Search results
1 – 10 of 15This paper focuses on the meanings attributed to the measurement of return on investment (ROI) in knowledge management (KM) initiatives in knowledge-intensive organizations. At…
Abstract
Purpose
This paper focuses on the meanings attributed to the measurement of return on investment (ROI) in knowledge management (KM) initiatives in knowledge-intensive organizations. At the heart of this exploratory research is the introduction of a unique coherent perspective of discipline experts regarding the ROI metric, as part of their perception of assessing effectiveness in this field.
Design/methodology/approach
The research begins with in-depth semi-structured personal interviews and continues with focus groups, as part of a qualitative research paradigm. The data were analyzed using a thematic analysis method, based on the grounded theory approach.
Findings
The findings provide empirical evidence regarding the significant challenges associated with the objective assessment of KM performance, which is deeply rooted in numerical-financial values. Despite the high status of ROI in the business environment, the authors find that decision-makers surprisingly avoid evaluating ROI for the most important resource of the organization, notwithstanding the immeasurable hopes that depend on this performance measure and the expectation of establishing the profitability of investment in organizational KM.
Originality/value
The uniqueness of this research is the adoption of the skeptical-critical research approach. For the first time, the authors interrogate the suitability and relevance of the general model of the ROI metric as a means of proving the value and contribution of well-managed knowledge to organizations. The authors call for adoption of a new integrative perspective for evaluating effectiveness, which will reflect the holistic set of KM in organizations.
Details
Keywords
This research seeks to understand, for the first time, what motivates knowledge-intensive organizations (KIOs) to initiate knowledge management (KM) activities in times of routine…
Abstract
Purpose
This research seeks to understand, for the first time, what motivates knowledge-intensive organizations (KIOs) to initiate knowledge management (KM) activities in times of routine and emergency. The COVID-19 pandemic was placed at the center as a case study of an extreme crisis.
Design/methodology/approach
Based on the adoption of the qualitative-constructivist paradigm, the study was conducted among 52 KM professionals through in-depth interviews and focus groups. The data were analyzed using a thematic analysis method, according to the principles of the grounded theory approach.
Findings
The findings reveal that opportunities and risks are two types of catalysts which accelerate KM efforts in times of routine and emergency respectively. Due to KM’s support of the transition to flexible employment during COVID-19, the authors show that this field experienced real growth and prosperity in the “new normal.” KM initiatives were promoted during the COVID-19 crisis in light of gaps in retention, sharing, accessibility and development of knowledge.
Originality/value
Given that knowledge risks are a field with fragmented understanding, the results contribute to understanding the importance of risk management related to knowledge in times of crises and turmoil. The authors call for incorporating this niche into the overall risk management of the organization, while adopting a holistic and long-term perspective of KM. Furthermore, the authors uncover KM’s position in KIOs during the global pandemic. The paper proposes food for thought regarding informal knowledge sharing in virtual environments typical of the “Corona routine”.
Details
Keywords
This study aims to give expression, for the first time, to the contemporary perceptions of knowledge management (KM) professionals regarding the technological layer in KM. From an…
Abstract
Purpose
This study aims to give expression, for the first time, to the contemporary perceptions of knowledge management (KM) professionals regarding the technological layer in KM. From an organizational-holistic view, the authors strive to provide a deeper understanding of the position and role of technology in KM in knowledge-intensive organizations.
Design/methodology/approach
As part of the adoption of the qualitative-constructivist paradigm, the research started with in-depth interviews and continued with focus groups. The data were collected from 21 KM experts and analyzed according to the thematic analysis method, based on the grounded theory.
Findings
Although many hopes depend on technological tools, the authors learn why KM cannot be considered a purely information technology (IT)-based process. The study raises significant concern regarding the leadership of KM efforts by IT units, due to the possible lack of focus on strategic aspects supported by that support closing knowledge gaps. KM experts support technological changes and anticipate the introduction of automated mechanisms for knowledge flow processes.
Originality/value
Understanding the technological component of KM provides a window of opportunity for the meanings ascribed by the professionals to the whole KM discipline. The results improve the understanding that the KM community should be required to be more aware of the business-organizational aspects for which the practice of KM in the organization is required, as well as the centrality of human resources in knowledge creation and sharing. Moreover, the paper provides a unique glimpse into the future of organizational KM.
Details
Keywords
This study aims to examine the relevance of the term “knowledge management” (KM) in the organizational context, and deliberates whether there is a need for rebranding of this…
Abstract
Purpose
This study aims to examine the relevance of the term “knowledge management” (KM) in the organizational context, and deliberates whether there is a need for rebranding of this field. It also enriches the understanding regarding the appropriateness of the term “KM,” which was chosen to represent the discipline.
Design/methodology/approach
This study adopted a qualitative research methodology, and a case study approach was followed by conducting 19 semi-structured in-depth interviews with international KM experts working in a global consulting firm. The data were analyzed using a thematic analysis method based on the grounded theory approach.
Findings
The findings provide empirical evidence that attempts are being made to move away from the label “KM” in certain knowledge-intensive organizations. This study sheds light on the challenges associated with this term, which leads some to believe that the name of the discipline needs to change.
Originality/value
The present pioneering research contributes to empirical knowledge through investigation of an unexplored scientific field. To the best of the authors’ knowledge, for the first time, its uniqueness can be established by the fact that the opinions of KM professionals are being heard regarding the “KM” label, as well as the need for a rebranding of this discipline in the organizational context. From a practical and strategic perspective, this study suggests that the research community and practitioners pay attention to attempts to shift away from the existing title identified in organizational practice.
Details
Keywords
Maor Weinberger and Dan Bouhnik
This exploratory study explores usage habits in music streaming applications (MSA) and their influence on various dimensions, such as: changes in personal music management (PMM…
Abstract
Purpose
This exploratory study explores usage habits in music streaming applications (MSA) and their influence on various dimensions, such as: changes in personal music management (PMM) and musical information retrieval; sense of ownership over songs being stored on MSA; and privacy concerns when using those applications. It also investigates the potential effect of demographic factors and personal musical preferences on the tested variables.
Design/methodology/approach
This is examined by using a mixed methodology that is consisted of two phases – qualitative and quantitative: The qualitative phase includes semistructured interviews with three MSA users, and the quantitative phase includes the distribution of closed-ended questionnaires among 192 users of MSA.
Findings
It seems that the musical information management methods have changed dramatically with the introduction of MSA. Also, the findings show that even though users are only moderately concerned about their privacy within MSA, they are willing to pay for premium services that will ensure privacy protection. Interestingly, personal musical preference was found to affect the belief in the potential of using MSA as part of a social activity and on the willingness to pay for premium services within them.
Originality/value
This paper represents an extension of the article by Weinberger and Bouhnik (2019). It appears to be the first academic research to investigate the issue of musical information retrieval and PMM among MSA. In addition, it is the first study that takes into account privacy-related issues among MSA users.
Peer review
The peer review history for this article is available at: https://publons.com/publon/10.1108/OIR-04-2020-0118
Details
Keywords
This study aims to identify the risks associated with the lack of optimal knowledge management (KM) in knowledge-intensive organizations and delves into understanding their…
Abstract
Purpose
This study aims to identify the risks associated with the lack of optimal knowledge management (KM) in knowledge-intensive organizations and delves into understanding their severity. In doing so, the authors explored the significance attributed to these issues by international KM experts.
Design/methodology/approach
A case method was chosen. The study began with semi-structured in-depth interviews and continued with focus groups as part of the qualitative research paradigm. The data was analyzed using a thematic analysis method, based on the grounded theory approach.
Findings
The findings provide empirical evidence for a set of risks faced by organizations in a reality where organizational knowledge is managed poorly. The study finds that, in the experts’ view, the risks associated with knowledge constitute a clear catalyst for initiating and investing efforts to manage organizational knowledge. In addition, their severity is usually understood only after the occurrence of a business or organizational crisis related to knowledge.
Originality/value
This pioneering research contributes to empirical knowledge through an unexplored scientific field. The uniqueness of this research is also reflected in the voices of KM professionals. The authors extended the literature on knowledge risks, taking a broad perspective of a variety of organizations from different sectors. In doing so, the study also contributes to a more comprehensive understanding of KM. The study has implications on the practical level in view of deepening the understanding of the severity of the risk in the absence of optimal KM in knowledge-intensive organizations.
Details
Keywords
Noa Aharony, Dan Bouhnik and Nurit Reich
This study examines the impact of personality traits on the degree of challenge experienced by individuals with respect to the threat on their information, the evaluation of their…
Abstract
Purpose
This study examines the impact of personality traits on the degree of challenge experienced by individuals with respect to the threat on their information, the evaluation of their self-efficacy to secure the information and hence, their readiness to secure information.
Design/methodology/approach
The study's population consisted of 157 teachers from various educational institutions across Israel. We used five questionnaires to gather data.
Findings
Findings reveal a link between participants' personality traits, situation evaluation indicators and their readiness to secure information. Further, the greater subjects' information security awareness and familiarity with information security concepts, the better their application of the tools for securing information will be.
Originality/value
The importance of this research lies primarily in that it highlights the importance of individual differences while dealing with information security awareness. The findings constitute a theoretical and empirical basis for building tools toward guiding teachers to protect their information, as well as for devising educational and pedagogic programs for making a cultural change.
Details
Keywords
Maor Weinberger, Maayan Zhitomirsky-Geffet and Dan Bouhnik
The purpose of this paper is to investigate the attitudes and influential factors of users’ knowledge and use of the tools designated for controlling and enhancing online privacy…
Abstract
Purpose
The purpose of this paper is to investigate the attitudes and influential factors of users’ knowledge and use of the tools designated for controlling and enhancing online privacy, which are referred to as online privacy literacy (OPL). Particularly, inspired by the protection motivation theory, a motivational factor is defined as comprising several variables which reflect users’ motivation to protect their online privacy.
Design/methodology/approach
To this end, a user study was conducted based on the quantitative method with the participation of 169 students from the Israeli academia who were administered closed-ended questionnaires.
Findings
Generally low to moderate levels of OPL were obtained. Interestingly, the multivariate linear regression analysis showed that motivational factors, such as users’ concern for personal information protection on the internet and users’ privacy self-efficacy and sense of anonymity when visiting a website, were among the strongest predictive factors of users’ OPL level.
Social implications
This research has social implications that might contribute to an increase in the OPL among internet users.
Originality/value
The direct influence of the examined factors on users’ OPL was not previously discussed in the literature. As a result of the study, a comprehensive model of user online privacy behavior was constructed.
Details
Keywords
Dan Bouhnik, Nurit Reich and Noa Aharony
The study focuses on adolescents and the influence the big five great personality traits – extroversion, agreeableness, neuroticism, openness to experiences and conscientiousness…
Abstract
Purpose
The study focuses on adolescents and the influence the big five great personality traits – extroversion, agreeableness, neuroticism, openness to experiences and conscientiousness – on self-disclosure. These personality traits, combined with the ability to cope with stress, determine the degree of threat felt by an individual towards their information, their evaluation of their personal ability to keep their information secure, and their willingness to secure information.
Design/methodology/approach
Five questionnaires relating to the big five personality traits, self-disclosure, cognitive assessment, self-efficacy and IS awareness were distributed among 157 adolescents.
Findings
Readiness for IS. Furthermore, the study showed that the more ostentatiousness, agreeable, goal oriented and open the subjects are, the lower they will evaluate the threat to their information. A relationship was also revealed between the subjects' agreeableness, goal orientation and their information threat assessment. It was also found that the more extroverted, agreeable, conscientious and the more inclined to self-disclosure, the higher they evaluate their self-ability to handle threats to their information.
Originality/value
For IS behavior to become second nature to adolescents they must first be educated and trained to do so. Knowing what motivates them and, on the other hand, what hinders them, to practice IS can help build training models for teachers which may be adapted according to their personal traits, thus getting the most out of such programs.
Details
Keywords
This paper attempts to recognize the informational needs of women who suffer from intimate partner violence (IPV). It then presents a model of a web site that may answer to these…
Abstract
Purpose
This paper attempts to recognize the informational needs of women who suffer from intimate partner violence (IPV). It then presents a model of a web site that may answer to these needs.
Design/methodology/approach
First, the paper defines the phases women suffering from IPV go through. This is done by surveying the literature that describes the stages these women experience. In order to clarify the proposed model, the paper then describe our own set of phases based on the above literature. Once the phases mentioned above are understood, the needs of these women become evident, thus allowing us to define and specify them. The model of the web site is then described and the paper shows how it relates to the various aforementioned needs.
Findings
The web site would offer a variety of information, such as: names of organizations that offer support, chats, and forums that provide emotional support and advice from women who experienced abuse in the past as well as from professionals.
Research limitations/implications
Security issues of this model need to be researched before applying it to use, as they are beyond the scope of this paper. Such issues should include techniques for erasing the user's traces and for keeping out “unwelcome visitors.”
Originality/value
This model, if applied, may greatly aid women suffering from IPV, as it would provide them with the emotional support and technical information they need in order to make important decisions regarding their situation. Information, if utilized, may give these women the ability to control their fate and actively improve their quality of life.
Details