• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 45
  • 15
  • 12
  • 10
  • 7
  • 6
  • 5
  • 5
  • 2
  • 2
  • 1
  • 1
  • Tagged with
  • 131
  • 74
  • 73
  • 24
  • 21
  • 18
  • 13
  • 12
  • 12
  • 11
  • 11
  • 10
  • 9
  • 9
  • 9
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
121

Role of knowledge management enablers in facilitating knowledge management practices in selected private higher education institutions in Botswana

Makambe, Ushe 02 1900 (has links)
This research was set out to investigate the role of knowledge management as a coping strategy for PHE institutions in Botswana, especially given that they operate in a highly regulated environment. One of the major drivers of volatility in the educational sector is intensely volatile regulatory environment in which the institutions operate. Further, a large portion of the stakeholder community of these institutions hold a strong believe that these institutions offer poor quality education to maximise profit. The primary objective of this study is therefore to determine the role of knowledge management (KM) enablers in facilitating KM practices in selected PHE institutions in Botswana that operate in this highly regulated environment and to develop a model for effective KM in these institutions. The study adopted a survey research design and collected quantitative data through a structured self-administered questionnaire and document reviews. The subjects comprised all five degree-awarding PHE institutions, which were strictly regulated by the Tertiary Education Council (TEC). The population surveyed came to 670 and sample size was 350. Data was analysed through various statistical measures such as Structural Equation Modelling (SEM) in the form of Analysis of Variance (ANOVA), multiple regression analysis, and Chi-square test. The results of the study revealed that KM enablers were playing an insignificant role in facilitating KM practices in selected PHE institutions in Botswana. Results of the study can be generalised to similar institutions elsewhere operating in similar environments. In order to enhance KM practices in PHE institutions, it is recommended that the institutions adopt a systematic approach to KM, establish an organisational culture and structure that promote KM practices, and enhance the quality of their human capital including leadership. It should be noted that the state of KM in organisations operating in an uncertain environment can be enhanced if the leadership carefully controls the family-owned setting and organisational culture as these factors can detract from the organisation’s effective practising of KM. However, strategic leadership, organisational structure, and the role played by stakeholders played positive deterministic factors in ensuring an enhanced KM drive. / Business Management / D.Admin. (Business Management)
122

The role of taxonomies in knowledge management

Fouché, Marie-Louise 30 June 2006 (has links)
The knowledge economy has brought about some new challenges for organisations. Accessing data and information in a logical manner is a critical component of information and knowledge management. Taxonomies are viewed as a solution to facilitate ease of access to information in a logical manner. The aim of this research was to investigate the role of taxonomies within organisations which utilise a knowledge management framework or strategy. An interview process was utilised to gain insight from leading organisations as to the use of taxonomies within the knowledge management environment. Organisations are starting to use taxonomies to manage multi-sourced environments and facilitate the appropriate sourcing of the organisations intellectual capital. Based on the research it is clear that taxonomies will play a central role in the coming years to help manage the complexity of the organisation's environment and ease the access to relevant information. / Information Science / M.Inf.
123

Efficient Key Management, and Intrusion Detection Protocols for Enhancing Security in Mobile Ad Hoc Networks

Maity, Soumyadev January 2014 (has links) (PDF)
Security of communications is a major requirement for Mobile Adhoc NETworks(MANETs) since they use wireless channel for communications which can be easily tapped, and physical capture of MANET nodes is also quite easy. From the point of view of providing security in MANETs, there are basically two types of MANETs, viz., authoritarian MANETs, in which there exist one or more authorities who decide the members of the network, and self-organized MANETs, in which there is no such authority. Ensuring security of communications in the MANETs is a challenging task due to the resource constraints and infrastructure-less nature of these networks, and the limited physical security of MANET nodes. Attacks on security in a MANET can be launched by either the external attackers which are not legitimate members of the MANET or the internal attackers which are compromised members of the MANET and which can hold some valid security credentials or both. Key management and authentication protocols(KM-APs)play an important role in preventing the external attackers in a MANET. However, in order to prevent the internal attackers, an intrusion detection system(IDS) is essential. The routing protocols running in the network layer of a MANET are most vulnerable to the internal attackers, especially to the attackers which launch packet dropping attack during data packet forwarding in the MANET. For an authoritarian MANET, an arbitrated KM-AP protocol is perfectly suitable, where trusts among network members are coordinated by a trusted authority. Moreover, due to the resource constraints of a MANET, symmetric key management protocols are more efficient than the public key management protocols in authoritarian MANETs. The existing arbitrated symmetric key management protocols in MANETs, that do not use any authentication server inside the network are susceptible to identity impersonation attack during shared key establishments. On the other hand, the existing server coordinated arbitrated symmetric key management protocols in MANETs do not differentiate the role of a membership granting server(MGS) from the role of an authentication server, and so both are kept inside the network. However, keeping the MGS outside the network is more secure than keeping it inside the network for a MANET. Also, the use of a single authentication server inside the network cannot ensure robustness against authentication server compromise. In self-organized MANETs, public key management is more preferable over symmetric key management, since the distribution of public keys does not require a pre-established secure channel. The main problem for the existing self-organized public key management protocols in MANETs is associated with the use of large size certificate chains. Besides, the proactive certificate chaining based approaches require each member of a MANET to maintain an updated view of the trust graph of the entire network, which is highly resource consuming. Maintaining a hierarchy of trust relationships among members of a MANET is also problematic for the same reason. Evaluating the strength of different alternative trust chains and restricting the length of a trust chain used for public key verification is also important for enhancing the security of self-organized public key management protocols. The existing network layer IDS protocols in MANETs that try to defend against packet dropping attack use either a reputation based or an incentive based approach. The reputation based approaches are more effective against malicious principals than the incentive based approaches. The major problem associated with the existing reputation based IDS protocols is that they do not consider the protocol soundness issue in their design objectives. Besides, most of the existing protocols incorporate no mechanism to fight against colluding principals. Also, an IDS protocol in MANETs should incorporate some secure and efficient mechanism to authenticate the control packets used by it. In order to mitigate the above mentioned problems in MANETs, we have proposed new models and designed novel security protocols in this thesis that can enhance the security of communications in MANETs at lesser or comparable cost. First, in order to perform security analysis of KM-AP protocols, we have extended the well known strand space verification model to overcome some of its limitations. Second, we have proposed a model for the study of membership of principals in MANETs with a view to utilize the concept for analyzing the applicability and the performance of KM-AP protocols in different types of MANETs. Third and fourth, we have proposed two novel KM-AP protocols, SEAP and CLPKM, applicable in two different types of MANET scenarios. The SEAP protocol is an arbitrated symmetric key management protocol designed to work in an authoritarian MANET, whereas the CLPKM protocol is a self-organized public key management protocol designed for self-organized MANETs. Fifth, we have designed a novel reputation based network layer IDS protocol, named EVAACK protocol, for the detection of packet dropping misbehavior in MANETs. All of the three proposed protocols try to overcome the limitations of the existing approaches in their respective categories. We have provided rigorous mathematical proofs for the security properties of the proposed protocols. Performance of the proposed protocols have been compared with those of the other existing similar approaches using simulations in the QualNet simulator. In addition, we have also implemented the proposed SEAP and CLPKM protocols on a real MANET test bed to test their performances in real environments. The analytical, simulation and experimentation results confirm the effectiveness of the proposed schemes.
124

A new framework for a technological perspective of knowledge management

Botha, Antonie Christoffel 26 June 2008 (has links)
Rapid change is a defining characteristic of our modern society. This has huge impact on society, governments, and businesses. Businesses are forced to fundamentally transform themselves to survive in a challenging economy. Transformation implies change in the way business is conducted, in the way people perform their contribution to the organisation, and in the way the organisation perceives and manages its vital assets – which increasingly are built around the key assets of intellectual capital and knowledge. The latest management tool and realisation of how to respond to the challenges of the economy in the new millennium, is the idea of "knowledge management" (KM). In this study we have focused on synthesising the many confusing points of view about the subject area, such as: <ul><li> a. different focus points or perspectives; </li><li> b. different definitions and positioning of the subject; as well as</li><li> c. a bewildering number of definitions of what knowledge is and what KM entails.</li></ul> There exists a too blurred distinction in popular-magazine-like sources about this area between subjects and concepts such as: knowledge versus information versus data; the difference between information management and knowledge management; tools available to tackle the issues in this field of study and practice; and the role technology plays versus the huge hype from some journalists and within the vendor community. Today there appears to be a lack of a coherent set of frameworks to abstract, comprehend, and explain this subject area; let alone to build successful systems and technologies with which to apply KM. The study is comprised of two major parts:<ul><li> 1. In the first part the study investigates the concepts, elements, drivers, and challenges related to KM. A set of models for comprehending these issues and notions is contributed as we considered intellectual capital, organizational learning, communities of practice, and best practices. </li><li> 2. The second part focuses on the technology perspective of KM. Although KM is primarily concerned with non-technical issues this study concentrates on the technical issues and challenges. A new technology framework for KM is proposed to position and relate the different KM technologies as well as the two key applications of KM, namely knowledge portals and knowledge discovery (including text mining). </li></ul> It is concluded that KM and related concepts and notions need to be understood firmly as well as effectively positioned and employed to support the modern business organisation in its quest to survive and grow. The main thesis is that KM technology is a necessary but insufficient prerequisite and a key enabler for successful KM in a rapidly changing business environment. / Thesis (PhD (Computer Science))--University of Pretoria, 2010. / Computer Science / unrestricted
125

Společenský dům / The Social House

Bíza, Petr January 2015 (has links)
The diploma thesis focuses on project of new building of social house in Mutěnice in Hodonín district in South Moravian region. The project is in accordance with official assignment and with contemporary Czech standards and legislation. The building is placed in inner part of the town close to the town centre. It’s designed on an empty plot owned by town. Object should serve to the town citizens as cultural and social meeting point. The building plan is irregullarly-shaped with maximum dimensions 29,5 X 52,0 m and has two floors. Inside the social house there is a dance hall, restastaurant with kitchen and rooms for cultural and social activities of citizens of Mutěnice. Structural system can be divided into two parts. The part of the building with dance hall consists of feinforced concrete frames combined with infill masonry walls. The other part with restaurant and other rooms is made of masonry walls. The foundations of the building are made of concrete strip foundations and reinforced concrete square footings with grade beams. Bearing walls are made of sand-lime blocks KM Beta. Ceilings are made of prestressed concrete floor slabs Spiroll. Partition walls consist of plasterboard panels. The building is roofed by flat extensive green roof. All external walls are insulated with mineral wool. Doors and windows have wooden frames and triple glazing. As result there’s structurally, operationally and aesthetically functional complex, that will be benefit for the town and its citizens, especially for their cultural and social life.
126

BIKEZONE.cz - Cykloprodejna s bytovými jednotkami / BIKEZONE.cz - Bikeshop with flats

Barták, Martin January 2016 (has links)
The aim of the diploma thesis „BIKEZONE.CZ – bikeshop with flats“ is development of detailed documentation to build the bikeshop with flats for permanent living for sixty person on the land number 337/4, in the city named Hradec Králové – Kukleny. The building is designed with the master plan and the surrounding construction and appropriately mounted on the adjacent intersection. The building is designed as a four-floors, partial basement with two-floors bikeshop with own service and the flat part with seventeen flats of the size two or three bedrooms with kitchen. Next to building are designed two car parkings with capacity for 25 cars. The main entrance to the shop is from the street Pražská třída where is a parking for customers a the main entrace to the flat house is from the street Pálenecká. The supporting part will consist of a combination of sand-lime bricks KM BETA and monolithic ceiling and column. The non-supporting part will of sand-lime bricks KM BETA. The roof is flat with a waterproofing membrane of flexible PVC surcharge laundered gravel. Insulation of the building envelope will contact system ETICS terminated blending facade of dark and light gray colors. Doors and windows are wooden with golden oak color shade.
127

Some Advanced Model Selection Topics for Nonparametric/Semiparametric Models with High-Dimensional Data

Fang, Zaili 13 November 2012 (has links)
Model and variable selection have attracted considerable attention in areas of application where datasets usually contain thousands of variables. Variable selection is a critical step to reduce the dimension of high dimensional data by eliminating irrelevant variables. The general objective of variable selection is not only to obtain a set of cost-effective predictors selected but also to improve prediction and prediction variance. We have made several contributions to this issue through a range of advanced topics: providing a graphical view of Bayesian Variable Selection (BVS), recovering sparsity in multivariate nonparametric models and proposing a testing procedure for evaluating nonlinear interaction effect in a semiparametric model. To address the first topic, we propose a new Bayesian variable selection approach via the graphical model and the Ising model, which we refer to the ``Bayesian Ising Graphical Model'' (BIGM). There are several advantages of our BIGM: it is easy to (1) employ the single-site updating and cluster updating algorithm, both of which are suitable for problems with small sample sizes and a larger number of variables, (2) extend this approach to nonparametric regression models, and (3) incorporate graphical prior information. In the second topic, we propose a Nonnegative Garrote on a Kernel machine (NGK) to recover sparsity of input variables in smoothing functions. We model the smoothing function by a least squares kernel machine and construct a nonnegative garrote on the kernel model as the function of the similarity matrix. An efficient coordinate descent/backfitting algorithm is developed. The third topic involves a specific genetic pathway dataset in which the pathways interact with the environmental variables. We propose a semiparametric method to model the pathway-environment interaction. We then employ a restricted likelihood ratio test and a score test to evaluate the main pathway effect and the pathway-environment interaction. / Ph. D.
128

台北縣立國民中學工作團隊之知識管理研究 / A study on knowledge management of work teams in Taipei county junior high school

吳堂鐘 Unknown Date (has links)
本研究是以個案研究的方式,探討台北縣立國民中學的工作團隊之知識性活動與知識管理的差距。分析的項目包括知識管理關鍵因素和組織環境等二部分。同時也對工作團隊面臨的問題及其因應對策進行了解。其中知識管理關鍵因素包括知識的取得、知識的創造、知識的儲存等三項。組織環境的部分包括人員和組織行政的配合情況。 本研究發現,台北縣國民中學教師所組成的工作團隊,雖然在沒有知識管理的認知下,其知識性活動和已在實施的知識管理專案,相距並不大。若是將各個工作團隊採行的知識性活動加以彙整,則這個差距將更小。所以,如果要在這些單位中實施知識管理,應是可行的。 關鍵詞:工作團隊、知識管理、知識的獲得、知識的儲存、知識的創造、小班教學精神、課程統整、多元智慧、電腦輔助教學。 / This research is adopted to the method of case study: deeply discussing the difference between the knowledge activities and knowledge management ( KM ) of the work teams of junior high schools in Taipei County. The analysis items include two parts: the feature components of knowledge management and organizational environment. At the same time, the research also gets understanding in the facing problems of the team work and their coordinate strategies. In detail, the feature components of knowledge management include knowledge gaining, knowledge creation, and knowledge saving. The organizational environment includes the members and administrators of the work teams and their cooperation. The research found that the work teams of the teachers of junior high schools in Taipei County even if without acknowledgement in knowledge management, their knowledge activities are corresponding to the cases of current practicing of knowledge management. If to collect all the knowledge activities addressed by each work teams, the difference is getting smaller. Therefore, it is to say that to practice the knowledge management is doable. Key wards: work team, knowledge management(KM), Knowledge gaming, Knowledge saving, Knowledge creation, the sprits of small class instruction, curriculum integration, multiple intelligences, computer assisted instruction ( CAI ).
129

政府採購入口網站功能架構與關鍵成功因素之研究 / A Study of the functional architecture and Key Success Factors for the Government Electronic Procurement Portal Website

陳冠竹 Unknown Date (has links)
政府入口網站含蓋了眾多提供公共服務的網站,讓民眾或企業進行相關業務的辦理、資訊的查詢以及進行交易等行為。全國或是全球需要使用到政府服務,例如政府採購等之使用者皆是政府入口網站之服務對象。因此政府網站在資料流量含量方面較之於一般商業網站更為可觀,亦包含了電子商務性質。在此狀況下,政府角色亦已逐漸從管制調適為服務。就政府體策略或執行計畫而言,實施知識管理除可使行政單位的工作效率提昇,行政流程時間縮短,更可避免重覆錯誤及誤判訊息之可能。   本研究主要以行政院公共工程委員會目前所推行之『政府採購電子化』計畫為研究對象,冀於對未來五年能達到政府採購作業全面電子化提出建議。本研究之目標係分析研擬「政府電子採購入口網站」之關鍵成功因素,從而由「政府採購電子化」計畫現行系統歸納出具綜效之整合型「政府電子採購入口網站」功能架構,其工作內容如下:   1. 歸納、分析現行各系統及政府採購法推動之問題。   2. 瞭解國內政府入口網站之推動情形,分析企業資訊入口網站解決方案現況。   3. 利用分析層級程序法(Analytic Hierarchy Process,簡稱AHP)歸納出三分類專家,包括工程會內部專家、公部門專家、產業界及學界專家所認為的「政府電子採購入口網站」之關鍵成功因素,同時也分析資訊職務與非資訊職務專家觀點之相異點。   4. 根據歸納出來之關鍵成功因素與內部需求,提出具建設性之「政府電子採購入口網站」功能架構雛形,建議工程會推動「政府採購入口網站」提供之功能依據。   本研究AHP法研究結果如下:   1. 本研究中之各類專家一般認為內在因素比外在環境因素之權重大。   2. 第三層關鍵成功因素包括知識管理機制之健全化、政策及法制配合度、使用者服務機制、資訊系統與營運。整體而言,工程會內部專家與產業界及學界專家兩類專家較重視政策及法制配合度構面因素,而公部門專家比較重視資訊系統與營運構面因素。資訊職務專家較重視政策及法制配合度構面因素,非資訊職務專家比較重視資訊系統與營運構面因素。   3. 整體最底層關鍵成功因素排名前七項分別為高階長官的參與和支持並訂定明確的目標、即時配合實際狀況,修正、鬆綁法規、充裕的資源配合、提昇法令約束力之效力、提供快速回應問題之機制、介面具親和力、操作流程循序簡單、提供高度的可靠性與穩定性。   本研究最後逐一對專家深入訪談、工程會需求訪談、企業資訊入口網站解決方案及關鍵成功因素AHP之分析等結果提出結論與建議。 / An e-Government Portal should integrates numerous websites that offer public service, and provides individuals or enterprises with a platform for trafficking, searching information, and conducting transactions. Thus, all the users, that need to access government service and government procurement information, are potential customers of the e-Government Portal website. Hence, the e-Government Portal website, with e-Commerce quality, has more enormous data flow and database contents in comparison with simple e-Commerce sites. Last but not least, the role of e-Government Portal website is turned gradually into a service provider from its simple transition role of inspection.   From government's strategic aspect, actions regarding knowledge management can not only improve the efficiency and streamline the administrative procedures, but also avoid the crisis of repeating failures and misleadings of messages.   The object of this research is the Electronic Procurement Plan, which was established and promoted by the Public Construction Commission (PCC) of The Executive Yuan, R.O.C. The goal of the Electronic Procurement Plan is to accomplish the electronic commerce of the government procurement entirely in five years. This study aims to find out the critical success factors (CSF) for the Government Electronic Procurement Portal Website, and to carry out a functional architecture for the synergic Government Electronic Procurement Portal Website via the following working packages :   1. to analyze and formulate the problems of promoting the electronic government procurement system and the government procurement law.   2. to discuss the ongoing domestic promotion programs of the e-Government Portal websites and analyze the status quo cases of the Enterprise Information Portal (EIP) solution.   3. to analyze and compare the critical success factors of the Government Electronic Procurement Portal Website of various expert viewpoints through Analytic Hierarchy Process (AHP) method. The experts come from the PCC internal public servants, public servants from other government agencies as well as industrialists and scholars. On the other hand, the different viewpoints between the IT background experts and non-IT background experts are also compared.   4. to summarize constitutive functional architecture for the Government Electronic Procurement Portal Website according to the resulted CSF and the PCC internal requirements.   The results of AHP analysis can be stated as following:   1. The internal factors outweigh external factors.   2. The third-level of factors of AHP architecture includes the solidity of knowledge management, the compatibility of policies and laws, the user service mechanism and the information systems and operations. Generally, the PCC internal public servants, industrialists and scholars pay more attention to the compatibility of policies and laws than the other public servants that put a lot of emphasis on the information systems and operations. The IT background experts value the compatibility of policies and laws, whereas the non-IT background experts emphasize the information systems and operations.   3. The top seven priority factors of the rock-bottom level factors include the involvements and endorsements of the top executives and establish the clear goals, the instantaneous emendation and relaxation of the laws, the compatibility of abundant resource, the effectiveness of promoting the law's constraint force, friendly interface and easily sequential operation flow and high reliability and stability.   At last, this research leads to the conclusions and suggestions in regard to in-depth experts interviews,PCC internal requirement investigations, EIP solutions and the AHP CSF analysis.
130

壽險業顧客知識流程之研究 - 以保誠人壽為例 / A study on Customer Knowledge Process in Life Insurance Company - PCA Life Assurance(Taiwan) as A Case

李哲維, Lee, Che Wei Unknown Date (has links)
和顧客保持長期關係,對於企業經營是有利的,然而,由於資訊科技的進步與物流效率的提升,顧客越來越來越聰明,要尋找並取得替代產品與服務也越來越容易。在這樣的環境前提下,如何使顧客願意與企業維持長期關係而不轉向競爭者,是企業的一大挑戰。在文獻探討中本文發現,其關鍵是在於要能夠持續與顧客互動並了解顧客,並且將這些了解應用於產品設計、流程設計與組織設計。對於顧客的了解,本文定義其為顧客知識,就成為了顧客關係的基石。不過,由於與顧客的接觸點越多,了解顧客的管道就越多,其整合上有一定的難度,而資訊科技與傳統行銷方法都能夠產生對於顧客的了解,再加上產生並應用對於顧客的了解,以塑造顧客在消費與使用產品與服務時能得到高度的滿意,已經企業所有部門的責任,這樣跨部門的作業也不是一件簡單的事,這些議題都是企業在顧客知識管理上所需面對的。 在過往的文獻中所談的顧客知識管理,很多都混淆顧客資訊與知識,較無探討企業如何加工與顧客互動所得到的資訊,因此無法清楚了解企業在顧客知識管理上所作的貢獻為何。本文就以流程觀點,並以目前市場需求飽和且競爭激烈的人壽保險產業中的一家企業:保誠人壽為例,探討企業內的顧客知識流程,並且探討主要的影響因素,以了解企業在顧客知識管理上所作的努力。 而在本文個案的探訪後,本文還嘗試以服務業作業系統的角度,提出一種顧客知識的新分類:前台作業所需的顧客知識、後台作業所需的顧客知識,並且根據個案中保誠人壽的實際做法,修正文獻探討所提出的顧客知識管理架構,並且提出三種顧客知識管理的類型以及提出其管理重點,以作為實務界與後人研究的參考。 / It is beneficial for an enterprise to keep long-term relationship with its customers. However, owing to advances of information technology and the improvement of logistics efficiency, it is not difficult to search and acquire better products and services to substitute for what they are using now. Under these circumstances, it is a challenge for enterprises to retain their customers. How to do this? The answer in literatures is: to gain more customer insights (defined as customer knowledge in this study) through interactions with customers and apply them in product design, process design and organizational structure design. Therefore customer knowledge is the basics of long-term relationships with customers. But still, there are issues. First, an enterprise may have many contact points with its customers. Then, there are traditional ways versus information technology ways to generate customer knowledge. Finally, an enterprise has to think how to address appropriate customer knowledge to right departments and use them to enhance the total experience when interacting with customers. These are all issues an enterprise has to face with when trying to do “Customer Knowledge Management” (CKM). Most of past studies on CKM did not tell the difference between information and knowledge, thus can not clearly define what contributions an enterprise makes when implementing CKM. This study attempts to investigate practices of CKM in an enterprise in life insurance industry, in which the demand is saturated and the competition is fierce, from a process perspective to manifest how customer knowledge is generated and applied, and what main factors are to affect CKM in an enterprise. After investigation of the case, this study proposes a new framework, from the operation system in service industry, to classify customer knowledge into two categories: customer knowledge needed for front-office operations, and customer knowledge needed for back-office operations. In addition, according to practices in this case, this study will revise the CKM process framework proposed right after the literature review, and will raise keys to successful CKM in CKM processes, for the reference for following studies.

Page generated in 0.0456 seconds