Search results

1 – 10 of over 1000

Abstract

Details

Assembly Automation, vol. 24 no. 2
Type: Research Article
ISSN: 0144-5154

Keywords

Article
Publication date: 1 October 2006

Kevin D. Barber, J. Eduardo Munive‐Hernandez and John P. Keane

This paper presents a practical methodology for developing a process‐based knowledge management system (KMS) for supporting continuous improvement (CI) and asset management.

4221

Abstract

Purpose

This paper presents a practical methodology for developing a process‐based knowledge management system (KMS) for supporting continuous improvement (CI) and asset management.

Design/methodology/approach

An action research methodology was used to develop a KMS to support CI in a manufacturing company. The KMS is evaluated through application in the case study company. This methodology ensures a consistent approach to carrying out all improvement initiatives. The final part of the methodology addresses the construction of an intranet‐based knowledge warehouse. This contains several searchable areas such as existing information on assets, new knowledge generated from projects, details of expertise in the business and links to the key business drivers through the corporate intranet.

Findings

The KMS is shown to support CI initiatives through the utilization of available data already held within the company's management databases (production, quality and maintenance) including consideration of corporate strategic plans. Process models trigger the application of improvement tools and projects in a true CI environment.

Research limitations/implications

This methodology acknowledges both tacit and explicit knowledge within the company, and it represents an appropriate environment to promote and develop a true learning organization.

Practical implications

The system developed is shown to be flexible and has been implemented in a manufacturing environment. Financial benefits are presented.

Originality/value

The approach used is novel and integrates several areas of IT and process improvement techniques. The resulting methodology is applicable to large and small companies without requiring major IT support facilities. The methodology supports the development of true learning organizations.

Details

International Journal of Quality & Reliability Management, vol. 23 no. 8
Type: Research Article
ISSN: 0265-671X

Keywords

Article
Publication date: 1 March 1998

H. Joseph Wen

An intranet puts a new layer into a client/server (C/S) architecture, the Web server, which acts as the gateway to the application logic and data. It is three‐tier computing…

1315

Abstract

An intranet puts a new layer into a client/server (C/S) architecture, the Web server, which acts as the gateway to the application logic and data. It is three‐tier computing, where these functions are performed on separate servers. The servers store everything and perform the bulk of the querying and the data presentation. Although there is great potential using an intranet to develop applications, there are certain challenges, including: security, privacy, currency, and performance. There is progress with security but performance with high volume transaction processing is still unproved. There have been a lot of mistakes with C/S and the danger here is to go down the same road with the intranet. To avoid this, this study explores the managerial and technical issues involved in developing a corporate intranet. Inspired with the success of Internet, intranet is proved to be an extension of and an enhancement to C/S. Client/server is not dead just as the mainframe is not dead; but the C/S model is being changed by the intranet.

Details

Information Management & Computer Security, vol. 6 no. 1
Type: Research Article
ISSN: 0968-5227

Keywords

Article
Publication date: 1 February 1997

Peter Morrell

European Management Systems has for a number of years been providing EIS to international organisations. This activity has recently been extended to offering intranet solutions…

Abstract

European Management Systems has for a number of years been providing EIS to international organisations. This activity has recently been extended to offering intranet solutions and this synopsis describes the research work undertaken and a case study of a live application. Other topics covered include the practical lessons learnt from the implementation, tips for successful intranet projects and cultural issues which arise.

Details

Aslib Proceedings, vol. 49 no. 2
Type: Research Article
ISSN: 0001-253X

Article
Publication date: 1 September 2000

Craig Standing and Stephen Benson

The article considers the relationship between effective knowledge creation, acquisition and management and the user interface. The need for and problems associated with knowledge…

1235

Abstract

The article considers the relationship between effective knowledge creation, acquisition and management and the user interface. The need for and problems associated with knowledge management are discussed and a useful model for organisational learning development is proposed (IPRAM). The article makes a detailed consideration of interface issues in relation to knowledge management and their role in synergising the personal‐corporate knowledge nexus for organisational and economic benefit. Alternative customisable representations of intranets are presented with their implications discussed. Network models, metaphors and iconic interfaces all have their merits. Besides improving interface representations of the intranet researchers need to consider how conceptual and experiential knowledge can be captured in the intranet.

Details

Journal of Knowledge Management, vol. 4 no. 3
Type: Research Article
ISSN: 1367-3270

Keywords

Article
Publication date: 1 July 2004

Zhang Yingjie and Ge Liling

Reverse engineering methodology paves an efficient way for simulating and manufacturing existing objects with complex shapes, and a range of applications also has shown this…

Abstract

Reverse engineering methodology paves an efficient way for simulating and manufacturing existing objects with complex shapes, and a range of applications also has shown this approach to be feasible and efficient. However, in many applications, a lot of sub‐tasks in reverse engineering are usually not done in the same place, they need to be done cooperatively over the Internet or Intranet. So, this paper is concerned with developing a novel e‐service platform for remote service in reverse engineering applications based on mobile agent technology, and some correlative enabling technologies such as data compression, security considerations, agent models and so on. The framework was programmed using the Java Sevlets and Java Beans component models, and data transferring and processing were implemented based on the dispatch/retract mechanisms of mobile agents. The mobile agent is developed with IBM's Aglets Workbench, and the feasibility of the proposed method has been verified by a case.

Details

Rapid Prototyping Journal, vol. 10 no. 3
Type: Research Article
ISSN: 1355-2546

Keywords

Article
Publication date: 1 December 1999

Jan Damsgaard and Rens Scheepers

Intranets hold great promise as “organizational Internets” to allow information sharing and collaboration across departments, functions and different information systems within an…

2310

Abstract

Intranets hold great promise as “organizational Internets” to allow information sharing and collaboration across departments, functions and different information systems within an organization. Yet not much is known about how to implement intranets. We adapt a taxonomy based on institutional theory and distinguish six broad diffusion drivers that might be considered to sustain the implementation process. An exploratory field study of four intranet implementations was conducted to analyze which drivers were used and the results that were yielded. We draw several conclusions. First, all six drivers were deployed in the analyzed cases. Second, the choice of drivers varied with the level of the intranet (corporate or unit), the implementation stage, and existing organizational practices and contingencies. Third, it seems that the critical drivers are knowledge building, subsidy and mobilization in the early stages of implementation. In the later stages knowledge deployment, subsidy and innovation directives were most commonly used.

Details

Information Technology & People, vol. 12 no. 4
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 1 January 1997

Wodehouse

Looking at computing and networks Costs At a meeting of The Royal Society of Arts, an IBM researcher made the following statement: “The only fact that matters is that hardware…

Abstract

Looking at computing and networks Costs At a meeting of The Royal Society of Arts, an IBM researcher made the following statement: “The only fact that matters is that hardware costs fall by 30% per annum in real terms.” Pressed later on he added the following: “Network costs fall by 50% per annum.” These two statements should not be dismissed lightly. At a lecture to a British Computer Society (BCS) group, it was also stated that in 1989 a 50 MIP system cost about £250,000 — £5,000 per MIP. Today that cost is £2,500 — £50 per MIP: a hundred‐fold reduction.

Details

Aslib Proceedings, vol. 49 no. 1
Type: Research Article
ISSN: 0001-253X

Article
Publication date: 8 October 2018

Natalia Miloslavskaya

Nowadays, to operate securely and legally and to achieve business objectives, secure valuable assets and support uninterrupted business processes, all organizations need to match…

Abstract

Purpose

Nowadays, to operate securely and legally and to achieve business objectives, secure valuable assets and support uninterrupted business processes, all organizations need to match a lot of internal and external compliance regulations such as laws, standards, guidelines, policies, specifications and procedures. An integrated system able to manage information security (IS) for their intranets in the new cyberspace while processing tremendous amounts of IS-related data coming in various formats is required as never before. These data, after being collected and analyzed, should be evaluated in real-time from an IS incident viewpoint, to identify an incident’s source, consider its type, weigh its consequences, visualize its vector, associate all target systems, prioritize countermeasures and offer mitigation solutions with weighted impact relevance. Different security information and event management (SIEM) systems cope with this routine and usually complicated work by rapid detection of IS incidents and further appropriate response. Modern challenges dictate the need to build these systems using advanced technologies such as the blockchain (BC) technologies (BCTs). The purpose of this study is to design a new BC-based SIEM 3.0 system and propose a methodology for its evaluation.

Design/methodology/approach

Modern challenges dictate the need to build these systems using advanced technologies such as the BC technologies. Many internet resources argue that the BCT suits the intrusion detection objectives very well, but they do not mention how to implement it.

Findings

After a brief analysis of the BC concept and the evolution of SIEM systems, this paper presents the main ideas on designing the next-generation BC-based SIEM 3.0 systems, for the first time in open access publications, including a convolution method for solving the scalability issue for ever-growing BC size. This new approach makes it possible not to simply modify SIEM systems in an evolutionary manner, but to bring their next generation to a qualitatively new and higher level of IS event management in the future.

Research limitations/implications

The most important area of the future work is to bring this proposed system to life. The implementation, deployment and testing onto a real-world network would also allow people to see its viability or show that a more sophisticated model should be worked out. After developing the design basics, we are ready to determine the directions of the most promising studies. What are the main criteria and principles, according to which the organization will select events from PEL for creating one BC block? What is the optimal number of nodes in the organization’s BC, depending on its network assets, services provided and the number of events that occur in its network? How to build and host the SIEM 3.0 BC infrastructure? How to arrange streaming analytics of block’s content containing events taking place in the network? How to design the BC middleware as software that enables staff to interact with BC blocks to provide services like IS events correlation? How to visualize the results obtained to find insights and patterns in historical BC data for better IS management? How to predict the emergence of IS events in the future? This list of questions can be continued indefinitely for a full-fledged design of SIEM 3.0.

Practical implications

This paper shows the full applicability of the BC concept to the creation of the next-generation SIEM 3.0 systems that are designed to detect IS incidents in a modern, fully interconnected organization’s network environment. The authors’ attempt to begin with a detailed description of the basics for a BC-based SIEM 3.0 system design is presented, as well as the evaluation methodology for the resulting product.

Originality/value

The authors believe that their new revolutionary approach makes it possible not to simply modify SIEM systems in an evolutionary manner, but to bring their next generation to a qualitatively new and higher level of IS event management in the future. They hope that this paper will evoke a lively response in this segment of the security controls market from both theorists and direct developers of living systems that will implement the above approach.

Content available
540

Abstract

Details

Library Hi Tech News, vol. 16 no. 9/10
Type: Research Article
ISSN: 0741-9058

1 – 10 of over 1000