropriate but necessary to promote and implement an Integrated Management System Quality - Environment - Health and Operational Security - Information Security

  3. Incentive Issues in Information Security Management

    Science.gov (United States)

    Lee, Chul Ho

    2012-01-01

    This dissertation studies three incentive issues in information security management. The first essay studies contract issues between a firm that outsources security functions and a managed security service provider (MSSP) that provides security functions to the firm. Since MSSP and firms cannot observe each other's actions, both can suffer…

  4. Knowledge management: another management fad?

    Directory of Open Access Journals (Sweden)

    Leonard J. Ponzi

    2002-01-01

    Full Text Available Knowledge management is a subject of a growth body of literature. While capturing the interest of practitioners and scholars in the mid-1990s, knowledge management remains a broadly defined concept with faddish characteristics. Based on annual counts of article retrieved from Science Citation Index, Social Science Citation Index, and ABI Inform referring to three previous recognized management fad, this paper introduces empirical evidence that proposes that a typical management movement generally reveals itself as a fad in approximately five years. In applying this approach and assumption to the case of knowledge management, the findings suggest that knowledge management is at least living longer than typical fads and perhaps is in the process of establishing itself as a new aspect of management. To further the understanding of knowledge management's development, its interdisciplinary activity and breadth are reported and briefly discussed.

  5. Automated security management

    CERN Document Server

    Al-Shaer, Ehab; Xie, Geoffrey

    2013-01-01

    In this contributed volume, leading international researchers explore configuration modeling and checking, vulnerability and risk assessment, configuration analysis, and diagnostics and discovery. The authors equip readers to understand automated security management systems and techniques that increase overall network assurability and usability. These constantly changing networks defend against cyber attacks by integrating hundreds of security devices such as firewalls, IPSec gateways, IDS/IPS, authentication servers, authorization/RBAC servers, and crypto systems. Automated Security Managemen

  6. DNS security management

    CERN Document Server

    Dooley, Michael

    2017-01-01

    An advanced Domain Name System (DNS) security resource that explores the operation of DNS, its vulnerabilities, basic security approaches, and mitigation strategies DNS Security Management offers an overall role-based security approach and discusses the various threats to the Domain Name Systems (DNS). This vital resource is filled with proven strategies for detecting and mitigating these all too frequent threats. The authors—noted experts on the topic—offer an introduction to the role of DNS and explore the operation of DNS. They cover a myriad of DNS vulnerabilities and include preventative strategies that can be implemented. Comprehensive in scope, the text shows how to secure DNS resolution with the Domain Name System Security Extensions (DNSSEC), DNS firewall, server controls, and much more. In addition, the text includes discussions on security applications facilitated by DNS, such as anti-spam, SFP, and DANE.

  7. Managing Knowledge

    OpenAIRE

    Connolly, Niall

    2013-01-01

    This paper provides a perspective on what knowledge is, why knowledge is important, and how we might encourage good knowledge behaviours. A knowledge management framework is described, and although the framework is project management-centric the basic principles are transferrable to other contexts. From a strategic perspective, knowledge can be considered an asset that has the potential to provide a competitive advantage provided that it has intrinsic value, it is not easily accessible by ...

  8. The (Big Data-security assemblage: Knowledge and critique

    Directory of Open Access Journals (Sweden)

    Claudia Aradau

    2015-10-01

    Full Text Available The Snowden revelations and the emergence of ‘Big Data’ have rekindled questions about how security practices are deployed in a digital age and with what political effects. While critical scholars have drawn attention to the social, political and legal challenges to these practices, the debates in computer and information science have received less analytical attention. This paper proposes to take seriously the critical knowledge developed in information and computer science and reinterpret their debates to develop a critical intervention into the public controversies concerning data-driven security and digital surveillance. The paper offers a two-pronged contribution: on the one hand, we challenge the credibility of security professionals’ discourses in light of the knowledge that they supposedly mobilize; on the other, we argue for a series of conceptual moves around data, human–computer relations, and algorithms to address some of the limitations of existing engagements with the Big Data-security assemblage.

  9. The many secure knowledge bases of psychotherapy.

    Science.gov (United States)

    Bergner, Raymond M

    2006-01-01

    Psychotherapeutic practice, while it has benefited greatly from scientific research, rests on many further secure epistemic foundations. In the present article, this thesis is argued in two stages. First, a brief review of some elementary epistemological findings is presented. In this review, the generally acknowledged degree of certainty attributed to different knowledge sources, and thus the confidence with which we may believe and act upon them, are recounted. Second, an extended analysis of the ways in which each of these knowledge sources enter into the practice of psychotherapy is developed. In the end, what is proffered here is a demonstration that well conducted psychotherapy is an activity whose judgments and decisions rest on many secure foundations.

  10. Certified training for nuclear and radioactive source security management

    International Nuclear Information System (INIS)

    Johnson, Daniel

    2017-01-01

    Radioactive sources are used by hospitals, research facilities and industry for such purposes as diagnosing and treating illnesses, sterilising equipment and inspecting welds. Unfortunately, many States, regulatory authorities and licensees may not appreciate how people with malevolent intentions could use radioactive sources, and statistics confirm that a number of security incidents happen around the globe. The adversary could be common thieves, activists, insiders, terrorists and organised crime groups. Mitigating this risk requires well trained and competent staff who have developed the knowledge, attributes and skills necessary to successfully discharge their security responsibilities. The International Atomic Energy Agency and the World Institute for Nuclear Security are leading international training efforts. The target audience is a multi-disciplinary group of professionals with management responsibilities for security at facilities with radioactive sources. These efforts to promote training and competence amongst practitioners have been recognised at the 2014 and 2016 Nuclear Security and Nuclear Industry Summits. (author)

  11. INFORMATION SECURITY MANAGEMENT: FACTORS THAT INFLUENCE ITS ADOPTION IN SMALL AND MID-SIZED BUSINESSES

    Directory of Open Access Journals (Sweden)

    Abner da Silva Netto

    2008-02-01

    Full Text Available The objectives of this study were verify in what measure the small and medium companies accomplish the management security information and identify which factors influence the small and medium companies to adopt measures of management security information. The source research was exploratory-descriptive and the design used was the survey. The sample was compound of 43 metal production industries located in ABC region. According to management information security literature and Brazilian norm of information security were identified the tools or techniques of management security information and classified it into three layers: physic, logic and human. The study identified that the human layer is the one that presents the major shortage of cares in the companies followed by the logical one. The companies get used to have the antivirus as the main security tool/technique according to the researched companies to guarantee the safety of information. Besides that, the research showed that 59% of the companies have a safety satisfactory level and the main motivator factor to adopt the management security information is "to avoid possible financial loss”. On the other hand, all the inhibitors factors showed important to the researched companies like: lack of knowledge, investments value, organization culture and difficulty to measure cost/benefit.

  12. Knowledge as an Asset and Knowledge Management

    OpenAIRE

    Sevinç Gülseçen

    2014-01-01

    The most valuable resource available to any organization today is its knowledge asset which is stored in processes and information systems, corporate data warehouses, employees’ brains, copyrights and patents. Knowledge management is the process of capturing, distributing, and effectively using this knowledge. The factors affecting Knowledge Management can be listed as follows: organizational culture, knowledge manager, the evolution of knowledge, knowledge polution and technology.

  13. Knowledge as an Asset and Knowledge Management

    Directory of Open Access Journals (Sweden)

    Sevinç Gülseçen

    2014-03-01

    Full Text Available The most valuable resource available to any organization today is its knowledge asset which is stored in processes and information systems, corporate data warehouses, employees’ brains, copyrights and patents. Knowledge management is the process of capturing, distributing, and effectively using this knowledge. The factors affecting Knowledge Management can be listed as follows: organizational culture, knowledge manager, the evolution of knowledge, knowledge polution and technology.

  14. The future of technical knowledge management

    International Nuclear Information System (INIS)

    Kang, C.-S.

    2005-01-01

    The sustainable development of nuclear energy can only be achieved by establishing the global nuclear safety regime. The effective management of technical knowledge will become one of the issues and challenges in establishing the global nuclear safety. We have to develop the measures to identify the nature and scope of associated problems and to explore the cooperative international actions to resolve them. The future of its effective management will depend on how to optimize the transfer and deployment of the knowledge as well as how to maintain the knowledge base. In this presentation, two specific topics are discussed: sharing of the knowledge and preservation of the workforce. In sharing the knowledge, topics are assurance of free flow of safety-related R and D information from developed to developing countries and potential imposition of a strong trade agreement between nuclear exporting and importing countries to ensure the safety. In preserving the workforce, topics are development of the knowledge transfer system from this generation to the next like a forum of IYNC, enforcement of regional and international educational systems like ANENT and WNU for workforce development, and exploration of optimal mechanism in using retired workforce. The publication of the world-wide directory of nuclear professionals, aggressive implementation of the youth internship program and introduction of the international professional certification program are also discussed. The reformation of CNS as a more enforcing and binding agreement in keeping the safety along with the introduction of 'Global Nuclear Safety Treaty' could be an excellent mechanism of achieving an effective knowledge management and eventually enforcing the global safety regime. IAEA has always been the corroborator of maintaining high levels of nuclear safety through close international nuclear cooperation. These important roles of IAEA should continue to be emphasized more than ever in order to secure the

  15. Agile IT Security Implementation Methodology

    CERN Document Server

    Laskowski, Jeff

    2011-01-01

    The book is a tutorial that goes from basic to professional level for Agile IT security. It begins by assuming little knowledge of agile security. Readers should hold a good knowledge of security methods and agile development. The book is targeted at IT security managers, directors, and architects. It is useful for anyone responsible for the deployment of IT security countermeasures. Security people with a strong knowledge of agile software development will find this book to be a good review of agile concepts.

  16. Knowledge Management Implementation In Indonesia Nuclear Energy Regulatory Agency (BAPETEN)

    International Nuclear Information System (INIS)

    Nurwidi Astuti, Y.H.

    2016-01-01

    Full text: Indonesian Nuclear Energy Regulatory Agency (BAPETEN) acquires the task and function to control the safety, security and safeguards in the field of nuclear energy through the development of legislation, licensing services, inspection and enforcement. Which is supported by review and assessment, emergency preparedness. Knowledge Management (KM) is importance for BAPETEN to achieve the Regulatory body effectiveness and product innovation. The Chairman of BAPETEN has set policies statement for KM implementation. To implement a knowledge management program, BAPETEN creates KM guidelines that includes blueprint and roadmap KM programme based on a KM readiness survey. The KM readiness survey involves 20% of staff who represent each unit and discussions with the senior manager of BAPETEN, and the result of readiness survey produce 13 KM BAPETEN initiatives strategic. After the initiative strategic has been obtained, BAPETEN creates the Roadmap of BAPETEN Knowledge Management for 2015–2019 programme for KM People with the activity sozialization of KM Guidebook, workshop SMART knowledge worker, nurture Community of practices (COP) and develop social network analysis (SNE). KM Process with activity focus group discussion, KM Readyness survey, KM Statement, KM Bapeten Guidebook, knowledge mapping, knowledge harvesting. KM Technology with activity develop knowledge system or portal, e-learning. (author

  17. An exploration study to detect important barriers for knowledge management

    Directory of Open Access Journals (Sweden)

    Jalil Ghafourian

    2014-01-01

    Full Text Available This paper presents an empirical investigation to find the important factors influencing implementation of knowledge management in revenue agencies in Iran. The proposed study designs a questionnaire and distributes it among some experts and, using principal component analysis, the study detects important barriers for knowledge management implications. The study selects 170 people from 880 regular employees who work for revenue agency and distributes the questionnaire designed in Likert scale. Cronbach alpha has been determined as 0.70, which is well above the minimum acceptable level. In terms of knowledge management, the study determines six factors including support for creativity and innovation, knowledge sharing, trust, employee promotion plan, mission and training programs and they represent 66.57% of the described factors. In addition, in terms of barriers, job security, cultural issues, individual differences, infrastructure, organizational structure and lack of vision are the most important issues representing 61.98% of the factors.

  18. Information Security Awareness On-Line Materials Design with Knowledge Maps

    Science.gov (United States)

    Shaw, Ruey-Shiang; Keh, Huan-Chao; Huang, Nan-Ching; Huang, Tien-Chuan

    2011-01-01

    Information Security Awareness, though known as a primary and important issue in the domain of Information Security, CSI computer crime and security survey showed poor security awareness training in public and private sectors. In many studies, the authors have found that the usage of knowledge maps helps the process of learning and conception…

  19. Information Security Management System toolkit

    OpenAIRE

    Καραμανλής, Μάνος; Karamanlis, Manos

    2016-01-01

    Secure management of information is becoming critical for any organization because information is one of the most valuable assets in organization’s business operations. An Information security management system (ISMS) consists of the policies, procedures, guidelines, and associated resources and activities, collectively managed by an organization, in the pursuit of protecting its information assets. An ISMS is a systematic approach for establishing, implementing, operating, mon...

  20. Knowledge Management, Codification and Tacit Knowledge

    Science.gov (United States)

    Kimble, Chris

    2013-01-01

    Introduction: This article returns to a theme addressed in Vol. 8(1) October 2002 of the journal: knowledge management and the problem of managing tacit knowledge. Method: The article is primarily a review and analysis of the literature associated with the management of knowledge. In particular, it focuses on the works of a group of economists who…

  1. Mothers' electrophysiological, subjective, and observed emotional responding to infant crying: The role of secure base script knowledge.

    Science.gov (United States)

    Groh, Ashley M; Roisman, Glenn I; Haydon, Katherine C; Bost, Kelly; McElwain, Nancy; Garcia, Leanna; Hester, Colleen

    2015-11-01

    This study examined the extent to which secure base script knowledge-reflected in the ability to generate narratives in which attachment-relevant events are encountered, a clear need for assistance is communicated, competent help is provided and accepted, and the problem is resolved-is associated with mothers' electrophysiological, subjective, and observed emotional responses to an infant distress vocalization. While listening to an infant crying, mothers (N = 108, M age = 34 years) lower on secure base script knowledge exhibited smaller shifts in relative left (vs. right) frontal EEG activation from rest, reported smaller reductions in feelings of positive emotion from rest, and expressed greater levels of tension. Findings indicate that lower levels of secure base script knowledge are associated with an organization of emotional responding indicative of a less flexible and more emotionally restricted response to infant distress. Discussion focuses on the contribution of mothers' attachment representations to their ability to effectively manage emotional responding to infant distress in a manner expected to support sensitive caregiving.

  2. Knowledge Management as Attention

    DEFF Research Database (Denmark)

    Kreiner, Kristian

    2004-01-01

    This article explores the case of product development for insights into the potential role of knowledge management. Current literature on knowledge management entertains the notion that knowledge management is a specific set of practices - separate enough to allow specialization of responsibility....... By common standard, the proclaimed responsibility of knowledge management is shared knowledge, saved learning costs and coordinated action in an organization. The significance of the practices of knowledge management is the intention of shared knowledge, saved learning costs and coordinated action....

  3. Information technology - Security techniques - Information security management systems - Requirements

    CERN Document Server

    International Organization for Standardization. Geneva

    2005-01-01

    ISO/IEC 27001:2005 covers all types of organizations (e.g. commercial enterprises, government agencies, not-for profit organizations). ISO/IEC 27001:2005 specifies the requirements for establishing, implementing, operating, monitoring, reviewing, maintaining and improving a documented Information Security Management System within the context of the organization's overall business risks. It specifies requirements for the implementation of security controls customized to the needs of individual organizations or parts thereof. ISO/IEC 27001:2005 is designed to ensure the selection of adequate and proportionate security controls that protect information assets and give confidence to interested parties. ISO/IEC 27001:2005 is intended to be suitable for several different types of use, including the following: use within organizations to formulate security requirements and objectives; use within organizations as a way to ensure that security risks are cost effectively managed; use within organizations to ensure comp...

  4. Integrated Safeguards and Security Management Self-Assessment 2004

    Energy Technology Data Exchange (ETDEWEB)

    Lunford, Dan; Ramsey, Dwayne

    2005-04-01

    profiles at the end of phase one (August 6, 2004) and phase two (November 1, 2004). The Self-Assessment confirmed that classified information is not held or processed at Berkeley Lab. The survey results also identified areas where increased employee knowledge and awareness of Laboratory policy would be beneficial, the two most prominent being password usage and wireless network service. Line management will be able to determine additional corrective actions based on the results of the Self-Assessment. Future assessments will raise the ratings bar for some existing program elements and add new elements to stimulate further improvements in Laboratory security.

  5. Computer security engineering management

    International Nuclear Information System (INIS)

    McDonald, G.W.

    1988-01-01

    For best results, computer security should be engineered into a system during its development rather than being appended later on. This paper addresses the implementation of computer security in eight stages through the life cycle of the system; starting with the definition of security policies and ending with continuing support for the security aspects of the system throughout its operational life cycle. Security policy is addressed relative to successive decomposition of security objectives (through policy, standard, and control stages) into system security requirements. This is followed by a discussion of computer security organization and responsibilities. Next the paper directs itself to analysis and management of security-related risks, followed by discussion of design and development of the system itself. Discussion of security test and evaluation preparations, and approval to operate (certification and accreditation), is followed by discussion of computer security training for users is followed by coverage of life cycle support for the security of the system

  6. Security and Emergency Management Division

    Data.gov (United States)

    Federal Laboratory Consortium — Volpe's Security and Emergency Management Division identifies vulnerabilities, risks, and opportunities to improve the security of transportation systems, critical...

  7. The challenges of knowledge management portals application and implementation:An Iranian organizations case study

    Directory of Open Access Journals (Sweden)

    Sara Sharifi-Yazdi

    2010-07-01

    Full Text Available This article aims to review, identify and prioritize challenge factors of the implementation of knowledge management portals for Iranian organizations. The study determines several important weakness factors affecting the implications of the knowledge management such as the weakness in organizational strategy, information overcrowd, content management, portals project management, and etc. The study also indicates that the factors have different priorities where managerial factors are in the highest priority and financial factors are in the lowest priority. We also perform factor analysis to summarize seventeen factors into six issues: Financial and information security, Technology and management, Senior management support and strategy, Acceptance, User's motivation and culture, Project management, Change management and training. Knowledge management portal is a brand new concept for Iranian organizations and it is hard to gather information from limited number of organizations or companies for applied knowledge management portals. The results of this study could be useful for knowledge management planners and managers in organizations and clear the prospects to deal with the challenges.

  8. Certified Training for Nuclear and Radioactive Source Security Management.

    Science.gov (United States)

    Johnson, Daniel

    2017-04-01

    Radioactive sources are used by hospitals, research facilities and industry for such purposes as diagnosing and treating illnesses, sterilising equipment and inspecting welds. Unfortunately, many States, regulatory authorities and licensees may not appreciate how people with malevolent intentions could use radioactive sources, and statistics confirm that a number of security incidents happen around the globe. The adversary could be common thieves, activists, insiders, terrorists and organised crime groups. Mitigating this risk requires well trained and competent staff who have developed the knowledge, attributes and skills necessary to successfully discharge their security responsibilities. The International Atomic Energy Agency and the World Institute for Nuclear Security are leading international training efforts. The target audience is a multi-disciplinary group of professionals with management responsibilities for security at facilities with radioactive sources. These efforts to promote training and competence amongst practitioners have been recognised at the 2014 and 2016 Nuclear Security and Nuclear Industry Summits. © The Author 2016. Published by Oxford University Press. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  9. Architecture and Knowledge-Driven Self-Adaptive Security in Smart Space

    Directory of Open Access Journals (Sweden)

    Antti Evesti

    2013-03-01

    Full Text Available Dynamic and heterogeneous smart spaces cause challenges for security because it is impossible to anticipate all the possible changes at design-time. Self-adaptive security is an applicable solution for this challenge. This paper presents an architectural approach for security adaptation in smart spaces. The approach combines an adaptation loop, Information Security Measuring Ontology (ISMO and a smart space security-control model. The adaptation loop includes phases to monitor, analyze, plan and execute changes in the smart space. The ISMO offers input knowledge for the adaptation loop and the security-control model enforces dynamic access control policies. The approach is novel because it defines the whole adaptation loop and knowledge required in each phase of the adaptation. The contributions are validated as a part of the smart space pilot implementation. The approach offers reusable and extensible means to achieve adaptive security in smart spaces and up-to-date access control for devices that appear in the space. Hence, the approach supports the work of smart space application developers.

  10. Evolution of knowledge management

    Directory of Open Access Journals (Sweden)

    Mašić Branislav

    2017-01-01

    Full Text Available The theory of business and management is changing rapidly, and changes are expected to continue. Emerging concepts and paradigms are being introduced and applied to organizational life. Knowledge management (KM is not new but rather newly structured concept. Although the concept was not popularized until the last two decades of the 20th century, transmitting and managing knowledge stretch back into distant history. The aim of this paper is to analyse knowledge management evolutionary history and to investigate the use of knowledge management as management tool in organizations. This paper is focused on systematic review of literature on knowledge management. Emphasis is placed on correlation between knowledge management and information and communication technology and advent and use of new tools and techniques; change in the way knowledge has been conceptualized; social context of KM, big data and analytics, artificial intelligence. The importance of knowledge itself was not questioned, as it is recognized as highly valuable resource.

  11. Knowledge Management: A Skeptic's Guide

    Science.gov (United States)

    Linde, Charlotte

    2006-01-01

    A viewgraph presentation discussing knowledge management is shown. The topics include: 1) What is Knowledge Management? 2) Why Manage Knowledge? The Presenting Problems; 3) What Gets Called Knowledge Management? 4) Attempts to Rethink Assumptions about Knowledgs; 5) What is Knowledge? 6) Knowledge Management and INstitutional Memory; 7) Knowledge Management and Culture; 8) To solve a social problem, it's easier to call for cultural rather than organizational change; 9) Will the Knowledge Management Effort Succeed? and 10) Backup: Metrics for Valuing Intellectural Capital i.e. Knowledge.

  12. Managing customer knowledge

    OpenAIRE

    2013-01-01

    M. Phil. (Information Management) Customer relationship management has been exposed as a strategic failure, unveiling only customer dissatisfaction. A new method for managing customers is consequently required. The effect of the knowledge economy has brought about a change in global orientation, in the focus on customer wants and needs to increase satisfaction. There was then a shift in focus from information to knowledge. In such an economy, the customer knowledge management strategy, as ...

  13. Information security management with ITIL V3

    CERN Document Server

    Cazemier, Jacques A; Peters, Louk

    2010-01-01

    This groundbreaking new title looks at Information Security from defining what security measures positively support the business, to implementation to maintaining the required level and anticipating required changes. It covers:Fundamentals of information security ? providing readers insight and give background about what is going to be managed. Topics covered include: types of security controls, business benefits and the perspectives of business, customers, partners, service providers, and auditors.Fundamentals of management of information security - explains what information security manageme

  14. An Energy-Efficient Secure Routing and Key Management Scheme for Mobile Sinks in Wireless Sensor Networks Using Deployment Knowledge

    Directory of Open Access Journals (Sweden)

    Le Xuan Hung

    2008-12-01

    Full Text Available For many sensor network applications such as military or homeland security, it is essential for users (sinks to access the sensor network while they are moving. Sink mobility brings new challenges to secure routing in large-scale sensor networks. Previous studies on sink mobility have mainly focused on efficiency and effectiveness of data dissemination without security consideration. Also, studies and experiences have shown that considering security during design time is the best way to provide security for sensor network routing. This paper presents an energy-efficient secure routing and key management for mobile sinks in sensor networks, called SCODEplus. It is a significant extension of our previous study in five aspects: (1 Key management scheme and routing protocol are considered during design time to increase security and efficiency; (2 The network topology is organized in a hexagonal plane which supports more efficiency than previous square-grid topology; (3 The key management scheme can eliminate the impacts of node compromise attacks on links between non-compromised nodes; (4 Sensor node deployment is based on Gaussian distribution which is more realistic than uniform distribution; (5 No GPS or like is required to provide sensor node location information. Our security analysis demonstrates that the proposed scheme can defend against common attacks in sensor networks including node compromise attacks, replay attacks, selective forwarding attacks, sinkhole and wormhole, Sybil attacks, HELLO flood attacks. Both mathematical and simulation-based performance evaluation show that the SCODEplus significantly reduces the communication overhead, energy consumption, packet delivery latency while it always delivers more than 97 percent of packets successfully.

  15. Secure IP mobility management for VANET

    CERN Document Server

    Taha, Sanaa

    2013-01-01

    This brief presents the challenges and solutions for VANETs' security and privacy problems occurring in mobility management protocols including Mobile IPv6 (MIPv6), Proxy MIPv6 (PMIPv6), and Network Mobility (NEMO). The authors give an overview of the concept of the vehicular IP-address configurations as the prerequisite step to achieve mobility management for VANETs, and review the current security and privacy schemes applied in the three mobility management protocols. Throughout the brief, the authors propose new schemes and protocols to increase the security of IP addresses within VANETs in

  16. Is emergency management an integrated element of business continuity management? A case study with security professionals in Western Australia.

    Science.gov (United States)

    Frohde, Kenny; Brooks, David J

    Emergency management (EM) and business continuity management (BCM) frameworks incorporate various strategic and operational measures. Defined within a number of national and international standards and guidelines, such concepts may be integrated within one another to provide increased resilience to disruptive events. Nevertheless, there is a degree of dispute regarding concept integration among security and EM professionals and bodies of knowledge. In line with cognitive psychology exemplar-based concepts, such disputes may be associated with a lack of precision in communality in the approach to EM and BCM. This paper presents a two-stage study, where stage 1 critiqued national and international literature and stage 2 applied semi-structured interviews with security managers in Western Australia. Findings indicate the existence of contradictory views on EM and its integration within BCM. As such, this study concludes that EM is considered a vital component of BCM by the majority of security managers. However, there is broader dispute regarding its degree of integration. Understanding the underpinnings of such disputes will aid in raising the standards and application of professionalism within security, EM and BCM domains, supporting clarification and definition of professional boundaries.

  17. Nurse Managers’ Work Life Quality and Their Participation in Knowledge Management: A Correlational Study

    Science.gov (United States)

    Hashemi Dehaghi, Zahra; Sheikhtaheri, Abbas; Dehnavi, Fariba

    2014-01-01

    Background: The association between quality of work life and participation in knowledge management is unknown. Objectives: This study aimed to discover the association between quality of work life of nurse managers and their participation in implementing knowledge management. Materials and Methods: This was a correlational study. All nurse managers (71 people) from 11 hospitals affiliated with the Social Security Organization in Tehran, Iran, were included. They were asked to rate their participation in knowledge management and their quality of work life. Data was gathered by a researcher-made questionnaire (May-June 2012). The questionnaire was validated by content and construct validity approaches. Cronbach’s alpha was used to evaluate reliability. Finally, 50 questionnaires were analyzed. The answers were scored and analyzed using mean of scores, T-test, ANOVA (or nonparametric test, if appropriate), Pearson’s correlation coefficient and linear regression. Results: Nurse managers’ performance to implement knowledge management strategies was moderate. A significant correlation was found between quality of work life of nurse managers and their participation in implementing knowledge management strategies (r = 0.82; P The strongest correlations were found between implementation of knowledge management and participation of nurse managers in decision making (r = 0.82; P knowledge management. PMID:25763267

  18. Homeland Security Knowledge Management for Local Law Enforcement in the National Capital Region

    National Research Council Canada - National Science Library

    Walker, Deirdre I

    2005-01-01

    .... Using existing knowledge (derived primarily from the emergency management field), police agencies have worked to develop locally relevant, viable and available expertise in the developing field of HLS...

  19. Knowledge Management: An Introduction.

    Science.gov (United States)

    Mac Morrow, Noreen

    2001-01-01

    Discusses issues related to knowledge management and organizational knowledge. Highlights include types of knowledge; the knowledge economy; intellectual capital; knowledge and learning organizations; knowledge management strategies and processes; organizational culture; the role of technology; measuring knowledge; and the role of the information…

  20. Knowledge Base for an Intelligent System in order to Identify Security Requirements for Government Agencies Software Projects

    Directory of Open Access Journals (Sweden)

    Adán Beltrán G.

    2016-01-01

    Full Text Available It has been evidenced that one of the most common causes in the failure of software security is the lack of identification and specification of requirements for information security, it is an activity with an insufficient importance in the software development or software acquisition We propose the knowledge base of CIBERREQ. CIBERREQ is an intelligent knowledge-based system used for the identification and specification of security requirements in the software development cycle or in the software acquisition. CIBERREQ receives functional software requirements written in natural language and produces non-functional security requirements through a semi-automatic process of risk management. The knowledge base built is formed by an ontology developed collaboratively by experts in information security. In this process has been identified six types of assets: electronic data, physical data, hardware, software, person and service; as well as six types of risk: competitive disadvantage, loss of credibility, economic risks, strategic risks, operational risks and legal sanctions. In addition there are defined 95 vulnerabilities, 24 threats, 230 controls, and 515 associations between concepts. Additionally, automatic expansion was used with Wikipedia for the asset types Software and Hardware, obtaining 7125 and 5894 software and hardware subtypes respectively, achieving thereby an improvement of 10% in the identification of the information assets candidates, one of the most important phases of the proposed system.

  1. Basic Elements of Knowledge Management

    Directory of Open Access Journals (Sweden)

    Marcin W. Staniewski

    2007-10-01

    Full Text Available The article is a review of basic knowledge management terminology. It presents such a description as: knowledge resources levels (data, information, knowledge, and wisdom, knowledge sources (internal, external, and knowledge typology (implicit, tacit or individual, social. Moreover the article characterizes knowledge management process, knowledge management system and main knowledge management strategies (codification, personalization. At the end of the article there is mentioned the knowledge creating process (the concept of knowledge creation spiral and the role of Intelligence Technology (IT and organizational culture as main elements supporting knowledge management implementation in organizations.

  2. Android application security essentials

    CERN Document Server

    Rai, Pragati

    2013-01-01

    Android Application Security Essentials is packed with examples, screenshots, illustrations, and real world use cases to secure your apps the right way.If you are looking for guidance and detailed instructions on how to secure app data, then this book is for you. Developers, architects, managers, and technologists who wish to enhance their knowledge of Android security will find this book interesting. Some prior knowledge of development on the Android stack is desirable but not required.

  3. Knowledge Management

    DEFF Research Database (Denmark)

    Hald Nielsen, Bo; Nicolajsen, Katrine

    For Økonomistyrelsen opstilles en teoretisk model over forudsætningerne for, at mmah er kan anvende knowledge management. Praksis vurderes dernæst i forhold til denne model.......For Økonomistyrelsen opstilles en teoretisk model over forudsætningerne for, at mmah er kan anvende knowledge management. Praksis vurderes dernæst i forhold til denne model....

  4. What Does Industry Really Want in a Knowledge Management System? A Longitudinal Study of Taiwanese Case

    Science.gov (United States)

    Yang, Liang-Chih; Lu, Hsi-Peng

    This paper depicts a longitudinal investigation of knowledge management system development from industrial perspectives. Snapshots on three surveys (2002, 2006, and 2010) of Taiwanese companies were conducted and compared, which is to explore the perceived understandings and requirements for the applications of a knowledge management system.From the surveys, it was found that the most useful applications were document management, knowledge search and retrieval, and knowledge repository and map. The emerging applications were expert management, document security, and knowledge automation such as auto-classification, auto-abstract and auto-keyword generation. The most wanted services along with KMS were consulting service, success story-sharing, and modularization while deploying knowledge management system in the enterprises. The trends and transformation of a KM system were also collected and analyzed. We suggest that a company should use different knowledge management approach according to its corporate main business function. Combing intellectual capital theories proposed by other researchers, we categorize knowledge management focus as staff-centric, system-centric, and customer-centric knowledge from industrial perspectives.

  5. Knowledge management and networking for enhancing nuclear safety

    International Nuclear Information System (INIS)

    Taniguchi, T.; Lederman, L.

    2004-01-01

    receives feedback so that training services and material are improved and kept current. This approach adds a new dimension to transferring knowledge as compared with conventional training methods. Recognizing that nuclear safety and security are truly global and transboundary issues, the IAEA has put forward the vision of a global nuclear safety and security regime that provides for the protection of people and the environment from effects of ionizing radiation, the minimization of the likelihood of accidents that could endanger life and property, and effective mitigation of the effects of any such events. The IAEA will pursue knowledge management and networking as fundamental elements for achieving this vision. (author)

  6. Security Management Model in Cloud Computing Environment

    OpenAIRE

    Ahmadpanah, Seyed Hossein

    2016-01-01

    In the cloud computing environment, cloud virtual machine (VM) will be more and more the number of virtual machine security and management faced giant Challenge. In order to address security issues cloud computing virtualization environment, this paper presents a virtual machine based on efficient and dynamic deployment VM security management model state migration and scheduling, study of which virtual machine security architecture, based on AHP (Analytic Hierarchy Process) virtual machine de...

  7. Enabling Dynamic Security Management of Networked Systems via Device-Embedded Security (Self-Securing Devices)

    National Research Council Canada - National Science Library

    Ganger, Gregory R

    2007-01-01

    This report summarizes the results of the work on the AFOSR's Critical Infrastructure Protection Program project, entitled Enabling Dynamic Security Management of Networked Systems via Device-Embedded Security...

  8. Knowledge management in support of enterprise risk management

    OpenAIRE

    Rodriguez, Eduardo; Edwards, John S.

    2014-01-01

    Risk management and knowledge management have so far been studied almost independently. The evolution of risk management to the holistic view of Enterprise Risk Management requires the destruction of barriers between organizational silos and the exchange and application of knowledge from different risk management areas. However, knowledge management has received little or no attention in risk management. This paper examines possible relationships between knowledge management constructs relate...

  9. Knowledge Management

    Directory of Open Access Journals (Sweden)

    Ravi Kiran

    2013-04-01

    Full Text Available The present study covers the knowledge management (KM in institutions of higher technical education (IHTEs from the perspective of thought leaders and junior academia to identify whether there is a difference of opinion regarding KM strategies, including knowledge technologies, knowledge acquisition, knowledge storage, knowledge dissemination, and KM-based framework for research and curriculum development (CD. Data have been collected through structured questionnaire from 141 respondents covering 30 higher educational institutions in India, including national- and state-level institutions—Designations of the targeted respondents in the IHTEs have been categorized into (a senior academia, that is, professors, heads, and associate professors occupying senior management positions, considered to be the institute overseers and thought leaders of KM and (b junior academia consisting of assistant professors and lecturers who are using and also contributing to the KM system. ANOVA has been used to see whether there is a significant difference of opinion among the two groups of knowledge users. The results of the study highlight a significant difference among the two groups regarding knowledge technologies, knowledge acquisition, knowledge storage, and knowledge dissemination. But, there is a consensus regarding KM-based framework for research and CD.

  10. Indigenous Knowledge - A Holistic View Through a Food Security Lens

    Science.gov (United States)

    Angnaboogok, V.; Behe, C.; Daniel, R. G.

    2017-12-01

    Rapid changes occurring within the Arctic heighten the need to understand the multiple drivers pushing change and their cumulative impacts. Most importantly to better understand Arctic change a holistic view is needed that can only be achieved through bringing together multiple knowledge systems and scientific disciplines. Inuit have called the Arctic home from time immemorial acquiring a knowledge system. The Inuit knowledge system continues to grow, and holds methodologies and assessment processes that provide a pathway for holistically understanding the Arctic. This holistic view is largely attributed to a focus on relationships between system components, close attention to food webs, and a unique understanding of interconnecting systems. The Alaskan Inuit understanding of food security represents an Indigenous way of viewing the world - where food security encompasses complex and interlinked cultural and environmental systems. These systems are comprised of connections among the health of people, animals, and plants; the different states of land, sea, and air; and the cultural fabric held together by language, cultural expression, and social integrity. Within the Inuit knowledge system, it is impossible to disentangle some of these relationships; when we discuss an Inuit food security perspective, it is this interconnectivity and these relationships that we refer to. This presentation will offer an introduction to what it means to adopt a food security lens approach - a view needed to build our knowledge of the changes that are occurring and further our understanding of cumulative impacts while illuminating the nexus between all pieces that make up Arctic ecosystems.

  11. Using Blockchain and smart contracts for secure data provenance management

    OpenAIRE

    Ramachandran, Aravind; Kantarcioglu, Dr. Murat

    2017-01-01

    Blockchain technology has evolved from being an immutable ledger of transactions for cryptocurrencies to a programmable interactive the environment for building distributed reliable applications. Although, blockchain technology has been used to address various challenges, to our knowledge none of the previous work focused on using blockchain to develop a secure and immutable scientific data provenance management framework that automatically verifies the provenance records. In this work, we le...

  12. Examining the Impact of Non-Technical Security Management Factors on Information Security Management in Health Informatics

    Science.gov (United States)

    Imam, Abbas H.

    2013-01-01

    Complexity of information security has become a major issue for organizations due to incessant threats to information assets. Healthcare organizations are particularly concerned with security owing to the inherent vulnerability of sensitive information assets in health informatics. While the non-technical security management elements have been at…

  13. Additional Security Considerations for Grid Management

    Science.gov (United States)

    Eidson, Thomas M.

    2003-01-01

    The use of Grid computing environments is growing in popularity. A Grid computing environment is primarily a wide area network that encompasses multiple local area networks, where some of the local area networks are managed by different organizations. A Grid computing environment also includes common interfaces for distributed computing software so that the heterogeneous set of machines that make up the Grid can be used more easily. The other key feature of a Grid is that the distributed computing software includes appropriate security technology. The focus of most Grid software is on the security involved with application execution, file transfers, and other remote computing procedures. However, there are other important security issues related to the management of a Grid and the users who use that Grid. This note discusses these additional security issues and makes several suggestions as how they can be managed.

  14. Knowledge of practice: A multi-sited event ethnography of border security fairs in Europe and North America.

    Science.gov (United States)

    Baird, Theodore

    2017-06-01

    This article takes the reader inside four border security fairs in Europe and North America to examine the knowledge practices of border security professionals. Building on the border security as practice research agenda, the analysis focuses on the production, circulation, and consumption of scarce forms of knowledge. To explore situated knowledge of border security practices, I develop an approach to multi-sited event ethnography to observe and interpret knowledge that may be hard to access at the security fairs. The analysis focuses on mechanisms for disseminating and distributing scarce forms of knowledge, technological materializations of situated knowledge, expressions of transversal knowledge of security problems, how masculinities structure knowledge in gendered ways, and how unease is expressed through imagined futures in order to anticipate emergent solutions to proposed security problems. The article concludes by reflecting on the contradictions at play at fairs and how to address such contradictions through alternative knowledges and practices.

  15. Knowledge Management Implementation in P2STPIBN as Internal TSO of BAPETEN

    International Nuclear Information System (INIS)

    Nugroho, D.H.

    2016-01-01

    Full text: Awareness of the importance of knowledge management implementation is growing since the launching in 2014 of BAPETEN’s (Nuclear Energy Regulatory Agency of Indonesia) vision to become a world-class nuclear energy regulatory agency. BAPETEN’s prime challenge arises since most of its human resources are still lacking experience, and many senior professionals have retired or are approaching retirement age. These challenges made P2STPIBN (Center for Regulatory Assessment on the Science and Technology of Nuclear Installation and Material) as an internal technical support organization (TSO) in BAPETEN aware that knowledge management should be implemented in advance. Following the BAPETEN Knowledge Management Guideline which was launched at the end of 2015, P2STPIBN, as part of BAPETEN, activated the knowledge management programme by creating a roadmap and programmes, such as a knowledge map and taxonomy, and a portal for knowledge repository (in progress). In the first quarter of FY of 2016 we started to build CoPs (community of practices) for the Nuclear Reactor Analysis, Nuclear Cyber Security and Nuclear Safety Culture based-on consideration of the needs on the most urgent knowledge. The CoP programme has run from the 2nd week of March 2016. The estimated challenges and anticipations are also discussed. (author

  16. Information security architecture an integrated approach to security in the organization

    CERN Document Server

    Killmeyer, Jan

    2006-01-01

    Information Security Architecture, Second Edition incorporates the knowledge developed during the past decade that has pushed the information security life cycle from infancy to a more mature, understandable, and manageable state. It simplifies security by providing clear and organized methods and by guiding you to the most effective resources available.

  17. [Knowledge management (I)].

    Science.gov (United States)

    Ruiz Moreno, J; Cruz Martín Delgado, M

    2001-09-01

    Beyond to be in fashion, the knowledge management (KM) is by itself a powerful strategic weapon for managing organizations. In a first part, the authors analyze strategic concepts related to management, emphasizing the attachment between KM and competitive advantage. Finally, the authors tie the KM to learning process ("tacit knowledge", "socialization", "externalization", "combination", and "internationalization").

  18. Incorporating Security Quality Requirements Engineering (SQUARE) into Standard Life-Cycle Models

    National Research Council Canada - National Science Library

    Mead, Nancy R; Viswanathan, Venkatesh; Padmanabhan, Deepa; Raveendran, Anusha

    2008-01-01

    ...). This report is for information technology managers and security professionals, management personnel with technical and information security knowledge, and any personnel who manage security-critical...

  19. Knowledge-enabled Customer Relationship Management: integrating customer relationship management and knowledge management concepts

    OpenAIRE

    Gebert, Henning; Geib, Malte; Kolbe, Lutz; Brenner, Walter

    2003-01-01

    The concepts of customer relationship management (CRM) and knowledge management (KM) both focus on allocating resources to supportive business activities in order to gain competitive advantages. CRM focuses on managing the relationship between a company and its current and prospective customer base as a key to success, while KM recognizes the knowledge available to a company as a major success factor.From a business process manager's perspective both the CRM and KM approaches promise a positi...

  20. Knowledge Management at CNAT

    Energy Technology Data Exchange (ETDEWEB)

    Callosada, C. de la

    2016-07-01

    Knowledge management at CNAT (Almaraz & Trillo NPPs) representsa significant part of our safety-oriented management system. The purpose is to generate for the stations useful knowledge, which should be then preserved and made easily accessible for everyone in the organization. The aim is to promote knowledge usage for ensuring safe plant operation and facilitating the required generational change-over. In fact, knowledge management is considered one of the main policies at CNAT, with everyone in the organization being expected to collaborate in it. Similarly, some general behavioral expectations at CNAT are directly or indirectly related to knowledge management (i.e. qualification, teamwork, learning and continuous improvement). (Author)

  1. Personal knowledge management: the foundation of organisational knowledge management

    Directory of Open Access Journals (Sweden)

    Priti Jain

    2011-01-01

    Full Text Available The purpose of this small-scale study was to explore how people perceived Personal Knowledge Management (PKM, whether people were aware of the PKM concept, and how PKM can have an impact on organisational knowledge management and productivity. A questionnaire survey with quantitative and qualitative questions was used. The study revealed that a majority (63% of respondents were not aware of the PKM concept; 33% were aware, while 2% had a vague idea about it. Eighty three (83% felt that it was important to manage personal knowledge and that PKM could increase individual productivity and organisational performance. The major recommendations included creating awareness about PKM. It should be at the heart of each employee-development programme, alignment of personal and organisational goals and adequate facilities and training in PKM.

  2. Knowledge management: organizing nursing care knowledge.

    Science.gov (United States)

    Anderson, Jane A; Willson, Pamela

    2009-01-01

    Almost everything we do in nursing is based on our knowledge. In 1984, Benner (From Novice to Expert: Excellence and Power in Clinical Nursing Practice. Menlo Park, CA: Addison-Wesley; 1984) described nursing knowledge as the culmination of practical experience and evidence from research, which over time becomes the "know-how" of clinical experience. This "know-how" knowledge asset is dynamic and initially develops in the novice critical care nurse, expands within competent and proficient nurses, and is actualized in the expert intensive care nurse. Collectively, practical "know-how" and investigational (evidence-based) knowledge culminate into the "knowledge of caring" that defines the profession of nursing. The purpose of this article is to examine the concept of knowledge management as a framework for identifying, organizing, analyzing, and translating nursing knowledge into daily practice. Knowledge management is described in a model case and implemented in a nursing research project.

  3. Knowledge management method for knowledge based BWR Core Operation Management System

    Energy Technology Data Exchange (ETDEWEB)

    Wada, Yutaka; Fukuzaki, Takaharu; Kobayashi, Yasuhiro

    1989-03-01

    A knowledge management method is proposed to support an except whose knowledge is stored in a knowledge base in the BWR Core Operation Management System. When the alterations in the operation plans are motivated by the expert after evaluating them, the method attempts to find the knowledge which must be modified and to give the expert guidances. In this way the resultant operation plans are improved by modifying values of referenced data. Using data dependency among data, which are defined and referred during inference, data to be modified are retrieved. In generating modification guidances, data reference and definition procedures are classified by syntactic analysis of knowledge. The modified data values are calculated with a sensitivity between the increment in the data to be modified and the resultant one in the performance of operation plans. The efficiency of the knowledge management by the proposed method, when applied to the knowledge based system including 500 pieces of knowledge for BWR control rod programming, is higher than that for interactive use of existing general purpose editors. (author).

  4. Knowledge management method for knowledge based BWR Core Operation Management System

    International Nuclear Information System (INIS)

    Wada, Yutaka; Fukuzaki, Takaharu; Kobayashi, Yasuhiro

    1989-01-01

    A knowledge management method is proposed to support an except whose knowledge is stored in a knowledge base in the BWR Core Operation Management System. When the alterations in the operation plans are motivated by the expert after evaluating them, the method attempts to find the knowledge which must be modified and to give the expert guidances. In this way the resultant operation plans are improved by modifying values of referenced data. Using data dependency among data, which are defined and referred during inference, data to be modified are retrieved. In generating modification guidances, data reference and definition procedures are classified by syntactic analysis of knowledge. The modified data values are calculated with a sensitivity between the increment in the data to be modified and the resultant one in the performance of operation plans. The efficiency of the knowledge management by the proposed method, when applied to the knowledge based system including 500 pieces of knowledge for BWR control rod programming, is higher than that for interactive use of existing general purpose editors. (author)

  5. Knowledge management in creativity

    DEFF Research Database (Denmark)

    Byrge, Christian; Hansen, Søren

    2011-01-01

    Is it possible to predetermine what kind of ideas that comes out of creativity by using knowledge management? Is it possible to decide beforehand what ideas we want to generate and the direction in which an idea takes in the further development? This paper deals with knowledge management in creat......Is it possible to predetermine what kind of ideas that comes out of creativity by using knowledge management? Is it possible to decide beforehand what ideas we want to generate and the direction in which an idea takes in the further development? This paper deals with knowledge management...... in creativity. The point of departure is taken in the connection between knowledge in a cognitive sense, and creativity focussing on ideas. The paper gives a perspective on how knowledge management can be part of creativity. It develops a concept of horizontal thinking and combines it with the fuzzy set theory...

  6. Homeland Security. Management Challenges Facing Federal Leadership

    Science.gov (United States)

    2002-12-01

    Security Management Challenges Facing Federal Leadership 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT...including attention to management practices and key success factors. HOMELAND SECURITY Management Challenges Facing Federal Leadership www.gao.gov/cgi...significant management and coordination challenges if it is to provide this leadership and be successful in preventing and responding to any future

  7. A secure file manager for UNIX

    Energy Technology Data Exchange (ETDEWEB)

    DeVries, R.G.

    1990-12-31

    The development of a secure file management system for a UNIX-based computer facility with supercomputers and workstations is described. Specifically, UNIX in its usual form does not address: (1) Operation which would satisfy rigorous security requirements. (2) Online space management in an environment where total data demands would be many times the actual online capacity. (3) Making the file management system part of a computer network in which users of any computer in the local network could retrieve data generated on any other computer in the network. The characteristics of UNIX can be exploited to develop a portable, secure file manager which would operate on computer systems ranging from workstations to supercomputers. Implementation considerations making unusual use of UNIX features, rather than requiring extensive internal system changes, are described, and implementation using the Cray Research Inc. UNICOS operating system is outlined.

  8. Information Security Assessment of SMEs as Coursework -- Learning Information Security Management by Doing

    Science.gov (United States)

    Ilvonen, Ilona

    2013-01-01

    Information security management is an area with a lot of theoretical models. The models are designed to guide practitioners in prioritizing management resources in companies. Information security management education should address the gap between the academic ideals and practice. This paper introduces a teaching method that has been in use as…

  9. Social Media for Knowledge Management

    DEFF Research Database (Denmark)

    Dyrby, Signe

    2013-01-01

    of social media as a tool for knowledge management presents an interesting addition to existing knowledge management initiatives. In this research in progress paper, social media for knowledge management is explored through investigating the research question, how can social media influence knowledge...... and show multiple opportunities and challenges for adopting these initiatives into organizational practices. In recent years social media technologies have entered the organizational spheres with the objective of connecting people and enabling them to share and build knowledge. The application and use...... management practices in organizations? The investigation builds on a theoretical reflection of the concepts of knowledge management practices and social media. The method for the theoretical investigation is based in the outline of core literature perspectives dealing with knowledge management practices...

  10. Management of knowledge across generations: preventing knowledge loss, enabling knowledge readiness

    International Nuclear Information System (INIS)

    Day, John A.

    2012-01-01

    J. Day argued that the preservation of records is a necessary, but not a sufficient condition to enable intelligent future decision making and management of nuclear waste. He distinguishes knowledge management from information management. Information without the potential to act on it is information for its own sake. He believes that knowledge will be a key factor for the generations that follow us. Records need knowledge, and knowledge needs records. A single representation of knowledge can be dangerous. Knowledge is multifaceted and complex, which necessitates a holistic approach. Throughout the presentation the concepts of 'knowledge readiness' and 'knowledge mothballing' (the process of knowing, forgetting and relearning) were proposed. Based on experiences at Sellafield the actions of knowledge audit mapping (including technical, societal and historical knowledge), knowledge loss risk assessing (although we would like to we cannot hold on to everything, and should thus take a risk approach, asking ourselves what is at stake if we delete certain parts of information), and knowledge retention for the long term management of a nuclear facility were presented. During the discussion, the link between knowledge and behaviour was raised. It was argued that the better informed people are, the less likely they are to make mistakes

  11. Using the safety/security interface to the security manager's advantage

    International Nuclear Information System (INIS)

    Stapleton, B.W.

    1993-01-01

    Two aspects of the safety/security interface are discussed: (1) the personal safety of nuclear security officers; and (2) how the security manager can effectively deal with the safety/security interface in solving today's requirements yet supporting the overall mission of the facility. The basis of this presentation is the result of interviews, document analyses, and observations. The conclusion is that proper planning and communication between the players involved in the security/safety interface can benefit the two programs and help achieve overall system integration, ultimately contributing to the bottom line. This is especially important in today's cost conscious environment

  12. IT Management: How IT managers gain IT knowledge

    DEFF Research Database (Denmark)

    Søndergård, Jes; Tambo, Torben; Koch, Christian

    2010-01-01

    It is not a secret that, IT management has become more and more and integrated part of almost all organizations. IT managers posses an enormous amount of knowledge within both organizational knowledge and general IT knowledge. This article investigates how IT managers keep themselves updated...... on IT knowledge in general and looks into how much time IT managers spend on weekly basis searching the net for new or problem solving IT knowledge. The theory used in this paper is used to investigate the current role of IT managers and what issues they are facing. Furthermore a research is conducted where 7...... IT managers in medium sized and large Danish companies are interviewed to add further focus on the role of the IT manager and to focus on how they keep themselves updated. Beside finding substantial need for more research, IT managers - generalists or specialists - only have limited knowledge resources...

  13. Managing business compliance using model-driven security management

    Science.gov (United States)

    Lang, Ulrich; Schreiner, Rudolf

    Compliance with regulatory and governance standards is rapidly becoming one of the hot topics of information security today. This is because, especially with regulatory compliance, both business and government have to expect large financial and reputational losses if compliance cannot be ensured and demonstrated. One major difficulty of implementing such regulations is caused the fact that they are captured at a high level of abstraction that is business-centric and not IT centric. This means that the abstract intent needs to be translated in a trustworthy, traceable way into compliance and security policies that the IT security infrastructure can enforce. Carrying out this mapping process manually is time consuming, maintenance-intensive, costly, and error-prone. Compliance monitoring is also critical in order to be able to demonstrate compliance at any given point in time. The problem is further complicated because of the need for business-driven IT agility, where IT policies and enforcement can change frequently, e.g. Business Process Modelling (BPM) driven Service Oriented Architecture (SOA). Model Driven Security (MDS) is an innovative technology approach that can solve these problems as an extension of identity and access management (IAM) and authorization management (also called entitlement management). In this paper we will illustrate the theory behind Model Driven Security for compliance, provide an improved and extended architecture, as well as a case study in the healthcare industry using our OpenPMF 2.0 technology.

  14. Successes and Failures of Knowledge Management: An Investigation into Knowledge Management Metrics

    International Nuclear Information System (INIS)

    Liebowitz, J.

    2016-01-01

    Full text: In reviewing the literature and industry reports, a number of organizations have approached KM metrics from a balanced scorecard, intellectual capital (e.g., Skandia’s intellectual capital navigator), activity-based costing, or other borrowed approaches from the accounting and human resources disciplines. Liebowitz in his edited book, Making Cents Out of Knowledge Management (Scarecrow Press, 2008), shows case studies of organizations trying to measure knowledge management success. A few methodologies have examined ways to measure return on knowledge, such as Housel and Bell’s knowledge value-added (KVA) methodology (Housel and Bell, 2001). Liebowitz analyzed over 80 publications on knowledge management metrics, whereby KM metrics can be divided into system measures, output measures, and outcome measures. (author

  15. Hotel Security Management : Case: Original Sokos Hotel Vaakuna Vaasa

    OpenAIRE

    Koskela, Jere

    2016-01-01

    This thesis studied hotel security management and examined one case hotel more closely on matters of security management. The case hotel in this research was Original Sokos Hotel Vaakuna Vaasa. The aim of the thesis was to find out how security aspects are managed and how they could be developed in the case hotel. This research was conducted to help the case hotel’s security supervisor to develop and improve security. The thesis consists of a theoretical framework and an empirical study. The ...

  16. Conceptualizing Knowledge Communication for Project Management

    DEFF Research Database (Denmark)

    Kampf, Constance Elizabeth

    2015-01-01

    In the field of project management, the search for better ways to manage projects is ongoing. One of the more recent trends in the literature focuses on the integration of knowledge management in project management environments. Advantages of integrating knowledge management into projects can be ...... knowledge for project management, this paper focuses on extending Knowledge Management to include concepts related to communicating knowledge from the fields of rhetoric, knowledge communication, and corporate communication....

  17. Improving organisational resilience through enterprise security risk management.

    Science.gov (United States)

    Petruzzi, John; Loyear, Rachelle

    Enterprise Security Risk Management (ESRM) is a new philosophy and method of managing security programmes through the use of traditional risk principles. As a philosophy and life cycle, ESRM is focused on creating a business partnership between security practitioners and business leaders to more effectively provide protection against security risks in line with acceptable risk tolerances as defined by business asset owners and stakeholders. This paper explores the basics of the ESRM philosophy and life cycle and also shows how embracing the ESRM philosophy and implementing a risk-based security management model in the business organisation can lead to higher levels of organisational resilience as desired by organisation leaders, executives and the board of directors.

  18. Management and leadership: analysis of nurse manager's knowledge.

    Science.gov (United States)

    Lourenço, Maria Regina; Shinyashiki, Gilberto Tadeu; Trevizan, Maria Auxiliadora

    2005-01-01

    Nurses have assumed management positions in many health institutions. To properly accomplish the demands of this role, it is important that they be competent in both management and leadership. For appropriate performance, knowledge of management and supervision styles is a priority. Therefore, the goal of this investigation is to identify the nurse manager's knowledge regarding management and leadership. A structured questionnaire containing twenty-seven questions was applied to twelve Brazilian nurse managers of primary care center called "Family Basic Health Units". Data analysis suggested that the nurse manager lower knowledge in management and leadership is related to visionary leadership, management and leadership conceptual differences, leader's behavior, and situational leadership. And, nurse manager greater knowledge is related to power; team work, and coherence between values and attitudes.

  19. Design knowledge management using configuration manager

    International Nuclear Information System (INIS)

    Kang, Mu Jin; Jung, Seung Hwan

    2000-01-01

    It is known that about 15 to 40 percent of total design time is spent on retrieving information such as standard parts, handbook data, engineering equations, previous designs. This paper describes a knowledge management system for machine tool design. Product structuring, change management, and complex design knowledge management are possible through the developed system. The system can speed up the design process by making necessary data instantly available as it is needed and keeping of all the relevant design information and knowledge including individual decisions, design intentions, documents, and drawings

  20. The Management and Security Expert (MASE)

    Science.gov (United States)

    Miller, Mark D.; Barr, Stanley J.; Gryphon, Coranth D.; Keegan, Jeff; Kniker, Catherine A.; Krolak, Patrick D.

    1991-01-01

    The Management and Security Expert (MASE) is a distributed expert system that monitors the operating systems and applications of a network. It is capable of gleaning the information provided by the different operating systems in order to optimize hardware and software performance; recognize potential hardware and/or software failure, and either repair the problem before it becomes an emergency, or notify the systems manager of the problem; and monitor applications and known security holes for indications of an intruder or virus. MASE can eradicate much of the guess work of system management.

  1. Cross-cultural Knowledge Management

    Directory of Open Access Journals (Sweden)

    Dorel Mihai PARASCHIV

    2009-01-01

    Full Text Available The success of international companies in providing high quality products and outstanding services is subject, on the one hand, to the increasing dynamic of the economic environment and on the other hand to the adoption of worldwide quality standards and procedures. As market place is becoming more and more global, products and services offered worldwide by international companies must face the multi-cultural environment challenges. These challenges manifest themselves not only at customer relationship level but also deep inside companies, at employee level. Important support in facing all these challenges has been provided at cognitive level by management system models and at technological level by information cutting edge technologies Business Intelligence & Knowledge Management Business Intelligence is already delivering its promised outcomes at internal business environment and, with the explosive deployment of public data bases, expand its analytical power at national, regional and international level. Quantitative measures of economic environment, wherever available, may be captured and integrated in companies’ routine analysis. As for qualitative data, some effort is still to be done in order to integrate measures of social, political, legal, natural and technological environment in companies’ strategic analysis. An increased difficulty is found in treating cultural differences, common knowledge making the most hidden part of any foreign environment. Managing cultural knowledge is crucial to success in cultivating and maintaining long-term business relationships in multicultural environments. Knowledge Management provides the long needed technological support for cross-cultural management in the tedious task of improving knowledge sharing in multi-national companies and using knowledge effectively in international joint ventures. The paper is approaching the conceptual frameworks of knowledge management and proposes an unified model

  2. Knowledge Management and Transfer

    Energy Technology Data Exchange (ETDEWEB)

    Sennanye, D.M.; Thugwane, S.J.; Rasweswe, M.A. [South African Young Nuclear Professionals Society, South African Nuclear Energy Cooperation, National Nuclear Regulator, P O Box 7106, Centurion 0046 (South Africa)

    2008-07-01

    Knowledge management has become an important concept in the nuclear industry globally. This has been driven by the fact that new reactors are commissioned and some are decommissioned. Since most old experts are near retirement then there is a need to capture the nuclear knowledge and expertise and transfer it to the new generation. Knowledge transfer is one of the important building blocks of knowledge management. Processes and strategies need to be developed in order to transfer this knowledge. South African Young Nuclear Professionals Society (SAYNPS) has established a document to address strategies that can be used to close the knowledge gap between the young less experienced and experts in the field. This action will help the young generation to participate in knowledge management. The major challenges will be the willingness of the experts to share and making sure that all knowledge is captured, stored and kept up to date. The paper presents the SAYNPS point of view with regard to knowledge transfer. (authors)

  3. Knowledge Management and Transfer

    International Nuclear Information System (INIS)

    Sennanye, D.M.; Thugwane, S.J.; Rasweswe, M.A.

    2008-01-01

    Knowledge management has become an important concept in the nuclear industry globally. This has been driven by the fact that new reactors are commissioned and some are decommissioned. Since most old experts are near retirement then there is a need to capture the nuclear knowledge and expertise and transfer it to the new generation. Knowledge transfer is one of the important building blocks of knowledge management. Processes and strategies need to be developed in order to transfer this knowledge. South African Young Nuclear Professionals Society (SAYNPS) has established a document to address strategies that can be used to close the knowledge gap between the young less experienced and experts in the field. This action will help the young generation to participate in knowledge management. The major challenges will be the willingness of the experts to share and making sure that all knowledge is captured, stored and kept up to date. The paper presents the SAYNPS point of view with regard to knowledge transfer. (authors)

  4. Structuring Knowledge Management – Classical Theory, Strategic Initiation And Operational Knowledge Management (part I

    Directory of Open Access Journals (Sweden)

    Zawiła-Niedźwiecki Janusz

    2015-06-01

    Full Text Available The article is the generalization of experience of the implementation project, which has been treated as well as a research field. The results are presented in two parts. The first part includes: a description of the classical approach to knowledge management and shows the concept of structure of process of knowledge management with a description of the procedure in each step of the process. The key idea is to divide the process in three spirals of actions: spiral of perfecting the collection of knowledge; spiral of the perfecting of the formulation of knowledge; spiral of perfecting the utilization of knowledge. Part II of this paper is article Structuring Knowledge Management – Levels, Resources And Efficiency Areas of Knowledge Management (DOI: 10.1515/fman-2015-0042.

  5. Novel approach to information security management of confidential ...

    African Journals Online (AJOL)

    Novel approach to information security management of confidential and propriety information ... Journal of Fundamental and Applied Sciences ... valuable information by using steganography it can have a major impact security management.

  6. Designing Knowledge Map for Knowledge Management projects Using Network Analysis

    Directory of Open Access Journals (Sweden)

    heidar najafi

    2017-09-01

    Full Text Available In this research knowledge management has been studied as an interdisciplinary area. We aim to find an answer for this question that "what are the scientific structure and knowledge map of knowledge management projects regarding these two aspect of subject areas and keywords. For this purpose, nearly 40000 scientific documents including knowledge management as one of their keywords were selected from Scopus database and were studied in various subject areas. In this research,bar charts have been drawn for each index of subject areas and keywords. Besides, using Co-occurrence matrix, adjacency graphs were drawn and then clustered using Average-Link algorithm. Bar charts and graphs were drawn using R and Excel software. The results of this research showed that among the researches on knowledge management in the world, the most relevant scientific fields to knowledge management are Computer Sciences with 32.5%, Business, Management and Accounting with 14.5%, Engineering with 13.7%, Decisive Sciences with 12.6%, Mathematics with 7.07%, and Social Sciences with 6.63%, respectively. The most keywords collocate with knowledge management in the world are Human-Computer Interaction, Information Management, Systems Management, Information Technology, Manufacturing, Acquisition of Knowledge, Semantics, Knowledge Transfer, Ontology and Information Retrieval.

  7. Security engineering: systems engineering of security through the adaptation and application of risk management

    Science.gov (United States)

    Gilliam, David P.; Feather, Martin S.

    2004-01-01

    Information Technology (IT) Security Risk Management is a critical task in the organization, which must protect its resources and data against the loss of confidentiality, integrity, and availability. As systems become more complex and diverse, and more vulnerabilities are discovered while attacks from intrusions and malicious content increase, it is becoming increasingly difficult to manage IT security. This paper describes an approach to address IT security risk through risk management and mitigation in both the institution and in the project life cycle.

  8. Security Requirements Management in Software Product Line Engineering

    Science.gov (United States)

    Mellado, Daniel; Fernández-Medina, Eduardo; Piattini, Mario

    Security requirements engineering is both a central task and a critical success factor in product line development due to the complexity and extensive nature of product lines. However, most of the current product line practices in requirements engineering do not adequately address security requirements engineering. Therefore, in this chapter we will propose a security requirements engineering process (SREPPLine) driven by security standards and based on a security requirements decision model along with a security variability model to manage the variability of the artefacts related to security requirements. The aim of this approach is to deal with security requirements from the early stages of the product line development in a systematic way, in order to facilitate conformance with the most relevant security standards with regard to the management of security requirements, such as ISO/IEC 27001 and ISO/IEC 15408.

  9. Using Cyber-Insurance as a Risk Management Strategy: Knowledge Gaps and Recommendations for Further Research

    OpenAIRE

    Tøndel, Inger Anne; Meland, Per Håkon; Omerovic, Aida; Gjære, Erlend Andreas; Solhaug, Bjørnar

    2015-01-01

    - Risk transfer can be an economically favorable way of handling security and privacy issues, but choosing this option indiscriminately and without proper knowledge is a risk in itself. This report provides an overview of knowledge gaps related to cyber-insurance as a risk management strategy. These are grouped into three high-level topics; cyber-insurance products, understanding and measuring risk and estimation of consequences. The topics are further divided into 11 knowledge areas with ...

  10. Global Security Program Management Plan

    Energy Technology Data Exchange (ETDEWEB)

    Bretzke, John C. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2014-03-25

    The Global Security Directorate mission is to protect against proliferant and unconventional nuclear threats –regardless of origin - and emerging new threats. This mission is accomplished as the Los Alamos National Laboratory staff completes projects for our numerous sponsors. The purpose of this Program Management Plan is to establish and clearly describe the GS program management requirements including instructions that are essential for the successful management of projects in accordance with our sponsor requirements. The detailed information provided in this document applies to all LANL staff and their subcontractors that are performing GS portfolio work. GS management is committed to a culture that ensures effective planning, execution, and achievement of measurable results in accordance with the GS mission. Outcomes of such a culture result in better communication, delegated authority, accountability, and increased emphasis on safely and securely achieving GS objectives.

  11. Knowledge Management System in Health & Social Care: Review on 20 Practiced Knowledge Management

    Directory of Open Access Journals (Sweden)

    Muhammad Saiful Ridhwan

    2014-02-01

    Full Text Available The importance of managing medical information has become very critical in the healthcare delivery system. Medical information nowadays are optimized towards serving different areas such as; diagnosing of diseases, planning and administration, treatment and monitoring of patient outcomes, services and costs. This article provides a review into various Health and Social Care systems which encompasses the Knowledge Management value. For analysis, more than 30 systems that are related to Health and Social Care were gathered via Internet research, only 20 of these systems were finally selected based on recent system development and popularity of the system.Keywords: Health Care, Knowledge, Knowledge Management, Social Care, systemdoi:10.12695/ajtm.2013.6.2.4 How to cite this article:Ridhwan, M.S., and Oyefolahan, I.O. (2013. Knowledge Management System in Health & Social Care: Review on 20 Practiced Knowledge Management. The Asian Journal of Technology Management 6 (2: 92-101. Print ISSN: 1978-6956; Online ISSN: 2089-791X. doi:10.12695/ajtm.2013.6.2.4

  12. Green knowledge management to support environmental sustainability; Green knowledge management zur Unterstuetzung oekologischer Nachhaltigkeit

    Energy Technology Data Exchange (ETDEWEB)

    Dornhoefer, Mareike-Jessica

    2017-01-24

    Sustainability, environmental management and green initiatives are topics which gradually developed into trends since the late 1980s, not only in research institutions, but also in public and private organizations. While the usage of energy and other resources are increasing, these organizations search for new possibilities to reduce the economic, ecologic and social burdens and consequences of office and production environments for employees and nature. While certified environmental management systems were established already in the 1990s, green approaches and technologies are only about 10 years old and steadily developing. Decisions about a fitting strategy and the support of suitable measures inside an organization always require knowledge provided for the decision makers. Furthermore it is of importance to record the environmental consequences of the operational business and to not only record data and information, but to create a context and deduce the knowledge for future activities. Based on this situation, the work addresses the main research question of how �classical'' knowledge management might be further developed or transformed into Green Knowledge Management and how it addresses the goals of sustainability, especially ecological sustainability, environmental management and green approaches alike? The definition of Green Knowledge Management consists of five factors, which are discussed systematically, explored conceptually and documented with the help of practical examples. Different knowledge management models and their respective building blocks are analyzed to deduce how knowledge processes might interact with environmental ones as well as green aspects. Also different types of knowledge management systems are analysed for their application possibilities. A planning and decision making tool in form of a three dimensional cube, the ''Green Knowledge Management Cube'' is introduced on a conceptual level and documented

  13. Total Quality Management in a Knowledge Management Perspective.

    Science.gov (United States)

    Johannsen, Carl Gustav

    2000-01-01

    Presents theoretical considerations on both similarities and differences between information management and knowledge management and presents a conceptual model of basic knowledge management processes. Discusses total quality management and quality control in the context of information management. (Author/LRW)

  14. Information Technology Security Professionals' Knowledge and Use Intention Based on UTAUT Model

    Science.gov (United States)

    Kassa, Woldeloul

    2016-01-01

    Information technology (IT) security threats and vulnerabilities have become a major concern for organizations in the United States. However, there has been little research on assessing the effect of IT security professionals' knowledge on the use of IT security controls. This study examined the unified theory of acceptance and use of technology…

  15. Knowledge management in Portuguese healthcare institutions.

    Science.gov (United States)

    Cruz, Sofia Gaspar; Ferreira, Maria Manuela Frederico

    2016-06-01

    Knowledge management imposes itself as a pressing need for the organizations of several sectors of the economy, including healthcare. to evaluate the perception of healthcare institution collaborators in relation to knowledge management in the institution where they operate and analyze the existence of differences in this perception, based on the institution's management model. a study conducted in a sample consisting of 671 collaborators from 10 Portuguese healthcare institutions with different models of management. In order to assess the knowledge management perception, we used a score designed from and based on items from the scores available in the literature. the perception of moderate knowledge management on the healthcare institutions and the statistically significant differences in knowledge management perception were evidenced in each management model. management knowledge takes place in healthcare institutions, and the current management model determines the way staff at these institutions manage their knowledge.

  16. Knowledge Map of Facilities Management

    DEFF Research Database (Denmark)

    Nenonen, Suvi; Jensen, Per Anker; Lindahl, Göran

    2014-01-01

    both the research community and FM-practitioners can develop new models for identifying knowledge needs and gaps and to improve knowledge sharing and knowledge flow and thus the fulfilment of their mission and goals. Knowledge maps can also help in organizing research activities and analysing......Purpose This paper aims to draft a knowledge map of the fragmented and multidisciplinary research of and relevant to FM. Facilities management knowledge map is a tool for presenting what relevant data and knowledge, a.k.a. knowledge, resides in different disciplines. Knowledge mapping is a step...... in creating an inventory of knowledge (i.e. the knowledge base) and developing/improving the processes of knowledge sharing in research, education and practice. Theory Knowledge mapping is discussed in terms of knowledge management. The research is connected to knowledge mapping in the facilities management...

  17. Natural Resources Management for Sustainable Food Security in ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Natural Resources Management for Sustainable Food Security in the Sahel ... as well as strategies for managing the resource base with a view to improving food security. ... InnoVet-AMR grants to support development of innovative veterinary ...

  18. Security management of next generation telecommunications networks and services

    CERN Document Server

    Jacobs, Stuart

    2014-01-01

    This book will cover network management security issues and currently available security mechanisms by discussing how network architectures have evolved into the contemporary NGNs which support converged services (voice, video, TV, interactive information exchange, and classic data communications). It will also analyze existing security standards and their applicability to securing network management. This book will review 21st century security concepts of authentication, authorization, confidentiality, integrity, nonrepudiation, vulnerabilities, threats, risks, and effective approaches to enc

  19. Securing the energy industry : perspectives in security risk management

    Energy Technology Data Exchange (ETDEWEB)

    Hurd, G.L. [Anadarko Canada Corp., Calgary, AB (Canada)

    2003-07-01

    This presentation offered some perspectives in security risk management as it relates to the energy sector. Since the events of September 11, 2001 much attention has been given to terrorism and the business is reviewing protection strategies. The paper made reference to each of the following vulnerabilities in the energy sector: information technology, globalization, business restructuring, interdependencies, political/regulatory change, and physical/human factors. The vulnerability of information technology is that it can be subject to cyber and virus attacks. Dangers of globalization lie in privacy and information security, forced nationalization, organized crime, and anti-globalization efforts. It was noted that the Y2K phenomenon provided valuable lessons regarding interdependencies and the effects of power outages, water availability, transportation disruption, common utility corridor accidents, and compounding incidents. The paper also noted the conflict between the government's desire to have a resilient infrastructure that can withstand and recover from attacks versus a company's ability to afford this capability. The physical/human factors that need to be considered in risk management include crime, domestic terrorism, and disasters such as natural disasters, industrial disasters and crisis. The energy industry has geographically dispersed vulnerable systems. It has done a fair job of physical security and has good emergency management practices, but it was noted that the industry cannot protect against all threats. A strategy of vigilance and awareness is needed to deal with threats. Other strategies include contingency planning, physical security, employee communication, and emergency response plans. tabs., figs.

  20. Knowledge management in international networks

    NARCIS (Netherlands)

    Man, de A.P.

    2006-01-01

    Networks and knowledge are intimately connected. Networks are believed to be innovative because of the smooth transfer, combination and creation of knowledge that can take place in them. Interestingly however, knowledge management research has hardly studied knowledge management techniques in

  1. Knowledge management in nuclear power plants

    International Nuclear Information System (INIS)

    Cal, C. de la; Barasoain, F.; Buedo, J. L.

    2013-01-01

    This article aims to show the importance of knowledge management from different perspectives. In this first part part of the article, the overall approach that performs CNAT of knowledge management is described. In the second part, a specific aspect of knowledge management in ANAV, tacit knowledge transfer is showed. finally, the third part discusses the strategies and actions that are followed in CNCO for knowledge management. All this aims to show an overview of knowledge management held in the Spanish Nuclear Power Plants. (Author)

  2. Analysis of Relationship between Knowledge Management and Customer Relationship Management with Customer Knowledge Management (Case Study At Azaran Valve Co.)

    OpenAIRE

    Sayyed Mohsen Allameh; Arash Shahin; Babak Tabanifar

    2012-01-01

    Knowledge management (KM) and customer relationship management (CRM) are both emphasized on the allocation of resources to business supportive activities in order to gain competitive advantages.. Merging the two concepts of knowledge management and customer relationship management in customer knowledge management (CKM) model can promote the benefits of employing each of them and reduce the risk of implementation failure. This study sought to analyze the relationship between knowledge manageme...

  3. Day-to-day management of EU projects: Implementation of a local manager network to secure knowledge transfer

    Science.gov (United States)

    Hoffmann, Friederike; Meyer, Stefanie; de Vareilles, Mahaut

    2017-04-01

    In the past years there has been a strong push in Norway for increasing participation in the EU Framework Programmes for Research and Innovation. EU projects coordinated by the University of Bergen (UiB) usually receive management support from the central administration (mostly financial) in collaboration with a full- or part-time scientific project manager working on a fixed-term contract at the same institute as the project's principal scientist. With an increasing amount of granted EU projects, the number of scientific project managers employed across the whole university has also increased, and a need for coordination and professionalization of this service became obvious. Until recently, UiB had no unified structures and routines for training of newly recruited project managers, or for archiving and transferring routines and skills after the end of the project and the manager's employment contract. To overcome this administrative knowledge gap, the "Forum for scientific EU project managers at UiB" was founded in spring 2016 as an informal communication platform. Its purpose is to bring together current and previous scientific EU project managers from different disciplines to share their experiences. The main aim of the forum is to transfer and improve knowledge, skills and routines on effective management of EU funded projects, but also to function as a discussion forum where issues arising from handling international consortia can be reviewed. The group meets monthly and discusses current challenges from on-going EU projects as well as routines for specific project operation tasks. These routines are archived in an online best-practise guide which the group currently develops. The regular personal meetings are supplemented with an intense communication via a group mailing list and several individual mail- and phone-meetings. Since lessons learned during project implementation may improve future proposals, UiB research advisors for proposal support frequently

  4. Reasons in Support of Data Security and Data Security Management as Two Independent Concepts: A New Model

    Science.gov (United States)

    Moghaddasi, Hamid; Kamkarhaghighi, Mehran

    2016-01-01

    Introduction: Any information which is generated and saved needs to be protected against accidental or intentional losses and manipulations if it is to be used by the intended users in due time. As such, information managers have adopted numerous measures to achieve data security within data storage systems, along with the spread of information technology. Background: The “data security models” presented thus far have unanimously highlighted the significance of data security management. For further clarification, the current study first introduces the “needs and improvement” cycle; the study will then present some independent definitions, together with a support umbrella, in an attempt to shed light on the data security management. Findings: Data security focuses on three features or attributes known as integrity, identity of sender(s) and identity of receiver(s). Management in data security follows an endless evolutionary process, to keep up with new developments in information technology and communication. In this process management develops new characteristics with greater capabilities to achieve better data security. The characteristics, continuously increasing in number, with a special focus on control, are as follows: private zone, confidentiality, availability, non-repudiation, possession, accountability, authenticity, authentication and auditability. Conclusion: Data security management steadily progresses, resulting in more sophisticated features. The developments are in line with new developments in information and communication technology and novel advances in intrusion detection systems (IDS). Attention to differences between data security and data security management by international organizations such as the International Standard Organization (ISO), and International Telecommunication Union (ITU) is necessary if information quality is to be enhanced. PMID:27857823

  5. Reasons in Support of Data Security and Data Security Management as Two Independent Concepts: A New Model.

    Science.gov (United States)

    Moghaddasi, Hamid; Sajjadi, Samad; Kamkarhaghighi, Mehran

    2016-01-01

    Any information which is generated and saved needs to be protected against accidental or intentional losses and manipulations if it is to be used by the intended users in due time. As such, information managers have adopted numerous measures to achieve data security within data storage systems, along with the spread of information technology. The "data security models" presented thus far have unanimously highlighted the significance of data security management. For further clarification, the current study first introduces the "needs and improvement" cycle; the study will then present some independent definitions, together with a support umbrella, in an attempt to shed light on the data security management. Data security focuses on three features or attributes known as integrity, identity of sender(s) and identity of receiver(s). Management in data security follows an endless evolutionary process, to keep up with new developments in information technology and communication. In this process management develops new characteristics with greater capabilities to achieve better data security. The characteristics, continuously increasing in number, with a special focus on control, are as follows: private zone, confidentiality, availability, non-repudiation, possession, accountability, authenticity, authentication and auditability. Data security management steadily progresses, resulting in more sophisticated features. The developments are in line with new developments in information and communication technology and novel advances in intrusion detection systems (IDS). Attention to differences between data security and data security management by international organizations such as the International Standard Organization (ISO), and International Telecommunication Union (ITU) is necessary if information quality is to be enhanced.

  6. Staff management, training and knowledge management

    International Nuclear Information System (INIS)

    Makino, Hitoshi; Umeki, Hiroyuki; Capouet, M.; Depaus, C.; Berckmans, A.

    2014-01-01

    Staff management/training and knowledge management are organisational issues that are particularly sensitive in long-term projects stretching over decades like the development and operation of a geological repository. The IAEA has already issued several publications that deal with this issue (IAEA, 2006, 2008). Organisational aspects were also discussed in the framework of a topical session organised by the Integration Group for the Safety Case (IGSC) at its annual meeting in 2009 and were regarded as a topic deserving future attention (NEA, 2009a). More recently, the Forum on Stakeholder Confidence (FSC) identified organisational, mission and behavioural features as attributes of confidence and trust (NEA, 2013). They also identified that aspects such as structural learning capacity, high levels of skill and competence in relevant areas, specific management plan, good operating records, transparency and consistency are associated with confidence building in a safety case. These aspects are considerably related to staff training/management and knowledge management. The IGSC has initiated a proposal of study dedicated to staff training/management and knowledge management with the objective to highlight how these recent concerns and the requirements issued by the IAEA are concretely implemented in the national programmes. The goal of this study is to acknowledge the differences of views and needs for staff management and knowledge management at different stages of individual programmes and between implementer and regulator. As a starting point to this study, the JAEA and ONDRAF/NIRAS prepared a draft questionnaire in order to succinctly capture processes and tools that the national organisations have implemented to meet the requirements and address the issues set out in the field of staff and knowledge management. For the purpose of this study, a questionnaire is now under development, which will be presented on the occasion of this symposium with guidance based on a

  7. 78 FR 66949 - Homeland Security Science and Technology Advisory Committee (HSSTAC)

    Science.gov (United States)

    2013-11-07

    ... Technology, such as new developments in systems engineering, cyber-security, knowledge management and how... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2013-0071] Homeland Security Science and... Management; Notice of Federal Advisory Committee Meeting. SUMMARY: The Homeland Security Science and...

  8. Knowledge Management di Perguruan Tinggi

    Directory of Open Access Journals (Sweden)

    Harjanto Prabowo

    2010-11-01

    Full Text Available Conceptually, Knowledge Management is the organization's activities in managing knowledge as an asset, it is necessary that knowledge is properly distributed to the right people and in swift time, until they can interact, share knowledge and apply it in their daily work in order to improve organizational performance. In the study of higher education, in addition to being an element forming a sustainable competitive advantage, knowledge is also the value created by the college to be conveyed to consumers. This research discusses the understanding of knowledge management that is implemented in universities. 

  9. 10 CFR 1046.15 - Training and qualification for security skills and knowledge.

    Science.gov (United States)

    2010-01-01

    ... knowledge. 1046.15 Section 1046.15 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) PHYSICAL PROTECTION OF... knowledge. (a) DOE contractors shall only employ as protective force personnel individuals who successfully... and Qualification for Security Skills and Knowledge,” to this subpart. The DOE contractor shall...

  10. Knowledge Management Analysis: A Case Study

    Science.gov (United States)

    Mecha, Ezi I.; Desai, Mayur S.; Richards, Thomas C.

    2009-01-01

    It is imperative for businesses to manage knowledge and stay competitive in the marketplace. Knowledge management is critical and is a key to prevent organizations from duplicating their efforts with a subsequent improvement in their efficiency. This study focuses on overview of knowledge management, analyzes the current knowledge management in…

  11. Knowledge management program

    International Nuclear Information System (INIS)

    Henderson, T.

    2013-01-01

    To capture and retain the CANDU experience from a wider CANDU base and transfer knowledge and experience to our members, supplier participants and universities in a cost effective manner. Major focus area of the program is knowledge management joint projects, generic training delivery, inter-utilities mentoring and technical support, public education programs. The path forward is execution of transition of OPG NPDS Program as an ongoing program in COG with member funding, pursue opportunities to provide member utilities with additional leadership and train-the-trainer training and grow the knowledge management activities by 20% per year based on 2013/2014 results.

  12. Knowledge management program

    Energy Technology Data Exchange (ETDEWEB)

    Henderson, T. [CANDU Owners' Group, Toronto, Ontario (Canada)

    2013-07-01

    To capture and retain the CANDU experience from a wider CANDU base and transfer knowledge and experience to our members, supplier participants and universities in a cost effective manner. Major focus area of the program is knowledge management joint projects, generic training delivery, inter-utilities mentoring and technical support, public education programs. The path forward is execution of transition of OPG NPDS Program as an ongoing program in COG with member funding, pursue opportunities to provide member utilities with additional leadership and train-the-trainer training and grow the knowledge management activities by 20% per year based on 2013/2014 results.

  13. An Object-oriented Knowledge Link Model for General Knowledge Management

    OpenAIRE

    Xiao-hong, CHEN; Bang-chuan, LAI

    2005-01-01

    The knowledge link is the basic on knowledge share and the indispensable part in knowledge standardization management. In this paper, a object-oriented knowledge link model is proposed for general knowledge management by using objectoriented representation based on knowledge levels system. In the model, knowledge link is divided into general knowledge link and integrated knowledge with corresponding link properties and methods. What’s more, its BNF syntax is described and designed.

  14. Knowledge management in the firm

    DEFF Research Database (Denmark)

    Rasmussen, Palle; Nielsen, Peter

    2011-01-01

    to innovation and illustrates how combinations of these might benefit firm performance. It also stresses the preconditions of employee involvement and participation to knowledge management and not least the importance of interaction with environmental resources. To improve performance firms should be aware......Purpose – The purpose of this paper is to set focus on, and discuss the concept of knowledge, and show how the interrelations between knowledge and other concepts, such as learning, have become a decisive element in managing human resources and firm performance. Design....../methodology/approach – The dimensions of knowledge management are identified and related to learning, organizational configurations, human resources management and institutional environments in order to identify and percent the most important approaches to knowledge management and the development over time. Findings – Creating...

  15. Information Security Management in Context of Globalization

    OpenAIRE

    Wawak, Slawomir

    2012-01-01

    Modern information technologies are the engine of globalization. At the same time, the global market influences the way of looking at information security. Information security thus becomes an increasingly important field. The article discuses the results of research on information security management systems in public administration in Poland.

  16. Knowledge management for libraries

    CERN Document Server

    Forrestal, Valerie

    2015-01-01

    Libraries are creating dynamic knowledge bases to capture both tacit and explicit knowledge and subject expertise for use within and beyond their organizations. In this book, readers will learn to move policies and procedures manuals online using a wiki, get the most out of Microsoft SharePoint with custom portals and Web Parts, and build an FAQ knowledge base from reference management applications such as LibAnswers. Knowledge Management for Libraries guides readers through the process of planning, developing, and launching th

  17. An Analysis of Information Technology Managers' and Executives' Security Concerns on Willingness to Adopt Cloud Computing Solutions

    Science.gov (United States)

    Tanque, Marcus M.

    2012-01-01

    The research conducted in this study inquires about Information Technology (IT) managers' and executives' attitudes, beliefs, and knowledge on Cloud Computing (CC) security. The study evaluated how these factors affect IT managers' and executives' willingness to adopt CC solutions in their organizations. Confidentiality,…

  18. Mobile Customer Relationship Management and Mobile Security

    Science.gov (United States)

    Sanayei, Ali; Mirzaei, Abas

    The purpose of this study is twofold. First, in order to guarantee a coherent discussion about mobile customer relationship management (mCRM), this paper presents a conceptualization of mCRM delineating its unique characteristics because of Among the variety of mobile services, considerable attention has been devoted to mobile marketing and in particular to mobile customer relationship management services. Second, the authors discusses the security risks in mobile computing in different level(user, mobile device, wireless network,...) and finally we focus on enterprise mobile security and it's subgroups with a series of suggestion and solution for improve mobile computing security.

  19. Knowledge Management – the Key Resource in the Knowledge Economy

    Directory of Open Access Journals (Sweden)

    Domingo NEVADO PEÑA

    2010-06-01

    Full Text Available The influence of global information and communication technology changes and globalization have transformed our society by favoring the economy and innovation as key driver of global competition. Creation and exploitation of knowledge has become key resource in the new economy. All advanced economies are technologically knowledgebased economy. Many of today's managers and their employees, still guided by the definition given by Francis Bacon (1597 “Knowledge is power” instead of “sharing and managing knowledge is power”. Knowing taken alone may not bring value if not shared before and then managed in an efficient manner. This article seeks to demonstrate what knowledge, what the knowledge management is and what are its main implications in the new economy, a knowledge-based economy.

  20. The Evolution of Knowledge Management System(Knowledge Management/Two)

    Institute of Scientific and Technical Information of China (English)

    彭艳坤

    2015-01-01

    <正>Introduction"Knowledge is neither data nor information,though it is related to both,and the differences between these terms are often a matter of degree"(Davenport&Prusak,2000;1).Knowledge Management System(KMS)can be differentiated based on the types of functions,its purposes,and the number of features as well as its chronological development.

  1. Manufacturing knowledge management strategy

    OpenAIRE

    Shaw , Duncan; Edwards , John

    2006-01-01

    Abstract The study sought to understand the components of knowledge management strategy from the perspective of staff in UK manufacturing organisations. To analyse this topic we took an empirical approach and collaborated with two manufacturing organisations. Our main finding centres on the key components of a knowledge management strategy, and the relationships between it and manufacturing strategy and corporate strategy. Other findings include: the nature of knowledge in manufact...

  2. The role of knowledge-oriented leadership in knowledge management and innovation

    Directory of Open Access Journals (Sweden)

    Abdolreza Sadeghi

    2018-03-01

    Full Text Available Therefore, improving innovative performance is critical for creating com-petitive advantage. On the other hand, availability of information and knowledge can be defined as one the best ways to increase the innovation ability of organizations. Many theorists as well as practitioners emphasize on knowledge management as an enabler in enhancing organizational inno-vation. Hence, This study is carried out in the Fars governor in Iran during the year of 2017 to in-vestigate the relationship between the knowledge-based leadership and knowledge management and innovation performance. This study is descriptive / survey and the data collection is a cross-sectional and data questionnaire is used to collect the required data. Data analysis and hypotheses testing have indicated a significant relationship between knowledge-based leadership and knowledge management and innovation performance in Fars governor. The results also suggest a relationship between knowledge-based leadership and the knowledge management activities with a coefficient of 0.97. In addition, There is also a positive and meaningful relationship between knowledge management and innovation performance with a coefficient of 0.73 and between knowledge-based leadership and innovation performance with a coefficient of 0.73. The results al-so led to the existence of a relationship between knowledge based leadership, knowledge manage-ment practices and innovation performance with a coefficient of 0.7081.

  3. Security and policy driven computing

    CERN Document Server

    Liu, Lei

    2010-01-01

    Security and Policy Driven Computing covers recent advances in security, storage, parallelization, and computing as well as applications. The author incorporates a wealth of analysis, including studies on intrusion detection and key management, computer storage policy, and transactional management.The book first describes multiple variables and index structure derivation for high dimensional data distribution and applies numeric methods to proposed search methods. It also focuses on discovering relations, logic, and knowledge for policy management. To manage performance, the text discusses con

  4. Knowledge management in production enterprises

    Directory of Open Access Journals (Sweden)

    Agnieszka Bitkowska

    2017-06-01

    Full Text Available The fact that companies are constantly subjected to changes creates challenges connected with constant learning and acquiring knowledge. Companies are forced to act in accordance with the generative strategy. Besides realizing the traditional tasks of production or service, companies need to acquire and process knowledge and apply it in practice. The consequence of these changes is the transformation of contemporary enterprises into knowledge-based organizations, with managers increasingly recognizing the role and importance of the concept of knowledge management in creating enterprises competitiveness. The main aim of the article is identification of knowledge management in production enterprises.

  5. Knowledge management vs business process management in contemporary enterprises

    Directory of Open Access Journals (Sweden)

    Bitkowska Agnieszka

    2016-06-01

    Full Text Available The main objective of this paper is to identify the system of knowledge management in contemporary process organizations in business process perspective, especially with regard to technological and social conditions. Methodology is based on literature analysis and case studies. The integration of knowledge management technologies, concepts and methods into organizational business processes is challenging research issue today. The concepts of knowledge management and business process management should be analyzed jointly in the contemporary enterprises. Despite of the growing interest among researchers and practitioners of the concept of the knowledge management referring to business process management there is a lack of articles in this area. Appropriate approach to the modelling of knowledge management processes, as well as the use of IT tools, and a motivation system are of key importance for the introduction of this solution in organizations.

  6. Outsourcing information security

    CERN Document Server

    Axelrod, Warren

    2004-01-01

    This comprehensive and timely resource examines security risks related to IT outsourcing, clearly showing you how to recognize, evaluate, minimize, and manage these risks. Unique in its scope, this single volume offers you complete coverage of the whole range of IT security services and fully treats the IT security concerns of outsourcing. The book helps you deepen your knowledge of the tangible and intangible costs and benefits associated with outsourcing IT and IS functions.

  7. Nuclear knowledge management: The GRS realisation

    International Nuclear Information System (INIS)

    Beraha, D.; Westerheide, P.

    2004-01-01

    Full text: Knowledge has become a crucial factor in our information society in deciding whether companies will last into the future. The aim of knowledge management is to promote systematically the acquisition, use, and distribution of knowledge in an organisation and to initiate measures for improving the knowledge processes. It therefore has a strategic significance for corporate decisions. The GRS faces the challenge of helping to shape the status and use of science and technology even in conditions in which many experts are retiring for age reasons. Knowledge management makes an essential contribution here. Methods and tools of knowledge management that support these activities will be outlined in the final paper. It will show also the ways of how systematic knowledge management in the GRS and its integration into projects is being performed. The approach of knowledge management for strengthening this factor consists in systematically analysing the knowledge-related processes in the identification, acquisition, sharing, distribution, use, retention, and growth of knowledge and in developing methods with the aim of managing knowledge processes better in the company. Advanced information technology enables knowledge-orientated methods ('enabling technologies') to be supported and put to good practical use. The acute lack of newcomers in the field of nuclear techniques and the narrowing financial situation are strengthening the GRS approach. To show the operational actions of knowledge management in a complete form a knowledge model has been introduced at GRS that puts the different fields of action into context with the normative and strategic goals. That model will be presented. A further section will illuminate the supporting means for practical knowledge management, whether these are procedures for the daily work or tools like the GRS Portal, the Document Management System or tools for online collaboration. Under its caption 'project oriented knowledge

  8. Nuclear knowledge management

    International Nuclear Information System (INIS)

    Constantin, Marin; Ghitescu, Petre

    2007-01-01

    Nuclear knowledge is characterized by high-complexity and variety of the component topics and long duration required by the build-up of individual competence. At organizational level, these characteristics made the power of an organization or institution to be determined by the capital accumulated of existing knowledge. Furthermore, the capacity of an organization to re-generate and raise the knowledge capital according to the specific processes it is running according to the existing demand decides its position/ranking in the economy of nuclear field. Knowledge management emphasizes re-utilization of existing practice and experience, upgrade, enrich and re-value of accumulated knowledge. The present paper identifies and classifies the nuclear knowledge steps, namely: tacit knowledge, explicit knowledge, preserving, transfer, knowledge capture etc. On this basis there are identified the existing problems of nuclear knowledge management in Romania such as: difficulties to keep within the country the existing expertise, lack of interest in nuclear education, low level of organization of existing knowledge due to a small number of data bases, an insufficient integration of existing knowledge in IT systems, lack of ontology and taxonomy or an average structuralism. Nuclear knowledge in Romania is facing a major challenge which is generated by the future development of nuclear facilities. It is related to the rising demand of expertise and experts. This challenge is better solved by partnership between end users and institutions of Research and Development and university organization as well which could ensure the generation, transfer and preservation of nuclear knowledge. (authors)

  9. Learning Management Systems: Are They Knowledge Management Tools?

    Directory of Open Access Journals (Sweden)

    Bayan Aref Abu Shawar

    2010-03-01

    Full Text Available The new adventure of online world has helped to improve many domains and sectors. Knowledge management era which originally related to business sector is now required in industry, health, or any institute that needs to manage its knowledge. Education is no exception! The advancement in computers speed and memory, and the growth of Internet usage are behind the inspiration of e-learning approach. In which the computer is used as a medium to deliver and share educational materials and knowledge instead of face-to-face tutoring. This makes education available to any one, any place, and any time as learner need. This paper presents the relationship between knowledge management and learning management system (LMS that is used in e-learning paradigms. A detailed description of the LMS used at Arab Open University (AOU is included in this paper. We claim that the LMS used at AOU can be considered as a knowledge management tool.

  10. Challenges and Issues in Knowledge Management

    DEFF Research Database (Denmark)

    "Challenges and Issues in Knowledge Management" - the fifth volume in the "Research on Management Consulting" series - presents sixteen chapters that explore these various perspectives, focusing on knowledge management within the context of the management consulting industry, the dynamics...... associated with knowledge sharing and dissemination, methodological approaches to studying knowledge in organizations, and reflections on knowledge management and management consulting. As the chapters underscore, it is important to ensure that KM initiatives are aligned with the needs of the organization...... and its members, that the KM system is "owned" by organizational members with particular emphasis on executive sponsorship and team member acceptance, and that it be understood as an ongoing process rather than simply another management objective or faddish consulting tool. The focus, therefore, should...

  11. A cooperative model for IS security risk management in distributed environment.

    Science.gov (United States)

    Feng, Nan; Zheng, Chundong

    2014-01-01

    Given the increasing cooperation between organizations, the flexible exchange of security information across the allied organizations is critical to effectively manage information systems (IS) security in a distributed environment. In this paper, we develop a cooperative model for IS security risk management in a distributed environment. In the proposed model, the exchange of security information among the interconnected IS under distributed environment is supported by Bayesian networks (BNs). In addition, for an organization's IS, a BN is utilized to represent its security environment and dynamically predict its security risk level, by which the security manager can select an optimal action to safeguard the firm's information resources. The actual case studied illustrates the cooperative model presented in this paper and how it can be exploited to manage the distributed IS security risk effectively.

  12. Knowledge intensive organisations: on the frontiers of knowledge management: Guest editorial

    NARCIS (Netherlands)

    Millar-Schijf, Carla C.J.M.; Lockett, Martin; Mahon, John F.

    2016-01-01

    Purpose This paper aims to further research on leadership and knowledge management through formal knowledge strategies in knowledge-intensive organizations (KIOs), and analyse knowledge management challenges and approaches within KIOs, especially tacit knowledge. Design/methodology/approach This

  13. Security for Key Management Interfaces

    OpenAIRE

    Kremer , Steve; Steel , Graham; Warinschi , Bogdan

    2011-01-01

    International audience; We propose a much-needed formal definition of security for cryptographic key management APIs. The advantages of our definition are that it is general, intuitive, and applicable to security proofs in both symbolic and computational models of cryptography. Our definition relies on an idealized API which allows only the most essential functions for generating, exporting and importing keys, and takes into account dynamic corruption of keys. Based on this we can define the ...

  14. Knowledge management, innovation and creativity

    NARCIS (Netherlands)

    Dhondt, S.

    2003-01-01

    Since five years, knowledge management stays high on the policy agenda of companies. They hope to improve their operations by introducing knowledge and innovation programs. Also, at the EU-level, knowledge management is seen as an important item for research. The European Commission has included

  15. Advances in Knowledge Management

    DEFF Research Database (Denmark)

    Razmerita, Liana; Phillips-Wren, Gloria; Jain, Lakhmi C.

    2016-01-01

    This chapter briefly overviews the evolution of KM from a historical perspective and discusses core concepts associated with the management of knowledge, projects and networks. We introduce theoretical perspectives that are used in the KM literature, discuss the concept of a networked-centric col......This chapter briefly overviews the evolution of KM from a historical perspective and discusses core concepts associated with the management of knowledge, projects and networks. We introduce theoretical perspectives that are used in the KM literature, discuss the concept of a networked......-centric collaborative organization, and present future technologies in KM including the management of knowledge using social media and intelligent techniques....

  16. Knowledge Management and Intellectual Capital

    DEFF Research Database (Denmark)

    Bukh, Per Nikolaj; Skovvang Christensen, Karina; Mouritsen, Jan

    From various angles and perspectives this book shows how knowledge management is actually practised in many different European firms. New dimensions of well-known management principles and concepts emerge by focusing on knowledge. Leading researchers and experts from European business schools offer...... new insight into the range of practical problems that can be addressed and methods that can be applied when knowledge is put on the management agenda....

  17. Knowledge Management Orientation: An Innovative Perspective to Hospital Management.

    Science.gov (United States)

    Ghasemi, Matina; Ghadiri Nejad, Mazyar; Bagzibagli, Kemal

    2017-12-01

    By considering innovation as a new project in hospitals, all the project management's standard steps should be followed in execution. This study investigated the validation of a new set of measures in terms of providing a procedure for knowledge management-oriented innovation that enriches the hospital management system. The relation between innovation and all the knowledge management areas, as the main constructs of project management, was illustrated by referring to project management standard steps and previous studies. Through consultations and meetings with a committee of professional project managers, a questionnaire was developed to measure ten knowledge management areas in hospital's innovation process. Additionally, a group of experts from hospital managers were invited to comment on the applicability of the questionnaires by considering if the items are measurable in hospitals practically. A close-ended, Likert-type scale items, consisted of ten sections, were developed based on project management body of knowledge thorough Delphi technique. It enables the managers to evaluate hospitals' situation to be aware whether the organization follows the knowledge management standards in innovation process or not. By pilot study, confirmatory factor analysis and exploratory factor analysis were conducted to ensure the validity and reliability of the measurement items. The developed items seem to have a potential to help hospital managers and subsequently delivering new products/services successfully based on the standard procedures in their organization. In all innovation processes, the knowledge management areas and their standard steps help hospital managers by a new tool as questionnaire format.

  18. Knowledge management: processes and systems | Igbinovia ...

    African Journals Online (AJOL)

    Knowledge management: processes and systems. ... Information Impact: Journal of Information and Knowledge Management ... observation, role reversal technique, and discussion forums as well as the forms of knowledge representation to include report writing, database management system and institutional repositories.

  19. Harnessing indigenous knowledge for sustainable forest management in Ghana

    Directory of Open Access Journals (Sweden)

    Margaret Sraku-Lartey

    2015-01-01

    Full Text Available This paper makes a case for harnessing indigenous knowledge (IK for sustainable national development in Ghana. IK according to the World Bank is the basic component of any country’s knowledge system and it is upon this knowledge that scientific research builds. In Ghana the Government has recognized the need to harness IK for sustainable national development and has therefore incorporated it into the National Science, Technology and Innovation Development Programme. But there is no evidence however that scientific research in Ghana actually takes IK into consideration during the research process. This paper discusses the concept of indigenous knowledge, its relevance in scientific discourse and the need for harnessing it for national development in Ghana. A desk study was conducted using journal publications, research and technical reports, online databases and the internet. About sixty articles were analysed using the thematic synthesis method under the following broad headings: Importance of Indigenous knowledge, Indigenous forest foods, Indigenous medicines, IK and food security, the management and processing of IK and the protection of Indigenous Knowledge.The results of the study established the need to document the local knowledge using appropriate procedures and strategies. It also concludes by suggesting that IK in Ghana must be protected by law and integrated into formal science.

  20. Waves of Knowledge Management: The Flow between Explicit and Tacit Knowledge

    OpenAIRE

    Roxanne H. Stevens; Joshua Millage; Sondra Clark

    2010-01-01

    Problem statement: Knowledge Management (KM) is often equated with content management. Indeed, robust knowledge management processes include a database; but, information becomes knowledge when it is understood, manipulated and can become tied to a purpose or idea. By equating KM with content management and by equating the purpose of KM with predictability and control, companies may inadvertently de-emphasize knowledge creation and transfer. To keep pace with global market dynamics, an explici...

  1. Remodeling Strategic Staff Safety and Security Risks Management in Nigerian Tertiary Institutions

    Directory of Open Access Journals (Sweden)

    Sunday S. AKPAN

    2015-10-01

    Full Text Available This paper examined safety and security risk management in tertiary institutions in Nigeria. The frequent attacks at workplace, especially schools, have placed safety and security in the front burner of discussion in both business and political circles. This therefore, forms the imperative for the conduct of this study. The work adopted a cross sectional survey research design and collected data from respondents who are security personnel of the University of Uyo. Analysis of data was done with simple percentage statistics while the research hypotheses were tested with mean and simple regression and correlation statistics. The findings of the study revealed that assassination, kidnappings and bombings were principal risk incidents threatening the safety and security of staff in University of Uyo. A significant positive relationship was found between the funding of security management and workers’ performance. It was discovered specifically that employment screening, regular training of security personnel, regular safety and security meetings and strategic security policy formation were the main strategies for managing safety and security in University of Uyo. The paper concluded that safety and security management and control involves every worker (management and staff of University of Uyo. It was recommended, among others, that management should be more committed to safety and security management in the University by means of making safety and security issues an integral part of University’s strategic plan and also by adopting the management line model – one form of management structure-where safety and security are located, with other general management responsibilities. This way, the resurgent cases of kidnapping, hired assassination, etc. would be reduced if not completely eradicated in the University.

  2. Congestion management considering voltage security of power systems

    International Nuclear Information System (INIS)

    Esmaili, Masoud; Shayanfar, Heidar Ali; Amjady, Nima

    2009-01-01

    Congestion in a power network is turned up due to system operating limits. To relieve congestion in a deregulated power market, the system operator pays to market participants, GENCOs and DISCOs, to alter their active powers considering their bids. After performing congestion management, the network may be operated with a low security level because of hitting some flows their upper limit and some voltages their lower limit. In this paper, a novel congestion management method based on the voltage stability margin sensitivities is introduced. Using the proposed method, the system operator so alleviates the congestion that the network can more retain its security. The proposed method not only makes the system more secure after congestion management than other methods already presented for this purpose but also its cost of providing security is lower than the earlier methods. Test results of the proposed method along with the earlier ones on the New-England test system elaborate the efficiency of the proposed method from the viewpoint of providing a better voltage stability margin and voltage profile as well as a lower security cost. (author)

  3. Knowledge management, business intelligence, and content management the IT practitioner's guide

    CERN Document Server

    Keyes, Jessica

    2006-01-01

    The New Intelligence: The Birth of the KnowledgeManagement Industry Buried in Information From Batch to Decision Support A Short Course in Knowledge Representation Data, Information, Knowledge, and Wisdom - and Why WeNeed to Do This Embedding Knowledge Management in the OrganizationWhere Do We Go Next?Knowledge Management Transfer Strategies KM Frameworks Knowledge Transfer TechniquesWhere Do We Go Next?Knowledge-Engineering Techniques Two Levels of Knowledge ElicitationA Knowledge-Engineering MethodologyWhere Do We Go Next? Innovation ManagementSources of InnovationGenerating Innovation Compu

  4. Functional Security Model: Managers Engineers Working Together

    Science.gov (United States)

    Guillen, Edward Paul; Quintero, Rulfo

    2008-05-01

    Information security has a wide variety of solutions including security policies, network architectures and technological applications, they are usually designed and implemented by security architects, but in its own complexity this solutions are difficult to understand by company managers and they are who finally fund the security project. The main goal of the functional security model is to achieve a solid security platform reliable and understandable in the whole company without leaving of side the rigor of the recommendations and the laws compliance in a single frame. This paper shows a general scheme of the model with the use of important standards and tries to give an integrated solution.

  5. Implementation of Knowledge Management in Organizations

    Science.gov (United States)

    Winkler, Katrin; Mandl, Heinz

    2007-01-01

    In the context of learning implementation of new ideas e.g. knowledge management in organizations often is neglected. Concerning knowledge management measures we demonstrate its implementation in organizations. A theoretical framework was developed showing the necessary basic conditions for implementing knowledge management. Subsequently we…

  6. Major Events Coordinated Security Solutions: The Application of the Project Management Body of Knowledge for Managing a Science and Technology Project

    Science.gov (United States)

    2011-02-01

    represents the sum of knowledge related to project management and includes best practises and techniques generally accepted by the project...project has demonstrated that the principles of project management can be applied even to those activities that naturally resist the structure and...team and to engender trust in the output. DRDC believes strongly in the application of sound project management principles and uses an abbreviated

  7. Managing nuclear knowledge: IAEA activities and international coordination. Including resource material full text CD-ROM

    International Nuclear Information System (INIS)

    2005-06-01

    The present CD-ROM summarizes some activities carried out by the Departments of Nuclear Energy and Nuclear Safety and Security in the area of nuclear knowledge management in the period 2003-2005. It comprises, as open resource, most of the relevant documents in full text, including policy level documents, reports, presentation material by Member States and meeting summaries. The collection starts with a reprint of the report to the IAEA General Conference 2004 on Nuclear Knowledge [GOV/2004/56-GC(48)/12] summarizing the developments in nuclear knowledge management since the 47th session of the General Conference in 2003 and covers Managing Nuclear Knowledge including safety issues and Information and Strengthening Education and Training for Capacity Building. It contains an excerpt on Nuclear Knowledge from the General Conference Resolution [GC(48)/RES/13] on Strengthening the Agency's Activities Related to Nuclear Science, Technology and Applications. On the CD-ROM itself, all documents can easily be accessed by clicking on their titles on the subject pages (also printed at the end of this Working Material). Part 1 of the CD-ROM covers the activities in the period 2003-2005 and part 2 presents a resource material full text CD-ROM on Managing Nuclear Knowledge issued in October 2003

  8. Integrating Security Risk Management into Business Process Management for the Cloud

    OpenAIRE

    Goettelmann , Elio; Mayer , Nicolas; Godart , Claude

    2014-01-01

    International audience; Security issues are still preventing wider adoption of cloud computing, especially for businesses which are handling sensitive information. Indeed, by outsourcing its information system (IS), a company can lose control over its infrastructure, its software or even its data. Therefore, new methods and tools need to be defined to respond to this challenge. In this paper we propose to integrate Security Risk Management approaches into Business Process Management to effect...

  9. Knowledge management systems in practice

    DEFF Research Database (Denmark)

    Tørning, Kristian

    which has the strategy of working with knowledge in the form of "best practices" meant to boost performance. The thesis explores the situation that workers are in, since they are meant to share and develop "best practices" knowledge in a portal based Knowledge Management System (KMS). The study...... indentifies a set of problems that prevents knowledge sharing from taking place to the degree to which management was specifically aiming. It was explored whether these problems could, to some degree, be mitigated by employing persuasive design, which is a new stance towards design where the aim...... is to directly seek to change the user's behavior, i.e., persuading more knowledge sharing. The main contribution is an indication of an anomaly with regards to the strategic approach towards knowledge management, where knowledge sharing is seen as an effort by which companies can gain a competitive advantage...

  10. The State-of-the-Art Report for the Knowledge Management System for the Radioactive Waste Depository

    International Nuclear Information System (INIS)

    Jeong, Jong Tae; Choi, Jong Won; Choi, Heui Joo; Cho, Dong Keun; Park, Chung Kyun; Cho, Young Chul; Lee, Sang Hun

    2011-09-01

    The radioactive waste disposal projects require stepwise long-term research and developments such as site characterization, site selection, operation and monitoring, closure and environmental monitoring and son on. During each steps of disposal projects, much information and knowledge such as experimental data, databases, design reports, technical reports, guidelines, operation manuals are produced. Also, knowledge based on experiences by staff members participated in each steps of disposal projects are also very important. These knowledge based on experiences may be disappeared with the retirement of staff members if there are no effective and systematic system for the acquisition and storage of these knowledge. Therefore, it is necessary to preserve these written and experiences systematically in order to perform a disposal projects successfully. The acquisition and preservation of these knowledge for the successful performances of disposal projects can be possible by the establishment of a knowledge management system by recent using information technologies. The knowledge management system can be defined as a information technology system developed and used to maximize the values of knowledge resources of a certain organization through the support of knowledge management process. The application areas of the knowledge management system for the disposal projects are the enhancement of effectiveness and usefulness of acquisition, management, and maintenance of knowledge, objective decision making, opinion collection of many stakeholders, securing of credibility of the safety assessment, and promotion of public acceptances. However, the integrated knowledge management system for the disposal projects have never been developed, and only a management system for experimental data and database management system which can be used as a sub-system for the integrated knowledge management system are being developed and used. Therefore, the establishment of an integrated

  11. Modern project management theory and knowledge framework

    Institute of Scientific and Technical Information of China (English)

    Luo Zhongbao

    2014-01-01

    The scholars increasingly pay at ention to the internal rules in knowledge development and innovation of construction engineering management,as wel as the framework for engineering management body of knowledge. Considering the one-of-a-kind characteristic of construction project s and highly dependence from projects on management knowledge and its innovation,this paper analyzed the knowledge body of engineering management and its development dimension ,such as thinking and knowledge structure dimensions. The engineering management knowledge innovation model and structural model were put forward. The paper reviewed and proposed the engineering management knowledge system framework under engineering thinking mode,including the basic knowledge system framework which is used in engineering management research ,and a framework for body of knowledge which is applicable for engineering management practice. Based on a brief analysis of engineering management practice,this paper analyzed the development progres of engineering management from engineering thinking to ethical thinking and philosophical thinking. A dynamic model formed from the modern engineering management theory was put forward. The construction of projects are divided into two stages:an investment decision-making stage, and project implementation stage. According to the fact that project owners obtain the project products by transaction,the management during project implementation stage are divided into two aspects:project transaction management for the owner, and construction project management for the contractor. Thus, the three theoretical modules of modern engineering management were established:project investment decision-making management theory,engineering transaction management theory, and engineering project management theory. This paper further analyzed the content and basic theoretical issues of each theoretical module.

  12. Knowledge management: implications for human service organizations.

    Science.gov (United States)

    Austin, Michael J; Claassen, Jennette; Vu, Catherine M; Mizrahi, Paola

    2008-01-01

    Knowledge management has recently taken a more prominent role in the management of organizations as worker knowledge and intellectual capital are recognized as critical to organizational success. This analysis explores the literature of knowledge management including the individual level of tacit and explicit knowledge, the networks and social interactions utilized by workers to create and share new knowledge, and the multiple organizational and managerial factors associated with effective knowledge management systems. Based on the role of organizational culture, structure, leadership, and reward systems, six strategies are identified to assist human service organizations with implementing new knowledge management systems.

  13. Information security in the context of philosophy of management

    Directory of Open Access Journals (Sweden)

    Irina Yurievna Alekseeva

    2017-04-01

    Full Text Available Building a culture of information security involves consideration of problems of management in society. Ideas and approaches developed in philosophy of management are relevant to studies in problems of information security in broader methodological and social context. The article focuses on problems of information and psychological security in social systems. The author considers disorienting signs and signals as information threat to security of persons and societies. The author argues that management ideology of pseudo-economical reductionism makes distortion at the level of values and priorities of the system. This ideology exalts competitiveness to the detriment of the systems’ viability. Philosophy of complexity (better known as “philosophy of complex systems” embraces new visions for methodology of management in XXI century. “Observer of complexity” and “complexity of observer of complexity” phenomena are central in this context. The problem of appropriate language for system self-description is of critical importance. This language is necessary for substantive production of intellectual tools for problems solving and decision making; refusal to produce such tools is fraught with decrease of information security level.

  14. IT Security Management Implementation Model in Iranian Bank Industry

    Directory of Open Access Journals (Sweden)

    Mona Vanaki

    2017-06-01

    Full Text Available According to the complexity and differences between Iranian banks and other developed countries the appropriate actions to implement effective security management of information technology have not been taken. The aim of this study was to create a powerful model by selecting the appropriate security controls to protect information assets in the bank. In this model, at first the principle set fort in ISO standard 27001, was extracted and then by further studies derived from best practices carried out in the world on the related subject from 2008 to 2016 using a qualitative descriptive method, points comply with information security management in the banking industry were added to it. With the study of Iranian banks in dealing with IT security management system and with help of action research tools, provisions which prevent the actual implementation of this standard was removed and finally a conceptual model with operating instructions and considering all the principles of information security management standard, as well as banking institutions focusing on the characteristics of Iran was proposed.

  15. Knowledge Management Design Using Collaborative Knowledge Retrieval Function

    OpenAIRE

    Suryadi, Kadarsah; Sigit Pramudyo, Cahyono

    2008-01-01

    Knowledge is a key word in the information age. Organizational knowledge provides businesses with a way to compete effectively and efficiently in the market. The performance of many organizations is determined more by their knowledge than their physical assets. Capturing and representing knowledge is critical in knowledge management. The spread of organizational knowledge has made a difficulty in sharing knowledge. This problem creates a longer learning cycle. This research proposes a web bas...

  16. Managing Intellectual Capital in Knowledge Economy

    OpenAIRE

    Mercier-Laurent, Eunika

    2014-01-01

    Part 4: Components of Knowledge Flow; International audience; Strategic Knowledge Management considers Intellectual Capital (IC) as roots of all organizations activities. The success of organizations strongly depends on the way they manage all facets of knowledge and skills. Artificial Intelligence brought some methods and techniques for handling intellectual assets of companies, expertise management, knowledge transfer and training. This paper presents an overview of experiences and research...

  17. Managing a major security system installation: Practical lessons learned

    International Nuclear Information System (INIS)

    Roehrig, S.C.

    1986-01-01

    Sandia National Laboratories has been heavily involved for over a decade in aiding a number of DOE facilities in defining and implementing upgraded security safeguards systems. Because security system definition, design, and installation is still a relatively new field to the commercial world, effective project management must pay special attention to first understanding and then interpreting the unique aspects of a security system for all concerned parties. Experiences from an actual security system installation are used to illustrate some project management approaches which have been found to be effective

  18. KNOWLEDGE MANAGEMENT SYSTEM DESIGN AT HUMAN RESOURCES DIVISION

    Directory of Open Access Journals (Sweden)

    Yanti Yanti

    2009-05-01

    Full Text Available The Human Resources Division of a company is a vital division. Most of the time, they perform their work manually, and therefore creating limitations to their capacity. The knowledge contained is very important for human resources development and subsequently for developing the company. In order to manage this knowledge well, the company shall require a knowledge management system. This knowledge management system would be a solution to be used for the company to manage all knowledge contained in that particular division. Phases in designing knowledge managements starts from analyzing knowledge sources of the company, knowledge identification and definition, and determining knowledge goals. Knowledge management systems contain many functions such as collecting, recording and managing the knowledge and sharing this to all related employees easily. The company may also use knowledge management systems to share and inform employees regarding updates of information, news and/or activity regarding the employees themselves. Information from knowledge management systems may also be used by employees to monitor their performance and thereby increasing it. Knowledge management systems may also help employees in their learning activities.Keywords: knowledge management, human resources, employee

  19. Understanding dynamic capabilities through knowledge management

    DEFF Research Database (Denmark)

    Nielsen, Anders Paarup

    2006-01-01

    In the paper eight knowledge management activities are identified; knowledge creation, acquisition, capture, assembly, sharing, integration, leverage and exploitation. These activities are assembled into the three dynamic capabilities of knowledge development, knowledge (re......)combination and knowledge use. The dynamic capabilities and the associated knowledge management activities create flows to and from the firm’s stock of knowledge and they support the creation and use of organizational capabilities....

  20. Problems in knowledge management: a case study of a knowledge intensive company

    NARCIS (Netherlands)

    van Zolingen, S.J.; Streumer, Jan; Stooker, M.M.; Stooker, M.

    2001-01-01

    Knowledge management has become an important tool in staying ahead in the competition between companies. In this article five different phases of the knowledge management process are distinguished: acquiring knowledge, codifying knowledge, disseminating knowledge, developing knowledge and applying

  1. Security leader insights for information protection lessons and strategies from leading security professionals

    CERN Document Server

    Fahy, Bob

    2014-01-01

    How do you, as a busy security executive or manager, stay current with evolving issues, familiarize yourself with the successful practices of your peers, and transfer this information to build a knowledgeable, skilled workforce the times now demand? With Security Leader Insights for Information Protection, a collection of timeless leadership best practices featuring insights from some of the nation's most successful security practitioners, you can. This book can be used as a quick and effective resource to bring your security staff up to speed on security's role in information protection. I

  2. Human Resource Management in the Enhancement Processes of Knowledge Management

    Directory of Open Access Journals (Sweden)

    Didi Sundiman

    2017-11-01

    Full Text Available This research explored Human Resource Management (HRM in enhancement processes of knowledge management. This research explored how HRM practice enhanced the operational of knowledge management. Data were collected by a survey by interviewing 12 informants from Small and Medium Enterprise (SME. The results show that HRM practice gives initiative in the enhancement process of the knowledge management strategy applied to the company. It can be concluded that each sub-component of HRM affects the components of knowledge management, and HRM is highly influential and has a positive effect on quality management processes and vice versa in the work environment.

  3. Knowledge management in a project-oriented organization

    DEFF Research Database (Denmark)

    Christensen, Karina

    2003-01-01

    Knowledge management is seen as a metaphorical perspective on management where the managerial focus depends on the epistemological standpoint taken. An identification of three epistemological perspectives accommodates the main body of literature on knowledge management: an artifact oriented...... epistemology that focuses on explicit knowledge, a process oriented epistemology focusing on both tacit and explicit knowledge and the interaction of these types of knowledge and an autopoietic epistemology where knowledge basically always has a tacit dimension. Based on a study of knowledge management...... in the Danish company Crisplant, the paper shos how the three epistemologies bring different aspects of managerial practice forward. By comparing the characteristics of knowledge, the nature of knowledge management activities, how konwledge is created and share it is concluded that awareness of the implications...

  4. Knowledge management: An abstraction of knowledge base and database management systems

    Science.gov (United States)

    Riedesel, Joel D.

    1990-01-01

    Artificial intelligence application requirements demand powerful representation capabilities as well as efficiency for real-time domains. Many tools exist, the most prevalent being expert systems tools such as ART, KEE, OPS5, and CLIPS. Other tools just emerging from the research environment are truth maintenance systems for representing non-monotonic knowledge, constraint systems, object oriented programming, and qualitative reasoning. Unfortunately, as many knowledge engineers have experienced, simply applying a tool to an application requires a large amount of effort to bend the application to fit. Much work goes into supporting work to make the tool integrate effectively. A Knowledge Management Design System (KNOMAD), is described which is a collection of tools built in layers. The layered architecture provides two major benefits; the ability to flexibly apply only those tools that are necessary for an application, and the ability to keep overhead, and thus inefficiency, to a minimum. KNOMAD is designed to manage many knowledge bases in a distributed environment providing maximum flexibility and expressivity to the knowledge engineer while also providing support for efficiency.

  5. Security Management and Safeguards Office

    Science.gov (United States)

    Bewley, Nathaniel M.

    2004-01-01

    The Security Management and Safeguards Office at NASA is here to keep the people working in a safe environment. They also are here to protect the buildings and documents from sabotage, espionage, and theft. During the summer of 2004, I worked with Richard Soppet in Physical Security. While I was working here I helped out with updating the map that we currently use at NASA Glenn Research Center, attended meetings for homeland security, worked with the security guards and the locksmith. The meetings that I attended for homeland security talked about how to protect ourselves before something happened, they told us to always be on the guard and look for anything suspicious, and the different ways that terrorist groups operate. When I was with the security guards I was taught how to check someone into the base, showed how to use a radar gun, observed a security guard make a traffic stop for training and was with them while they patrolled NASA Glenn Research Center to make sure things were running smooth and no one was in danger. When I was with the lock smith I was taught how to make keys and locks for the employees here at NASA. The lock smith also showed me that he had inventory cabinets of files that show how many keys were out to people and who currently has access to the rooms that they keys were made for. I also helped out the open house at NASA Glenn Research Center. I helped out by showing the Army Reserves, and Brook Park's SWAT team where all the main events were going to take place a week before the open house was going to begin. Then during the open house I helped out by making sure people had there IDS, checked through there bags, and handed out a map to them that showed where the different activities were going to take place. So the main job here at NASA Glenn Research Center for the Security Management and Safeguards Office is to make sure that nothing is stolen, sabotaged, and espionaged. Also most importantly make sure all the employees here at NASA are

  6. KNOWLEDGE WORKERS’ MANAGEMENT

    Directory of Open Access Journals (Sweden)

    Ramona TODERICIU

    2014-06-01

    Full Text Available The empirical research of this paper deals with knowledge workers in Romanian organizations from different fields of activity, with the purpose of distinguishing them from other types of employees and clarifying their profile and individual characteristics. Also, the paper presents the most important challenges concerning the knowledge workers’ management: identifying, developing and evaluating knowledge workers, motivating and rewarding them, as well as describing specific structure of the organizations that rely mostly on knowledgeable workforce. The findings of the research represent an important factor in developing future efficient human resources strategies and practices regarding workers that fuel the knowledge economy.

  7. Knowledge Model: Project Knowledge Management

    DEFF Research Database (Denmark)

    Durao, Frederico; Dolog, Peter; Grolin, Daniel

    2009-01-01

    The Knowledge model for project management serves several goals:Introducing relevant concepts of project management area for software development (Section 1). Reviewing and understanding the real case requirements from the industrial perspective. (Section 2). Giving some preliminary suggestions...... for usage in KIWI system (Sections 3). This document is intended for technological partners to understand how for example the software development concepts can be applied to a semantic wiki framework....

  8. Managing Viable Knowledge

    NARCIS (Netherlands)

    Achterbergh, J.M.I.M.; Vriens, D.J.

    2002-01-01

    In this paper, Beer's Viable System Model (VSM) is applied to knowledge management. Based on the VSM, domains of knowledge are identified that an organization should possess to maintain its viability. The logic of the VSM is also used to support the diagnosis, design and implementation of the

  9. Knowledge Mangement and Management of Working-life

    DEFF Research Database (Denmark)

    Ipsen, Christine

    2003-01-01

    Knowledge Management and the Management of Working Life Research paper – case study Oral presentation Keywords: Knowledge work, knowledge management, working life and knowledge-intensive companies. A single case study has indicated that there is a clear connection between the organizational work......, managerial style and the working environment in knowledge-intensive companies. Furthermore the study indicates that the knowledge-workers only to a limited extent use the formalised working environment–system. Instead current issues are dealt with in a more informal manner. A subsequent systematic search...... on the working conditions within the practice of Knowledge Management, and the organizing of the knowledge work. The overall objective is to analyse the possibilities for knowledge-intensive companies to integrate working environment management and ensure improved working conditions. The methodology employed...

  10. Knowledge management and organizational learning

    CERN Document Server

    2009-01-01

    Knowledge management (KM) is a set of relatively new organizational activities. This volume presents some 20 papers organized into five sections covering basic concepts of knowledge management. The volume editor is an esteemed name in the field..

  11. Social web and knowledge management

    DEFF Research Database (Denmark)

    Dolog, Peter; Kroetz, Markus; Schaffert, Sebastian

    2009-01-01

    Knowledge Management is the study and practice of representing, communicating, organizing, and applying knowledge in organizations. Moreover, being used by organizations, it is inherently social. The Web, as a medium, enables new forms of communications and interactions and requires new ways...... to represent knowledge assets. It is therefore obvious that the Web will influence and change Knowledge Management, but it is very unclear what the impact of these changes will be. This chapter raises questions and discusses visions in the area that connects the Social Web and Knowledge Management – an area...... of research that is only just emerging. The World Wide Web conference 2008 in Beijing hosted a workshop on that question, bringing together researchers and practitioners to gain first insights toward answering questions of that area....

  12. Security Management Strategies for Protecting Your Library's Network.

    Science.gov (United States)

    Ives, David J.

    1996-01-01

    Presents security procedures for protecting a library's computer system from potential threats by patrons or personnel, and describes how security can be breached. A sidebar identifies four areas of concern in security management: the hardware, the operating system, the network, and the user interface. A selected bibliography of sources on…

  13. Personal Knowledge Management for Employee Commoditization

    Science.gov (United States)

    Schild, Susie A.

    2013-01-01

    Knowledge management thinking has resulted in the perception that the organization is the relevant beneficiary of knowledge. Individual approaches to and experiences with personal knowledge management are not well documented in empirical studies, which uncovered the specific problem that the situatedness of knowledge worker contemporaries within…

  14. Value Creation through IT-supported Knowledge Management? The Utilisation of a Knowledge Management System in a Global Consulting Company

    Directory of Open Access Journals (Sweden)

    Karlheinz Kautz

    2003-01-01

    Full Text Available Although many consulting companies have introduced IT-supported knowledge-management systems, and proponents of the literature continue to advocate knowledge management as a key to competitive advantage in consultancies, many knowledge management systems have fallen short of expectation in companies that have adopted them. However, empirical studies regarding the performance implications of these systems are missing. This paper reports such an empirical, explorative study identifying the extent as well as impediments of the utilization of an IT-supported knowledge management system in a large, global consulting company. The main findings are that the majority of the IT users are not familiar with the knowledge management framework of the company; still the knowledge management system is used by 3/4 of all respondents, but mainly to search for general information, much less to participate in competence networks to develop shared knowledge assets. The knowledge management system is not used as the primary repository and communication media for knowledge assets. The limited use is explained by the practitioners as being caused by lack of time and their perception of the system as a slow and poorly structured technical infrastructure. These and other findings are discussed with regard to the current understanding of knowledge management as presented by the literature, and important issues with regard to future research integrating individual, organisational, technical and economical perspectives of knowledge management are raised.

  15. Information Security Management: The Study of Lithuanian State Institutions

    OpenAIRE

    Jastiuginas, Saulius

    2012-01-01

    Growing information security cases and scope illustrate that the relevance of information security issues becomes critical and present information security means are not sufficient enough to manage information security. Narrow comprehension of information security merely as technological problem is broadened by the research results of economic, managerial, psychological, legal and other related aspects’ influence to information security. Information is named as the object of information s...

  16. Management Of Knowledge And System - Evolution Of Knowledge

    Directory of Open Access Journals (Sweden)

    Avishek Choudhury

    2015-08-01

    Full Text Available The study of knowledge is one of the most fundamental and necessary components in todays world. A claim to knowledge should be evaluated to determine whether or not it is knowledge in its real sense. To conduct this sort of evaluation understanding of what knowledge is and how much knowledge is possible is required. This paper provides an overview of the important aspects of knowledge and with the help of epistemology tries to answer the most fundamental questions of what is knowledge Moreover how do we know what we know The paper attempts to show the effect of culture on organizations and how foundational knowledge can help us develop logical decisions in a fluctuating environment. To manage an organization within evolving paradigm knowledge of variation acts as a necessary requirement. As Deming defined management as a prediction a leader must have skills to predict and adapt to its external environment. Most of the time organizations fail to observe the paradigm shift and couldnt adjust to the changing environment. The paper also discusses the effect of diverse culture and their respective interpretation of language. Thus the paper highlights the necessity of understanding human psychology attaining foundational knowledge and ability to validate the knowledge to establish a successful organization.

  17. Effective knowledge management as basis for holistic knowledge engineering – Knowledge as the key asset of an organization

    Directory of Open Access Journals (Sweden)

    Svetlana Lazović

    2013-03-01

    Full Text Available In knowledge management , human resources are in the foreground and their value is constantly rising. In the eyes of modern managers knowledge is the key asset of an organization. Effective management and management of knowledge processes are central preoccupations of modern managers and, at the same time, the most prominent feature of a knowledge-based organization. Like innovation and creativity, knowledge needs to be encouraged and treated with due care. Commitment to acquisition of new knowledge depends on how the interpersonal relationships are managed in an organization, therefore, those responsible for knowledge processes, the so-called modern knowledge managers, will develop partnership relation- ships with all members of their organization. In the core of such partnerships lie competences of individual employees and their creative application of knowledge. By encouraging learning, discussions and opinion exchange as well as personal and professional growth of their employees, management in knowledge-based organizations is improving the quality of work, and consequently, generation of new knowledge and their organization’s competitive advantage.

  18. Managing Knowledge Performance: Testing the Components of a Knowledge Management System on Organizational Performance

    Science.gov (United States)

    Cho, Taejun; Korte, Russell

    2014-01-01

    The main purpose of the current study is to validate the framework of knowledge management (KM) capabilities created by Gold ("Towards a theory of organizational knowledge management capabilities." Doctoral dissertation, University of North Carolina, Chapel Hill) 2001) in a study of South Korean companies. However, the original framework…

  19. Security research roadmap; Security-tutkimuksen roadmap

    Energy Technology Data Exchange (ETDEWEB)

    Naumanen, M.; Rouhiainen, V. (eds.)

    2006-02-15

    security products and technologies needed are, for example, management of total security, detection, identification, localisation and communication, protection of information networks and systems, and physical protection. This report presents in more detail the knowledge and development needs as well as future development potentials seen in the security area. (orig.)

  20. Problems and solutions of information security management in Latvia

    Directory of Open Access Journals (Sweden)

    Deruma S.

    2014-01-01

    Security cannot exist as a standalone function, it should be integrated in the associated processes continuously supervising and improving the security management programme based on predefined criteria. Adopting a holistic approach with regard to security has proven to be a critical contributing factor to effective security in organizations.

  1. Towards Agile Security Risk Management in RE and Beyond

    NARCIS (Netherlands)

    Nunes Leal Franqueira, V.; Bakalova, Z.; Tun, Thein Tan; Daneva, Maia

    Little attention has been given so far to the process of security risk management at the early stages of system development. Security has been addressed by isolated security assurance practices, some of which consider risks and mitigations but they do not provide an overview of the overall security

  2. Applications of Ontologies in Knowledge Management Systems

    Science.gov (United States)

    Rehman, Zobia; Kifor, Claudiu V.

    2014-12-01

    Enterprises are realizing that their core asset in 21st century is knowledge. In an organization knowledge resides in databases, knowledge bases, filing cabinets and peoples' head. Organizational knowledge is distributed in nature and its poor management causes repetition of activities across the enterprise. To get true benefits from this asset, it is important for an organization to "know what they know". That's why many organizations are investing a lot in managing their knowledge. Artificial intelligence techniques have a huge contribution in organizational knowledge management. In this article we are reviewing the applications of ontologies in knowledge management realm

  3. Management of Information Security in Financial Accounting

    OpenAIRE

    Aurel Serb; Constantin Baron; Nicoleta Magdalena Iacob; Costinela-Luminita Defta

    2014-01-01

    Security issues in financial accounting are complex, and the risks are often difficult to stipulate, even for experts. The issues presented in this article try to be formed in a contribution to the consolidation of problems in the field of risk, and former vulnerabilities in cyber security in financial accounting. The use of an information security management system became a requirement for organizations because on the states began adopting mandatory data protection legislation and informatio...

  4. COMMUNICATION - CENTRAL VECTOR IN KNOWLEDGE MANAGEMENT

    Directory of Open Access Journals (Sweden)

    Adriana, GRIGORESCU

    2014-11-01

    Full Text Available As a key concept in modern management, the knowledge management among the knowledge administration, development and transfer between the members of an organization, it also involves the knowledge stimulation to obtain the competitive advantage and the innovations. The association between communication and knowledge is normal; the knowledge without communication is sterile, even useless. The communication's role in the knowledge management is both normal and valuable, because the knowledge, which is a good value, must be transferred so it can be exploited to maximum, and the knowledge transfer is possible only through communication. The managerial decisions, strategies, plans, explanations must be communicated to the organization's members so they know how, where and why it must be acted to assure its success. In turn, the organization's members hold a personal luggage of knowledge that can be developed and putted in the interests of the organization so it can become a collective source that generates new values. The present article presents the results of a research that had as purpose to identify in which way the communication is used to implement the knowledge management.

  5. Knowledge Management and Intellectual Capital

    DEFF Research Database (Denmark)

    Bukh, Per Nikolaj; Skovvang Christensen, Karina; Mouritsen, Jan

    From various angles and perspectives this book shows how knowledge management is actually practised in many different European firms. New dimensions of well-known management principles and concepts emerge by focusing on knowledge. Leading researchers and experts from European business schools offer...

  6. Moving towards Cloud Security

    Directory of Open Access Journals (Sweden)

    Edit Szilvia Rubóczki

    2015-01-01

    Full Text Available Cloud computing hosts and delivers many different services via Internet. There are a lot of reasons why people opt for using cloud resources. Cloud development is increasing fast while a lot of related services drop behind, for example the mass awareness of cloud security. However the new generation upload videos and pictures without reason to a cloud storage, but only few know about data privacy, data management and the proprietary of stored data in the cloud. In an enterprise environment the users have to know the rule of cloud usage, however they have little knowledge about traditional IT security. It is important to measure the level of their knowledge, and evolve the training system to develop the security awareness. The article proves the importance of suggesting new metrics and algorithms for measuring security awareness of corporate users and employees to include the requirements of emerging cloud security.

  7. The KMAT: Benchmarking Knowledge Management.

    Science.gov (United States)

    de Jager, Martha

    Provides an overview of knowledge management and benchmarking, including the benefits and methods of benchmarking (e.g., competitive, cooperative, collaborative, and internal benchmarking). Arthur Andersen's KMAT (Knowledge Management Assessment Tool) is described. The KMAT is a collaborative benchmarking tool, designed to help organizations make…

  8. Initiating Knowledge Management Project in a Regulatory Body in Thailand

    International Nuclear Information System (INIS)

    Pakdee, K.; Apichaibukol, A.

    2016-01-01

    Full text: Thailand is one of countries that have adopted the use of nuclear technology in various applications such as medical, agricultural, industrial and research applications. Recognizing this enormous potential in many applications, the Office of Atoms for Peace (OAP) as a regulatory body under the Ministry of Science and Technology, carries out a variety of activities to disseminate and promote youth, entrepreneurs and public on the awareness of the atomic energy in Thailand. In recent years, “knowledge management” is one of the key factors that contribute to safe, secure and efficient operation of nuclear activities and facilities but also for the regulatory processes as well. In this regards, the OAP is aware and recognize of the importance of studying and initiating nuclear knowledge and human resource development programme in the regulatory body. Even though, the OAP has been initiating the project on nuclear knowledge and human resources for several years but the present status of the projects still remain in primarily stage of the initiating. This paper describes the initiating of nuclear knowledge in the past and present status for knowledge management project in regulatory body in Thailand. (author

  9. Globalization And Knowledge Management In Projects

    Directory of Open Access Journals (Sweden)

    Bubel Dagmara

    2015-06-01

    Full Text Available Knowledge management is a field of management dealing with the use of knowledge, methods, and tools to effectively coordinate complex and unique projects. In accordance with this definition, project knowledge can be treated as a useful resource of information that allows projects to be implemented in compliance with its objectives: time, costs, and quality of results. Knowledge in the activity of an organization, including in the implementation of projects, has for many years been an area of interest to researchers, who confirmed its key importance for building permanent competitive advantages of companies and enterprises. In project management, this issue takes on a new character, as it is transferred to the field of dynamic, time restricted, temporary, and team-implemented projects. The aim of this paper is to present the results of a survey regarding the use of practices of knowledge management in projects in international organizations and to show that the concept of knowledge management in projects is a tool conducive to spreading the process of globalization.

  10. Product Knowledge Modelling and Management

    DEFF Research Database (Denmark)

    Zhang, Y.; MacCallum, K. J.; Duffy, Alex

    1996-01-01

    function-oriented design. Both Specific Product Knowledge and Product Domain Knowledge are modelled at two levels, a meta-model and an information-level.Following that, a computer-based scheme to manage the proposed product lknowledge models within a dynamically changing environment is presented.......The term, Product Knowledge is used to refer to two related but distinct concepts; the knowledge of a specific product (Specific Product Knowledge) and the knowledge of a product domain (Product Domain Knowledge). Modelling and managing Product Knowlege is an essential part of carrying out design.......A scheme is presented in this paper to model, i.e. classify, structure and formalise the product knowledge for the purpose of supporting function-oriented design. The product design specification and four types of required attributes of a specific product have been identified to form the Specific Product...

  11. Security Risks: Management and Mitigation in the Software Life Cycle

    Science.gov (United States)

    Gilliam, David P.

    2004-01-01

    A formal approach to managing and mitigating security risks in the software life cycle is requisite to developing software that has a higher degree of assurance that it is free of security defects which pose risk to the computing environment and the organization. Due to its criticality, security should be integrated as a formal approach in the software life cycle. Both a software security checklist and assessment tools should be incorporated into this life cycle process and integrated with a security risk assessment and mitigation tool. The current research at JPL addresses these areas through the development of a Sotfware Security Assessment Instrument (SSAI) and integrating it with a Defect Detection and Prevention (DDP) risk management tool.

  12. Knowledge Management in Economic Downturn: Indian Scenario

    Directory of Open Access Journals (Sweden)

    D. Mehta

    2011-10-01

    Full Text Available Knowledge management is becoming an indispensable aspect of most of the modern business organizations. It is considered as a corporate cost savings process to augment performance capabilities with broader availability and utilization of major corporate knowledge assets. Knowledge management is the basis of all planning, all development and all progress ofan organization. It is one of the significant ingredients, which makes the accessibility of acceptance with understanding of learning. With recession encompassing the globe, theorganizations are passionately engaged in cost cutting practices to maintain profitability and competitiveness. When enterprises realize that developing and sharing knowledge is pivotal tosustain a cutting edge, the management can decide to place knowledge management high on their agenda- especially during economic turmoil. The Indian organizations have exceedingly done well during the economic turmoil. The present paper is an attempt to study knowledge management during recession in Indian scenario. Major challenges faced by the organizations are highlighted along with strategies to overcome such challenges are presented by the authors.Keywords: knowledge, knowledge management, recession, innovation, Indian scenario.

  13. Critical infrastructure cyber-security risk management

    OpenAIRE

    Spyridopoulos, T.; Maraslis, K.; Tryfonas, T.; Oikonomou, G.

    2017-01-01

    Traditional IT cyber-security risk management methods are based on the evaluation of risks calculated as the likelihood of cyber-security incidents occurring. However, these probabilities are usually estimations or guesses based on past experience and incomplete data. Incorrect estimations can lead to errors in the evaluation of risks that can ultimately affect the protection of the system. This issue is also transferred to methods used in Industrial Control Systems (ICSs), as they are mainly...

  14. Knowledge Management Experience in Kosovo Organizations

    OpenAIRE

    MSc. Drita Kacandolli-Gjonbalaj; MSc. Anera Alishani; MSc. Arber Reci

    2014-01-01

    This paper is an empirical study, the findings of which reflect the experience gathered in knowledge management in Kosovo organizations. The main goal of this paper was to identify the realistic situation, and recommend instruments for a more effective knowledge management in Kosovo organizations. The findings of the empirical study have found inefficiency in knowledge management by organizations in Kosovo. A research was undertaken for this study, thereby directly interviewing representative...

  15. Cloud management and security

    CERN Document Server

    Abbadi, Imad M

    2014-01-01

    Written by an expert with over 15 years' experience in the field, this book establishes the foundations of Cloud computing, building an in-depth and diverse understanding of the technologies behind Cloud computing. In this book, the author begins with an introduction to Cloud computing, presenting fundamental concepts such as analyzing Cloud definitions, Cloud evolution, Cloud services, Cloud deployment types and highlighting the main challenges. Following on from the introduction, the book is divided into three parts: Cloud management, Cloud security, and practical examples. Part one presents the main components constituting the Cloud and federated Cloud infrastructure(e.g., interactions and deployment), discusses management platforms (resources and services), identifies and analyzes the main properties of the Cloud infrastructure, and presents Cloud automated management services: virtual and application resource management services. Part two analyzes the problem of establishing trustworthy Cloud, discuss...

  16. Knowledge Management - Identification of Domain Specific Knowledge Processes

    DEFF Research Database (Denmark)

    Larsen, Michael Holm

    1999-01-01

    Implementation of Information Technology infer substantial changes to an organisation, e.g. changes in jobs, roles of the company's employees, and the knowledge content of these jobs.This paper point out some of the knowledge management issues and challenges in the case of an implementation of an...... performed by humans. Their decisions are based on the integration of three different kinds of knowledge, i.e. uncodifiable or tacit knowledge, codifiable data from acquisition systems, and codifiable best practice from knowledge repositories....

  17. Temporal Convergence for Knowledge Management

    Directory of Open Access Journals (Sweden)

    Christopher Phillip Martin

    2008-05-01

    Full Text Available Time and knowledge have tended to be conceptualised in conventional knowledge management systems as either ‘timeless’ recordings of procedures, or time-stamped records of past events and states. The concept of temporal convergence was previously developed to help apply knowledge-management theory to complex military processes such as commander’s intent, shared situation awareness, and self-synchronisation. This paper clarifies the concept and introduces several others in forming a framework to assist discussion and exploration of the types of knowledge required for complex endeavours, such as warfighting, characterised by opposition and uncertainty. The approach is grounded in a pragmatist philosophy and constructivist epistemology. Argument proceeds along mathematical lines from a basis that the types of knowledge most valuable to goal-directed agents in uncertain environments can be modelled as directed graph topologies. The framework is shown to be useful in describing and reasoning about the knowledge requirements and prerequisites for distributed decision-making through the sharing of situational knowledge and common intentions, with practical application to the planning and execution of operations. To the designers of knowledge management systems seeking to address this space, it presents a challenge that cannot be addressed merely by construction, storage, search and retrieval of documents and records pertaining to the past.

  18. Airport Managers' Perspectives on Security and Safety Management Systems in Aviation Operations: A Multiple Case Study

    Science.gov (United States)

    Brown, Willie L., Jr.

    Global terrorism continues to persist despite the great efforts of various countries to protect and safely secure their citizens. As airports form the entry and exit ports of a country, they are one of the most vulnerable locations to terror attacks. Managers of international airports constantly face similar challenges in developing and implementing airport security protocols. Consequently, the technological advances of today have brought both positive and negative impacts on security and terrorism of airports, which are mostly managed by the airport managers. The roles of the managers have greatly increased over the years due to technological advances. The developments in technology have had different roles in security, both in countering terrorism and, at the same time, increasing the communication methods of the terrorists. The purpose of this qualitative multiple case study was to investigate the perspectives of airport managers with regard to societal security and social interactions in the socio-technical systems of the National Terrorism Advisory System (NTAS). Through the data gained regarding managers' perception and experiences, the researcher hoped to enable the development of security measures and policies that are appropriate for airports as socio-technical systems. The researcher conducted interviews with airport managers to gather relevant data to fulfill the rationale of the study. Ten to twelve airport managers based in three commercial aviation airports in Maryland, United States participated in the study. The researcher used a qualitative thematic analysis procedure to analyze the data responses of participants in the interview sessions.

  19. A Multilevel Secure Workflow Management System

    National Research Council Canada - National Science Library

    Kang, Myong H; Froscher, Judith N; Sheth, Amit P; Kochut, Krys J; Miller, John A

    1999-01-01

    The Department of Defense (DoD) needs multilevel secure (MLS) workflow management systems to enable globally distributed users and applications to cooperate across classification levels to achieve mission critical goals...

  20. Improving HIV/AIDS Knowledge Management Using EHRs.

    Science.gov (United States)

    Malmberg, Erik D; Phan, Thao M; Harmon, Glynn; Nauert, Richard F

    2012-01-01

    A primary goal for the development of EHRs and EHR-related technologies should be to facilitate greater knowledge management for improving individual and community health outcomes associated with HIV / AIDS. Most of the current developments of EHR have focused on providing data for research, patient care and prioritization of healthcare provider resources in other areas. More attention should be paid to using information from EHRs to assist local, state, national, and international entities engaged in HIV / AIDS care, research and prevention strategies. Unfortunately the technology and standards for HIV-specific reporting modules are still being developed. A literature search and review supplemented by the author's own experiences with electronic health records and HIV / AIDS prevention strategies will be used. This data was used to identify both opportunities and challenges for improving public health informatics primarily through the use of latest innovations in EHRs. Qualitative analysis and suggestions are offered for how EHRs can support knowledge management and prevention strategies associated with HIV infection. EHR information, including demographics, medical history, medication and allergies, immunization status, and other vital statistics can help public health practitioners to more quickly identify at-risk populations or environments; allocate scarce resources in the most efficient way; share information about successful, evidenced-based prevention strategies; and increase longevity and quality of life. Local, state, and federal entities need to work more collaboratively with NGOs, community-based organizations, and the private sector to eliminate barriers to implementation including cost, interoperability, accessibility, and information security.

  1. Distributed Knowledge Management in Extranets

    DEFF Research Database (Denmark)

    Pedersen, Mogens Kühn; Larsen, Michael Holm

    1999-01-01

    Knowledge management exchange schemes based on symmetric incentives are rarely found in the literature. The distributed knowledge model relies upon a double loop knowledge conversion decision support system with symmetric incentives in an extranet. The model merges specific knowledge with knowledge...... chains and networks like replacement, maintenance and services industries....

  2. Knowledge management in the learning economy

    DEFF Research Database (Denmark)

    Lundvall, Bengt-Åke

    organisation, are more innovative than the average firm. The paper contributes to the empirical foundation for the argument that learning organisations stimulate innovation and competence building and it makes an original conceptual contribution of practical relevance by linking knowledge management to HRM......The purpose of this paper is to show why to build ‘learning organisations' must be a central element of knowledge management. The paper argues that the wide use of information technology has a contradictory impact on knowledge management. On the one hand it extends the potential for codifying...... and innovation management....

  3. KNOWLEDGE MANAGEMENT TOOLS FOR THE EUROPEAN KNOWLEDGE BASED SOCIETY

    Directory of Open Access Journals (Sweden)

    Ramona – Diana Leon

    2011-12-01

    Full Text Available Increasingly more literature mention that in the current competitive environment, knowledge have become the main source of the competitive advantages, while recent researches regarding economic growth and development have defined knowledge as being the most critical resource of the emerging countries.Therefore, the organizations interest for knowledge has increased, the latter being defined as knowledge management process in order to meet existing needs, to identify and exploit existing and/or acquired knowledge and developing new opportunities.In other words, knowledge management facilitates productive information usage, intelligence growth, storing intellectual capital, strategic planning, flexible acquisition, collection of best practices, increasing the likelihood of being successful as well as a more productive collaboration within the company.In order to benefit from all these advantages, it is required the usage of specific tools including models and systems to stimulate the creation, dissemination and use of knowledge held by each employee and the organization as a whole.

  4. The Knowledge Management Research of Agricultural Scientific Research Institution

    Institute of Scientific and Technical Information of China (English)

    2010-01-01

    Based on the perception of knowledge management from experts specializing in different fields,and experts at home and abroad,the knowledge management of agricultural scientific research institution can build new platform,offer new approach for realization of explicit or tacit knowledge,and promote resilience and innovative ability of scientific research institution.The thesis has introduced functions of knowledge management research of agricultural science.First,it can transform the tacit knowledge into explicit knowledge.Second,it can make all the scientific personnel share knowledge.Third,it is beneficial to the development of prototype system of knowledge management.Fourth,it mainly researches the realization of knowledge management system.Fifth,it can manage the external knowledge via competitive intelligence.Sixth,it can foster talents of knowledge management for agricultural scientific research institution.Seventh,it offers the decision-making service for leaders to manage scientific program.The thesis also discusses the content of knowledge management of agricultural scientific research institution as follows:production and innovation of knowledge;attainment and organizing of knowledge;dissemination and share of knowledge;management of human resources and the construction and management of infrastructure.We have put forward corresponding countermeasures to further reinforce the knowledge management research of agricultural scientific research institution.

  5. Nuclear Security Management for Research Reactors and Related Facilities

    International Nuclear Information System (INIS)

    2016-03-01

    This publication provides a single source guidance to assist those responsible for the implementation of nuclear security measures at research reactors and associated facilities in developing and maintaining an effective and comprehensive programme covering all aspects of nuclear security on the site. It is based on national experience and practices as well as on publications in the field of nuclear management and security. The scope includes security operations, security processes, and security forces and their relationship with the State’s nuclear security regime. The guidance is provided for consideration by States, competent authorities and operators

  6. Importance of Knowledge Management in Human Resource Development

    International Nuclear Information System (INIS)

    Pleslic, Sanda

    2014-01-01

    Human resource management and knowledge management: • In human resource management - important to identify crucial knowledge base on which competitiveness of company depends → according this ensure appropriate development of human resources. • Era of so-called knowledge economy - only individual and organizational knowledge could give competitive advantage. • From operational perspective, knowledge management - systematic processes by which an organization identifies, creates, captures, acquires, shares and increase knowledge

  7. Knowledge management toboost productivity in manufacturing ...

    African Journals Online (AJOL)

    Knowledge management toboost productivity in manufacturing. ... Journal of Fundamental and Applied Sciences ... The assessment tool is an important factor because knowledge management has a deep relationship with performance ...

  8. Knowledge Management, Total Quality Management and Innovation: A New Look

    Directory of Open Access Journals (Sweden)

    Amir Honarpour

    2012-09-01

    Full Text Available In the present challenging dynamic environment, innovation is considered as a capability that renews the competitive advantage of a company. In recent years, considerable effort has been made to examine the factors that affect innovation in organizations. Knowledge management and total quality management, which play an important role in the contemporary management progress, are among the factors investigated. On the one hand, knowledge management has been recognized as an enabler that can deploy innovation by creating, storing, transferring, and applying knowledge, while on the other hand, the implementation of total quality management practices are addressed as one of the important factors that can influence innovation in a positive way. Lately, although a few researchers have shown some interest in the relationship of total quality management and knowledge management and their have not reached a consensus to conceptualize this relation. Looking at it from the methodological perspective, this problem can be tackled by using the Joint Variance analysis method where it can demonstrate correlation among independent variables and the effect of them on innovation. This study aims to propose a framework that shows how total quality management and knowledge management are reciprocally related to each other and how this affinity can impact innovation.

  9. A knowledge management model for graduate development

    Directory of Open Access Journals (Sweden)

    Eduardo Bustos Farías

    2016-01-01

    Full Text Available The aim of this paper is to present a model for administrative knowledge management for the Graduate Support Division of the Instituto Politécnico Nacional (IPN. This administrative unit is important because it is responsible for managing the institution’s academic services at graduate level. A qualitative methodology was used based on in-depth interviews with graduate-level directors, experts in knowledge management and members of the institution. The results obtained support the use of administrative management tools based on Information Technology (IT, such as the design of a comprehensive dashboard, and the proposal that knowledge management processes be automated with digital repositories. The model identifies factors such as the relationships between people, technology, administrative knowledge and knowledge management processes, and is formed with innovative administrative contributions.

  10. Knowledge Management and Global Information Dissemination

    Science.gov (United States)

    Umunadi, Ejiwoke Kennedy

    2014-01-01

    The paper looked at knowledge management and global information dissemination. Knowledge is a very powerful tool for survival, growth and development. It can be seen as the information, understanding and skills that you gain through education or experience. The paper was addressed under the following sub-headings: Knowledge management knowledge…

  11. Nuclear Knowledge Management e-Bulletin, January 2014

    International Nuclear Information System (INIS)

    2014-01-01

    It has become increasingly clear to Member States that creating, sharing and transferring knowledge is critical for the safe and efficient management of any nuclear activity. Many Member States now have knowledge management programmes in place and are gaining a better understanding of the specific characteristics of nuclear knowledge needs to achieve the distinctive mission and vision of their organizations. For the members of the Nuclear Knowledge Management Section, the last 9 months were mainly dedicated towards the implementation of our existing programme consisting of the various schools, knowledge management assist visits, close cooperation with our various educational networks, and the completion of guidelines, reports and technical documents. At the same time, in response to Member States’ needs, we started some very interesting new initiatives aimed at enhancing nuclear safety and economics. Among these you can find the university initiative for a master’s degree in nuclear management, the promotion and support of communities of practice, the national nuclear education capability assessment and planning (CAP) framework, the life-cycle design basis knowledge management, the establishment of a nuclear education network in the region of the commonwealth of independent states (CIS), and the development of a knowledge management guide

  12. Analisis Knowledge Management System Pada STMIK Mitra Lampung

    OpenAIRE

    Winarko, Triyugo

    2014-01-01

    Knowledge is information that is contextual, relevant and actionable. Knowledge differs from data or information because knowledge is only found in one's thinking. For that we need the knowledge that knowledge management can be an "intangible assets" that can be managed and utilized by many people. STMIK Mitra Lampung is a college with a wealth of knowledge on each personal well yet manageable, so that the knowledge management is expected to be "intangible assets" that can play its role optim...

  13. Knowledge Exchange and Management Research

    DEFF Research Database (Denmark)

    Bager, Torben

    2018-01-01

    for ‘interesting’ discoveries has a potential to lift off papers with a high level of scientific rigor as well as a high level of relevance for practice. Originality: An outcome focus on the relationship between knowledge exchange activities and management research is to our knowledge new in the debate about......Purpose: The growing involvement of management researchers in knowledge exchange activities and collaborative research does not seem to be reflected in a growing academic output. The purpose of this paper is to explore barriers for academic output from these activities as well as the potential...... derived from knowledge exchange activities and Mode 2 research into academic papers such as low priority of case study research in leading management journals, a growing practice orientation in the research funding systems, methodological challenges due to limited researcher control, and disincentives...

  14. Knowledge Management Practices for Development - Slovak Model

    Directory of Open Access Journals (Sweden)

    Aferdita Dervishi

    2016-11-01

    Full Text Available Knowledge and its management, innovation and technology are key elements for economic growth and sustainable development in technology and globalization era. The purpose of this paper is to study the effects of best practices of knowledge management in Slovakia, a$ empting to present a model that may serve to improve access to knowledge management and technology in Albania. This paper analyses practices of research & development, intellectual capital, the link between knowledge, innovation and technology transfer and trends of economic development in Slovakia. This study has used the qualitative method, supported on secondary source of data. From the assessment perspective, the findings are believable that investing on intellectual capital and managing knowledge properly, stable effects on the development of economy, industry and other fields is reached. Knowledge is managed by higher scientific institutions supported by the state. Today, in Slovakia are operating the most powerful companies. Albanians possess human capital that may face the difficult technological challenges and innovations. Both, Albania and Kosovo governments need to create a more coherent and national access to knowledge management and innovation through the establishment of National Council of Science, Knowledge and Technology Transfer.

  15. Managing opportunities in the global knowledge society

    DEFF Research Database (Denmark)

    Nielsen, Sven Hvid

    2007-01-01

    It is commonplace these days to say that knowledge is the most critical asset to be managed. Yet not many people - particularly not practitioners - invest very much time in learning about what knowledge really is and how different knowledge management (KM) is from information management (IM...

  16. Business Intelligence & Knowledge Management - Technological Support for Strategic Management in the Knowledge Based Economy

    Directory of Open Access Journals (Sweden)

    Dorel PARASCHIV

    2008-01-01

    Full Text Available The viability and success of modern enterprises are subject to the increasing dynamic of the economic environment, so they need to adjust rapidly their policies and strategies in order to respond to sophistication of competitors, customers and suppliers, globalization of business, international competition. Perhaps the most critical component for success of the modern enterprise is its ability to take advantage of all available information - both internal and external. Making sense of all this information, gaining value and competitive advantage through represents real challenges for the enterprise. The IT solutions designed to address these challenges have been developed in two different approaches: structured data management (Business Intelligence and unstructured content management (Knowledge Management. Integrating Business Intelligence and Knowledge Management in new software applications designated not only to store highly structured data and exploit it in real time but also to interpret the results and communicate them to decision factors provides real technological support for Strategic Management. Integrating Business Intelligence and Knowledge Management in order to respond to the challenges the modern enterprise has to deal with represents not only a "new trend" in IT, but a necessity in the emerging knowledge based economy. These hybrid technologies are already widely known in both scientific and practice communities as Competitive Intelligence. In the end of paper,a competitive datawarehouse design is proposed, in an attempt to apply business intelligence technologies to economic environment analysis making use of romanian public data sources.

  17. 75 FR 8088 - Privacy Act of 1974; Department of Homeland Security/ALL-023 Personnel Security Management System...

    Science.gov (United States)

    2010-02-23

    ... risk of harm to economic or property interests, identity theft or fraud, or harm to the security or... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2009-0041] Privacy Act of 1974; Department of Homeland Security/ALL--023 Personnel Security Management System of Records AGENCY...

  18. Investigating the Knowledge Management Culture

    Science.gov (United States)

    Stylianou, Vasso; Savva, Andreas

    2016-01-01

    Knowledge Management (KM) efforts aim at leveraging an organization into a knowledge organization thereby presenting knowledge employees with a very powerful tool; organized valuable knowledge accessible when and where needed in flexible, technologically-enhanced modes. The attainment of this aim, i.e., the transformation into a knowledge…

  19. Security Risks Management in Selected Academic Libraries in Osun ...

    African Journals Online (AJOL)

    The survival of a library depends to a large extent on how secured its collections are. Security of collections constitutes a critical challenge facing academic libraries in Nigeria. It is against this background that this study investigated the security risks management in selected academic libraries in Osun State, Nigeria.

  20. Safety and Mission Assurance Knowledge Management Retention: Managing Knowledge for Successful Mission Operations

    Science.gov (United States)

    Johnson, Teresa A.

    2006-01-01

    Knowledge Management is a proactive pursuit for the future success of any large organization faced with the imminent possibility that their senior managers/engineers with gained experiences and lessons learned plan to retire in the near term. Safety and Mission Assurance (S&MA) is proactively pursuing unique mechanism to ensure knowledge learned is retained and lessons learned captured and documented. Knowledge Capture Event/Activities/Management helps to provide a gateway between future retirees and our next generation of managers/engineers. S&MA hosted two Knowledge Capture Events during 2005 featuring three of its retiring fellows (Axel Larsen, Dave Whittle and Gary Johnson). The first Knowledge Capture Event February 24, 2005 focused on two Safety and Mission Assurance Safety Panels (Space Shuttle System Safety Review Panel (SSRP); Payload Safety Review Panel (PSRP) and the latter event December 15, 2005 featured lessons learned during Apollo, Skylab, and Space Shuttle which could be applicable in the newly created Crew Exploration Vehicle (CEV)/Constellation development program. Gemini, Apollo, Skylab and the Space Shuttle promised and delivered exciting human advances in space and benefits of space in people s everyday lives on earth. Johnson Space Center's Safety & Mission Assurance team work over the last 20 years has been mostly focused on operations we are now beginning the Exploration development program. S&MA will promote an atmosphere of knowledge sharing in its formal and informal cultures and work processes, and reward the open dissemination and sharing of information; we are asking "Why embrace relearning the "lessons learned" in the past?" On the Exploration program the focus will be on Design, Development, Test, & Evaluation (DDT&E); therefore, it is critical to understand the lessons from these past programs during the DDT&E phase.

  1. 77 FR 56662 - Homeland Security Science and Technology Advisory Committee (HSSTAC)

    Science.gov (United States)

    2012-09-13

    ... its business. ADDRESSES: The meeting will be held at the Department of Homeland Security (DHS... as new developments in systems engineering, cyber-security, knowledge management and how best to... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2012-0053] Homeland Security Science and...

  2. Strategic Impact of Knowledge Management on Organisational Efficiency

    DEFF Research Database (Denmark)

    Larsen, Michael Holm; Pedersen, Mogens Kühn

    1999-01-01

    Knowledge management is rarely found in a strategy context. Although some companies already have introduced the role of a chief knowledge officer, knowledge management is not treated as a strategic endeavour. Furthermore, contributions from an academic point of view are scarce in the field...... of the strategic issues of knowledge management. This paper contributes with some insight in pointing out the strategic question that knowledge management might provide answers for: The efficiency issue of stategic positioning. Furthermore, the paper emphasises the distinction between symmetric and asymmetric...... incentives in business relations, and on this basis identifies the notion of Distributed Knowledge Management as a means for creating efficiency strategies with symmetric incentives in business relations. In this way a strategic agenda for knowledge management is identified....

  3. How to Develop the Knowledge Management Environment

    International Nuclear Information System (INIS)

    Pleslic, S.

    2016-01-01

    Full text: Knowledge as the most valuable asset in organization should be managed properly and carefully. When we are trying to manage knowledge, we should not intent to create big knowledge repositories that will capture everything that anybody ever knew. It is better to follow people who have knowledge and to develop culture and technology that will help them to share knowledge and experience. The key elements for successful knowledge management are: people, processes and technology. Technology should be standard and reliable to facilitate knowledge sharing. KM processes should be defined to simplify creation, sharing and use of knowledge. People are the most valuable resource of organizational knowledge because they can create new knowledge, share knowledge around the organization and use that knowledge to achieve the best performance. Technology and processes are powerful together, but without the people there is a high risk that efforts to change something in organization will not be successful. People are such factor that can break or make any KM initiatives. It is even more critical situation in nuclear knowledge management. How to develop organizational culture and individual behavior in nuclear field will be described. (author

  4. Nuclear knowledge management in radioactive waste management programmes

    International Nuclear Information System (INIS)

    Vetere, Claudia L.; Gomiz, Pablo R.; Lavalle, Myriam; Masset, Elvira

    2015-01-01

    In late 2007, the Nuclear Knowledge Management (NKM) group of the Argentine Atomic Energy Commission (CNEA), understanding the need to preserve knowledge related with radioactive waste, formulated the CONRRaD Project with the aim of developing and implementing a sustainable knowledge management system. The CONRRaD Project was highly focused on minimising the loss of radioactive waste management knowledge related to processes and facilities as a consequence of staff ageing and retiring, promoting transfer and preservation so as to ensure that future generations interpret and improve the management of waste, protecting the environment and people's health. The National Programme for Radioactive Waste Management (NPRWM) has the responsibility of maintaining a documented record system to preserve the knowledge that is available and relates to the facilities for radioactive wastes treatment, conditioning, packaging, storing and disposal of low-level radioactive wastes. The STOReR system has been designed with the aim of ensuring traceability through all the steps of radioactive waste management from generation to storage or disposal. Apart from upgrading an application in use since 2001, the new software includes improvements in the inventory calculations according to the current regulations. Basically, the system consists of two applications. One application called PAGE is on the Net and it is available for the producers. These producers are the facilities that generate radioactive waste as a consequence of their normal operation. PAGE enables the producers to access all the services provided by AGE more easily. Not only are producers the users of PAGE, but there are also authorised owners of radioactive sources and devices because AGE provides transitory or permanent storage of these elements. The other application called STOReR is the main one which provides the capabilities needed to support the whole system, such as the databases storage and management. STORe

  5. KNOWLEDGE MANAGEMENT UNTUK CUSTOMER SERVICE

    Directory of Open Access Journals (Sweden)

    Lianna Sugandi

    2010-10-01

    Full Text Available Knowledge is a success key in every field aspects. Along with the development in the world nowadays, where globalization is a challenge in every Indonesian human resource to face global competition. In this case, education has important part as media in developing qualified human resources and also as the place where they can be educated in their field. In the development of information technology, it came new systems in several fields including what educational field known as e-learning. Knowledge management (KM is one implementation of e-learning. There is a concept that gathers all knowledge aspects in easily accessed file or document, and also in hardly accessed as knowledge and experience.Keywords: knowledge management, human resource, education

  6. Improving performance with knowledge management

    Science.gov (United States)

    Kim, Sangchul

    2018-06-01

    People and organization are unable to easily locate their experience and knowledge, so meaningful data is usually fragmented, unstructured, not up-to-date and largely incomplete. Poor knowledge management (KM) leaves a company weak to their knowledge-base - or intellectual capital - walking out of the door each year, that is minimum estimated at 10%. Knowledge management (KM) can be defined as an emerging set of organizational design and operational principles, processes, organizational structures, applications and technologies that helps knowledge workers dramatically leverage their creativity and ability to deliver business value and to reap finally a competitive advantage. Then, this paper proposed various method and software starting with an understanding of the enterprise aspect, and gave inspiration to those who wanted to use KM.

  7. Knowledge Management, Human Resource Management, and Higher Education: A Theoretical Model

    Science.gov (United States)

    Brewer, Peggy D.; Brewer, Kristen L.

    2010-01-01

    Much has been written on the importance of knowledge management, the challenges facing organizations, and the important human resource management activities involved in assuring the acquisition and transfer of knowledge. Higher business education plays an important role in preparing students to assume the knowledge management and human resource…

  8. Green knowledge management to support environmental sustainability

    International Nuclear Information System (INIS)

    Dornhoefer, Mareike-Jessica

    2017-01-01

    Sustainability, environmental management and green initiatives are topics which gradually developed into trends since the late 1980s, not only in research institutions, but also in public and private organizations. While the usage of energy and other resources are increasing, these organizations search for new possibilities to reduce the economic, ecologic and social burdens and consequences of office and production environments for employees and nature. While certified environmental management systems were established already in the 1990s, green approaches and technologies are only about 10 years old and steadily developing. Decisions about a fitting strategy and the support of suitable measures inside an organization always require knowledge provided for the decision makers. Furthermore it is of importance to record the environmental consequences of the operational business and to not only record data and information, but to create a context and deduce the knowledge for future activities. Based on this situation, the work addresses the main research question of how �classical'' knowledge management might be further developed or transformed into Green Knowledge Management and how it addresses the goals of sustainability, especially ecological sustainability, environmental management and green approaches alike? The definition of Green Knowledge Management consists of five factors, which are discussed systematically, explored conceptually and documented with the help of practical examples. Different knowledge management models and their respective building blocks are analyzed to deduce how knowledge processes might interact with environmental ones as well as green aspects. Also different types of knowledge management systems are analysed for their application possibilities. A planning and decision making tool in form of a three dimensional cube, the ''Green Knowledge Management Cube'' is introduced on a conceptual level and documented

  9. A System for Managing Critical Knowledge for Accelerator Subsystems: Pansophy

    International Nuclear Information System (INIS)

    C. Reece; V. Bookwalter; B. Madre

    2001-01-01

    Accelerator development and construction projects often intentionally push the envelope of well-established technical performance and manageable complexity. In addition, the desire for efficient retention and exploitation of accumulated experience across the multi-decade life cycles of major installations calls for a robust, yet user-friendly knowledge management system. To meet these needs, we are presently deploying a new web-based system at Jefferson Lab: Pansophy. This system is a custom integration of several commercial software utilities, DocushareTM, ColdFusionTM, MatlabTM, IngresTM, and common desktop programs. Users of the system range from process managers, shop-floor technicians, test engineers, to after-the-fact data miners and operations staff. The system integrates important QA elements of procedural control, automated data accumulation into a secured central database, prompt and reliable data query and retrieval, and online analysis tools, all accessed by the user via their platform-independent web browser. A system overview, completed pilot project, and implementation experience to date will be presented

  10. Toward a Conceptual Knowledge Management Framework in Health

    Science.gov (United States)

    Lau, Francis

    2004-01-01

    This paper describes a conceptual organizing scheme for managing knowledge within the health setting. First, a brief review of the notions of knowledge and knowledge management is provided. This is followed by a detailed depiction of our proposed knowledge management framework, which focuses on the concepts of production, use, and refinement of three specific knowledge sources-policy, evidence, and experience. These concepts are operationalized through a set of knowledge management methods and tools tailored for the health setting. We include two case studies around knowledge translation on parent-child relations and virtual networks in community health research to illustrate how this knowledge management framework can be operationalized within specific contexts and the issues involved. We conclude with the lessons learned and implications. PMID:18066388

  11. 17 CFR 229.403 - (Item 403) Security ownership of certain beneficial owners and management.

    Science.gov (United States)

    2010-04-01

    ... of certain beneficial owners and management. 229.403 Section 229.403 Commodity and Securities... Management and Certain Security Holders § 229.403 (Item 403) Security ownership of certain beneficial owners and management. (a) Security ownership of certain beneficial owners. Furnish the following information...

  12. Librarians Are the Ultimate Knowledge Managers?

    Science.gov (United States)

    Koina, Cathie

    2003-01-01

    Librarians are the ultimate knowledge managers. Everyone knows that. After all, haven't they been the custodians of documented knowledge for centuries? Who could possibly do it better than them? Well, then why aren't people knocking down their doors, begging them to be the knowledge managers of the organisation? Are they just ignorant of how…

  13. Managing Nuclear Knowledge: connecting past and future

    International Nuclear Information System (INIS)

    Ruyssen, M.-L.

    2006-01-01

    Since several years SCKoCEN has acknowledged the importance of Nuclear Knowledge Management. In recent years, a number of trends have drawn attention to the need for better management of nuclear knowledge. At the Lisbon European Council in 2000 the role of RandD was recognized as the driving force for a competitive and dynamic knowledge-based economy and linked to the economy's capacity to turn new knowledge into technological innovation. Knowledge management (KM) is therefore becoming more and more critical to exploit RandD results effectively and expect sufficient returns to balance the risk inherent in the large investments required by today's nuclear research. The SCK-CEN practical approach towards Nuclear Knowledge Management is twofold. First, the capture of tacit knowledge before the loss of key individuals as well as the preservation of various knowledge repositories address the complex issues of aging of the nuclear workforce and reduction of the number of students taking nuclear subjects. Secondly, the set up of education networks at international level aims to prevent further dilution of nuclear education and training programmes while pooling nuclear research resources in order to meet future requirements for qualified nuclear staff. Knowledge management combines therefore different sources of information with human knowledge capital

  14. Improving Information Security Risk Management

    Science.gov (United States)

    Singh, Anand

    2009-01-01

    manaOptimizing risk to information to protect the enterprise as well as to satisfy government and industry mandates is a core function of most information security departments. Risk management is the discipline that is focused on assessing, mitigating, monitoring and optimizing risks to information. Risk assessments and analyses are critical…

  15. Knowledge Management in Projects: Insights from two Perspectives

    DEFF Research Database (Denmark)

    Christensen, Karina Skovvang; Bukh, Per Nikolaj

    2009-01-01

    The article focuses on how managerial options in relation to development and sharing of knowledge in projects can be extended by analysing project management from two different, but complementary, knowledge management perspectives: an artefact-oriented and a process-oriented perspective. Further......, the article examines how a similar project management model is used in two different organisations and how its role in knowledge management differs dependent on other knowledge management initiatives and how the production processes are structured. Following the artefact-oriented perspective, the explicit...... dimension of knowledge can be captured, retrieved and reused using knowledge management systems. From the process-oriented perspective, focus is on the tacit or implicit dimension of knowledge and the context for understanding the information is more important. It is concluded that if a company offers...

  16. Knowledge management systems success in healthcare: Leadership matters.

    Science.gov (United States)

    Ali, Nor'ashikin; Tretiakov, Alexei; Whiddett, Dick; Hunter, Inga

    2017-01-01

    To deliver high-quality healthcare doctors need to access, interpret, and share appropriate and localised medical knowledge. Information technology is widely used to facilitate the management of this knowledge in healthcare organisations. The purpose of this study is to develop a knowledge management systems success model for healthcare organisations. A model was formulated by extending an existing generic knowledge management systems success model by including organisational and system factors relevant to healthcare. It was tested by using data obtained from 263 doctors working within two district health boards in New Zealand. Of the system factors, knowledge content quality was found to be particularly important for knowledge management systems success. Of the organisational factors, leadership was the most important, and more important than incentives. Leadership promoted knowledge management systems success primarily by positively affecting knowledge content quality. Leadership also promoted knowledge management use for retrieval, which should lead to the use of that better quality knowledge by the doctors, ultimately resulting in better outcomes for patients. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.

  17. KNOWLEDGE MANAGEMENT IN CUBAN ENTERPRISES

    Directory of Open Access Journals (Sweden)

    Raúl Yoel La Fé Jiménez

    2017-10-01

    Full Text Available In Cuba the intensive use of knowledge has focused on some sectors more than others, despite the high level of training of human resources and the need to boost the Cuban economy with efficiency. This is the reason why the objective of this article is to propose a procedure for the implementation and improvement of knowledge management in Cuban companies. For this purpose, it was created a series of phases that follows a logical sequence for the implementation and improvement of knowledge management in any type of company.

  18. CSNI activities in knowledge management and knowledge transfer - An international dimension

    International Nuclear Information System (INIS)

    Reig, J.; Hrehor, M.

    2004-01-01

    The Committee on the Safety of Nuclear Installations (CSNI) of the OECD Nuclear Energy Agency (NEA) was set up in 1973 to develop and to co-ordinate the activities of the NEA concerning the technical aspects of the design, construction and operation of nuclear installations insofar as they affect the safety of such installations. Although there is currently no formal 'CSNI knowledge management strategy', i.e. defined CSNI approach and the appropriate resources for activities related to knowledge management as such, the CSNI has been actively involved during its 30 years of existence in a number of areas closely linked with knowledge management. The paper gives a number of specific examples of various CSNI activities which, all together, represent from an international perspective a significant contribution to knowledge management efforts at the national level of the OECD/NEA member countries. (author)

  19. Survey of current technologies of security management for distributed information systems; Bunsangata joho system no security iji kanri hoshiki no genjo

    Energy Technology Data Exchange (ETDEWEB)

    Matsui, S [Central Research Institute of Electric Power Industry, Tokyo (Japan)

    1997-05-01

    The latest situation of the security management for a distributed information system was examined and systematically summarized to indicate the management design in future. This paper describes the threat of the distributed information system to security, the risk for confidentiality, integrity, and availability due to the threat, and the measures to be taken. The basic technology of security management is classified into the `user certification to prevent an incorrect access` and the `encipherment to prevent data from being used incorrectly.` The technology for certification has been almost completed. It can be securely done using an expendable password or IC card system. In Internet, multiple enciphering technologies for constructing a virtual private network that can secure the almost the same security as for a private network can be used. In an electronic mail, the enciphering technology can also be used easily. The tool that manages the security of very many servers, clients, and networks is in the initial stage. 16 refs., 1 fig., 5 tabs.

  20. Knowledge management in the NPP domain

    International Nuclear Information System (INIS)

    Nilsen, Svein; Bisio, Rossella; Ludvigsen, Jan Tore

    2004-03-01

    This report gives an outlook on Knowledge Management (KM) activities within NPP related establishments as of today. There may be less activity in the NPP world as compared to many other industrial sectors. Still there is an awakening within the NPP industry demanding that KM should be attended to at a larger scale. The most notable reason for this is maybe an imminent increase in the number of people going into retirement. The types of establishments involved cover the major kinds such as utilities, research institutes and worldwide nuclear organizations. The report sums up a few of those efforts that are presently being implemented. Moreover the report looks at general advancements within the field of knowledge management. Simply stated the endeavours belong to either one of two classes. The first class emphasize the use of technology to solve knowledge management problems. The second class regard knowledge management as a problem pertaining to human factors and organizational issues. This report maintain that knowledge management initiatives should make due considerations to both perspectives. This report also sums up the Halden Reactor Project short term KM initiative. (Author)

  1. A review of game theory approach to cyber security risk management

    African Journals Online (AJOL)

    A review of game theory approach to cyber security risk management. ... This paper presents a review of game theoretic-based model for cyber security risk management. Specifically, issues on ... AJOL African Journals Online. HOW TO USE ...

  2. Presenting a Framework for Conceptualizing Knowledge Management Office

    Directory of Open Access Journals (Sweden)

    Narges Farzaneh

    2018-03-01

    Full Text Available Designing an effective structure for knowledge management is one of the critical factors for its success in the organization. Structuring to KM and identifying the experts of this field in the structure of the organization is necessary to achieve the sustained and continuous benefits of knowledge management. This paper deals with the conceptualizing of knowledge management office as the organizational structure for effective management of knowledge. For this purpose, Meta-synthesize methodology was adopted. From 198 sources founded, 12 articles were consistent with accepted standards. As a result of combining the findings, concept of knowledge management office was figured with 54 codes, 12 concepts in the four themes including purpose (Strategic and Functional, structure (Centralized and Decentralized and Mixed, function (Strategies, Processes and Mechanisms and role (KM Committee, CKO, knowledge manager, Knowledge Representative. Organizations can use the results of this study to establish an appropriate structure of knowledge management. According to research, any article was not found by the researchers that have has this integrity and methodology. So, this paper has innovation.

  3. Match & Manage : The use of knowledge matching and project management to integrate knowledge in collaborative inbound open innovation

    OpenAIRE

    Lakemond, Nicolette; Bengtsson, Lars; Laursen, Keld; Tell, Fredrik

    2016-01-01

    Despite mounting evidence on the potential benefits of inbound open innovation, little is known about how firms purposefully manage inflows of knowledge. We investigate the use of two knowledge governance procedures—project management and knowledge matching—in collaborative inbound open innovation. Our findings suggest that, in addition to “knowledge-precursors,” which the literature on open innovation and absorptive capacity has shown to be important for the integration of external knowledge...

  4. Human resource management practices stimulating knowledge sharing

    Directory of Open Access Journals (Sweden)

    Matošková Jana

    2017-12-01

    Full Text Available The major goal of the paper was to develop a theoretical framework that conceptualizes the indirect impact on human resource management practice on knowledge sharing in the organization. In the current competitive environment, the ability to use knowledge assets and to continuously renovate it is required for organizational success. Therefore, the field of human resource management should dedicate great effort to understanding how to enhance the knowledge flows within the organization. Theoretical indications were provided about HRM practices that influence the quality and quantity of knowledge sharing within an organization. Further, a conceptual model of relations between HRM practices and factors influencing knowledge sharing within an organization was introduced. It is supposed that HRM practices have direct impacts on personality traits of employees, organizational culture, characteristics of managers, and instruments used for knowledge sharing. Subsequently, these factors have direct effects on the perceived intensity of knowledge sharing. The paper offers 12 testable propositions for the indirect relation between HRM practices and knowledge sharing in the organization. The suggested model could assist future research to examine the influence of HRM practices upon managing knowledge is a more complex way. Via a theoretical contribution to the debate on the influence on HRM practices upon managing knowledge, the study contributes to further research development in this field.

  5. Essays on Knowledge Management

    Science.gov (United States)

    Xiao, Wenli

    2012-01-01

    For many firms, particularly those operating in high technology and competitive markets, knowledge is cited as the most important strategic asset to the firm, which significantly drives its survival and success (Grant 1996, Webber 1993). Knowledge management (KM) impacts the firm's ability to develop process features that reduce manufacturing…

  6. Knowledge Resources - A Knowledge Management Approach for Digital Ecosystems

    Science.gov (United States)

    Kurz, Thomas; Eder, Raimund; Heistracher, Thomas

    The paper at hand presents an innovative approach for the conception and implementation of knowledge management in Digital Ecosystems. Based on a reflection of Digital Ecosystem research of the past years, an architecture is outlined which utilizes Knowledge Resources as the central and simplest entities of knowledge transfer. After the discussion of the related conception, the result of a first prototypical implementation is described that helps the transformation of implicit knowledge to explicit knowledge for wide use.

  7. Third-year medical students' knowledge of privacy and security issues concerning mobile devices.

    Science.gov (United States)

    Whipple, Elizabeth C; Allgood, Kacy L; Larue, Elizabeth M

    2012-01-01

    The use of mobile devices are ubiquitous in medical-care professional settings, but information on privacy and security concerns of mobile devices for medical students is scarce. To gain baseline information about third-year medical students' mobile device use and knowledge of privacy and security issues concerning mobile devices. We surveyed 67 third-year medical students at a Midwestern university on their use of mobile devices and knowledge of how to protect information available through mobile devices. Students were also presented with clinical scenarios to rate their level of concern in regards to privacy and security of information. The most used features of mobile devices were: voice-to-voice (100%), text messaging (SMS) (94%), Internet (76.9%), and email (69.3%). For locking of one's personal mobile phone, 54.1% never physically lock their phone, and 58% never electronically lock their personal PDA. Scenarios considering definitely privacy concerns include emailing patient information intact (66.7%), and posting de-identified information on YouTube (45.2%) or Facebook (42.2%). As the ease of sharing data increases with the use of mobile devices, students need more education and training on possible privacy and security risks posed with mobile devices.

  8. A Knowledge Management Strategy To Achieve Organisation Competitiveness

    Directory of Open Access Journals (Sweden)

    Dr. St. Sukmawati.

    2015-08-01

    Full Text Available The purpose of this research is to study the influence of organizational environment on the selection of knowledge management strategies. The research focuses particularly on the relationship between business and knowledge management strategy and the success of the knowledge management initiatives. This research is a case study researching 2 South Sulawesi banking companies. The knowledge management initiatives were categorized by six criteria objectives processes problems content strategy knowledge type and their fit with the respective business strategy of the organizational unit was evaluated. The findings in this research suggest a relationship between the success of knowledge management and the alignment of knowledge management and business strategy. The research also shows that an organization whose business strategy requires process efficiency should rely primarily on a codification strategy. An organization whose business strategy requires productprocess innovation should rely primarily on a personalization strategy. The most successful knowledge management projects were driven by a strong business need and with the goal to add value to the organizational unit operations. The research shows there are limitations due to the qualitative nature of the research logical rather than statistical conclusions small sample size and subjectivity of interpretations. The research sees that a manager should be aware of the objectives and business processes of the organizational unit and chooses the knowledge management strategy and objective in accordance to the business strategy and objective. Originalityvalue. The research enhances understanding about the influence of organizational environment factors on the success of knowledge management initiatives.

  9. Knowledge management in international mergers

    NARCIS (Netherlands)

    Grotenhuis, F.D.J.; Weggeman, M.C.D.P.

    2002-01-01

    This paper discusses the need for knowledge management in mergers and acquisitions. In mergers and acquisitions two cultures are combined, and also two systems of knowledge and insights are integrated. In order to develop and sustain competitive advantages for the knowledge-intensive firm, strategic

  10. Assessing and managing security risk in IT systems a structured methodology

    CERN Document Server

    McCumber, John

    2004-01-01

    SECURITY CONCEPTSUsing ModelsIntroduction: Understanding, Selecting, and Applying Models Understanding AssetsLayered Security Using Models in Security Security Models for Information Systems Shortcomings of Models in SecuritySecurity in Context Reference Defining Information SecurityConfidentiality, Integrity, and Availability Information AttributesIntrinsic versus Imputed Value Information as an Asset The Elements of Security Security Is Security Only in Context Information as an Asset Introduction Determining Value Managing Information Resources ReferencesUnderstanding Threat and Its Relatio

  11. The Eighth Stage of Information Management: Information Resources Management (IRM) vs. Knowledge Management (KM), and the Chief Information Officer (CIO) vs. the Chief Knowledge Officer (CKO).

    Science.gov (United States)

    Chen, Rui

    1998-01-01

    Describes the characteristics of the transfer point of information management to knowledge management (KM), what information resources management (IRM) does, and compares information and knowledge management and the roles of chief information officer (CIO) and chief knowledge officer (CKO). (PEN)

  12. Integrating knowledge seeking into knowledge management models and frameworks

    Directory of Open Access Journals (Sweden)

    Francois Lottering

    2012-02-01

    Full Text Available Background: A striking feature of the knowledge management (KM literature is that the standard list of KM processes either subsumes or overlooks the process of knowledge seeking. Knowledge seeking is manifestly under-theorised, making the need to address this gap in KM theory and practice clear and urgent.Objectives: This article investigates the theoretical status of the knowledge-seeking process in extant KM models and frameworks. It also statistically describes knowledge seeking and knowledge sharing practices in a sample of South African companies. Using this data, it proposes a KM model based on knowledge seeking.Method: Knowledge seeking is traced in a number of KM models and frameworks with a specific focus on Han Lai and Margaret Graham’s adapted KM cycle model, which separates knowledge seeking from knowledge sharing. This empirical investigation used a questionnaire to examine knowledge seeking and knowledge sharing practices in a sample of South African companies.Results: This article critiqued and elaborated on the adapted KM cycle model of Lai and Graham. It identified some of the key features of knowledge seeking practices in the workplace. It showed that knowledge seeking and sharing are human-centric actions and that seeking knowledge uses trust and loyalty as its basis. It also showed that one cannot separate knowledge seeking from knowledge sharing.Conclusion: The knowledge seeking-based KM model elaborates on Lai and Graham’s model. It provides insight into how and where people seek and share knowledge in the workplace. The article concludes that it is necessary to cement the place of knowledge seeking in KM models as well as frameworks and suggests that organisations should apply its findings to improving their knowledge management strategies. 

  13. A Methodology to Implement an Information Security Management System

    Directory of Open Access Journals (Sweden)

    Alaíde Barbosa Martins

    2005-08-01

    Full Text Available Information security has actually been a major challenge to most organizations. Indeed, information security is an ongoing risk management process that covers all of the information that needs to be protected. ISO 17799 offers what companies need in order to better manage information security. The best way to implement this standard is to ease the security management process using a methodology that will define will define guidelines, procedures and tools that will be needed along the way. Hence, this paper proposes a methodology to assist companies in assessing their compliance with BS 7799/ ISO 17799 as well as planning and implementing the actions necessary to become compliant or certified to the standard. The concepts and ideas presented here had been applied in a case study involving the Cetrel S/A - Company of Environmental Protection. For this company, responsible for treatment of industrial residues generated by the Camaçari Petrochemical Complex and adjacent areas, to assure confidentiality and integrity of customers' data is a basic requirement.

  14. Perceptions of knowledge management: A local government perspective

    Directory of Open Access Journals (Sweden)

    Bethuel Sibongiseni Ngcamu

    2012-12-01

    Full Text Available Public sector institutions are grappling to maintain knowledge management cycle which integrates knowledge into different phases as it also incorporates socialization, externalization, combination and internalization model. Whereas, knowledge management could be used as a strategic tool to advance organizational effectiveness and efficiency whilst accelerating service delivery and achieving operational goals. This article seeks to address the bottlenecks as far as knowledge management is concerned by using biographical profiles with the view of promoting the creation and management of knowledge within eThekwini Municipality. The study reflects that the biographical profiles of employees (age, education, race, job level influences their perceptions of the current knowledge management processes and strategies and their implementation and impact on effectiveness.

  15. Managing the risks of legacy radioactive sources from a security perspective

    International Nuclear Information System (INIS)

    Alexander, Mark; Murray, Allan

    2008-01-01

    The safety and security risk posed by highly radioactive, long-lived sources at the end of their normal use has not been consistently well-managed in previous decades. The Brazilian Cs-137 accident in 1986 and the Thailand Co-60 accident in 2000 are prime examples of the consequences that ensue from the loss of control of highly dangerous sources after their normal use. With the new international emphasis on security of radioactive sources throughout their life cycle, there is now further incentive to address the management of risks posed by legacy, highly dangerous radioactive sources. The ANSTO South-East Asia Regional Security of Radioactive Sources (RSRS) Project has identified, and is addressing, a number of legacy situations that have arisen as a result of inadequate management practices in the past. Specific examples are provided of these legacy situations and the lessons learned for managing the consequent safety and security risk, and for future complete life-cycle management of highly radioactive sources. (author)

  16. From Evidence-based Management to Management of Non-knowledge

    DEFF Research Database (Denmark)

    Knudsen, Morten

    2017-01-01

    Leadership and management are increasingly expected to base themselves on evidence, i.e. knowledge. This article does not disagree that knowledge may be beneficial. Yet, based on sociological insights on the complex relation between knowledge and ignorance, the article argues that more knowledge...

  17. KNOWLEDGE MANAGEMENT AND INTELLECTUAL CAPITAL MANAGEMENT COUPLED TO QUALITY MANAGEMENT SYSTEM LEAD TO BUSINESS SUCCESS

    Directory of Open Access Journals (Sweden)

    Stevan Živojinović

    2009-03-01

    Full Text Available From the vantage point of contemporary management paradigm shift and new knowledge-based economy, we underscore the importance of relations and support of quality management system - QMS (according to ISO 9001 standard for management of knowledge and intellectual capital. QMS implementation, documenting, application, maintenance and continuous improvement, as a catalyst of effective organization management, provides a foundation for effective knowledge management and intellectual capital enlargement, via knowledge, skills, management systems, procedures, information and product flow, culture, inovation, relations with customers and other stakeholders. Simultaneous implementation and dynamic interaction of these advanced management concepts intended to attain competitive advantage can result in synergic effects and improved performance. From the perspective of knowledge, as a central unifying notion, organizational behavior based on learning influences long-term business success, process effectiveness and customer satisfaction.

  18. Integrated Risk and Knowledge Management Program -- IRKM-P

    Science.gov (United States)

    Lengyel, David M.

    2009-01-01

    The NASA Exploration Systems Mission Directorate (ESMD) IRKM-P tightly couples risk management and knowledge management processes and tools to produce an effective "modern" work environment. IRKM-P objectives include: (1) to learn lessons from past and current programs (Apollo, Space Shuttle, and the International Space Station); (2) to generate and share new engineering design, operations, and management best practices through preexisting Continuous Risk Management (CRM) procedures and knowledge-management practices; and (3) to infuse those lessons and best practices into current activities. The conceptual framework of the IRKM-P is based on the assumption that risks highlight potential knowledge gaps that might be mitigated through one or more knowledge management practices or artifacts. These same risks also serve as cues for collection of knowledge particularly, knowledge of technical or programmatic challenges that might recur.

  19. Tools for an effective annual review of the Security Management Plan.

    Science.gov (United States)

    Daniel, Matthew

    2014-01-01

    A hospital's Security Management Plan, required by the Joint Commission, can also be used by security management professionals, the author points out, to ensure that they are continually monitoring and improving the program in a changing healthcare environment.

  20. Participative knowledge management to empower manufacturing workers

    DEFF Research Database (Denmark)

    Campatelli, Gianni; Richter, Alexander; Stocker, Alexander

    2016-01-01

    skills. In this paper, the authors suggest a participative knowledge management approach to empower manufacturing workers. Starting from a comprehensive empirical analysis of the existing work practices in a manufacturing company, the authors have developed and validated a knowledge management system...... prototype. The prototype is aimed for training, problem solving, and facilitating the discovery, acquisition, and sharing of manufacturing knowledge. The conducted evaluation of the prototype indicates that workers' skills and level of work satisfaction will increase since the knowledge management system...

  1. Study on a Process-oriented Knowledge Management Model

    OpenAIRE

    Zhang, Lingling; Li, Jun; Zheng, Xiuyu; Li, Xingsen; Shi, Yong

    2007-01-01

    Now knowledge has become the most important resource of enterprises. Process-oriented knowledge management (POKM) is a new and valuable research field. It may be the most practical method to deal with difficulties in knowledge management. The paper analyzes background, hypothesis and proposes of POKM, define the process knowledge, and give a process-oriented knowledge management model. The model integrates knowledge, process, human, and technology. It can improve the decision support capabili...

  2. Strategic Management for IT Services on Outsourcing Security Company

    Directory of Open Access Journals (Sweden)

    Lydia Wijaya

    2018-04-01

    Full Text Available Information Technology (IT is used by many organizations to enhance competitive advantage, but many outsource security firms have not used IT in their business processes. In this research, we will design Strategic Management for IT Services for outsourcing security company. We use an outsourcing security company as a case study of IT Strategy Management for IT Services development. The purpose of this study is to create an IT services strategy for security outsourcing companies. The framework used is the ITIL (Information Technology Infrastructure Library framework service strategy in strategy management for IT services process. There are several steps taken in the making of the strategy: (a Strategic assessment stage to analyzed internal and external factors of the company. (b Strategy generation by creating the strategic plan. (c Strategy execution to determine the tactical plan. And (d strategy measurement and evaluation. This study produced the proposed IT service system that suits the needs of the company in the form of strategic, tactical plans and strategy measurement. This result can be used as the foundations of IT service development in outsourcing security company. In the process of this study, we work closely with stakeholders; every work product has been verified and validated by stakeholders.

  3. Security management of water supply

    Directory of Open Access Journals (Sweden)

    Tchórzewska-Cieślak Barbara

    2017-03-01

    Full Text Available The main aim of this work is to present operational problems concerning the safety of the water supply and the procedures for risk management systems functioning public water supply (CWSS and including methods of hazard identification and risk assessment. Developed a problem analysis and risk assessment, including procedures called. WSP, which is recommended by the World Health Organization (WHO as a tool for comprehensive security management of water supply from source to consumer. Water safety plan is a key element of the strategy for prevention of adverse events in CWSS.

  4. Physician office readiness for managing Internet security threats.

    Science.gov (United States)

    Keshavjee, K; Pairaudeau, N; Bhanji, A

    2006-01-01

    Internet security threats are evolving toward more targeted and focused attacks.Increasingly, organized crime is involved and they are interested in identity theft. Physicians who use Internet in their practice are at risk for being invaded. We studied 16 physician practices in Southern Ontario for their readiness to manage internet security threats. Overall, physicians have an over-inflated sense of preparedness. Security practices such as maintaining a firewall and conducting regular virus checks were not consistently done.

  5. Network Security: Policies and Guidelines for Effective Network Management

    Directory of Open Access Journals (Sweden)

    Jonathan Gana KOLO

    2008-12-01

    Full Text Available Network security and management in Information and Communication Technology (ICT is the ability to maintain the integrity of a system or network, its data and its immediate environment. The various innovations and uses to which networks are being put are growing by the day and hence are becoming complex and invariably more difficult to manage by the day. Computers are found in every business such as banking, insurance, hospital, education, manufacturing, etc. The widespread use of these systems implies crime and insecurity on a global scale. In addition, the tremendous benefits brought about by Internet have also widened the scope of crime and insecurity at an alarming rate. Also, ICT has fast become a primary differentiator for institution/organization leaders as it offers effective and convenient means of interaction with each other across the globe. This upsurge in the population of organizations depending on ICT for business transaction has brought with it a growing number of security threats and attacks on poorly managed and secured networks primarily to steal personal data, particularly financial information and password.This paper therefore proposes some policies and guidelines that should be followed by network administrators in organizations to help them ensure effective network management and security of ICT facilities and data.

  6. 17 CFR 240.3b-14 - Definition of cash management securities activities.

    Science.gov (United States)

    2010-04-01

    ... derivative instruments or other financial instruments; (b) Cash management, in connection with any securities... § 240.15a-1 or any non-securities activities that involve eligible OTC derivative instruments or other... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Definition of cash management...

  7. Management of library and archival security from the outside looking in

    CERN Document Server

    O'Neill, Robert K

    2014-01-01

    Providing a substantive approach to the issue, Management of Library and Archival Security: From the Outside Looking In gives librarians and collection directors practical and helpful suggestions for developing policies and procedures to minimize theft. In addition, this text prepares you to deal with the aftermath of a robbery or natural disaster that destroys priceless materials. Through expert opinions and advice, Management of Library and Archival Security will teach you how to protect and secure invaluable collections and the finances invested in them.In addition, Management of Library an

  8. Knowledge Management from Organizational Culture Perspectives

    OpenAIRE

    Nguyen, Nhu T.B.

    2007-01-01

    This paper examines organizational culture perspectives to demonstrate their importance on knowledge management. Also, it is aimed to link three perspectives of organizational culture (Integration, Differentiation, and Fragmentation) to knowledge management. The conclusion suggests several implications of this paper and future research.

  9. Why Knowledge management is (Cognitive) Psychology

    NARCIS (Netherlands)

    Jorna, R.J.J.M.; Jorna, R.J.J.M.; Stephenson, N; Radtke, H.R.; Stam, H.J.

    2003-01-01

    This chapter illustrates how psychology, and cognitive psychology in particular, can enrich the discussions on knowledge management. Beginning with a realistic organizational example of the use of knowledge management, I argue that organizations are multi-actor systems and discuss the relevance of

  10. Research on a Valuation Standard and the Actual Condition About Security Management in PACS

    International Nuclear Information System (INIS)

    Jeong, Jae Ho; Son, Gi Gyeong; Kang, Hee Doo; Dong, Kyung Rae; Kweon, Dae Cheol; Kim, Hyun Soo

    2008-01-01

    This study is to prepare an evaluation standard about personal information protection and security management of a medical institution and to build up a grade standard of evaluation in PACS environment. We built up evaluation index based on 10 detailed items in four big categories (political security, technical security, data management security and physical security) by referring to ISO17799 (BS 7799), HIPPA (Health Insurance and Portability and Accountability Act of 1996) and domestic medical law. We have investigated at the thirty places where medical facility with the extracted security criteria and security evaluation index. Average score of physical security list, one of the big categories, was 18.5/20 (93%) at all medical institutions. Political security score was 18.5/30 (62%), data management security score was 12/20 (60%) and technical security score was 17.5/30 (58%). Therefore, security evaluation score was average 67 in 30 general hospitals, which was 4th level. The results showed that it is necessary to establish evaluation and management standard about personal information protection and security consciousness which are weak in PACS environment.

  11. Security issues at the Department of Energy and records management

    International Nuclear Information System (INIS)

    NUSBAUM, ANNA W.

    2000-01-01

    In order to discuss the connection between security issues within the Department of Energy and records management, the author covers a bit of security history and talks about what she calls ''the Amazing Project''. Initiated in late May 1999, it was to be a tri-laboratory (Lawrence Livermore National Laboratory of Livermore, California, Los Alamos National Laboratory of Los Alamos, New Mexico, and Sandia National Laboratories of Albuquerque, New Mexico, and Livermore, California) project. The team that formed was tasked to develop the best set of security solutions that still enabled weapon mission work to get done and the security solutions were to be the same set for everyone. The amazing project was called ''The Integrated Security Management Project'', or ''ISecM' for short. She'll describe why she thinks this project was so amazing and what it accomplished. There's a bit of sad news about the project, but then she'll move onto discuss what was learned at Sandia as a result of the project and what they're currently doing in records management

  12. Information literacy and personal knowledge management

    DEFF Research Database (Denmark)

    Schreiber, Trine; Harbo, Karen

    2004-01-01

    The aim of the paper is to discuss a new subject called personal knowledge management and to compare it with the better-known concept information literacy. Firstly, the paper describes and discusses the course called personal knowledge management. People from three institutions, the Library...... the participants partly how to manage information in such a way that it supports a learning process, and partly how to negotiate with the colleagues about the information needs, locate the information, and mediate it in such a way that the colleagues will use it. At the end of the course the participants construct...... a ´knowledge map´, which constitutes the mediation of the information to the workplace. The course has got a very positively reception. Secondly, the paper compares the course of personal knowledge management with the concept of information literacy. There exist a number of different definitions of the last...

  13. On Business-Driven IT Security Management and Mismatches between Security Requirements in Firms, Industry Standards and Research Work

    Science.gov (United States)

    Frühwirth, Christian

    Industry managers have long recognized the vital importance of information security for their businesses, but at the same time they perceived security as a technology-driven rather then a business-driven field. Today, this notion is changing and security management is shifting from technology- to business-oriented approaches. Whereas there is evidence of this shift in the literature, this paper argues that security standards and academic work have not yet taken it fully into account. We examine whether this disconnect has lead to a misalignment of IT security requirements in businesses versus industry standards and academic research. We conducted 13 interviews with practitioners from 9 different firms to investigate this question. The results present evidence for a significant gap between security requirements in industry standards and actually reported security vulnerabilities. We further find mismatches between the prioritization of security factors in businesses, standards and real-world threats. We conclude that security in companies serves the business need of protecting information availability to keep the business running at all times.

  14. COLLABORATIVE NETWORK SECURITY MANAGEMENT SYSTEM BASED ON ASSOCIATION MINING RULE

    Directory of Open Access Journals (Sweden)

    Nisha Mariam Varughese

    2014-07-01

    Full Text Available Security is one of the major challenges in open network. There are so many types of attacks which follow fixed patterns or frequently change their patterns. It is difficult to find the malicious attack which does not have any fixed patterns. The Distributed Denial of Service (DDoS attacks like Botnets are used to slow down the system performance. To address such problems Collaborative Network Security Management System (CNSMS is proposed along with the association mining rule. CNSMS system is consists of collaborative Unified Threat Management (UTM, cloud based security centre and traffic prober. The traffic prober captures the internet traffic and given to the collaborative UTM. Traffic is analysed by the Collaborative UTM, to determine whether it contains any malicious attack or not. If any security event occurs, it will reports to the cloud based security centre. The security centre generates security rules based on association mining rule and distributes to the network. The cloud based security centre is used to store the huge amount of tragic, their logs and the security rule generated. The feedback is evaluated and the invalid rules are eliminated to improve the system efficiency.

  15. MANAGEMENT OF RESOURCES IN DYNAMICALLY CHANGING SECURITY ENVRIONMENT

    Directory of Open Access Journals (Sweden)

    Sevdalina Dimitrova

    2014-09-01

    Full Text Available The monograph recommends integration between science and practice, experts from national bodies and scientific research potential of academic community of military universities in the field of management of resources of security and defence in accordance to the challenges in security environment caused by its dynamic and often unpredictable changes.

  16. A Design Thinking Approach to Teaching Knowledge Management

    Science.gov (United States)

    Wang, Shouhong; Wang, Hai

    2008-01-01

    Pedagogies for knowledge management courses are still undeveloped. This Teaching Tip introduces a design thinking approach to teaching knowledge management. An induction model used to guide students' real-life projects for knowledge management is presented. (Contains 1 figure.)

  17. Knowledge management in health: a systematic literature review.

    Science.gov (United States)

    Rocha, Elyrose Sousa Brito; Nagliate, Patricia; Furlan, Claudia Elisangela Bis; Rocha, Kerson; Trevizan, Maria Auxiliadora; Mendes, Isabel Amélia Costa

    2012-01-01

    Knowledge has been used as a resource for intelligent and effective action planning in organizations. Interest in research on knowledge management processes has intensified in different areas. A systematic literature review was accomplished, based on the question: what are the contributions of Brazilian and international journal publications on knowledge management in health? The sample totaled 32 items that complied with the inclusion criteria. The results showed that 78% of journals that published on the theme are international, 77% of researchers work in higher education and 65% have a Ph.D. The texts gave rise to five thematic categories, mainly: development of knowledge management systems in health (37.5%), discussion of knowledge management application in health (28.1%) and nurses' function in knowledge management (18.7%).

  18. The Role of Knowledge Management in Supply Chain Management: A Literature Review

    OpenAIRE

    Pérez Salazar, María del Rosario; Aguilar Laserre, Alberto Alfonso; Cedillo-Campos, Miguel Gastón; Hernández González, José Carlos

    2017-01-01

    Purpose: The aim of this paper is to examine the state of knowledge management research in supply chain management from three standpoints, methodological approach, supply chain management area, and knowledge management processes. Design/methodology/approach: To achieve this, a systematic review is conducted over the period 2000-2014 on the basis of a qualitative content analysis. Findings: Major results showed that knowledge management can be viewed as a leverage mechanism f...

  19. RISK MANAGEMENT FROM THE INFORMATION SECURITY PERSPECTIVE

    Directory of Open Access Journals (Sweden)

    Riza Ionuț

    2017-11-01

    Full Text Available Risk management has emerged ever since the appearance of human communities and it has developed at a slow rate. Over time, a significant improvement was made, from accepting hazards to the identification, evaluation and control of unwanted events, threat prevention and exploitation of opportunities through scientific risk management actions. The fundamental role of research in cyber security is to concentrate the efforts on those contexts and conditions which determine the way in which key players reach a common understanding of the way to conceive and eventually answer to certain challenges in cyber security. In order to build a clear perception of these effects, this work presents the main elements which define cyber space, to come to the aid of turning the management process into an efficient one, especially when talking about cyber space as a space for conflicts, both economic and political.

  20. KNOWLEDGE, INTELECTUAL CAPITAL AND QUALITY MANAGEMENT

    Directory of Open Access Journals (Sweden)

    Stevan Živojinović

    2009-12-01

    Full Text Available From the contemporary change management paradigm and new, knowledge-based economy, we emphasize the impact of advanced managerial tools. As evidenced in practice, simultaneous implementation of several management approaches, concepts and methods brings about more integral corporate success. We advocate integration of up-to-date approaches - knowledge management (KM and intellectual capital management (ICM as well as balanced scorecard (BSC under the "conceptional umbrella" of quality management, i.e. quality management system (QMS and total quality management (TQM. Interrelating elements of these management concepts through comparison of respective characteristics, differences and similarities, connections and complementary activities, we establish relations and interdependence which result in synergy when applied concurrently. QMS implementation (in accordance with ISO 9000 standard series, enroute to TQM, KM is improved, intellectual capital enlarged (via knowledge, skills, motivation, management systems, procedures, information and product flow, customer and other stakeholder relations and application of BSC facilitated. Conversely, KM and BSC improve opportunities for attaining organisational and business excellence. All mentioned concepts can be viewed as facets of modern integral management model, in continual dynamic interaction that brings about a potential for improved competitive advantage and business performance.

  1. A process framework for information security management

    Directory of Open Access Journals (Sweden)

    Knut Haufe

    2016-01-01

    Full Text Available Securing sensitive organizational data has become increasingly vital to organizations. An Information Security Management System (ISMS is a systematic approach for establishing, implementing, operating, monitoring, reviewing, maintaining and improving an organization's information security. Key elements of the operation of an ISMS are ISMS processes. However, and in spite of its importance, an ISMS process framework with a description of ISMS processes and their interaction as well as the interaction with other management processes is not available in the literature. Cost benefit analysis of information security investments regarding single measures protecting information and ISMS processes are not in the focus of current research, mostly focused on economics. This article aims to fill this research gap by proposing such an ISMS process framework as the main contribution. Based on a set of agreed upon ISMS processes in existing standards like ISO 27000 series, COBIT and ITIL. Within the framework, identified processes are described and their interaction and interfaces are specified. This framework helps to focus on the operation of the ISMS, instead of focusing on measures and controls. By this, as a main finding, the systemic character of the ISMS consisting of processes and the perception of relevant roles of the ISMS is strengthened.

  2. D and D knowledge management information tool - a web based system developed to share D and D knowledge worldwide

    International Nuclear Information System (INIS)

    Lagos, L.; Upadhyay, H.; Shoffner, P.

    2013-01-01

    Deactivation and decommissioning (D and D) work is a high risk and technically challenging enterprise within the U.S. Department of Energy complex. During the past three decades, the DOE's Office of Environmental Management has been in charge of carrying out one of the largest environmental restoration efforts in the world: the cleanup of the Manhattan Project legacy. In today's corporate world, worker experiences and knowledge that have developed over time represent a valuable corporate asset. The ever-dynamic workplace, coupled with an aging workforce, presents corporations with the ongoing challenge of preserving work-related experiences and knowledge for cross-generational knowledge transfer to the future workforce [5]. To prevent the D and D knowledge base and expertise from being lost over time, the DOE and the Applied Research Center at Florida International University (FIU) have developed the web-based Knowledge Management Information Tool (KM-IT) to capture and maintain this valuable information in a universally available and easily accessible and usable system. The D and D KM-IT was developed in collaboration with DOE Headquarters (HQ), the Energy Facility Contractors Group (EFCOG), and the ALARA [as low as reasonably achievable] Centers at Savannah River Sites to preserve the D and D information generated and collected by the D and D community. This is an open secured system that can be accessed from https://www.dndkm.org over the web and through mobile devices at https://m.dndkm.org. This knowledge system serves as a centralized repository and provides a common interface for D and D-related activities. It also improves efficiency by reducing the need to rediscover knowledge and promotes the reuse of existing knowledge. It is a community-driven system that facilitates the gathering, analyzing, storing, and sharing of knowledge and information within the D and D community. It assists the DOE D and D community in identifying potential solutions

  3. D and D knowledge management information tool - a web based system developed to share D and D knowledge worldwide

    Energy Technology Data Exchange (ETDEWEB)

    Lagos, L.; Upadhyay, H.; Shoffner, P. [Applied Research Center, Florida International University, 10555 W. Flagler Street,EC2100, Miami, FL (United States)

    2013-07-01

    Deactivation and decommissioning (D and D) work is a high risk and technically challenging enterprise within the U.S. Department of Energy complex. During the past three decades, the DOE's Office of Environmental Management has been in charge of carrying out one of the largest environmental restoration efforts in the world: the cleanup of the Manhattan Project legacy. In today's corporate world, worker experiences and knowledge that have developed over time represent a valuable corporate asset. The ever-dynamic workplace, coupled with an aging workforce, presents corporations with the ongoing challenge of preserving work-related experiences and knowledge for cross-generational knowledge transfer to the future workforce [5]. To prevent the D and D knowledge base and expertise from being lost over time, the DOE and the Applied Research Center at Florida International University (FIU) have developed the web-based Knowledge Management Information Tool (KM-IT) to capture and maintain this valuable information in a universally available and easily accessible and usable system. The D and D KM-IT was developed in collaboration with DOE Headquarters (HQ), the Energy Facility Contractors Group (EFCOG), and the ALARA [as low as reasonably achievable] Centers at Savannah River Sites to preserve the D and D information generated and collected by the D and D community. This is an open secured system that can be accessed from https://www.dndkm.org over the web and through mobile devices at https://m.dndkm.org. This knowledge system serves as a centralized repository and provides a common interface for D and D-related activities. It also improves efficiency by reducing the need to rediscover knowledge and promotes the reuse of existing knowledge. It is a community-driven system that facilitates the gathering, analyzing, storing, and sharing of knowledge and information within the D and D community. It assists the DOE D and D community in identifying potential solutions

  4. MAVEN Information Security Governance, Risk Management, and Compliance (GRC): Lessons Learned

    Science.gov (United States)

    Takamura, Eduardo; Gomez-Rosa, Carlos A.; Mangum, Kevin; Wasiak, Fran

    2014-01-01

    As the first interplanetary mission managed by the NASA Goddard Space Flight Center, the Mars Atmosphere and Volatile EvolutioN (MAVEN) had three IT security goals for its ground system: COMPLIANCE, (IT) RISK REDUCTION, and COST REDUCTION. In a multiorganizational environment in which government, industry and academia work together in support of the ground system and mission operations, information security governance, risk management, and compliance (GRC) becomes a challenge as each component of the ground system has and follows its own set of IT security requirements. These requirements are not necessarily the same or even similar to each other's, making the auditing of the ground system security a challenging feat. A combination of standards-based information security management based on the National Institute of Standards and Technology (NIST) Risk Management Framework (RMF), due diligence by the Mission's leadership, and effective collaboration among all elements of the ground system enabled MAVEN to successfully meet NASA's requirements for IT security, and therefore meet Federal Information Security Management Act (FISMA) mandate on the Agency. Throughout the implementation of GRC on MAVEN during the early stages of the mission development, the Project faced many challenges some of which have been identified in this paper. The purpose of this paper is to document these challenges, and provide a brief analysis of the lessons MAVEN learned. The historical information documented herein, derived from an internal pre-launch lessons learned analysis, can be used by current and future missions and organizations implementing and auditing GRC.

  5. The Trilogy of Science: Filling the Knowledge Management Gap with Knowledge Science and Theory

    Science.gov (United States)

    Bates, Anthony Shawn

    2017-01-01

    The international knowledge management field has different ways of investigating, developing, believing, and studying knowledge management. Knowledge management (KM) is distinguished deductively by know-how, and its intangible nature establishes different approaches to KM concepts, practices, and developments. Exploratory research and theoretical…

  6. Information security management system planning for CBRN facilities

    Energy Technology Data Exchange (ETDEWEB)

    Lenaeu, Joseph D. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); O' Neil, Lori Ross [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Leitch, Rosalyn M. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Glantz, Clifford S. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Landine, Guy P. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Bryant, Janet L. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Lewis, John [National Nuclear Lab., Workington (United Kingdom); Mathers, Gemma [National Nuclear Lab., Workington (United Kingdom); Rodger, Robert [National Nuclear Lab., Workington (United Kingdom); Johnson, Christopher [National Nuclear Lab., Workington (United Kingdom)

    2015-12-01

    The focus of this document is to provide guidance for the development of information security management system planning documents at chemical, biological, radiological, or nuclear (CBRN) facilities. It describes a risk-based approach for planning information security programs based on the sensitivity of the data developed, processed, communicated, and stored on facility information systems.

  7. Information security management system planning for CBRN facilities

    International Nuclear Information System (INIS)

    Lenaeu, Joseph D.; O'Neil, Lori Ross; Leitch, Rosalyn M.; Glantz, Clifford S.; Landine, Guy P.; Bryant, Janet L.; Lewis, John; Mathers, Gemma; Rodger, Robert; Johnson, Christopher

    2015-01-01

    The focus of this document is to provide guidance for the development of information security management system planning documents at chemical, biological, radiological, or nuclear (CBRN) facilities. It describes a risk-based approach for planning information security programs based on the sensitivity of the data developed, processed, communicated, and stored on facility information systems.

  8. Knowledge Management in Doctoral Education toward Knowledge Economy

    Science.gov (United States)

    Stamou, Adamantia

    2017-01-01

    Purpose: The purpose of this paper is to investigate the role and the scope of knowledge management (KM) in doctoral education, in the emerging knowledge economy (KE) context, and the recommendation of a framework for KM in doctoral education. Design/Methodology/Approach: An extended literature analysis was contacted to elaborate the role and the…

  9. Managing Materials and Wastes for Homeland Security Incidents

    Science.gov (United States)

    To provide information on waste management planning and preparedness before a homeland security incident, including preparing for the large amounts of waste that would need to be managed when an incident occurs, such as a large-scale natural disaster.

  10. Knowledge Management in the IAEA Department of Safeguards

    International Nuclear Information System (INIS)

    Konecni, S.; Carrillo de Fischer, J.

    2016-01-01

    Full text: Knowledge Management (KM) is an integral part of the Departmental Quality Management System because knowledge (i.e., the ‘know-how’, ‘know-when’, ‘know-who’, ‘know-why’, etc.) is needed to produce high quality products and services on a daily basis. The ability to continue providing such products and services is challenged each time an experienced staff member leaves the IAEA due to retirement or end of contract and takes with them important job-related knowledge. The most important assets in the International Atomic Energy Agency (IAEA) Department of Safeguards (SG) are people and their knowledge. The Department of Safeguards developed a knowledge management (KM) framework and the corresponding approaches as well as specific guidelines for its implementation. Knowledge retention (KR) is part of knowledge management and focusses on eliminating the risk of losing the critical job-related knowledge by putting in place a systematic knowledge retention plan. Particularly, for knowledge retention, the Safeguards Division of Concepts and Planning (SGCP) developed a model to draw out and capture the critical knowledge and making it available for use by others. This paper describes the knowledge retention model/approach and lessons learned from implementing the knowledge management programme in SG. (author

  11. Guidelines for development of NASA (National Aeronautics and Space Administration) computer security training programs

    Science.gov (United States)

    Tompkins, F. G.

    1983-01-01

    The report presents guidance for the NASA Computer Security Program Manager and the NASA Center Computer Security Officials as they develop training requirements and implement computer security training programs. NASA audiences are categorized based on the computer security knowledge required to accomplish identified job functions. Training requirements, in terms of training subject areas, are presented for both computer security program management personnel and computer resource providers and users. Sources of computer security training are identified.

  12. Emergency management and homeland security: Exploring the relationship.

    Science.gov (United States)

    Kahan, Jerome H

    2015-01-01

    In the years after the 9/11 tragedy, the United States continues to face risks from all forms of major disasters, from potentially dangerous terrorist attacks to catastrophic acts of nature. Professionals in the fields of emergency management and homeland security have responsibilities for ensuring that all levels of government, urban areas and communities, nongovernmental organizations, businesses, and individual citizens are prepared to deal with such hazards though actions that reduce risks to lives and property. Regrettably, the overall efficiency and effectiveness of the nation's ability to deal with disasters is unnecessarily challenged by the absence of a common understanding on how these fields are related in the workforce and educational arenas. Complicating matters further is the fact that neither of these fields has developed agreed definitions. In many ways, homeland security and emergency management have come to represent two different worlds and cultures. These conditions can have a deleterious effect on preparedness planning for public and private stakeholders across the nation when coordinated responses among federal, state, and local activities are essential for dealing with consequential hazards. This article demonstrates that the fields of emergency management and homeland security share many responsibilities but are not identical in scope or skills. It argues that emergency management should be considered a critical subset of the far broader and more strategic field of homeland security. From analytically based conclusions, it recommends five steps that be taken to bring these fields closer together to benefit more from their synergist relationship as well as from their individual contributions.

  13. Security management

    International Nuclear Information System (INIS)

    Adams, H.W.

    1990-01-01

    Technical progress is moving more and more quickly and the systems thus produced are so complex and have become so unclear to the individual that he can no longer estimate the consequences: Faith in progress has given way to deep mistrust. Companies have adjusted to this change in consciousness. An interesting tendency can be identified: technical security is already available - now the organization of security has become an important objective for companies. The key message of the book is: If outworn technical systems are no longer adequate, the organization must be thoroughly overhauled. Five chapters deal with the following themes: organization as an aspect of society; risk control; aspects of security; is there security in ADP; the broader concept of security. (orig./HP) [de

  14. The Importance of the Security Culture in SMEs as Regards the Correct Management of the Security of Their Assets

    Directory of Open Access Journals (Sweden)

    Antonio Santos-Olmo

    2016-07-01

    Full Text Available The information society is increasingly more dependent on Information Security Management Systems (ISMSs, and the availability of these kinds of systems is now vital for the development of Small and Medium-Sized Enterprises (SMEs. However, these companies require ISMSs that have been adapted to their special features, and which are optimized as regards the resources needed to deploy and maintain them. This article shows how important the security culture within ISMSs is for SMEs, and how the concept of security culture has been introduced into a security management methodology (MARISMA is a Methodology for “Information Security Management System in SMEs” developed by the Sicaman Nuevas Tecnologías Company, Research Group GSyA and Alarcos of the University of Castilla-La Mancha. for SMEs. This model is currently being directly applied to real cases, thus allowing a steady improvement to be made to its implementation.

  15. Information and knowledge management for sustainable forestry

    Science.gov (United States)

    Alan J. Thomson; Michael Rauscher; Daniel L. Schmoldt; Harald Vacik

    2007-01-01

    Institutional information and knowledge management often involves a range of systems and technologies to aid decisions and produce reports. Construction of a knowledge system organizing hierarchy facilitates exploration of the interrelationships among knowledge management, inventory and monitoring, statistics and modeling, and policy. Two case studies illustrate these...

  16. Measuring the ROI on Knowledge Management Systems.

    Science.gov (United States)

    Wickhorst, Vickie

    2002-01-01

    Defines knowledge management and corporate portals and provides a model that can be applied to assessing return on investment (ROI) for a knowledge management solution. Highlights include leveraging knowledge in an organization; assessing the value of human capital; and the Intellectual Capital Performance Measurement Model. (LRW)

  17. Knowledge of Practice: A Multi-sited Event Ethnography of Border Security Fairs in Europe and North America

    NARCIS (Netherlands)

    Baird, T.E.

    2017-01-01

    This article takes the reader inside four border security fairs in Europe and North America to examine the knowledge practices of border security professionals. Building on the border security as practice research agenda, the analysis focuses on the production, circulation, and consumption of scarce

  18. Managing domino effect-related security of industrial areas

    NARCIS (Netherlands)

    Reniers, Genserik L L; Dullaert, W.; Audenaert, Amaryllis; Ale, B. J.M.; Soudan, K.

    In chemical enterprises, security managers are interested in easy-to-handle and user-friendly decision-support tools, providing them with straightforward information ready for implementation. Therefore, a theoretical conceptualization on how to manage-in a relatively simple way-the prevention and

  19. Knowledge Transfer in Collaborative Knowledge Management: A Semiotic View

    Directory of Open Access Journals (Sweden)

    Norbert Jastroch

    2010-12-01

    Full Text Available Codification and transfer of knowledge is essential in the practice of knowledge management. Theoretical knowledge, like scientific theories and models, by nature comes in coded representation for the explicit purpose of transfer. Practical knowledge, as involved frequently in engineering or business operations, however, is a priori uncoded, making transfer for further use or the generation of new knowledge difficult. A great deal of systems engineering effort in recent years has been focused on resolving issues related to this sort of knowledge transfer. Semantic technologies play a major role in here, along with the development of ontologies. This paper presents a semiotic perspective on transfer of knowledge within collaborations.

  20. Nuclear knowledge management system in the regulatory activity

    International Nuclear Information System (INIS)

    Nosovskij, A.V.; Klevtsov, A.L.; Kravchenko, N.A.

    2010-01-01

    Important issues on collection, storage and spread of knowledge among organisation dealing with the use of nuclear technologies, role of close cooperation between enterprises and organizations in developing knowledge management, general requirements for creating a nuclear knowledge management system are considered. Recommendations and the main mechanisms are identified to create the knowledge management system in technical support organizations of the regulatory authority.

  1. Guidelines for developing NASA (National Aeronautics and Space Administration) ADP security risk management plans

    Science.gov (United States)

    Tompkins, F. G.

    1983-01-01

    This report presents guidance to NASA Computer security officials for developing ADP security risk management plans. The six components of the risk management process are identified and discussed. Guidance is presented on how to manage security risks that have been identified during a risk analysis performed at a data processing facility or during the security evaluation of an application system.

  2. Knowledge Management Enablers and Process in Hospital Organizations.

    Science.gov (United States)

    Lee, Hyun-Sook

    2017-02-01

    This research aimed to investigate the effects of knowledge management enablers, such as organizational structure, leadership, learning, information technology systems, trust, and collaboration, on the knowledge management process of creation, storage, sharing, and application. Using data from self-administered questionnaires in four Korean tertiary hospitals, this survey investigated the main organizational factors affecting the knowledge management process in these organizations. A total of 779 questionnaires were analyzed using SPSS 18.0 and AMOS 18.0. The results showed that organizational factors affect the knowledge management process differently in each hospital organization. From a managerial perspective, the implications of these factors for developing organizational strategies that encourage and foster the knowledge management process are discussed.

  3. Integrating technologies for effective knowledge management

    Energy Technology Data Exchange (ETDEWEB)

    Beaugrand, F.S.; Curtis, T.A. [Public Petroleum Data Model, PPDM Association, Calgary, AB (Canada)

    2002-06-01

    In order to succeed in today's business environment, effective knowledge management strategies are needed along with effective tools to solve real business problems. Relational databases provide accessible and practical tools that can be used to manage corporate knowledge assets. However, technology is growing so rapidly that it is difficult and too expensive for individual corporations to pursue each line of development independently. Collaborative efforts are needed to improve access to shared knowledge. The PPDM Association is an international not for profit standards body that is working collaboratively with the petroleum exploration and production industry to develop standards for managing data and knowledge, spatially enabling data, standardizing data content and data exchange. The PPDM Association provides a vendor-neutral environment for development, technical support and a methodology for designing, developing and publishing technical deliverables.

  4. Identity and Access Management and Security in Higher Education.

    Science.gov (United States)

    Bruhn, Mark; Gettes, Michael; West, Ann

    2003-01-01

    Discusses the drivers for an identity management system (IdM), components of this system, and its role within a school security strategy, focusing on: basic access management; requirements for access management; middleware support for an access management system; IdM implementation considerations (e.g., access eligibilities, authentication…

  5. Planning and Nuclear Knowledge Management

    International Nuclear Information System (INIS)

    Grance Torales, V.L.; Lira, L.

    2016-01-01

    Full text: The present case aims to share the experience of the Intellectual Capital Section (ICS), part of Planning, Coordination and Control Department of the Argentine Atomic Energy Commission (CNEA) in its search for a sustainable knowledge management. Among the strategic objectives included in CNEA’s Strategic Plan (SP), is the development, preservation and transference of knowledge and experience. Under this framework, the role initially assumed by the ICS, consisted on the observation and diagnosis of the situation of the Institutional Human Capital (HC), through the study of the main characteristics of the staff of CNEA. The second stage of SP (2015–2025), which consisted of updating the HC data, the incorporation of the concept of “knowledge management” was approved by the authorities of the Institution. Based on this background, in 2016 the objectives of the ICS are aimed at organizing and coordinating a network of knowledge management that involves the entire organization. This new phase implies, among other things, the proposal of a knowledge management policy, interaction with other sectors of CNEA for implementation, analysis of the tools to be used, in order to determine a way and work style that suits the culture and structure of the organization. (author

  6. Security Attributes Based Digital Rights Management

    NARCIS (Netherlands)

    Chong, C.N.; van Buuren, R.; van Buuren, R.F.; Hartel, Pieter H.; Kleinhuis, Geert; Boavida, F.; Monteiro, E.; Orvalho, J.

    2002-01-01

    Most real-life systems delegate responsibilities to different authorities. We apply this model to a digital rights management system, to achieve flexible security. In our model a hierarchy of authorities issues certificates that are linked by cryptographic means. This linkage establishes a chain of

  7. An Overview of Economic Approaches to Information Security Management

    NARCIS (Netherlands)

    Su, X.

    The increasing concerns of clients, particularly in online commerce, plus the impact of legislations on information security have compelled companies to put more resources in information security. As a result, senior managers in many organizations are now expressing a much greater interest in

  8. Wikis as the Knowledge Management Tools in Organizations

    Directory of Open Access Journals (Sweden)

    Hossein Pashaeizad

    2012-02-01

    Full Text Available In an attempt to enhance knowledge, firms and corporations have been overwhelmed with assorted methods for retaining employee wisdom. To pay attention to the benefits of a successful knowledge management program can help create competitive advantage. Therefore, numerous knowledge management solutions have been developed and implemented. Some of these knowledge management initiatives provide a means to accumulate, organize, and access the firm’s most essential asset. With the advent and spread of information and communication technologies, especially Internet, social software and communication tools has risen to the challenge of capturing knowledge with a variety of methods. One of these tools is wiki that provides a new way of collaboration and knowledge sharing. Wiki is a software that allows users to work collectively on a web-based knowledge base. This paper reviews the role of wikis in knowledge creation and management

  9. The importance of knowledge clusters as strategy to facilitate knowledge management among organizations

    Directory of Open Access Journals (Sweden)

    Alonso Perez-Soltero

    2009-02-01

    Full Text Available Organizational knowledge has always been an important subject, but in the last years this issue has acquired a greater importance, due to factors like the development of information technologies, scientific advances and global competition, among others. Knowledge management goes beyond the identification, creation, sharing and use of knowledge within organizations; a new approach is to exchange and share experience and knowledge between organizations. The objective of this article is to present the importance of knowledge clusters as a structure and strategy to facilitate knowledge management between organizations associated to specific and interconnected sectors by common and complementary practices. According to the developed expositions and shown evidences of success in this work, it is possible to conclude that knowledge clusters represent a good strategy to manage knowledge among organizations as well as a competitiveness improvement strategy.

  10. Strategic knowledge management: a methodology for structuring and analysing knowledge resources

    International Nuclear Information System (INIS)

    Ricciardi, Rita Izabel

    2009-01-01

    This work presents a methodology to organize, to classify and to assess the knowledge resources of an organization. This methodology presents an innovative integration of the following elements: (a) a systemic vision of the organization; (b) a representation maps of organization strategy; (c) the identification of relevant knowledge through process analysis; (d) the reconfiguration and representation of the identified knowledge in maps; (e) a combination of critical analysis (importance and vulnerability) and of strategic analysis to assess knowledge. Such methodology was applied to the Radiopharmaceutical Center of Nuclear and Energetic Research Institute resulting in a very rich vision and understanding of the knowledge domains that are crucial to the CR. This kind of analysis has allowed a sharp perception of the knowledge problems of the Center and has also made visible the needed connections between Strategic Management and Knowledge Management. (author)

  11. Data Security Measures in the IT Service Industry: A Balance between Knowledge & Action

    Directory of Open Access Journals (Sweden)

    N. Mlitwa

    2008-12-01

    Full Text Available That knowledge is power is fast becoming a cliche within the intelligentsia. Such power however, depends largely on how knowledge itself is exchanged and used, which says a lot about the tools of its transmission, exchange, and storage. Information and communication technology (ICT plays a significant role in this respect. As a networked tool, it enables efficient exchanges of video, audio and text data beyond geographical and time constraints. Since this data is exchanged over the worldwide web (www, it can be accessible by anyone in the world using the internet. The risk of unauthorised access, interception, modification, or even theft of confidential information, leading to financial losses in information dependant competitive institutions is therefore high. Improving efficiencies through ICT therefore, comes with security responsibilities. The problem however is that most organizations tend to focus on task-enhancing efficiencies and neglect security. Possibly due to limited awareness about security, underestimating the problem, concerns about security costs, or through plain negligence. The activity theory of Engestrm and the activity analysis development framework of Mursu et al are used as analytical lenses to the cybercrime challenge in this paper. A practical case study of Company X, an IT service provider in Malawi is then used to understand the extent to which organisations that offer electronic data solutions prioritise security in their operations. It is found that even better informed organisations fall short in taking adequate data security measures. A recommendation for all organisations is that they should not only have a clear policy, but also ensure that it is routinely and consistently implemented throughout the operations if information capital is to be secured. A framework towards a holistic approach to thinking about, and in addressing cybercrime is suggested, and recommended in the paper.

  12. Nuclear knowledge management at the IAEA

    International Nuclear Information System (INIS)

    Yanev, Y.

    2004-01-01

    Nuclear Knowledge Management as a part of the IAEA mission and its aim to help organizations to achieve competitive advantage; costs reduction; accelerated time to market in companies and large private sector organisations; innovation, supports error free decision making are discussed. The most important outputs such as nuclear knowledge management methodology; identifying endangered areas of nuclear science and technology; developing knowledge repositories; knowledge preservation technology; dedicated projects with Member States, (Atucha, Angra, KNK2, ) are presented. A brief review of the currently implemented with Agency's assistance project ANENT (Asian Network for Education in Nuclear Technology) is also given

  13. IMPORTANCE OF KNOWLEDGE MANAGEMENT FOR COMPANIES

    OpenAIRE

    Vivian Toledo Santos Gambarato; Pâmela Gimenez Mateus; Renato Luiz Gambarato

    2015-01-01

    This work addressed the importance of knowledge management as a strategy for the survival of companies in the market. It have been shown the talent retention concepts, people management, intellectual capital and technologies related to knowledge management, in the view of several authors, in order to prove the importance of these issues can provide organizations. A survey of companies was performed, which showed part of your reality with respect to talent retention practice and...

  14. Applying a Knowledge Management Taxonomy to Secondary Schools

    Science.gov (United States)

    Thambi, Melinda; O'Toole, Paddy

    2012-01-01

    The purpose of this article is to examine the relevance of a corporate-based taxonomy of knowledge management to secondary schooling. Do the principles of knowledge management from the corporate world translate to the world of education; specifically, secondary schooling? This article examines categories of knowledge management articulated in…

  15. The nuclear knowledge management: challenges and perspectives

    International Nuclear Information System (INIS)

    Gonzalez Garcia, Alejandro; Fernandez Rondon, Manuel

    2007-01-01

    The knowledge management has a one of its goals to keep and to drive the key organizational competence's to the development of products and services with high scientific and technological value, as proactive reply to a dynamic and complex environment. The International Atomic Energy Agency and nuclear institutions of Member Countries recognize that the pacific use of nuclear technology is supported on the nuclear knowledge collection and that its effective management is oriented to guarantee the continuos availability of scientific and technological information and high qualified people. Recently some nuclear Cuban institutions have started some projects to implement nuclear and organizational knowledge management process. In this paper some challenges and perspectives are presented for the nuclear knowledge management in Cuba and in the world context

  16. A new paradigm of knowledge management: Crowdsourcing as ...

    African Journals Online (AJOL)

    A new paradigm of knowledge management: Crowdsourcing as emergent research and development. ... Southern African Business Review ... Drawing from knowledge management theory, this paper argues that the knowledge aggregation ...

  17. Designing a fuzzy expert system for selecting knowledge management strategy

    Directory of Open Access Journals (Sweden)

    Ameneh Khadivar

    2014-12-01

    Full Text Available knowledge management strategy is mentioned as one of the most important success factors for implementing knowledge management. The KM strategy selection is a complex decision that requires consideration of several factors. For evaluation and selection of an appropriate knowledge management strategy in organizations, many factors must be considered. The identified factors and their impact on knowledge management strategy are inherently ambiguous. In this study, an overview of theoretical foundations of research regarding the different knowledge management strategies has been done And factors influencing the knowledge management strategy selection have been extracted from conceptual frameworks and models. How these factors influence the knowledge management strategy selection is extracted through the fuzzy Delphi. Next a fuzzy expert system for the selection of appropriate knowledge management strategy is designed with respect to factors that have an impact on knowledge management strategy. The factors which influence the selection of knowledge management strategy include: general business strategy, organizational structure, cultural factors, IT strategy, strategic human resource management, social level, the types of knowledge creation processes and release it. The factors which influence the knowledge management strategy selection include: business strategy general, organizational structure, cultural factors, IT strategy, human resource management strategies, socialization level, knowledge types and its creation and diffusion processes. According to identified factors which affect the knowledge management strategy, the final strategy is recommended based on the range of human-oriented and system-oriented by keep the balance of explicit and implicit knowledge. The Designed system performance is tested and evaluated by the information related to three Iranian organization.

  18. Identifikasi Informasi perguruan tinggi negeri dengan model knowledge management

    Directory of Open Access Journals (Sweden)

    Abu Anwar

    2014-08-01

    Full Text Available In theory and practice, knowledge management (knowledge management is part of the strategy implementation process. Knowledge management is a systematic action to identify, document, and distribute all Solving. The involvement of administrative management knowledge, both top level, middle, or bottom becomes a very important thing. Well in detecting the problem, generating solutions, evaluating the decision to apply the knowledge that has been tested as a product and service in the implementation of strategy. This activity can be used to make the issues become clearer and under proper supervision. Despite the heavy dotted knowledge management to “technology“, in this case the role of “man“ needs to be taken into account in order to complete the process of knowledge management integrating various angles between technology, human strategies through four areas to view. However, the hypothesis of cause and effect of the method can be used as a basis for understanding knowledge management and implementation.

  19. Knowledge Management in the IAEA Department of Safeguards

    International Nuclear Information System (INIS)

    Carrillo-de-Fischer, J.; Martinez, J. D.; Konecni, S.

    2015-01-01

    Knowledge management is the discipline of enabling individuals and teams to collectively and systematically create, share and apply knowledge. The most important assets in the IAEA Department of Safeguards are people and their knowledge. The focus of the Department’s knowledge management activities are to create an environment within which people share, learn and work together. The efforts to manage the knowledge of an individual leaving the Department have been focused on helping the supervisor of the departing staff member to identify what critical knowledge needs to be retained, and how to retain that knowledge. The Safeguards Knowledge Management team developed a person-centred approach. This approach involves interviews with the staff member, co-workers and/or customers to identify the critical knowledge to be transferred. Although time consuming, this method has been found to be effective in capturing the needed knowledge. This approach has four steps: – Identify the critical knowledge to be retained; – Select the knowledge transfer methods; – Apply the knowledge transfer methods; and – Assess and refine the transfer process. The paper will describe the person-centred approach and lessons learned from implementing this programme in the Department over several years. (author)

  20. Nuclear education, training and knowledge management in Europe

    Energy Technology Data Exchange (ETDEWEB)

    Beeley, Phil; Slugen, Vladimir; Kyrki-Rajamaeki, Rita [European Nuclear Society ENS, Brussels (Belgium). ENS High Scientific Council

    2010-04-15

    The situation in the nuclear education today is complex as it relates to nuclear technology for both peaceful and security applications. After more than 20 years period of depression in nuclear facility construction (significant mainly in Europe and USA), there is strong renewed interest in nuclear-generated electricity. Many factors have contributed to ''nuclear renaissance'' including concerns about possible climate changes due to carbon emissions. The Nuclear Energy Agency (OECD/NEA) study in 2000, ''Nuclear Education and Training. Cause for Concern'', highlighted the necessity for a renaissance in nuclear education and training with some recommendations. The European Nuclear Energy Forum (ENEF) identified the nuclear education as one of highest risks in nuclear industry. The nuclear renaissance depends on the increased number of engineers properly educated in wide spectrum of nuclear disciplines. The world has responded. Networks have been established to respond to the necessity to maintain and perpetuate nuclear knowledge in order to provide a suitably qualified workforce for the future operation of nuclear power plants. The quality in Education, Training and Knowledge Management (ETKM) is strongly influenced and supported by development of nuclear research, exploitation of experimental and training facilities, existence of proper education and training networks, software tools, distance and e-learning and a variety of knowledge management activities. The projected global annual requirements for new nuclear engineers over the next 10 years will challenge existing academic and training institutions with respect to capacity and load factors on classrooms, laboratories and other facilities such as basic principles simulators. Additionally, the nuclear academic workforce may need to increase to meet the demand for educating/training the new industrial workforce and this will take time. Within the European context many of the

  1. Nuclear education, training and knowledge management in Europe

    International Nuclear Information System (INIS)

    Beeley, Phil; Slugen, Vladimir; Kyrki-Rajamaeki, Rita

    2010-01-01

    The situation in the nuclear education today is complex as it relates to nuclear technology for both peaceful and security applications. After more than 20 years period of depression in nuclear facility construction (significant mainly in Europe and USA), there is strong renewed interest in nuclear-generated electricity. Many factors have contributed to ''nuclear renaissance'' including concerns about possible climate changes due to carbon emissions. The Nuclear Energy Agency (OECD/NEA) study in 2000, ''Nuclear Education and Training. Cause for Concern'', highlighted the necessity for a renaissance in nuclear education and training with some recommendations. The European Nuclear Energy Forum (ENEF) identified the nuclear education as one of highest risks in nuclear industry. The nuclear renaissance depends on the increased number of engineers properly educated in wide spectrum of nuclear disciplines. The world has responded. Networks have been established to respond to the necessity to maintain and perpetuate nuclear knowledge in order to provide a suitably qualified workforce for the future operation of nuclear power plants. The quality in Education, Training and Knowledge Management (ETKM) is strongly influenced and supported by development of nuclear research, exploitation of experimental and training facilities, existence of proper education and training networks, software tools, distance and e-learning and a variety of knowledge management activities. The projected global annual requirements for new nuclear engineers over the next 10 years will challenge existing academic and training institutions with respect to capacity and load factors on classrooms, laboratories and other facilities such as basic principles simulators. Additionally, the nuclear academic workforce may need to increase to meet the demand for educating/training the new industrial workforce and this will take time. Within the European context many of the programmes will continue through

  2. The Status Quo of Ontology Learning from Unstructured Knowledge Sources for Knowledge Management

    OpenAIRE

    Scheuermann , Andreas; Obermann , Jens

    2012-01-01

    International audience; In the global race for competitive advantage Knowledge Management gains increasing importance for companies. The purposeful and systematic creation, maintenance, and transfer of unstructured knowledge sources demands for advanced Information Technology. Ontologies constitute a basic ingredient of Knowledge Management; thus, ontology learning from unstructured knowledge sources is of particular interest since it bears the potential to bring significant advantages for Kn...

  3. Nuclear knowledge management - The role of the IAEA

    International Nuclear Information System (INIS)

    Yanko Yanev

    2006-01-01

    A recognized, threat for sustaining nuclear competence for quite a time has been the declining interest in the wide scale use of nuclear energy. This has been exacerbated by a marked decline in the number of appropriately qualified young nuclear professionals to preserve and further develop the accumulated nuclear knowledge and expertise. While any nuclear resurgence is not a foregone conclusion, the loss of institutional memory of nuclear knowledge in governments, organizations and research institutes could become the precursor of problems in nuclear safety and in non-proliferation. Loss of nuclear expertise could also negatively affect future potential to apply nuclear techniques and methods in important areas such as medicine, agriculture, hydrology and food preservation, especially in developing countries. Therefore, the decline in the number of younger people studying nuclear sciences and a growing number of universities giving up their nuclear education programs have given rise to understandable concerns and attention on behalf of governments, industry and academic institutions. The IAEA has responded to these concerns by establishing a dedicated programme on Nuclear Knowledge Management and by initiating a number of activities, which address different aspects of this problem. In the last three years the primary focus of the Agency knowledge management activities has been on working with the Member States to better understand their needs in managing nuclear related knowledge and information, both in terms of succession planning and knowledge preservation. The meeting of Senior Officials in June 2002, called by the DG, the Scientific Forum in 2003 and the Nuclear Knowledge Management International Conference in September 2004 in Saclay, France have marked important milestones in developing the Agency approach to nuclear knowledge management. The results and achievements of the Agency's 'nuclear knowledge management initiative' have been receiving wide support

  4. Security Attributes Based Digital Rights Management

    NARCIS (Netherlands)

    Chong, C.N.; van Buuren, R.; Hartel, Pieter H.; Kleinhuis, Geert

    ost real-life systems delegate responsibilities to di�erent authorities. We apply this model to a dig- ital rights management system, to achieve exible security. In our model a hierarchy of authorities issues certi�cates that are linked by cryptographic means. This linkage establishes a chain of

  5. Using VO Concept for Managing Dynamic Security Associations

    NARCIS (Netherlands)

    Demchenko, Y.; Gommans, L.; de Laat, C.T.A.M.

    2006-01-01

    This research paper presents results of the analysis how the Virtual Organisation (VO) concept can be used for managing dynamic security associations in collaborative applications and for complex resource provisioning. The paper provides an overview of the current practice in VO management at the

  6. The Effect of Information Security Management on Organizational Processes Integration in Supply Chain

    OpenAIRE

    Mohsen Shafiei Nikabadi; Ahmad Jafarian; Azam Jalili Bolhasani

    2012-01-01

    : The major purpose of this article was that how information security management has effect on supply chain integration and the effect of implementing "information security management system" on enhancing supplies chain integration. In this respect, current research was seeking a combination overview to these tow approaches (Information Security Management and Organizational Processes Integration by Enterprise Resources Planning System) and after that determined factors of these two import...

  7. Turning Knowledge into Success: The Role of Collaboration in Knowledge Management Implementation

    Science.gov (United States)

    Hizmetli, Handan

    2014-01-01

    This case study describes five phases that a community college went through in developing its use of knowledge management practices to improve their student outcomes and recommends how other colleges can similarly benefit from knowledge management in meeting their goals.

  8. eDOC : A collaboration infrastructure to manage knowledge and information on nuclear projects and research activities

    International Nuclear Information System (INIS)

    Van Craeynest, J.M.; Jacquemet, F.; Chermette, D.; Bonneau, S.

    2004-01-01

    One of EU's strategic goals was launched at Lisbon 2000 European summit: becoming the most competitive knowledge economy by 2010. In the field of nuclear technologies, we know that capitalizing knowledge and acquired experience is vital to preserve nuclear equipment's' safe use in the future. Knowledge Management encompasses various domains of business practices, relating to human resources management, information, information technologies, strategy, and accounting. Facing such complex issues, especially in R and D organizations, knowledge management cannot only stand on a few organizational or technical solutions. All functions must be involved to achieve those strategic objectives: management must find realistic incentives and inscribe Knowledge Management as a core management objective (just as Quality Insurance has been). Human Resources departments and education institutes can benefit from new technologies to improve training methods. Research units have to launch knowledge capitalization projects to retrieve, save and transfer critical knowledge, technical skills and know-how. An a-posteriori knowledge saving 'fireman-type' action must be done in the case of major events but we must promote an on-going capitalization effort as well and embed KM into projects and activities management methods. This effort during the project and afterwards is implemented through a perennial information system. This information system should provide a wide range of services for scientific publications and patents management, corporate or local knowledge bases and document repositories, project management and collaboration, rich media authoring, etc. Implementing virtual workspaces with eDOC Research and engineering activities are more and more cross-organizations funded and netlike organized. Furthermore, it is very difficult for project managers to deal with security constraints as they must share but protect knowledge as well. Before sharing information, teams have to share a

  9. Knowledge management implementation and the tools utilized in ...

    African Journals Online (AJOL)

    Knowledge management implementation and the tools utilized in healthcare for ... a knowledge driven process and thus knowledge management and the tools to ... health record systems, communities of practice and advanced care planning.

  10. Knowledge management for efficient quantitative analyses during regulatory reviews.

    Science.gov (United States)

    Krudys, Kevin; Li, Fang; Florian, Jeffry; Tornoe, Christoffer; Chen, Ying; Bhattaram, Atul; Jadhav, Pravin; Neal, Lauren; Wang, Yaning; Gobburu, Joga; Lee, Peter I D

    2011-11-01

    Knowledge management comprises the strategies and methods employed to generate and leverage knowledge within an organization. This report outlines the activities within the Division of Pharmacometrics at the US FDA to effectively manage knowledge with the ultimate goal of improving drug development and advancing public health. The infrastructure required for pharmacometric knowledge management includes provisions for data standards, queryable databases, libraries of modeling tools, archiving of analysis results and reporting templates for effective communication. Two examples of knowledge management systems developed within the Division of Pharmacometrics are used to illustrate these principles. The benefits of sound knowledge management include increased productivity, allowing reviewers to focus on research questions spanning new drug applications, such as improved trial design and biomarker development. The future of knowledge management depends on the collaboration between the FDA and industry to implement data and model standards to enhance sharing and dissemination of knowledge.

  11. SOME CONCEPTUAL PROPERTIES FOR KNOWLEDGE MANAGEMENT SYSTEMS DESIGN

    Directory of Open Access Journals (Sweden)

    Vasile MAZILESCU

    2005-01-01

    Full Text Available Knowledge Management Systems (KMS are important tools by which organizations can better useinformation and, more importantly, manage knowledge. Unlike other strategies, knowledge management (KM isdifficult to define because it encompasses a range of concepts, management tasks, technologies, and organizationalpractices, all of which come under the umbrella of the information management. Semantic approaches alloweasier and more efficient training, maintenance, and support knowledge. Current ICT markets are dominated byrelational databases and document-centric information technologies, procedural algorithmic programmingparadigms, and stack architecture. A key driver of global economic growth in the coming decade is the build-out ofbroadband telecommunications and the deployment of intelligent services bundling. This paper introduces themain characteristics of an Intelligent Knowledge Management System as a multi-agent system used in a LearningControl Problem (IKMSLCP. We describe an intelligent KM framework, allowing the observer (a human agentto learn from experience.

  12. Contextualisation: An exercise in knowledge management and transfer

    CSIR Research Space (South Africa)

    Botha, Adele

    2017-06-01

    Full Text Available 6 References Alguezaui, S., & Filieri, R. (2014). A knowledge-based view of the extending enterprise for enhancing a collaborative innovation advantage. International Journal of Agile Systems and Management, 7(2), 116-131. Amidon, D. M. (1996...–a lightning talk. Paper presented at the IFIP International Conference on Open Source Systems. Lee, M.-C. (2016). Knowledge management and innovation management: best practices in knowledge sharing and knowledge value chain. International Journal...

  13. The role of knowledge management in supply chain management: A literature review

    International Nuclear Information System (INIS)

    Pérez-Salazar, María del Rosario; Lasserre, Alberto Alfonso Aguilar; Cedillo-Campos, Miguel Gastón; González, José Carlos Hernández

    2017-01-01

    The aim of this paper is to examine the state of knowledge management research in supply chain management from three standpoints, methodological approach, supply chain management area, and knowledge management processes. Design/methodology/approach: To achieve this, a systematic review is conducted over the period 2000-2014 on the basis of a qualitative content analysis. Findings: Major results showed that knowledge management can be viewed as a leverage mechanism for: (i) supply chain integration; (ii) the enhancement of intra and inter-relations across the supply chain; (iii) supply chain strategy alignment; and (iv) the reinforcement of knowledge transfer in product development. Some supply chain management areas such as reverse logistics, inventory management, forecasting/demand planning, outsourcing, and risk management have been explored only to some extent. Furthermore, knowledge transfer is being studied in the majority of the articles, mainly by both case study and survey approach; mathematical models and simulation techniques are used in very limited articles. Findings concerning theoretical perspectives and managerial issues are also described. Research limitations/implications: The limitation of our study encompasses the aspects of search period (2000-2014), selection of search databases (Web of Science and SCOPUS and language selection (English). Practical implications: The exhibition of the KM processes within the SC context may help practitioners and managers interested in implementing KM initiatives to replicate the methodologies in order to increase the possibilities of a successful KM adoption. Originality/value: The systematic review will contribute to the understanding of the present state of research in the knowledge management theory, with focus on the supply chain, as there are no state-of-knowledge studies that report a systematic literature review approach.

  14. The role of knowledge management in supply chain management: A literature review

    Energy Technology Data Exchange (ETDEWEB)

    Pérez-Salazar, María del Rosario; Lasserre, Alberto Alfonso Aguilar; Cedillo-Campos, Miguel Gastón; González, José Carlos Hernández

    2017-07-01

    The aim of this paper is to examine the state of knowledge management research in supply chain management from three standpoints, methodological approach, supply chain management area, and knowledge management processes. Design/methodology/approach: To achieve this, a systematic review is conducted over the period 2000-2014 on the basis of a qualitative content analysis. Findings: Major results showed that knowledge management can be viewed as a leverage mechanism for: (i) supply chain integration; (ii) the enhancement of intra and inter-relations across the supply chain; (iii) supply chain strategy alignment; and (iv) the reinforcement of knowledge transfer in product development. Some supply chain management areas such as reverse logistics, inventory management, forecasting/demand planning, outsourcing, and risk management have been explored only to some extent. Furthermore, knowledge transfer is being studied in the majority of the articles, mainly by both case study and survey approach; mathematical models and simulation techniques are used in very limited articles. Findings concerning theoretical perspectives and managerial issues are also described. Research limitations/implications: The limitation of our study encompasses the aspects of search period (2000-2014), selection of search databases (Web of Science and SCOPUS and language selection (English). Practical implications: The exhibition of the KM processes within the SC context may help practitioners and managers interested in implementing KM initiatives to replicate the methodologies in order to increase the possibilities of a successful KM adoption. Originality/value: The systematic review will contribute to the understanding of the present state of research in the knowledge management theory, with focus on the supply chain, as there are no state-of-knowledge studies that report a systematic literature review approach.

  15. The role of knowledge management in supply chain management: A literature review

    Directory of Open Access Journals (Sweden)

    María del Rosario Pérez-Salazar

    2017-10-01

    Full Text Available Purpose: The aim of this paper is to examine the state of knowledge management research in supply chain management from three standpoints, methodological approach, supply chain management area, and knowledge management processes. Design/methodology/approach: To achieve this, a systematic review is conducted over the period 2000-2014 on the basis of a qualitative content analysis. Findings: Major results showed that knowledge management can be viewed as a leverage mechanism for: (i supply chain integration; (ii the enhancement of intra and inter-relations across the supply chain; (iii supply chain strategy alignment; and (iv the reinforcement of knowledge transfer in product development. Some supply chain management areas such as reverse logistics, inventory management, forecasting/demand planning, outsourcing, and risk management have been explored only to some extent. Furthermore, knowledge transfer is being studied in the majority of the articles, mainly by both case study and survey approach; mathematical models and simulation techniques are used in very limited articles. Findings concerning theoretical perspectives and managerial issues are also described. Research limitations/implications: The limitation of our study encompasses the aspects of search period (2000-2014, selection of search databases (Web of Science and SCOPUS and language selection (English. Practical implications: The exhibition of the KM processes within the SC context may help practitioners and managers interested in implementing KM initiatives to replicate the methodologies in order to increase the possibilities of a successful KM adoption. Originality/value: The systematic review will contribute to the understanding of the present state of research in the knowledge management theory, with focus on the supply chain, as there are no state-of-knowledge studies that report a systematic literature review approach.

  16. Nuclear knowledge management overview at EDF

    International Nuclear Information System (INIS)

    Ballay, J.; Vannieuwenhuyse, J.; Nups, A.

    2004-01-01

    This paper gives an overview of knowledge management practices within the French nuclear generation park. The study was initially partnered by one of the 19 Nuclear Power-plants, located at Golfech near Toulouse, and then extended to a more general overview. Golfech is a 650 people unit, from which 25 of them were interviewed to carry out the study. This staff was made of managers, experts, seniors and juniors, all of them being working at Golfech in the different skills for nuclear generation needs: driving, engineering, maintenance, safety, environment, etc. They were questioned about their practices, tools and organisations concerning creating, sharing, transferring, and renewing knowledge. A general knowledge management model was derived from this study. It shows that the professional knowledge, in any industrial sector, is the result of four learning processes: an education-oriented process, a codified and normative learning process, a context-based collective learning process and an experience-based individual learning process. These learning processes inter-operate through any kind of activity, and they induce four knowledge structures: the basic knowledge, the technical knowledge, the know-how and the experiential knowledge. In conclusion, the model explains how the firm learns and, in the same time, how everybody as a single individual learns. It is a crucial point to understand how the knowledge-based economy runs, as a constant interconnection between two opposite but complementary forces: the collective and the individual ones. (author)

  17. BUSINESS PROCESS MODELLING: A FOUNDATION FOR KNOWLEDGE MANAGEMENT

    Directory of Open Access Journals (Sweden)

    Vesna Bosilj-Vukšić

    2006-12-01

    Full Text Available Knowledge management (KM is increasingly recognised as a strategic practice of knowledge-intensive companies, becoming an integral part of an organisation's strategy to improve business performance. This paper provides an overview of business process modelling applications and analyses the relationship between business process modelling and knowledge management projects. It presents the case study of Croatian leading banks and the insurance company, discussing its practical experience in conducting business process modelling projects and investigating the opportunity for integrating business process repository and organisational knowledge as the foundation for knowledge management system development.

  18. Homeland Security. Management Challenges Facing Federal Leadership

    National Research Council Canada - National Science Library

    2002-01-01

    ...) and the Office of Personnel Management (OPM). Additionally, due to the dynamic and evolving nature of the government's homeland security activities, some of our work described in this report has already appeared in congressional testimony...

  19. Knowledge management at the IAEA - Challenges and opportunities

    International Nuclear Information System (INIS)

    Yanev, Y.L.; Cherif, S.

    2004-01-01

    Full text: 'Knowledge Management caters to the critical issues of organizational adaptation, survival and competence in face of increasingly discontinuous change of environment. Essentially, it embodies organizational processes that seek synergistic combination of data and information processing capacity of information technologies, and the creative and innovative capacity of human beings' (Malhotra 1997). International organizations are coming to view knowledge as their most valuable and strategic resource, and bringing that knowledge to bear on problems and opportunities as their most important capability. It is being realised that to remain geared to the evolving needs of their Member States it is a must to explicitly manage all intellectual resources and capabilities of the organization. To this end, many international organizations have initiated a range of knowledge management projects and programs. The primary focus of these efforts has been on developing new applications of information technology to support the digital capture, storage, retrieval and distribution of an organization's documented knowledge but also capturing valuable tacit knowledge existing within peoples' heads, augmented or shared via interpersonal interaction and social relationships. Numerous technical and organizational initiatives have been aligned and integrated, providing a comprehensive infrastructure to support knowledge management processes. But while the appropriate infrastructure can enhance an organization's ability to create and exploit knowledge, it does not insure that the organization is making the best investment of its resources or that it is managing the right knowledge in the right way. Against the background of these trends and the opportunities and challenges they present, the Agency has been active in establishing knowledge management as a crosscutting activity that includes both assisting Member States in managing their own nuclear knowledge assets but also in

  20. Towards Knowledge Management for Smart Manufacturing.

    Science.gov (United States)

    Feng, Shaw C; Bernstein, William Z; Hedberg, Thomas; Feeney, Allison Barnard

    2017-09-01

    The need for capturing knowledge in the digital form in design, process planning, production, and inspection has increasingly become an issue in manufacturing industries as the variety and complexity of product lifecycle applications increase. Both knowledge and data need to be well managed for quality assurance, lifecycle-impact assessment, and design improvement. Some technical barriers exist today that inhibit industry from fully utilizing design, planning, processing, and inspection knowledge. The primary barrier is a lack of a well-accepted mechanism that enables users to integrate data and knowledge. This paper prescribes knowledge management to address a lack of mechanisms for integrating, sharing, and updating domain-specific knowledge in smart manufacturing. Aspects of the knowledge constructs include conceptual design, detailed design, process planning, material property, production, and inspection. The main contribution of this paper is to provide a methodology on what knowledge manufacturing organizations access, update, and archive in the context of smart manufacturing. The case study in this paper provides some example knowledge objects to enable smart manufacturing.

  1. knowledge management practices in higher learning institutions

    African Journals Online (AJOL)

    user

    Knowledge Management (KM) Practices in Institutions of Higher Learning in .... quality and skills to cope with the labour market demands. .... Total. 44. 100.0. Source: Field Data (2012/13). Staff's Level of Awareness of Knowledge Management.

  2. 8th International Conference on Knowledge Management in Organizations : Social and Big Data Computing for Knowledge Management

    CERN Document Server

    Wang, Leon; Rodríguez, Juan; Yang, Hsin-Chang; Ting, I-Hsien

    2014-01-01

    The proceedings from the  eighth KMO conference represent the findings of this international meeting which brought together researchers and developers from industry and the academic world to report on the latest scientific and technical advances on knowledge management in organizations. This conference provided an international forum for authors to present and discuss research focused on the role of knowledge management for innovative services in industries, to shed light on recent advances in social and big data computing for KM as well as to identify future directions for researching the role of knowledge management in service innovation and how cloud computing can be used to address many of the issues currently facing KM in academia and industrial sectors.

  3. Knowledge management - A key issue for EnBW

    International Nuclear Information System (INIS)

    Zimmer, H.J.

    2007-01-01

    Full text: The motivation for knowledge management can be summarised with the words of EnBW CEO Prof. Claassen, 2002 'knowledge manager of the year' in Germany: 'Against the backdrop of the ever-increasing complexity of strategic planning and activities on the operational front, knowledge management is a key factor in the long-term success of our business.' Professional knowledge management motivates and supports employees, helping to create networks in which they can lay the foundations for the future success of the company. It must be emphasised that knowledge management is the responsibility of management, and EnBW has established a suitable framework consisting of different action levels and goals: 1) Normative level (corporate culture): creating a knowledge-aware and knowledge-friendly corporate culture 2) Strategic level (human resources): systematic gearing of internal intangible potentials towards future requirements. 3) Operational level (information/communication): making the required knowledge available in the necessary scope and quality, in the right place and at the right time. If knowledge management can generally be seen as basic requirement for successful companies, then it is even more important for nuclear operators. Today, nuclear energy is an important generating technology in Europe, for Germany and for EnBW with major future potential, but a technology that must be employed with great caution and attaching top priority to safe operation. For nuclear operators, the rule is always 'safety first'. But knowledge management implemented and used in the right way can also enhance both safety and competitive operation of the plants at the same time. In this connection, successful knowledge management plays a key role due to the complex interplay of many different disciplines within a demanding legal and regulatory framework, the paramount importance of collective past experience and the high demands on the expertise of the employees operating nuclear

  4. Reflexivity, Knowledge and the Management of Potential Innovation

    DEFF Research Database (Denmark)

    Bordum, Anders

    2005-01-01

    In this article I will interpret John Deweys perspective on reflective thinking as if he were a philosopher of innovation management. From his pragmatist point of departure, the problems involved in knowledge-processes relevant to innovation are analysed and reconceptualised. On the basis...... of the analysis I attempt to identify some categories of general applicability when understanding, designing, and managing radical innovation processes. These categories are useful to conceptualise and talk about innovation, when knowledge is taken seriously, and when managing innovation is also understood...... as managing the production of new knowledge, that is of making the unjustified justified, and the unknown known. Keywords: Reflexivity, reflective thought, radical innovation, innovation management, potential innovation, Plato, John Dewey, epistemology, knowledge....

  5. Analysis on the Management of College Teachers' Tacit Knowledge

    Science.gov (United States)

    Zhang, Linying; Han, Zhijun

    2008-01-01

    Knowledge management, especially, tacit knowledge management, is a significant guarantee for the sustainable development of universities. The transfer of college teachers' tacit knowledge is the key and difficult point in tacit knowledge management of universities. This paper starts from the existence and application condition of college teachers'…

  6. Restaurant manager and worker food safety certification and knowledge.

    Science.gov (United States)

    Brown, Laura G; Le, Brenda; Wong, Melissa R; Reimann, David; Nicholas, David; Faw, Brenda; Davis, Ernestine; Selman, Carol A

    2014-11-01

    Over half of foodborne illness outbreaks occur in restaurants. To combat these outbreaks, many public health agencies require food safety certification for restaurant managers, and sometimes workers. Certification entails passing a food safety knowledge examination, which is typically preceded by food safety training. Current certification efforts are based on the assumption that certification leads to greater food safety knowledge. The Centers for Disease Control and Prevention conducted this study to examine the relationship between food safety knowledge and certification. We also examined the relationships between food safety knowledge and restaurant, manager, and worker characteristics. We interviewed managers (N=387) and workers (N=365) about their characteristics and assessed their food safety knowledge. Analyses showed that certified managers and workers had greater food safety knowledge than noncertified managers and workers. Additionally, managers and workers whose primary language was English had greater food safety knowledge than those whose primary language was not English. Other factors associated with greater food safety knowledge included working in a chain restaurant, working in a larger restaurant, having more experience, and having more duties. These findings indicate that certification improves food safety knowledge, and that complex relationships exist among restaurant, manager, and worker characteristics and food safety knowledge.

  7. Restaurant Manager and Worker Food Safety Certification and Knowledge

    Science.gov (United States)

    Brown, Laura G.; Le, Brenda; Wong, Melissa R.; Reimann, David; Nicholas, David; Faw, Brenda; Davis, Ernestine; Selman, Carol A.

    2017-01-01

    Over half of foodborne illness outbreaks occur in restaurants. To combat these outbreaks, many public health agencies require food safety certification for restaurant managers, and sometimes workers. Certification entails passing a food safety knowledge examination, which is typically preceded by food safety training. Current certification efforts are based on the assumption that certification leads to greater food safety knowledge. The Centers for Disease Control and Prevention conducted this study to examine the relationship between food safety knowledge and certification. We also examined the relationships between food safety knowledge and restaurant, manager, and worker characteristics. We interviewed managers (N = 387) and workers (N = 365) about their characteristics and assessed their food safety knowledge. Analyses showed that certified managers and workers had greater food safety knowledge than noncertified managers and workers. Additionally, managers and workers whose primary language was English had greater food safety knowledge than those whose primary language was not English. Other factors associated with greater food safety knowledge included working in a chain restaurant, working in a larger restaurant, having more experience, and having more duties. These findings indicate that certification improves food safety knowledge, and that complex relationships exist among restaurant, manager, and worker characteristics and food safety knowledge. PMID:25361386

  8. Security Expertise

    DEFF Research Database (Denmark)

    systematic study of security expertise and opens up a productive dialogue between science and technology studies and security studies to investigate the character and consequences of this expertise. In security theory, the study of expertise is crucial to understanding whose knowledge informs security making......This volume brings together scholars from different fields to explore the power, consequences and everyday practices of security expertise. Expertise mediates between different forms of knowledge: scientific and technological, legal, economic and political knowledge. This book offers the first...... and to reflect on the impact and responsibility of security analysis. In science and technology studies, the study of security politics adds a challenging new case to the agenda of research on expertise and policy. The contributors investigate cases such as academic security studies, security think tanks...

  9. An Agile Enterprise Regulation Architecture for Health Information Security Management

    Science.gov (United States)

    Chen, Ying-Pei; Hsieh, Sung-Huai; Chien, Tsan-Nan; Chen, Heng-Shuen; Luh, Jer-Junn; Lai, Jin-Shin; Lai, Feipei; Chen, Sao-Jie

    2010-01-01

    Abstract Information security management for healthcare enterprises is complex as well as mission critical. Information technology requests from clinical users are of such urgency that the information office should do its best to achieve as many user requests as possible at a high service level using swift security policies. This research proposes the Agile Enterprise Regulation Architecture (AERA) of information security management for healthcare enterprises to implement as part of the electronic health record process. Survey outcomes and evidential experiences from a sample of medical center users proved that AERA encourages the information officials and enterprise administrators to overcome the challenges faced within an electronically equipped hospital. PMID:20815748

  10. An agile enterprise regulation architecture for health information security management.

    Science.gov (United States)

    Chen, Ying-Pei; Hsieh, Sung-Huai; Cheng, Po-Hsun; Chien, Tsan-Nan; Chen, Heng-Shuen; Luh, Jer-Junn; Lai, Jin-Shin; Lai, Feipei; Chen, Sao-Jie

    2010-09-01

    Information security management for healthcare enterprises is complex as well as mission critical. Information technology requests from clinical users are of such urgency that the information office should do its best to achieve as many user requests as possible at a high service level using swift security policies. This research proposes the Agile Enterprise Regulation Architecture (AERA) of information security management for healthcare enterprises to implement as part of the electronic health record process. Survey outcomes and evidential experiences from a sample of medical center users proved that AERA encourages the information officials and enterprise administrators to overcome the challenges faced within an electronically equipped hospital.

  11. Managing Distributed Knowledge Systems

    DEFF Research Database (Denmark)

    Sørensen, Brian Vejrum; Gelbuda, Modestas

    2005-01-01

    . This paper contributes to the research on organizations as distributed knowledge systems by addressing two weaknesses of the social practice literature. Firstly, it downplays the importance of formal structure and organizational design and intervention efforts by key organizational members. Secondly, it does......The article argues that the growth of de novo knowledge-based organization depends on managing and coordinating increasingly growing and, therefore, distributed knowledge. Moreover, the growth in knowledge is often accompanied by an increasing organizational complexity, which is a result...... of integrating new people, building new units and adding activities to the existing organization. It is argued that knowledge is not a stable capacity that belongs to any actor alone, but that it is rather an ongoing social accomplishment, which is created and recreated as actors engage in mutual activities...

  12. Applying the knowledge creation model to the management of ...

    African Journals Online (AJOL)

    In present-day society, the need to manage indigenous knowledge is widely recognised. However, there is a debate in progress on whether or not indigenous knowledge can be easily managed. The purpose of this paper is to examine the possibility of using knowledge management models like knowledge creation theory ...

  13. SOCIAL CRM FOR CUSTOMER KNOWLEDGE MANAGEMENT

    Directory of Open Access Journals (Sweden)

    Dorota Buchnowska

    2014-12-01

    Full Text Available The recent development and expansion of Web 2.0 technologies have created remarkable opportunities for Customer Knowledge Management (CKM. The goals of this paper are to analyze how organizations can apply Social CRM (social technologies integrated with traditional CRM systems systems for CKM and to investigate what benefits they may derive from the use of social technologies. To achieve these objectives, the article shows the concept of Social CRM, differences between CRM and SCRM, and a review of CKM models presented in the literature. Then, there are indicated the possibilities of using SCRM solutions in the processes of customer knowledge management, and there are presented examples of the use of different types of social media in the management of different types of customer knowledge.

  14. Knowledge Management and Czech Self-Governments: Empirical Investigations into the Application of Knowledge Management to Public Administration in the Czech Republic

    Directory of Open Access Journals (Sweden)

    Špaček David

    2017-06-01

    Full Text Available Although knowledge management has become the subject of an enormous quantity of articles and books in recent times, certain more problematic aspects of it remain neglected. Firstly, literature addressing knowledge management concentrates almost exclusively on business organizations and fails to provide details or recommendations adequate to effective application within the sphere of public administration. This holds especially true for Czech academic literature. Secondly, despite a reasonable number of articles on knowledge management in scientific journals, information about perceptions of knowledge-management activities, procedures and tools within organizations lacks detail. The purpose of this article is to investigate and summarize the activities, procedures and tools in use for dealing with knowledge within Czech self-governments and to discuss the main empirical findings. Although the quantitative survey herein does not provide fully representative data, it is still in a position to indicate that knowledge management in Czech public administration tends to be underdeveloped as well as undervalued.

  15. Security information and event management systems: benefits and inefficiencies

    OpenAIRE

    Κάτσαρης, Δημήτριος Σ.

    2014-01-01

    In this Master’s thesis, the new trend in computer and information security industry called Security Information and Event Management systems will be covered. The evolution, advantages and weaknesses of these systems will be described, as well as a home-based implementation with open source tools will be proposed and implemented.

  16. The importance of ICT on knowledge management in organizations ...

    African Journals Online (AJOL)

    The importance of ICT on knowledge management in organizations. ... Journal of Fundamental and Applied Sciences ... Abstract. Knowledge management (KM) is a process that transforms individual knowledge into organizational knowledge.

  17. Evaluation of Residential Consumers Knowledge of Wireless Network Security and Its Correlation with Identity Theft

    Science.gov (United States)

    Kpaduwa, Fidelis Iheanyi

    2010-01-01

    This current quantitative correlational research study evaluated the residential consumers' knowledge of wireless network security and its relationship with identity theft. Data analysis was based on a sample of 254 randomly selected students. All the study participants completed a survey questionnaire designed to measure their knowledge of…

  18. A Systematic Knowledge Management Approach Using Object-Oriented Theory in Customer Complaint Management

    Directory of Open Access Journals (Sweden)

    Wusheng Zhang

    2010-12-01

    Full Text Available Research into the effectiveness of customer complaint management has attracted researchers, yet there has been little discussion on customer complaint management in the context of systematic knowledge management approach particularly in the domain of hotel industry. This paper aims to address such gap through the application of object-oriented theory for which the notation of unified modelling language has been adopted for the representation of the concepts, objects, relationships and vocabularies in the domain. The paper used data from forty seven hotel management staff and academics in hospitalitymanagement to investigate lessons learned and best practices in customer complaint management and knowledge management. By providing insights into the potential of a knowledge management approach using object oriented theory, this study advances our understanding on how a knowledge management approach can systematically support the management of hotel customer complaints.

  19. Knowledge-Centric Technical Support Organization (TSO) Using Process Oriented Knowledge Management Approach

    International Nuclear Information System (INIS)

    Mohamad Safuan Sulaiman; Siti Nurbahyah Hamdan; Mohd Dzul Aiman Aslan

    2014-01-01

    In the United States of America, Process Oriented Knowledge Management (POKM) Model has been successfully implemented in most of Nuclear Power Plants. This approach has been introduced in Nuclear Knowledge Management program by the IAEA since 2011. Malaysia has involved in the IAEA Coordinated Research Project (CRP) focusing the approach started in 2011. The main objective for Malaysian participation of this project is to support readiness in terms of nuclear technical knowledge by Technical Support Organization (TSO) for Nuclear Power Program. This project has focused on several nuclear technical areas which consist of Public Information (PI), Radiological Impact Assessment (RIA), Nuclear Reactor Technology (NRT), Plant and Prototype Development (PDC) and nuclear knowledge management. This paper articulates the detail POKM approach and project experience in implementing the approach at organizational level. (author)

  20. Nuclear knowledge management strategies in Canada

    International Nuclear Information System (INIS)

    Torgerson, D.F.; Aly, A.M.M.; Shalaby, B.

    2004-01-01

    An effective knowledge management strategy must encompass three basic elements; a sound resource management and training strategy to maintain nuclear competency in the face of accelerated retirements of current generation of experts and the development of advanced products, effective engineering tools to preserve the current technology and design basis and effective information management systems to facilitate pooling and sharing of information amongst different entities. The Canadian Nuclear Industry and its regulatory agency, the Canadian Nuclear Safety Commission (CNSC) recognized the importance of nuclear knowledge management and have already implemented a number of initiatives, in order to maintain competency, capture and preserve existing knowledge, advance the nuclear technology, develop future nuclear workers and maintain a critical R and D capability. The paper describes activities and initiatives undertaken or in progress in Canada in order to ensure a smooth transition of nuclear knowledge to the next generation of nuclear workers. Although this paper intends to address the Canadian scene in general, special emphasis will be placed on activities currently underway at Atomic Energy of Canada Limited (AECL) as the design authority and guardian of the CANDU technology. (author)

  1. Sustaining Operational Resiliency: A Process Improvement Approach to Security Management

    National Research Council Canada - National Science Library

    Caralli, Richard A

    2006-01-01

    ... potential to significantly disrupt an organization's pursuit of its mission. Security, business continuity, and IT operations management are activities that traditionally support operational risk management...

  2. A risk-based approach to designing effective security force training exercises

    International Nuclear Information System (INIS)

    Bott, T.F.; Eisenhawer, S.W.

    2002-01-01

    The effectiveness of a security force in protecting a nuclear facility is often evaluated using training exercises that pit a group of simulated attackers against a security team. In the situation studied here, a security force was regularly tested by a regulatory body with the responsibility for security oversight. It was observed that the regulators were continually imposing more challenging security scenarios by assigning increasingly sophisticated facility knowledge to the attackers. Not surprisingly, the security forces' assessed effectiveness decreased until eventually they were unable to successfully resist the attacks. Security managers maintained that the knowledge attributed to the attackers was becoming increasingly unrealistic and feared they would be forced to concentrate resources on unrealistic scenarios at the expense of more credible threats.

  3. Knowledge Architect : A Tool Suite for Managing Software Architecture Knowledge

    NARCIS (Netherlands)

    Liang, Peng; Jansen, Anton; Avgeriou, Paris

    2009-01-01

    Management of software architecture knowledge (AK) is vital for improving an organization’s architectural capabilities. To support the architecting process within our industrial partner: Astron, the Dutch radio astronomy institute, we implemented the Knowledge Architect (KA): a tool suite for

  4. Digital Repository as Instrument for Knowledge Management

    International Nuclear Information System (INIS)

    Hakopov, Zaven N.

    2016-03-01

    In the modern technologically advanced world, implicit knowledge, but also certain manifestations of tacit knowledge, is accumulated primarily in digital form, increasing the dependence of Knowledge Management (KM) on tools and specifically on digital content management platforms and repositories. The latter, powered by subject classification system such as a thesaurus or an ontology, can form a complete Knowledge Organization System (KOS). The purpose of this paper is to describe and (re)define the role of these systems as an integral part of KM, and present an example of such a KOS, including its major role in knowledge preservation. (author)

  5. Knowledge Management in healthcare libraries: the current picture.

    Science.gov (United States)

    Hopkins, Emily

    2017-06-01

    Knowledge management has seen something of a resurgence in attention amongst health librarians recently. Of course it has never ceased to exist, but now many library staff are becoming more involved in organisational knowledge management, and positioning themselves as key players in the sphere. No single model of knowledge management is proliferating, but approaches that best fit the organisation's size, structure and culture, and a blending of evidence based practice and knowledge sharing. Whatever it is called and whatever models are used, it's clear that for librarians and information professionals, the importance of putting knowledge and evidence into practice, sharing knowledge well and capturing it effectively, are still what we will continue to do. © 2017 Health Libraries Group.

  6. Guidelines for assessing the knowledge management maturity of organizations

    Directory of Open Access Journals (Sweden)

    C. J. Kruger

    2007-11-01

    Full Text Available In a recent article Kruger and Snyman hypothesized that progressions in knowledge management maturity (from a strategic perspective are directly related to an increased ability to speed up the strategic cycle of imitation, consolidation and innovation. The arguments proposed, however, neglected to supply the reader with a practical toolkit or even a roadmap (a time-related matrix, or questionnaire to successfully measure succession in knowledge management maturity. This article builds on the previous one and proposes a questionnaire consisting of six sections, containing 101 descriptive questions, to enable organizations to test and assess their knowledge management maturity empirically. The development of an instrument to measure knowledge management maturity required adhering to a research design that combined theoretical propositions with practical experimentation. As a point of departure, a knowledge management maturity matrix consisting of seven maturity levels was formulated. All questions contained within the matrix were benchmarked against a survey questionnaire developed by the public management service of the OECD (PUMA and were also pre-tested and validated. This process of refinement led to the formulation of the Knowledge Management Maturity Questionnaire. To avoid any taint of this research being based only on theoretical propositions, the questionnaire was tested by 178 master students of the University of Pretoria, South Africa, in nine different industries. The proposed questionnaire provides a bridge between theoretical propositions and practical usability, not only enabling knowledge management practitioners to assess the level of knowledge management maturity reached successfully but, more importantly, also serving as a guideline to institutionalize further and future knowledge management endeavours.

  7. Knowledge Management for Enhancing Regulatory Body Capabilities in Thailand

    International Nuclear Information System (INIS)

    Apichaibukol, A.; Pakdee, K.

    2016-01-01

    Full text: In order to be a learning organization, the Office of Atoms for Peace (OAP) has appointed a knowledge-management team in an attempt to manage internal knowledge, both tacit knowledge and explicit knowledge, systematically. In principle, the seven steps of knowledge management will be applied for OAP KM, namely; 1. Knowledge identification including the knowledge required of the Regulatory Body. 2. Knowledge creation and acquisition including knowledge sharing, transfer and how to maintain knowledge external factors such as a customers, stakeholder, etc. 3. Knowledge organization based on knowledge structure is needed for a systematic knowledge retention in the future. 4. Knowledge refinement with ISO standards in document storage. 5. Knowledge access for example, using information technology management through web board. 6. Knowledge sharing, OAP staff through numerous methods designed to transfer implicit and tacit knowledge such as formal classroom and on-the-job training, informal Communities of Practice, mentoring. 7. Learning is OAP group continually enhancing their capabilities and making decisions, solving problems and improving the organization. OAP staff could apply knowledge for organization development and planning for a supporting guideline. (author

  8. E-Catalogue “Knowledge Management Practices in Nuclear Organizations”

    International Nuclear Information System (INIS)

    Sheveleva, S.; Pasztory, Z.

    2014-01-01

    The objectives of NKM E-Catalogue: Many nuclear organizations from IAEA Member States have considerable experiences and excellent achievements in the development of Knowledge Management Systems. Depending on organization’s strategy and type of business, they choose various methods and tools of knowledge management for realizing their aims. This catalogue will be available to all Member States interested in learning about collected knowledge management practices in order to enhance their own knowledge management programmes

  9. Knowledge management in fast reactors

    International Nuclear Information System (INIS)

    Kuriakose, K.K.; Satya Murty, S.A.V.; Swaminathan, P.; Raj, Baldev

    2010-01-01

    This paper highlights the work that is being carried out in Knowledge Management of Fast Reactors at Indira Gandhi Centre for Atomic Research (IGCAR) including a few examples of how the knowledge acquired because of various incidents in the initial years has been utilized for the successful operation of Fast Breeder Test Reactor. It also briefly refers to the features of the IAEA initiative on the preservation of Knowledge in the area of Fast Reactors in the form of 'Fast Reactor Knowledge Organization System' (FR-KOS), which is based on a taxonomy for storage and mining of Fast Reactor Knowledge. (author)

  10. Knowledge Management for Command and Control

    National Research Council Canada - National Science Library

    Ceruti, Marion G; Wilcox, Dwight R; Power, Brenda J

    2004-01-01

    This paper highlights some major trends and developments in knowledge management with particular emphasis on knowledge capturing and authoring, and how this technology can be combined with intelligent...

  11. Knowledge management for assuring high standards in nuclear safety

    International Nuclear Information System (INIS)

    Hahn, L.

    2004-01-01

    The primary incentives for introducing knowledge management in organisations active in the nuclear field are the impending loss of knowledge due to an ageing workforce and the necessity to transfer knowledge to the next generation. However, knowledge management may reach much further, and it is shown that ultimately, the goals of knowledge management are congruent with establishing, maintaining and further developing high standards of safety. Knowledge-based activities to reach these goals are discussed, and examples given for producing, utilising and sharing knowledge in organisations and in national and international networks. (author)

  12. The nuclear knowledge management, its present status and tasks

    International Nuclear Information System (INIS)

    Yanagisawa, Kazuaki; Yonezawa, Minoru; Sawada, Tetsuo

    2006-01-01

    Knowledge management can be defined as the integrated, systematic approach to identifying, collecting, maintaining, and sharing knowledge, and enabling the creation of new knowledge in order to achieve the objectives of the organization. Knowledge can be classified into explicit knowledge and tacit knowledge. Due to the aging of nuclear personnel, it is necessary to systematically manage nuclear knowledge within and between the organizations and to smoothly transfer or pass these down to the next generation. World's trend of nuclear knowledge management and its tasks were described referring to topics of its latest international meetings. (T.Tanaka)

  13. Role of organizational learning and knowledge management

    Directory of Open Access Journals (Sweden)

    Haleem Fazal

    2017-12-01

    Full Text Available This research is based on Electrocell, a US battery manufacturing company, which was facing problems in its marketing and sales departments as evidenced by its low performance. Following a short introduction to the firm, literature reviews the two recently emerged and widely debated topics, that is, organizational learning and knowledge management. It is followed by the reasons for Electrocell’s declination and revival before and after acquisition by Restart, a US cosmetic manufacturing company. Then, Knowledge Sharing Model, General Hierarchical Model of Organizational Commitment, Knowledge Management, and Learning Organization Capacity, and Three Dimensional Model are described and critically analyzed. At the end, Knowledge Management System Conceptual Model is applied on the case study thoroughly and critically analyzed followed by summary. The research contributes to the literature and offers important implications for academics, managers and strategists that why learning is important and how does it matter to an organization.

  14. Knowledge Management Issues in Academic Libraries in Imo State ...

    African Journals Online (AJOL)

    This paper explored the Knowledge Management (KM) issues in academic libraries. It discussed these issues - types of knowledge and knowledge management practices; the technologies and mechanisms of acquiring; creating; sharing, transferring etc knowledge in the present day knowledge era. It highlighted the ...

  15. Robustness of a Distributed Knowledge Management Model

    DEFF Research Database (Denmark)

    Pedersen, Mogens Kühn; Larsen, Michael Holm

    1999-01-01

    Knowledge management based on symmetric incentives is rarely found in literature. A knowledge exchange model relies upon a double loop knowledge conversion with symmetric incentives in a network. The model merges specific knowledge with knowledge from other actors into a decision support system...

  16. Information Technology Management Strategies to Implement Knowledge Management Systems

    Science.gov (United States)

    McGee, Mary Jane Christy

    2017-01-01

    More than 38% of the U.S. public workforce will likely retire by 2030, which may result in a labor shortage. Business leaders may adopt strategies to mitigate knowledge loss within their organizations by capturing knowledge in a knowledge management system (KMS). The purpose of this single case study was to explore strategies that information…

  17. Knowledge Management: A Model to Enhance Combatant Command Effectiveness

    Science.gov (United States)

    2011-02-15

    implementing the change that is required to achieve the knowledge management vision.43 The Chief Knowledge Management Officer ( KMO ) is overall responsible for...the processes, people/culture and technology in the organization. The Chief KMO develops policy and leads the organization’s knowledge management...integrates team. Reporting directly to the Chief KMO is the Chief Process Manager, Chief Learning Manager and Chief Technology Officer

  18. Coupling knowledge and action in the management context

    DEFF Research Database (Denmark)

    Mazza, Carmelo; Strandgaard Pedersen, Jesper; Alvarez, José Luis

    2003-01-01

    In the last decade, scholarly interest has been mainly attracted on the nature of knowledge,mechanisms of knowledge production and the transformation of the institutions diffusingknowledge. Most of these studies share the underlying hypotheses that management knowledge`travels', as a package, from...... on priorities and undertake specific courses of actions This supports theidea that the managerial role is intrinsically political.Second, management education cannot simply deals with managerial recipes and rules of thumb. Itis increasingly asked for providing non-technical knowledge to help managers exert...... their politicalrole. To mobilize constituencies and create consensus on controversial decisions, technicalitiescould be less relevant than business-unrelated knowledge. We hold that has a relevant impact onboth the institutional settings and the content of management education.The paper is structured in three parts...

  19. The Effect of Information Security Management on Organizational Processes Integration in Supply Chain

    Directory of Open Access Journals (Sweden)

    Mohsen Shafiei Nikabadi

    2012-03-01

    Full Text Available : The major purpose of this article was that how information security management has effect on supply chain integration and the effect of implementing "information security management system" on enhancing supplies chain integration. In this respect, current research was seeking a combination overview to these tow approaches (Information Security Management and Organizational Processes Integration by Enterprise Resources Planning System and after that determined factors of these two important issue by factor analysis. Researchers using a series of comments in the automotive experts (production planning and management and supply chain experts and caregivers car makers and suppliers in the first level and second level supply chain industry. In this way, it has been done that impact on how information security management processes enterprise supply chain integration with the help of statistical correlation analysis. The results of this investigation indicated effect of "information security management system" various dimensions that were coordination of information, prevent human errors and hardware, the accuracy of information and education for users on two dimensions of internal and external integration of business processes, supply chain and finally, it can increased integration of business processes in supply chain. At the end owing to quite these results, deployment of "information security management system" increased the integration of organizational processes in supply chain. It could be demonstrate with the consideration of relation of organizational integration processes whit the level of coordination of information, prevent errors and accuracy of information throughout the supply chain.

  20. New secure communication-layer standard for medical image management (ISCL)

    Science.gov (United States)

    Kita, Kouichi; Nohara, Takashi; Hosoba, Minoru; Yachida, Masuyoshi; Yamaguchi, Masahiro; Ohyama, Nagaaki

    1999-07-01

    This paper introduces a summary of the standard draft of ISCL 1.00 which will be published by MEDIS-DC officially. ISCL is abbreviation of Integrated Secure Communication Layer Protocols for Secure Medical Image Management Systems. ISCL is a security layer which manages security function between presentation layer and TCP/IP layer. ISCL mechanism depends on basic function of a smart IC card and symmetric secret key mechanism. A symmetry key for each session is made by internal authentication function of a smart IC card with a random number. ISCL has three functions which assure authentication, confidently and integrity. Entity authentication process is done through 3 path 4 way method using functions of internal authentication and external authentication of a smart iC card. Confidentially algorithm and MAC algorithm for integrity are able to be selected. ISCL protocols are communicating through Message Block which consists of Message Header and Message Data. ISCL protocols are evaluating by applying to regional collaboration system for image diagnosis, and On-line Secure Electronic Storage system for medical images. These projects are supported by Medical Information System Development Center. These project shows ISCL is useful to keep security.

  1. 76 FR 62439 - Order of Succession for the Office of Disaster Management and National Security

    Science.gov (United States)

    2011-10-07

    ... Office of Disaster Management and National Security AGENCY: Office of the Secretary, HUD. ACTION: Notice... Succession for the Office of Disaster Management and National Security. This is the first order of succession... L. McClure, Acting Chief Disaster and National Security Officer, Office of Disaster Management and...

  2. Nuclear Regulator Knowledge Management in a Dynamic Nuclear Industry Environment

    International Nuclear Information System (INIS)

    Turner, J.

    2016-01-01

    Full text: The paper outlines the experiences to date in developing mature knowledge management within the UK’s nuclear regulatory body The Office for Nuclear Regulation (ONR). In 2010 concerns over the loss of knowledge due to the age profile within the organization instigated a review of knowledge management and the development of a knowledge management initiative. Initially activities focused on knowledge capture but in order to move to through life knowledge transfer, knowledge management was then aligned with organizational resilience initiatives. A review of progress highlighted the need to better engage the whole organization to achieve the desired level of maturity for knowledge management. Knowledge management activities now cover organizational culture and environment and all aspects of organizational resilience. Benefits to date include clear understanding of core knowledge requirements, better specifications for recruitment and training and the ability to deploy new regulatory approaches. During the period of implementing the knowledge management programme ONR undertook several organizational changes in moving to become a separate statutory body. The UK nuclear industry was in a period of increased activity including the planning of new nuclear reactors. This dynamic environment caused challenges for embedding knowledge management within ONR which are discussed in the paper. (author

  3. Strategy and management of network security at KEK

    International Nuclear Information System (INIS)

    Kiyoharu Hashimoto; Teiji Nakamura; Hitoshi Hirose, Yukio Karita; Youhei Morita; Soh Suzuki; Fukuko Yuasa

    2001-01-01

    Recently the troubles related to the network security have often occurred at KEK. According to their security policy, the authors have started the strategy against the daily attacks. It consists of two fundamental things; the monitoring and the access control. To monitor the network, the authors have installed the intrusion detection system and have managed it since 1998. For the second thing, the authors arranged three categories to classify all hosts (about 5000 hosts) at KEK according to their security level. To realize these three categories, the authors filter the incoming packet from outside KEK whether it has a SYN flag or not. The network monitoring and the access control produced good effects in keeping the security level high. Since 2000 the authors have started the transition of LAN from shared-media network to switched network. Now almost part of LAN was re-configured and in this new LAN 10 Mbps 100 Mbps/1Gbps Ethernet are supported. Currently the authors are planning further speedup (10 Gbps) and redundancy of network. Not only LAN but also WAN, network speed will be upgraded to 10 Gbps thanks to the strong promotion of IT by Japanese government. In this very high speed network, the authors' current strategy will be affected and again the network security becomes a big issue. The authors describe the experiences in practice of the current strategy and management know-how together with the discussion on the new strategy

  4. The cloud security ecosystem technical, legal, business and management issues

    CERN Document Server

    Ko, Ryan

    2015-01-01

    Drawing upon the expertise of world-renowned researchers and experts, The Cloud Security Ecosystem comprehensively discusses a range of cloud security topics from multi-disciplinary and international perspectives, aligning technical security implementations with the most recent developments in business, legal, and international environments. The book holistically discusses key research and policy advances in cloud security - putting technical and management issues together with an in-depth treaties on a multi-disciplinary and international subject. The book features contributions from key tho

  5. Implementing Information Security and Its Technology: A LineManagement Perspective

    Energy Technology Data Exchange (ETDEWEB)

    Barletta, William A.

    2005-08-22

    Assuring the security and privacy of institutionalinformation assets is a complex task for the line manager responsible forinternational and multi-national transactions. In the face of an unsureand often conflicting international legal framework, the line managermust employ all available tools in an Integrated Security and PrivacyManagement framework that ranges from legal obligations, to policy, toprocedure, to cutting edge technology to counter the rapidly evolvingcyber threat to information assets and the physical systems thatinformation systems control.

  6. 17 CFR 240.3b-15 - Definition of ancillary portfolio management securities activities.

    Science.gov (United States)

    2010-04-01

    ... governing body of the dealer and included in the internal risk management control system for the dealer... of incidental trading activities for portfolio management purposes; and (3) Are limited to risk... portfolio management securities activities. 240.3b-15 Section 240.3b-15 Commodity and Securities Exchanges...

  7. Adaptive Knowledge Management of Project-Based Learning

    Science.gov (United States)

    Tilchin, Oleg; Kittany, Mohamed

    2016-01-01

    The goal of an approach to Adaptive Knowledge Management (AKM) of project-based learning (PBL) is to intensify subject study through guiding, inducing, and facilitating development knowledge, accountability skills, and collaborative skills of students. Knowledge development is attained by knowledge acquisition, knowledge sharing, and knowledge…

  8. Framework for Knowledge Management Processes in Supply Chain

    Directory of Open Access Journals (Sweden)

    Mohsen Shafiei Nikabadi

    2014-02-01

    The innovation aspect of the research is to provide a comprehensive framework for knowledge management processes in supply chain of automotive industry with main indicators for each process. Several investigations have been made for knowledge management but specific research on knowledge management processes in the supply chain has not been observed. Thus providing the framework and indicators for each component of the framework is the innovation of the research

  9. A challenge for computing in the 21. century: Radwaste knowledge management

    International Nuclear Information System (INIS)

    Umeki, H.

    2007-01-01

    Integrated nuclear waste management, including waste disposal, is a technical area characterised by a breadth of required multidisciplinary knowledge that is wider than almost any other industry - covering geology to radiation physics, materials science to microbiology, archaeology to engineering, public communication to advanced IT. It also has an unparalleled depth in time, in terms of project implementation (around 100 years - matched maybe by some medieval cathedrals) and the associated safety case (millions of years - longer than the existence of modern man). If anything, this is even more critical in Japan; which depends on a major nuclear power industry, has complex (and dynamic) geology and a policy of repository siting based on solicitation of volunteer municipalities. The technical challenge of Knowledge Management in such an area, which is suffering more than most from the information explosion caused by the exponentially increasing capacities of modern technology, are truly daunting. In order to take control of the situation, the main R and D organisation in this area (Japan Atomic Energy Agency; JAEA) is planning to develop a Knowledge Management System (KMS) that will ride the wave of cutting edge technology in: Database development and management; Search engines; Expert systems; Management support systems; Security and archiving. This initiative will be complemented by a major reassessment of the modelling approach to performance assessment of repositories and the technology for communication of such complex issues with a wide range of different audiences. The requirements as specified go beyond anything doable with existing technology, so an initial goal will be to build up a team capable of anticipating the areas of active technology development that will provide the required tools - and then tailoring them to provide the infrastructure needed for these very ambitious projects. Although this particular application is of limited scope, the general

  10. Competency development information system - Knowledge management based competency development management tool

    International Nuclear Information System (INIS)

    Aminuddin, R.; Zainuddin, Z.; Taib, Z.; Hamid, A.H.Ab.; Hamdan, S.N.

    2007-01-01

    Full text: Knowledge identification, acquisition, sharing, preservation and measurement are some of the desired habits and processes necessary for knowledge management to be effective and contributes to increased innovation, organizational value, competitiveness and sustainability. The knowledge workers in the K-economic era are expected to be an innovative knowledge professional who are capable of managing their own work as well as their own competency development. Organizations however need to provide an environment, tools and policies to support and encourage learning and knowledge acquisition in all forms, methods and approaches beyond what is traditionally done. For an ordinary knowledge professional, he is only interested in developing the necessary competency to complete his assigned tasks and progress in his career. He would not be interested to learn and be lectured on knowledge management or learning principles and concepts. But for the organization it is not only important that its staff members understand and able to go through the process of acquiring the necessary skills to carry out their current and future tasks at the right time, but it has to ensure that what they learn or their individual knowledge is converted into organizational knowledge, utilised, shared and preserved. Hence it is important that tools are provided and policies are set in place to ensure that staff identify, acquire, utilise, share and preserve knowledge necessary for organizational sustainability and growth. A Competency Development Information System was recently developed to address the issue of inculcating the habit of identifying, acquiring, utilising, sharing, preserving and measuring knowledge among staff members hands-on by doing and repeating without having to learn the theory first. Besides that it helps organization manage competency development processes from analysis to planning, implementing and right through to evaluation. The process starts from capturing

  11. Introducing Knowledge Management into the Integrated Management System of Nuclear Organizations

    International Nuclear Information System (INIS)

    Yanev, Y.; Brandner, A.; Kosilov, A.

    2016-01-01

    Full text: The analysis for introducing knowledge management into an integrated management system in nuclear organizations, conducted by NKMI, and discussed in a number of meetings in IAEA and other organizations has shown that currently there is no full and comprehensive implementation of KM in IMS. NKMI has suggested and developed a common, systematic approach for introducing Knowledge Management in the IMS of a nuclear regulatory organization, based on the concept of competence, graded approach and continuous improvement. The approach is based on the concept of integrating an initial review of all knowledge and competence needed for effective and efficient process implementation including a gap analysis and provision of compensatory measures. Knowledge resources are represented as a knowledge resource matrix, which are necessary to complete a given process successfully. The “performance” of the available knowledge resources contribute to an efficient regulatory process is also reviewed at the end of process implementation where relevant decision for enhancement of knowledge and competence are taken, including capturing, preserving, sharing and reuse of new knowledge, gained through the process implementation. The “knowledge resource matrix” approach is fully based on IAEA recommendation and has already been applied in a number of regulatory processes. (author

  12. Crisis-management and the Security in the Internet

    Science.gov (United States)

    Harada, Izumi

    This paper discusses about the crisis-management and the security in the Internet. The crime that not is so far occurs during widespread to the society of the Internet, and a big social trouble. Moreover, the problem of a new security such as a cyber war and cyber terrorism appeared, too. It is necessary to recognize such a situation, and to do both correspondences corresponding to the environmental transformation by government and the people.

  13. An energy security management model using quality function deployment and system dynamics

    International Nuclear Information System (INIS)

    Shin, Juneseuk; Shin, Wan-Seon; Lee, Changyong

    2013-01-01

    An energy security management model using quality function deployment (QFD) and system dynamics (SD) is suggested for application in public policymaking in developing economies. Through QFD, experts are guided toward identifying key energy security components, including indicators and policies, and in making these components consistent, focused, and customized for a particular country. Using these components as inputs, we construct an intermediate complex system dynamics model with a minimal number of crucial interactions. Key policies are simulated and evaluated in terms of the improvement of key indicators. Even with little data, our approach provides a coherent, useful, and customized energy security management model to help policymakers more effectively manage national energy security. To demonstrate its advantages, the model is applied to the Korean gas sector as an example. - Highlights: ► We suggest an energy security management model for developing economies. ► We identify a consistent set of key components, indicators and policies by using QFD. ► A coherent and practical system dynamics model based on QFD's output is constructed. ► The model is applied to the Korean gas sector as an example

  14. The Politics of Management Knowledge.

    Science.gov (United States)

    Clegg, Stewart R., Ed.; Palmer, Gill, Ed.

    This book recognizes the political nature of management knowledge, as a discourse produced from, and reproducing, power processes within and between organizations. Critical examinations of certain current management theories--lean production, excellence, entrepreneurship--are examples of relations of power that intermingle with relations of…

  15. Program Management at the National Nuclear Security Administration Office of Defense Nuclear Security: A Review of Program Management Documents and Underlying Processes

    International Nuclear Information System (INIS)

    Madden, Michael S.

    2010-01-01

    The scope of this paper is to review the National Nuclear Security Administration Office of Defense Nuclear Security (DNS) program management documents and to examine the underlying processes. The purpose is to identify recommendations for improvement and to influence the rewrite of the DNS Program Management Plan (PMP) and the documentation supporting it. As a part of this process, over 40 documents required by DNS or its stakeholders were reviewed. In addition, approximately 12 other documents produced outside of DNS and its stakeholders were reviewed in an effort to identify best practices. The complete list of documents reviewed is provided as an attachment to this paper.

  16. Information and Knowledge Management at South African Law Firms

    Directory of Open Access Journals (Sweden)

    T du Plessis

    2011-07-01

    Full Text Available Global and national law firms alike operate in a challenging business environment and managing the firm's information and knowledge assets is increasingly viewed as a key factor in efficient legal service delivery. In legal practice, information management technologies, for example intranets, portals, workflow management systems, document and content management systems, case and project management systems and online dispute resolution systems are becoming important means of legal service delivery. The reason for applying information management technologies and implementing knowledge management strategies in law firms is not only to satisfy clients' growing need for a trusted online platform to interact with legal service providers, but for law firms to capitalise on their intellectual assets, to continuously modernise legal practice management, to empower lawyers, to increase productivity, to use time efficiently, to transfer skills and knowledge from senior to junior professionals, to improve service delivery and to gain competitive advantage. This article firstly reviews the role of information and knowledge management in providing an effective legal service to clients and compares foreign and South African law firms' information management related contexts, challenges and benefits. Secondly, it presents the findings of a survey conducted at South African law firms based on their knowledge management practices. The aim of the article is to provide insights into law firm knowledge management and its effect on providing legal services in an online business environment.

  17. Knowledge Management Experience in Kosovo Organizations

    Directory of Open Access Journals (Sweden)

    MSc. Drita Kacandolli-Gjonbalaj

    2014-06-01

    Full Text Available This paper is an empirical study, the findings of which reflect the experience gathered in knowledge management in Kosovo organizations. The main goal of this paper was to identify the realistic situation, and recommend instruments for a more effective knowledge management in Kosovo organizations. The findings of the empirical study have found inefficiency in knowledge management by organizations in Kosovo. A research was undertaken for this study, thereby directly interviewing representatives of 102 organizations in Kosovo.The research was undertaken during the period January-February 2013. Findings of the research show that most of the organizations in Kosovo are dominated by a random approach to knowledge assessment in personnel. This is the opinion of 83,3% of respondents in foreign organizations and institutions, 58,3% of respondents in education institutions, 53,8% of interviewees in state institutions, 47,4% of respondents in business organizations, and 34,8% of interviewees in the Privatization Agency of Kosovo (regional units and other operational units. The main statistical model used in this study was the ChiSquare, Asymp. Sig test (2 single-way and V. Cramer’s. Records were processed with the Statistical Package for Social Science (SPSS. The main recommendation of this paper is the following: essential changes are required in managers’ behaviour in terms of knowledge management, thereby fostering and motivating their subordinates to engage in change and new approaches in Kosovo organizations.

  18. Strategies for knowledge management in law firms in Botswana

    Directory of Open Access Journals (Sweden)

    M.C. Fombad

    2009-02-01

    Full Text Available This article formulates a route map on how law firms in Botswana may utilise knowledge management to enhance their competitive edge amidst the changing legal environment. It draws from the multiple definitions and perspectives of knowledge management, several frameworks and models together with the empirical findings to recommend a strategy for knowledge management in law firms in Botswana. It underscores the fact that knowledge management is becoming an imperative for the survival of law firms as knowledge intensive organisations. Law firms in Botswana can no longer afford to rely on the traditional methods of managing knowledge because there is a need for the 'best minds' and the best knowledge in their area of practice. It is recommended that lawyers should be proactive, adaptive, innovative, effective and competitive in the provision of outstanding, cost-efficient and effective services to clients. Most previous studies in this area have been carried out in developed countries with large law firms.

  19. Analysis of a Knowledge-Management-Based Process of Transferring Project Management Skills

    Science.gov (United States)

    Ioi, Toshihiro; Ono, Masakazu; Ishii, Kota; Kato, Kazuhiko

    2012-01-01

    Purpose: The purpose of this paper is to propose a method for the transfer of knowledge and skills in project management (PM) based on techniques in knowledge management (KM). Design/methodology/approach: The literature contains studies on methods to extract experiential knowledge in PM, but few studies exist that focus on methods to convert…

  20. Managing nuclear knowledge: A SCK-CEN concern: Status of a practical knowledge management approach

    International Nuclear Information System (INIS)

    Ruyssen, M.L.; Moons, F.; Borgermans, P.

    2004-01-01

    Preserving and enhancing the institutional memory has become a strategic concern for SCK-CEN. Managing the Knowledge Capital is a long term journey, starting from a strategic commitment and integrating various operational projects. Since 2002, several pilot projects in different areas of expertise have been conducted to set up nuclear knowledge repositories and to sustain interactive research communities. Beyond the establishment of a corporate knowledge sharing culture, dedicated web-based portals based on both well established and emerging open source internet technologies ensure the long term persistence of data and the continuous capture of knowledge by providing on-line tools and related QA procedures. (author)

  1. The role of knowledge management tools in supporting sustainable forest management

    OpenAIRE

    Vacik, H.; Torresan, C.; Hujala, T.; Khadka, C.; Reynolds, K.

    2013-01-01

    Aim of study: Knowledge Management (KM) tools facilitate the implementation of knowledge processes by identifying, creating, structuring, and sharing knowledge through use of information technology in order to improve decision-making. In this contribution, we review the way in which KM tools and techniques are used in forest management, and categorize a selected set of them according to their contribution to support decision makers in the phases of problem identification, problem modelling, a...

  2. Managing knowledge and information on nuclear safety

    International Nuclear Information System (INIS)

    Hahn, L.

    2005-01-01

    Described is the management of nuclear safety knowledge through education networks, knowledge pool, sharing, archiving and distributing the knowledge information. Demonstrated is the system used at Gesellschaft fuer Anlagen-und Reaktorsicherheit

  3. Knowledge Management in the IAEA Department of Safeguards

    International Nuclear Information System (INIS)

    Konecni, S.; McCullough, R.

    2015-01-01

    Knowledge management is the discipline of enabling individuals and teams to collectively and systematically create, share and apply knowledge. The most important assets in the IAEA Department of Safeguards are people and their knowledge. The focus of the Department is to create an environment within which people share, learn and work together. The efforts to manage the knowledge leaving the Department have been focused on helping the supervisor of the departing staff member to identify what critical knowledge needs to be retained, and how to retain that knowledge. The Safeguards Knowledge Management team developed a person-centred approach. This approach involves interviews with the staff member, co-workers and/or customers to identify the critical knowledge to be transferred. Although time consuming we have found that this method is most effective to capture the needed knowledge. This approach has four steps: · Identify the critical knowledge to be retained; · Select the knowledge transfer methods; · Apply the knowledge transfer methods; and · Assess and refine the transfer process. The paper will describe the person-centred approach and lessons learned from implementing this programme in the Department over several years. (author)

  4. APPLIED KNOWLEDGE MANAGEMENT IN SMALL DESIGN FIRMS: CASE STUDY

    Directory of Open Access Journals (Sweden)

    Christian Donin

    2016-09-01

    Full Text Available Knowledge is the new strategic imperative of organizations. The ability to manage knowledge is a crucial part of any organizations operational processes. The creation and diffusion of knowledge have become ever more important factors in competitiveness. This paper investigates the Knowledge Management and flow information and in small design firms. It is divided into three main parts. The first part of this paper describes the importance of Knowledge Management for organizations are described together with responsibilities needed to ensure successful Knowledge Management implementations and the Spiral of Organizational Knowledge Creation conception. The second part approaches literature available about process and organizational structure and information flow related to Brazilian design firms. Finally, this paper presents a case study of small design office of Civil Engineering identifying organizational process, verifying the types of communication practices and identifying the types of dynamic process of The Spiral of Organizational Knowledge Creation, KM strategy and dynamic through Knowledge Transfer.

  5. Knowledge Management: Individual versus organizational learning

    OpenAIRE

    Noemí Martínez Caraballo

    2007-01-01

    During the last two decades, there has been a profusion of articles dealing with the topics organizational learning and knowledge management, on the academic and managerial side. For this reason, the present paper is focused on further analysing these concepts. In particular, the purpose is studying the link between individual and organizational learning, taking into account the literature about knowledge management, and trying to establish the application field and the intersection of them. ...

  6. Managing visitor sites in Svalbard: from a precautionary approach towards knowledge-based management

    Directory of Open Access Journals (Sweden)

    Kirstin Fangel

    2012-05-01

    Full Text Available Increased tourism in the Arctic calls for more knowledge to meet management challenges. This paper reviews existing knowledge of the effects of human use on vegetation, fauna and cultural heritage in Svalbard, and it addresses the need for site-specific knowledge for improved management. This paper draws upon scientific studies, knowledge held by management authorities and local people, the Governor's database on visitors and visited sites and our own data from landing sites we visited. There is a certain level of basic knowledge available, allowing us to roughly grade the vulnerability of sites. However, there is a thorough lack of site-specific data related to the management of single locations or groups of similar locations. Future research needs to address specific on-site challenges in the management of visitor sites. Relevant management models and measures are discussed. We contend that a shift away from a blanket application of the precautionary principle and towards a more integrated, site-specific and evidence-based management plan will contribute to more trusted and reliable, and thereby acceptable among stakeholders, decisions in the management of growing tourism activity in Svalbard.

  7. The Importance of Information Security Management in Crisis Prevention in the Company

    OpenAIRE

    Wawak, Slawomir

    2010-01-01

    Management information system can be compared to the nervous system of a company. Its malfunction may cause adverse effects in many different areas of the company. Information Security Management is understood as tool of the information confidentiality, availability and integrity assurance. An effective information security management system reduces the risk of crisis in the company. It also allows to reduce the effects of the crisis occurring outside the company.

  8. Knowledge management. Preservation and maintenance of implicit knowledge within a company

    International Nuclear Information System (INIS)

    Schmidt, Ulrich

    2010-01-01

    EnBW Energie Baden-Wuerttemberg AG operates in a more and more complex economical and political environment. This fact and ambitious growth targets are the reason for EnBW to activate more intensively hidden potentials of the staff and to strengthen their skills. The ''intellectual capital'' of EnBW becomes a key success factor and active knowledge management will be the key to save the sustainability of the company. For the implementation of knowledge management EnBW uses an integrated approach, which includes a cultural, strategic and operational level. Since 2006 the ''Knowledge Relay'' has been used in the EnBW group with great success. (orig.)

  9. Research on Knowledge-Oriented Supply ChainRisk Management System Model

    OpenAIRE

    Yingchun Guo

    2011-01-01

    Based on analyzing the characteristics of supply chain risk management under the influences of knowledge, in this paper integrates basic theories and methods of knowledge management into the process of risk management, builds a knowledge-oriented supply chain risk management system model, and proposes relevant strategies, presenting references for practical application of knowledge-oriented supply chain risk management. By means of acquiring, storing, sharing, and transferring supply chain ri...

  10. Information security risk management and incompatible parts of organization

    Energy Technology Data Exchange (ETDEWEB)

    Talabeigi, E.; Naeeini, S.G.J.

    2016-07-01

    Purpose: we prepared a questionnaire to evaluate Incompatible parts and also risk management in University of Science and Technology E-Learning Center and studying the Incompatible parts impacts on utility of organization. Design/methodology/approach: By using coalitional game theory we present a new model to recognize the degrees of incompatibility among independent divisions of an organization with dependent security assets. Based on positive and negative interdependencies in the parts, the model provides how the organization can decrease the security risks through non-cooperation rather than cooperation. we implement the proposed model of this paper by analyzing the data which have been provided by questionnaires from different three managers' ideas of Iran University of Science and Technology E-Learning Center located in Iran University of Science and Technology, Tehran, Iran. Findings: In general, by collecting data and analyzing them, the survey showed that Incompatible parts of organizations have negative impacts on utility of organization risk management process. Furthermore, it adds values to other organizations and provides the best practices in planning, developing, implementing and monitoring risk management in organizations. Research limitations/implications: Since Information security and also Risk Management are still areas which need to improve in some Iranian universities, we couldn’t consider them in our analysis. On the other hand, due to questionnaire limitation, the study’s sample size is 1. This size may be considered large for our statistical analysis. Originality/value: The main contribution of this paper is to propose a model for non-cooperation among a number of divisions in a organization and using risk management factors.

  11. Information security risk management and incompatible parts of organization

    International Nuclear Information System (INIS)

    Talabeigi, E.; Naeeini, S.G.J.

    2016-01-01

    Purpose: we prepared a questionnaire to evaluate Incompatible parts and also risk management in University of Science and Technology E-Learning Center and studying the Incompatible parts impacts on utility of organization. Design/methodology/approach: By using coalitional game theory we present a new model to recognize the degrees of incompatibility among independent divisions of an organization with dependent security assets. Based on positive and negative interdependencies in the parts, the model provides how the organization can decrease the security risks through non-cooperation rather than cooperation. we implement the proposed model of this paper by analyzing the data which have been provided by questionnaires from different three managers' ideas of Iran University of Science and Technology E-Learning Center located in Iran University of Science and Technology, Tehran, Iran. Findings: In general, by collecting data and analyzing them, the survey showed that Incompatible parts of organizations have negative impacts on utility of organization risk management process. Furthermore, it adds values to other organizations and provides the best practices in planning, developing, implementing and monitoring risk management in organizations. Research limitations/implications: Since Information security and also Risk Management are still areas which need to improve in some Iranian universities, we couldn’t consider them in our analysis. On the other hand, due to questionnaire limitation, the study’s sample size is 1. This size may be considered large for our statistical analysis. Originality/value: The main contribution of this paper is to propose a model for non-cooperation among a number of divisions in a organization and using risk management factors.

  12. 76 FR 60067 - Privacy Act of 1974; Department of Homeland Security Federal Emergency Management Agency-012...

    Science.gov (United States)

    2011-09-28

    ... 1974; Department of Homeland Security Federal Emergency Management Agency--012 Suspicious Activity... establish a new system of records titled, ``Department of Homeland Security/Federal Emergency Management... Department of Homeland Security/Federal Emergency Management Agency to collect, maintain, and retrieve...

  13. Knowledge Management System Model for Learning Organisations

    Science.gov (United States)

    Amin, Yousif; Monamad, Roshayu

    2017-01-01

    Based on the literature of knowledge management (KM), this paper reports on the progress of developing a new knowledge management system (KMS) model with components architecture that are distributed over the widely-recognised socio-technical system (STS) aspects to guide developers for selecting the most applicable components to support their KM…

  14. Information and Knowledge Management: Dimensions and Approaches

    Science.gov (United States)

    Schlögl, Christian

    2005-01-01

    Introduction: Though literature on information and knowledge management is vast, there is much confusion concerning the meaning of these terms. Hence, this article should give some orientation and work out the main aspects of information and knowledge management. Method: An author co-citation analysis, which identified the main dimensions of…

  15. Information security management: a proposal to improve the effectiveness of information security in the scientific research environment

    International Nuclear Information System (INIS)

    Alexandria, Joao Carlos Soares de

    2009-01-01

    The increase of the connectivity in the business environment, combined with the growing dependency of information systems, has become the information security management an important governance tool. Information security has as main goal to protect the business transactions in order to work normally. In this way, It will be safeguarding the business continuity. The threats of information come from hackers' attacks, electronic frauds and spying, as well as fire, electrical energy interruption and humans fault. Information security is made by implementation of a set of controls, including of the others politics, processes, procedures, organizational structures, software and hardware, which require a continuous management and a well established structure to be able to face such challenges. This work tried to search the reasons why the organizations have difficulties to make a practice of information security management. Many of them just limit to adopt points measures, sometimes they are not consistent with their realities. The market counts on enough quantity of standards and regulations related to information security issues, for example, ISO/IEC 27002, American Sarbanes-Oxley act, Basel capital accord, regulations from regulatory agency (such as the Brazilians ones ANATEL, ANVISA and CVM). The market researches have showed that the information security implementation is concentrated on a well-defined group of organization mainly formed by large companies and from specifics sectors of economy, for example, financial and telecommunication. However, information security must be done by all organizations that use information systems to carry out their activities, independently of its size or economic area that it belongs. The situation of information security in the governmental sector of Brazil, and inside its research institutions, is considered worrying by the Brazilian Court of Accounts (TCU). This research work presents an assessment and diagnostic proposal of

  16. Knowledge information management toolkit and method

    Science.gov (United States)

    Hempstead, Antoinette R.; Brown, Kenneth L.

    2006-08-15

    A system is provided for managing user entry and/or modification of knowledge information into a knowledge base file having an integrator support component and a data source access support component. The system includes processing circuitry, memory, a user interface, and a knowledge base toolkit. The memory communicates with the processing circuitry and is configured to store at least one knowledge base. The user interface communicates with the processing circuitry and is configured for user entry and/or modification of knowledge pieces within a knowledge base. The knowledge base toolkit is configured for converting knowledge in at least one knowledge base from a first knowledge base form into a second knowledge base form. A method is also provided.

  17. Organizational structure features supporting knowledge management processes

    OpenAIRE

    Claver-Cortés, Enrique; Zaragoza Sáez, Patrocinio del Carmen; Pertusa-Ortega, Eva

    2007-01-01

    Purpose – The idea that knowledge management can be a potential source of competitive advantage has gained strength in the last few years. However, a number of business actions are needed to generate an appropriate environment and infrastructure for knowledge creation, transfer and application. Among these actions there stands out the design of an organizational structure, the link of which with knowledge management is the main concern here. More specifically, the present paper has as its aim...

  18. Management of information security risks in a federal public institution: a case study

    Directory of Open Access Journals (Sweden)

    Jackson Gomes Soares Souza

    2016-11-01

    Full Text Available Public institutions bound to the Brazilian federal public sector must apply security measures, policies, procedures and guidelines as information assets protection measures. This case study sought to determine whether the management of information security risks is applied in a federal public institution according to Information Technology (I.T. managers perceptions and the results expose the importance of the roles played by people, responsibilities, policies, standards, procedures and their implementation aiming greater control of information security risks and opportunities related to information technology security.

  19. Knowledge management impact of information technology Web 2.0/3.0. The case study of agent software technology usability in knowledge management system

    Science.gov (United States)

    Sołtysik-Piorunkiewicz, Anna

    2015-02-01

    How we can measure the impact of internet technology Web 2.0/3.0 for knowledge management? How we can use the Web 2.0/3.0 technologies for generating, evaluating, sharing, organizing knowledge in knowledge-based organization? How we can evaluate it from user-centered perspective? Article aims to provide a method for evaluate the usability of web technologies to support knowledge management in knowledge-based organizations of the various stages of the cycle knowledge management, taking into account: generating knowledge, evaluating knowledge, sharing knowledge, etc. for the modern Internet technologies based on the example of agent technologies. The method focuses on five areas of evaluation: GUI, functional structure, the way of content publication, organizational aspect, technological aspect. The method is based on the proposed indicators relating respectively to assess specific areas of evaluation, taking into account the individual characteristics of the scoring. Each of the features identified in the evaluation is judged first point wise, then this score is subject to verification and clarification by means of appropriate indicators of a given feature. The article proposes appropriate indicators to measure the impact of Web 2.0/3.0 technologies for knowledge management and verification them in an example of agent technology usability in knowledge management system.

  20. Innovation, knowledge and information management in supply chains

    Directory of Open Access Journals (Sweden)

    Szuster Mariusz

    2016-03-01

    Full Text Available In this study the question of innovation and information management in supply chain is addressed. We assume that innovation and information management are interrelated in supply chains and that the relationship is crucial for their success on the market. Considerable attention was given to the issue of outsourcing which is now a commonplace in supply chain management. In particular, we examined how approaches to managing information and knowledge in the supply chain differ according to ICT outsourcing. The deduction is based on a data set of 426 companies located in Poland, representing a variety of industry sectors. Two stages of the research were realised. The rationale behind this was to identify enterprises that utilise a welldeveloped system of information and knowledge management to determine the scope of possible in-depth analyses. This helped to receive valuable responses. We find what information and knowledge management is mainly driven by. We show the similarities and differences in information and knowledge management between entities that use ICT outsourcing and those that do not. We discuss the research results and draw conclusions.

  1. Restorative Justice and Knowledge Management in Africa: A ...

    African Journals Online (AJOL)

    The article seeks to demonstrate the applicability of the Trans-dimensional Knowledge Management Model (TDKM-M) to restorative justice in Africa. The TDKM-M contradicts existing models of conflict control, management and resolution in Africa. The TDKM-M demonstrate that knowledge can be managed in such a way ...

  2. The Common Body of Knowledge: A Framework to Promote Relevant Information Security Research

    Directory of Open Access Journals (Sweden)

    Kenneth J. Knapp

    2007-03-01

    Full Text Available This study proposes using an established common body of knowledge (CBK as one means of organizing information security literature.  Consistent with calls for more relevant information systems (IS research, this industry-developed framework can motivate future research towards topics that are important to the security practitioner.  In this review, forty-eight articles from ten IS journals from 1995 to 2004 are selected and cross-referenced to the ten domains of the information security CBK.  Further, we distinguish articles as empirical research, frameworks, or tutorials.  Generally, this study identified a need for additional empirical research in every CBK domain including topics related to legal aspects of information security.  Specifically, this study identified a need for additional IS security research relating to applications development, physical security, operations security, and business continuity.  The CBK framework is inherently practitioner oriented and using it will promote relevancy by steering IS research towards topics important to practitioners.  This is important considering the frequent calls by prominent information systems scholars for more relevant research.  Few research frameworks have emerged from the literature that specifically classify the diversity of security threats and range of problems that businesses today face.  With the recent surge of interest in security, the need for a comprehensive framework that also promotes relevant research can be of great value.

  3. Knowledge Management System Untuk SDM Menggunakan Seci Model (Studi Kasus: Koperasi Karyawan

    Directory of Open Access Journals (Sweden)

    Eva Zuraidah

    2018-04-01

    Full Text Available Abstrak Koperasi Pegawai Badan Urusan Logistik adalah sebuah Koperasi yang bergerak dalam bidang jasa, simpan-pinjam. Knowledge Managment System tersebut, nampaknya sudah menjadi suatu kebutuhan mendasarkan untuk meningkatkan kualitas sumber daya manusia yang khususnya kepada karyawan. Knowledge management merupakan usaha untuk meningkatkan knowledge yang berguna dalam koperasi. Knowledge management tidak hanya merupakan pengaturan akan knowldge, namun lebih pada manajemen suatu koperasi dengan fokus khususnya terhadap knowledge, knowledge management dengan sebuah sistem, yang diharapkan dapat menjadi solusi dari kebutuhan aliran knowledge yang tidak dihalangi oleh batasan waktu dan tempat. Penelitian ini akan mengembangkan analisa knowledge management system dan merancang aplikasi dari analisa yang dikembangkan. Metodologi yang digunakan dengan model SECI dan melakukan analisa untuk mendapatkan knowledge management system tersebut. Analisa knowledge management system yang dihasilkan mendukung proses Sosialisasi, Eksternalisasi, Kombinasi, Internalisasi (SECI. Knowledge management system ini dikembangkan sebagai sarana sharing pada karyawan. Kata kunci: Knowledge Management System,SECI, Koperasi,SDM Abstract Employee Cooperative Agency of Logistics Affairs is a cooperative engaged in services, savings, and loans. Knowledge Managment System, it seems to have become a basic need to improve the quality of human resources, especially to employees. Knowledge management is an attempt to improve knowledge useful in cooperatives. Knowledge management is not only an arrangement of knowledge but rather the management of a cooperative with a particular focus on knowledge, knowledge management with a system, which is expected to be a solution of the needs of the flow of knowledge that is not hindered by time and space constraints. This research will develop the knowledge management system and design the application of the developed analysis. The methodology

  4. Managing Knowledge through "Hoshin Kanri"

    Science.gov (United States)

    Tennant C.; Roberts P.

    2003-01-01

    A fundamental challenge within business organizations (whether manufacturing or service, large or small) is posed by the difficulties associated with managing knowledge to integrate the long-term vision and strategic goals with daily working processes and with people. The traditional Western approach of "Management by Objectives" (MbO)…

  5. Integrating knowledge seeking into knowledge management models and frameworks

    Directory of Open Access Journals (Sweden)

    Francois Lottering

    2012-09-01

    Objectives: This article investigates the theoretical status of the knowledge-seeking process in extant KM models and frameworks. It also statistically describes knowledge seeking and knowledge sharing practices in a sample of South African companies. Using this data, it proposes a KM model based on knowledge seeking. Method: Knowledge seeking is traced in a number of KM models and frameworks with a specific focus on Han Lai and Margaret Graham’s adapted KM cycle model, which separates knowledge seeking from knowledge sharing. This empirical investigation used a questionnaire to examine knowledge seeking and knowledge sharing practices in a sample of South African companies. Results: This article critiqued and elaborated on the adapted KM cycle model of Lai and Graham. It identified some of the key features of knowledge seeking practices in the workplace. It showed that knowledge seeking and sharing are human-centric actions and that seeking knowledge uses trust and loyalty as its basis. It also showed that one cannot separate knowledge seeking from knowledge sharing. Conclusion: The knowledge seeking-based KM model elaborates on Lai and Graham’s model. It provides insight into how and where people seek and share knowledge in the workplace. The article concludes that it is necessary to cement the place of knowledge seeking in KM models as well as frameworks and suggests that organisations should apply its findings to improving their knowledge management strategies.

  6. Enhancing knowledge sharing management using BIM technology in construction.

    Science.gov (United States)

    Ho, Shih-Ping; Tserng, Hui-Ping; Jan, Shu-Hui

    2013-01-01

    Construction knowledge can be communicated and reused among project managers and jobsite engineers to alleviate problems on a construction jobsite and reduce the time and cost of solving problems related to constructability. This paper proposes a new methodology for the sharing of construction knowledge by using Building Information Modeling (BIM) technology. The main characteristics of BIM include illustrating 3D CAD-based presentations and keeping information in a digital format and facilitation of easy updating and transfer of information in the BIM environment. Using the BIM technology, project managers and engineers can gain knowledge related to BIM and obtain feedback provided by jobsite engineers for future reference. This study addresses the application of knowledge sharing management using BIM technology and proposes a BIM-based Knowledge Sharing Management (BIMKSM) system for project managers and engineers. The BIMKSM system is then applied in a selected case study of a construction project in Taiwan to demonstrate the effectiveness of sharing knowledge in the BIM environment. The results demonstrate that the BIMKSM system can be used as a visual BIM-based knowledge sharing management platform by utilizing the BIM technology.

  7. Bridging the Science-Management Divide: Moving from Unidirectional Knowledge Transfer to Knowledge Interfacing and Sharing

    Directory of Open Access Journals (Sweden)

    Dirk J. Roux

    2006-06-01

    Full Text Available Sustainable ecosystem management relies on a diverse and multi-faceted knowledge system in which techniques are continuously updated to reflect current understanding and needs. The challenge is to minimize delay as ideas flow from intent through scientific capability, and finally to implementation to achieve desired outcomes. The best way to do this is by setting the stage for the flow of knowledge between researchers, policy makers, and resource managers. The cultural differences between these groups magnify the challenge. This paper highlights the importance of the tacit dimension of knowledge, and how this renders the concept of knowledge transfer much less useful than the concepts of information transfer and technology transfer. Instead of knowledge transfer, we propose that "co-production" of knowledge through collaborative learning between "experts" and "users" is a more suitable approach to building a knowledge system for the sustainable management of ecosystems. This can be achieved through knowledge interfacing and sharing, but requires a shift from a view of knowledge as a "thing" that can be transferred to viewing knowledge as a "process of relating" that involves negotiation of meaning among partners. Lessons from informal communities of practice provide guidance on how to nurture and promote knowledge interfacing between science and management in R&D programs.

  8. A VIEWPOINT ON THE CURRENT STATE OF KNOWLEDGE MANAGEMENT INSTRUMENTS

    Directory of Open Access Journals (Sweden)

    ANDREEA PAULA DUMITRU

    2011-04-01

    Full Text Available Knowledge management is seeking solutions to harmonize the objectives of organizations of the human group, which need to rationalize, to provide policy makers and to implement. This article aims to provide readers with an introduction to knowledge management basic definitions, theories and concepts such as types of knowledge, the differences between data, information and knowledge, etc, are given. But, why we need a knowledge management ? This article justified the need for companies to focus management efforts on their intangible elements and provides the five enabling conditions for knowledge creation.

  9. Paradigms of knowledge management with systems modelling case studies

    CERN Document Server

    Pandey, Krishna Nath

    2016-01-01

    This book has been written by studying the knowledge management implementation at POWERGRID India, one of the largest power distribution companies in the world. The patterns which have led to models, both hypothesized and data-enabled, have been provided. The book suggests ways and means to follow for knowledge management implementation, especially for organizations with multiple business verticals to follow. The book underlines that knowledge is both an entity and organizational asset which can be managed. A holistic view of knowledge management implementation has been provided. It also emphasizes the phenomenological importance of human resource parameters as compared to that of technological parameters. Various hypotheses have been tested to validate the significant models hypothesized. This work will prove useful to corporations, researchers, and independent professionals working to study or implement knowledge management paradigms.

  10. Radwaste knowledge management in cooperation with the IAEA

    International Nuclear Information System (INIS)

    Batyukhnova, O.G.; Dmitriev, S.A.; Ozhovan, M.I.; Drejs, Z.; )

    2010-01-01

    The authors report on the emerging of the term knowledge management, and the practice of accumulation and preservation of nuclear knowledge. They emphasize that in addition to collecting and keeping scientific knowledge and identification of practical skills, management of nuclear knowledge includes setting the priorities to take into account the expected departure of retiring experts, and creating the mechanisms for attracting and training future employees. Education and training in radwaste management, as in the entire nuclear sector, is of a multi-disciplinary nature. It requires understanding of subjects such as geology, civil construction, mining, hydrogeology, chemistry, geophysics, mechanics, computing, etc. Moreover, this field is plagued with difficulty of reaching scientific, technical and even social consensus. Creation of effective and efficiently-operating systems for maintaining and disseminating knowledge is a complex and labour-consuming task. The role of the IAEA in the field of radwaste knowledge management is underlined. The SUE SIA Radon Moscow' experience and practice in training specialists of various professions and levels (including regulatory personnel) are described [ru

  11. KNOWLEDGE MANAGEMENT PROCESSES AND INTELLECTUAL PROPERTY MANAGEMENT PROCESSES: AN INTEGRATED CONCEPTUAL FRAMEWORK

    OpenAIRE

    HENAO-CALAD, MONICA; RIVERA-MONTOYA, PAULA; URIBE-OCHOA, BEATRIZ

    2017-01-01

    ABSTRACT Intellectual property management, knowledge management are disciplines that have been treated independently, both in academia and in the organizational field. Through the legal discipline of intellectual property, the former manages intangible assets that are eligible for protection (copyright, patents and trademarks, among others) leaving aside those assets that cannot be realized in any way. The latter is devoted to the processes of knowledge management in general, namely, the know...

  12. An Integrated Knowledge Management System

    Directory of Open Access Journals (Sweden)

    Vasile Mazilescu

    2014-11-01

    Full Text Available The aim of this paper is to present a Knowledge Management System based on Fuzzy Logic (FLKMS, a real-time expert system to meet the challenges of the dynamic environment. The main feature of our integrated shell FLKMS is that it models and integrates the temporal relationships between the dynamic of the evolution of an economic process with some fuzzy inferential methods, using a knowledge model for control, embedded within the expert system’s operational knowledge base.

  13. IT Security Vulnerability and Incident Response Management

    NARCIS (Netherlands)

    Hafkamp, W.H.M.; Paulus, S.; Pohlman, N.; Reimer, H.

    2006-01-01

    This paper summarises the results of a Dutch PhD research project on IT security vulnerability and incident response management, which is supervised by the University of Twente in the Netherlands and which is currently in its final stage. Vulnerabilities are ‘failures or weaknesses in computer

  14. Knowledge And Knowledge Management As A Competitive Advantage

    Directory of Open Access Journals (Sweden)

    Diana Bratić

    2009-01-01

    Full Text Available In the modern business environment with high turbulence and complexity, an organization’s force to create and sustain competitive advantage lies in what it knows not what it owns. Establishment of a knowledge management in organization will ensure sustainable competitive advantage because the intellectual capital has become the primary bases of core competencies and the key to superior performance. The transition from industrial to knowledge society, effective use of knowledge is one of the deciding factors in the struggle for competitiveness because it will ensure the rationality, efficiency and flexibility in operations, and only through the realization of those graphics company can gain a competitive advantage on the market.

  15. Health Care Leadership: Managing Knowledge Bases as Stakeholders.

    Science.gov (United States)

    Rotarius, Timothy

    Communities are composed of many organizations. These organizations naturally form clusters based on common patterns of knowledge, skills, and abilities of the individual organizations. Each of these spontaneous clusters represents a distinct knowledge base. The health care knowledge base is shown to be the natural leader of any community. Using the Central Florida region's 5 knowledge bases as an example, each knowledge base is categorized as a distinct type of stakeholder, and then a specific stakeholder management strategy is discussed to facilitate managing both the cooperative potential and the threatening potential of each "knowledge base" stakeholder.

  16. Practical examples of how knowledge management is addressed in Point Lepreau heat transport ageing management programs

    International Nuclear Information System (INIS)

    Slade, J.; Gendron, T.; Greenlaw, G.

    2009-01-01

    In the mid-1990s, New Brunswick Power Nuclear implemented a Management System Process Model at the Point Lepreau Generating Station that provides the basic elements of a knowledge management program. As noted by the IAEA, the challenge facing the nuclear industry now is to make improvements in knowledge management in areas that are more difficult to implement. Two of these areas are: increasing the value of existing knowledge, and converting tacit knowledge to explicit knowledge (knowledge acquisition). This paper describes some practical examples of knowledge management improvements in the Point Lepreau heat transport system ageing management program. (author)

  17. PATTERNS FOR IDENTIFYING APPROPRIATE KNOWLEDGE MANAGEMENT STRATEGIES IN ORGANIZATIONS

    Directory of Open Access Journals (Sweden)

    Khadijeh Salmani

    2012-06-01

    Full Text Available Nowadays, striving to find an efficient way for developing or identifying appropriate knowledge management strategies in organizations has become so critical. Researchers and practitioners have attached great importance to information pyramids in organizations and have highlighted the lack of trained and skilled staff as a serious problem. On the other hand, having more flexibility at workplace, offering better service, and fulfilling customers' demands require a strategy for managing knowledge and its consequence. Knowledge management provides a wide range of different strategies and methods for identifying, creating, and sharing knowledge in organizations. This deep insight which consists of individual, organization’s experience, knowledge, and understanding helps organization respond to both internal and external stimuli and act in harmony. One fact which has seemingly achieved a consensus is the need for different strategies of knowledge management. Among the wide range of various and often unclear knowledge management strategies one can choose a strategy in a specific situation. The aim of this paper is to respond to strategic questions which emphasize competitive intelligence and internal knowledge retrieval system. The implications are discussed in detail.

  18. Architecture of security management unit for safe hosting of multiple agents

    Science.gov (United States)

    Gilmont, Tanguy; Legat, Jean-Didier; Quisquater, Jean-Jacques

    1999-04-01

    In such growing areas as remote applications in large public networks, electronic commerce, digital signature, intellectual property and copyright protection, and even operating system extensibility, the hardware security level offered by existing processors is insufficient. They lack protection mechanisms that prevent the user from tampering critical data owned by those applications. Some devices make exception, but have not enough processing power nor enough memory to stand up to such applications (e.g. smart cards). This paper proposes an architecture of secure processor, in which the classical memory management unit is extended into a new security management unit. It allows ciphered code execution and ciphered data processing. An internal permanent memory can store cipher keys and critical data for several client agents simultaneously. The ordinary supervisor privilege scheme is replaced by a privilege inheritance mechanism that is more suited to operating system extensibility. The result is a secure processor that has hardware support for extensible multitask operating systems, and can be used for both general applications and critical applications needing strong protection. The security management unit and the internal permanent memory can be added to an existing CPU core without loss of performance, and do not require it to be modified.

  19. A framework for managing customer knowledge in retail industry

    Directory of Open Access Journals (Sweden)

    Sourav Mukherji

    2012-06-01

    Full Text Available Customer knowledge can be a critical source of competitive advantage in retail business. In this theoretical paper, three sources of customer knowledge are identified in the retail environment, namely customer transactions, customer interactions and customer communities of practice. Lessons for managing these three types of knowledge are derived from knowledge management practices of knowledge intensive service industries such as management consulting and software development. Finally, a decision model premised on consumer behaviour and purchase characteristics is proposed. The model would enable retailers to focus their knowledge management efforts to leverage the potential of customer knowledge for both productivity benefits and product innovation.

  20. Editorial: Collaborative Knowledge Management and E-Learning

    Directory of Open Access Journals (Sweden)

    Helen S. Du

    2011-06-01

    Full Text Available Finding effective ways to collaborate, and to create and share knowledge among people who are connected via disperse networks is one of the most challenging tasks. Many of our traditional learning models and educational systems are not yet ready for new forms of collaboration and knowledge management due to recent technology advancement. To achieve effective education and training, we need to pay attention not only to the technology itself, but also to technology infrastructures, pedagogies, social, and management aspects. This special issue of the KM&EL international journal focuses on recent directions for the alignment of collaborative knowledge management and e-learning, and their rising impact on research and pedagogical practice.

  1. An integration architecture for knowledge management system and business process management system

    NARCIS (Netherlands)

    Jung, J.; Choi, I.; Song, M.S.

    2007-01-01

    Recently, interests in the notion of process-oriented knowledge management (PKM) from academia and industry have been significantly increased. Comprehensive research and development requirements along with a cogent framework, however, have not been proposed for integrating knowledge management (KM)

  2. CENS as a network for knowledge dissemination and for expertise on energy, nuclear safety and security

    International Nuclear Information System (INIS)

    Chakraborty, S.; Stoian, A.

    2005-01-01

    This is a time when the whole of Europe faces energy and environmental transitions. CEE countries face in addition the challenge of implementing medium- to long-term energy reforms in order to comply with EU legislation and practices. Crucial to the proper managing of these common and fundamental concerns is the cooperation between developed and transforming countries. At a lower level this implies that problems specific to CEE countries, such as fragmentation and lack of performing resources, can be overcome through collaboration and knowledge transfer within a network of concerned and competent entities. As an organization aiming to support environmental protection by enhancing the safety and security of nuclear facilities in CEE countries, CENS is focused on being an independent forum and platform organization for the dissemination of scientific and technical knowledge and of expertise in the nuclear and energy-related communities. In seeking to achieve this objective, CENS has over the past two years provided a system of networking and international membership for nuclear regulators in CEE countries and for technical support organizations from around Europe. (orig.)

  3. EFFICIENCY INDICATORS INFORMATION MANAGEMENT IN INTEGRATED SECURITY SYSTEMS

    Directory of Open Access Journals (Sweden)

    N. S. Rodionova

    2014-01-01

    Full Text Available Summary. Introduction of information technology to improve the efficiency of security activity leads to the need to consider a number of negative factors associated with in consequence of the use of these technologies as a key element of modern security systems. One of the most notable factor is the exposure to information processes in protection systems security threats. This largely relates to integrated security systems (ISS is the system of protection with the highest level of informatization security functions. Significant damage to protected objects that they could potentially incur as a result of abnormal operation ISS, puts a very actual problem of assessing factors that reduce the efficiency of the ISS to justify the ways and methods to improve it. Because of the nature of threats and blocking distortion of information in the ISS of interest are: the volume undistorted ISF working environment, as a characteristic of data integrity; time access to information as a feature of its availability. This in turn leads to the need to use these parameters as the performance characteristics of information processes in the ISS - the completeness and timeliness of information processing. The article proposes performance indicators of information processes in integrated security systems in terms of optimal control procedures to protect information from unauthorized access. Set the considered parameters allows to conduct comprehensive security analysis of integrated security systems, and to provide recommendations to improve the management of information security procedures in them.

  4. Knowledge Management and Intellectual Capital: Establishing a Field of Practice

    DEFF Research Database (Denmark)

    and techniques involving many different management areas have been introduced. Taking a variety of angles and perspectives this book shows how knowledge management is actually practised in many different European firms. By focusing on knowledge, new dimensions of well-known management principles and concepts......Evidence in recent years of increasing interest in knowledge and how to manage it can be observed not only in the management literature but also in companies. The introduction of new views has taken place under headings such as "knowledge management" and intellectual capital. Several new methods...... emerge. Leading researchers and experts from European business schools offer new insight into the range of practical problems that can be addressed and methods that can be applied when knowledge is put on the management agenda....

  5. Knowledge management practices at selected banks in South Africa

    Directory of Open Access Journals (Sweden)

    Joel Chigada

    2015-06-01

    Full Text Available Background: Effective knowledge organisations (EKO create dynamic capabilities through the acquisition, creation, sharing and retention of knowledge. These EKOs are designed to enable an organisation to improve best practices in business. As knowledge is different from other organisational resources, decision-makers ought to understand the importance of knowledge to an organisation. In order to fully utilise knowledge-management (KM practices and to enhance efficiency, management should appreciate and understand the importance of KM. A proper understanding of KM will add value to organisational knowledge. Objective: This study focused on investigating the knowledge-management practices at selected banks in South Africa. The objective was to establish the extent to which selected banks had implemented knowledge-management practices such as the acquisition, sharing and retention of knowledge. Method: Quantitative and qualitative data for this study were collected through the use of a multi-methods approach. Data were collected from middle and senior managers through the use of questionnaires and an interview protocol. All usable quantitative data were analysed using Survey Monkey and Microsoft Excel 2010 whilst thematic analysis was used to extract detailed, rich and complex data accounts from interviews. Results: Though the study revealed the presence of KM practices at selected banks, KM concepts were not universally understood, thus impeding the organisation-wide implementation of KM practices. Knowledge-management practices were only discussed as a footnote because no formal policies existed to add value to KM initiatives. Conclusion: The study concludes that organisations such as banks should perform a knowledge inventory. Knowledge inventories will become handy during the process of developing KM policies and practices for integrating work processes, collaborating and sharing (including the efficient use of knowledge technology platforms and

  6. Introducing Knowledge Management in Study Program of Nuclear Engineering

    International Nuclear Information System (INIS)

    Pleslic, S.

    2012-01-01

    Nuclear engineering is the branch of engineering concerning application of the fission as well as the fusion of atomic nuclei, and the application of other sub-atomic physics, based on the principles of nuclear physics. In the sub-field of nuclear fission there are many investigations of interactions and maintaining of systems and components like nuclear reactors and nuclear power plants. The field also includes the study of different applications of ionizing radiation (medicine, agriculture...), nuclear safety, the problems of thermodynamics transport, nuclear materials and nuclear fuels, and other related technologies like radioactive waste management. In the area of nuclear science and engineering a big amount of knowledge has been accumulated over the last decades. Different levels of nuclear knowledge were considered in different ways and they were taught to different parts of population as a general human culture and as a general scientific-technical-technological culture (high schools, nuclear information centres, training centres, universities...). An advanced level of nuclear knowledge has been accumulated by many experienced workers, specialists and experts in all nuclear and nuclear-related fields and applications. In the last 20 years knowledge management has established itself as a discipline of enabling individuals, teams and whole organizations to create, share and apply knowledge collectively and systematically, with goal to better achieve their objectives. Also, knowledge management became key strategic approach for management of intellectual assets and knowledge that can improve safety, efficiency and innovation, and lead to preserve and enhance current knowledge. Knowledge management could be applied in education, training, networking, human resource development and capacity building, sharing, pooling and transferring knowledge form centres of knowledge to centres of growth. Considering the critical importance of nuclear knowledge it is important

  7. Report: Fiscal Year 2011 Federal Information Security Management Act Report Status of EPA’s Computer Security Program

    Science.gov (United States)

    Report #12-P-0062, November 9, 2011. Attached is the Office of Inspector General’s (OIG’s) Fiscal Year 2011 Federal Information Security Management Act (FISMA) Reporting Template, as prescribed by the Office of Management and Budget (OMB).

  8. Security-Enhanced Autonomous Network Management

    Science.gov (United States)

    Zeng, Hui

    2015-01-01

    Ensuring reliable communication in next-generation space networks requires a novel network management system to support greater levels of autonomy and greater awareness of the environment and assets. Intelligent Automation, Inc., has developed a security-enhanced autonomous network management (SEANM) approach for space networks through cross-layer negotiation and network monitoring, analysis, and adaptation. The underlying technology is bundle-based delay/disruption-tolerant networking (DTN). The SEANM scheme allows a system to adaptively reconfigure its network elements based on awareness of network conditions, policies, and mission requirements. Although SEANM is generically applicable to any radio network, for validation purposes it has been prototyped and evaluated on two specific networks: a commercial off-the-shelf hardware test-bed using Institute of Electrical Engineers (IEEE) 802.11 Wi-Fi devices and a military hardware test-bed using AN/PRC-154 Rifleman Radio platforms. Testing has demonstrated that SEANM provides autonomous network management resulting in reliable communications in delay/disruptive-prone environments.

  9. Cofrentes NPP Knowledge management plan

    International Nuclear Information System (INIS)

    Pardo Gonzalez, F.

    2016-01-01

    The main objective of the Knowledge Management Plan at Cofrentes Nuclear Power Plant is therefore to establish the steps to be followed for distributing and sharing the existing knowledge at the Plant through collaboration and continuous learning and exchanges with internal and external groups. It is also very important that staff and organisational learning is closely in line with Plant expectations. (Author)

  10. Towards a People-Oriented Knowledge Management Environment

    NARCIS (Netherlands)

    Dignum, V.

    2000-01-01

    In this preliminary report we present ongoing research on intelligent knowledge management (KM) environments supporting communication in a virtual environment. An agent community handles the interaction between knowledge sources of different degrees of formality and knowledge users and

  11. Cross-Cultural Knowledge Management

    CERN Document Server

    Giudice, Manlio Del; Peruta, Maria Rosaria Della

    2012-01-01

    Cross-cultural knowledge management, an elusive yet consequential phenomenon, is becoming an increasingly essential factor in organizational practice and policy in the era of globalization. In order to overcome culturally shaped blind spots in conducting research in different settings, this volume highlights how the structuring of roles, interests, and power among different organizational elements, such as teams, departments, and management hierarchies (each comprised of members from different intellectual and professional backgrounds), generates various paradoxes and tensions that bring into

  12. Knowledge and pharmacological management of Alzheimer's disease by managing community pharmacists: a nationwide study.

    Science.gov (United States)

    Zerafa, Natalie; Scerri, Charles

    2016-12-01

    Background Managing community pharmacists can play a leading role in supporting community dwelling individuals with Alzheimer's disease and their caregivers. Objective The main purpose of this study was to assess knowledge of managing community pharmacists towards Alzheimer's disease and its pharmacological management. Setting Community pharmacies in the Maltese islands. Method A nationwide survey was conducted with full-time managing community pharmacists in possession of a tertiary education degree in pharmacy studies. The level of knowledge was investigated using the Alzheimer's Disease Knowledge Scale and the Alzheimer's Disease Pharmacotherapy Measure. Participants were also asked to rate a number of statements related to disease management. Results Maltese managing community pharmacists (57 % response rate) had inadequate knowledge on risk factors, caregiving issues and pharmacological management of Alzheimer's disease. Age and number of years working in a community pharmacy setting were found to be negatively correlated with increased knowledge. Conclusion The findings highlight the need of providing training and continued educational support to managing community pharmacists in order to provide quality advice to individuals with dementia and their caregivers in the community.

  13. Designing a fuzzy expert system for selecting knowledge management strategy

    OpenAIRE

    Ameneh Khadivar; Shohreh Nasri Nasr Abadi; Elham Fallah

    2014-01-01

    knowledge management strategy is mentioned as one of the most important success factors for implementing knowledge management. The KM strategy selection is a complex decision that requires consideration of several factors. For evaluation and selection of an appropriate knowledge management strategy in organizations, many factors must be considered. The identified factors and their impact on knowledge management strategy are inherently ambiguous. In this study, an overview of theoretical found...

  14. Implementation of Knowledge Management as Process to Management System of ÚJD SR

    International Nuclear Information System (INIS)

    Szabó, V.

    2016-01-01

    Full text: This presentation provides basic information about the development of staff’s knowledge management of Nuclear Regulatory Authority of Slovak Republic. It is a case study about implementation of knowledge management as process to the integrated management system for Slovak regulatory body. (author

  15. A Conceptual Framework for Examining Knowledge Management in Higher Education Contexts

    Science.gov (United States)

    Lee, Hae-Young; Roth, Gene L.

    2009-01-01

    Knowledge management is an on-going process that involves varied activities: diagnosis, design, and implementation of knowledge creation, knowledge transfer, and knowledge sharing. The primary goal of knowledge management, like other management theories or models, is to identify and leverage organizational and individual knowledge for the…

  16. Information security risk management and incompatible parts of organization

    Directory of Open Access Journals (Sweden)

    Elham Talabeigi

    2016-11-01

    Full Text Available Purpose: we prepared a questionnaire to evaluate Incompatible parts and also risk management in University of Science and Technology E-Learning Center and studying the Incompatible parts impacts on utility of organization. Design/methodology/approach: By using coalitional game theory we present a new model to recognize the degrees of incompatibility among independent divisions of an organization with dependent security assets. Based on positive and negative interdependencies in the parts, the model provides how the organization can decrease the security risks through non-cooperation rather than cooperation. we implement the proposed model of this paper by analyzing the data which have been provided by questionnaires from different three managers' ideas of Iran University of Science and Technology E-Learning Center located in Iran University of Science and Technology, Tehran, Iran. Findings: In general, by collecting data and analyzing them, the survey showed that Incompatible parts of organizations have negative impacts on utility of organization risk management process. Furthermore, it adds values to other organizations and provides the best practices in planning, developing, implementing and monitoring risk management in organizations. Research limitations/implications: Since Information security and also Risk Management are still areas which need to improve in some Iranian universities, we couldn’t consider them in our analysis. On the other hand, due to questionnaire limitation, the study’s sample size is 1. This size may be considered large for our statistical analysis. Originality/value:  The main contribution of this paper is to propose a model for non-cooperation among a number of divisions in a organization and using risk management factors.

  17. Embedding security messages in existing processes: a pragmatic and effective approach to information security culture change

    CERN Document Server

    Lopienski, Sebastian

    Companies and organizations world-wide depend more and more on IT infrastructure and operations. Computer systems store vital information and sensitive data; computing services are essential for main business processes. This high dependency comes with a number of security risks, which have to be managed correctly on technological, organizational and human levels. Addressing the human aspects of information security often boils down just to procedures, training and awareness raising. On the other hand, employees and collaborators do not adopt security attitude and habits simply when told to do so – a real change in behaviour requires an established security culture. But how to introduce a security culture? This thesis outlines the need of developing or improving security culture, and discusses how this can be done. The proposed approach is to gradually build security knowledge and awareness, and influence behaviours. The way to achieve this is to make security communication pervasive by embedding security me...

  18. Developing knowledge management systems with an active expert methodology

    International Nuclear Information System (INIS)

    Sandahl, K.

    1992-01-01

    Knowledge management, understood as the ability to store, distribute and utilize human knowledge in an organization, is the subject of this dissertation. In particular we have studied the design of methods and supporting software for this process. Detailed and systematic description of the design and development processes of three case-study implementations of knowledge management software are provided. The outcome of the projects is explained in terms of an active expert development methodology, which is centered around support for a domain expert to take substantial responsibility for the design and maintenance of a knowledge management system in a given area of application. Based on the experiences from the case studies and the resulting methodology, an environment for automatically supporting knowledge management was designed in the KNOWLEDGE-LINKER research project. The vital part of this architecture is a knowledge acquisition tool, used directly by the experts in creating and maintaining a knowledge base. An elaborated version of the active expert development methodology was then formulated as the result of applying the KNOWLEDGE-LINKER approach in a fourth case study. This version of the methodology is also accounted for and evaluated together within the supporting KNOWLEDGE-LINKER architecture. (au)

  19. Expert knowledge maps for knowledge management: a case study in Traditional Chinese Medicine research.

    Science.gov (United States)

    Cui, Meng; Yang, Shuo; Yu, Tong; Yang, Ce; Gao, Yonghong; Zhu, Haiyan

    2013-10-01

    To design a model to capture information on the state and trends of knowledge creation, at both an individual and an organizational level, in order to enhance knowledge management. We designed a graph-theoretic knowledge model, the expert knowledge map (EKM), based on literature-based annotation. A case study in the domain of Traditional Chinese Medicine research was used to illustrate the usefulness of the model. The EKM successfully captured various aspects of knowledge and enhanced knowledge management within the case-study organization through the provision of knowledge graphs, expert graphs, and expert-knowledge biography. Our model could help to reveal the hot topics, trends, and products of the research done by an organization. It can potentially be used to facilitate knowledge learning, sharing and decision-making among researchers, academicians, students, and administrators of organizations.

  20. Knowledge management initiatives benefits for the Slovenian public sector

    Directory of Open Access Journals (Sweden)

    Simon Colnar

    2017-01-01

    Full Text Available This paper highlights the importance of knowledge management in Slovenian public sector organizations. Knowledge management has received a lot of attention in the past two decades, however in the public sector it is still under-researched. The global financial and economic crisis revealed some important organizational weaknesses in the Republic of Slovenia, some particularly due to the ineffectiveness of the Slovenian public sector, which ranks amongst the worst in the Euro zone. Authors argue that a stronger commitment to knowledge management, which is currently unused in the Slovenian public sector, represents an opportunity to coordinate and exploit public sector organizational knowledge resources. After analysing existing literature, authors have identified examples of good practices from foreign countries that could be partially transferred and adapted into the Slovenian environment. Since the efficient use of knowledge is linked to the performance of public sector organizations, the paper suggests that successful implementation of knowledge management initiatives should result in a more efficient public sector and, indirectly, in improved international public sector competitiveness rankings. This paper is also considered to be important for public sector practitioners and managers, as it proposes implementation of a knowledge management pilot project in Slovenian public sector.