Search results

1 – 10 of 30
Article
Publication date: 5 February 2020

Mona Mohamed, Sharma Pillutla and Stella Tomasi

The purpose of this paper is to establish a new conceptual iterative framework for extracting knowledge from open government data (OGD). OGD is becoming a major source for…

Abstract

Purpose

The purpose of this paper is to establish a new conceptual iterative framework for extracting knowledge from open government data (OGD). OGD is becoming a major source for knowledge and innovation to generate economic value, if properly used. However, currently there are no standards or frameworks for applying knowledge continuum tactics, techniques and procedures (TTPs) to improve elicit knowledge extraction from OGD in a consistent manner.

Design/methodology/approach

This paper is based on a comprehensive review of literature on both OGD and knowledge management (KM) frameworks. It provides insights into the extraction of knowledge from OGD by using a vast array of phased KM TTPs into the OGD lifecycle phases.

Findings

The paper proposes a knowledge iterative value network (KIVN) as a new conceptual model that applies the principles of KM on OGD. KIVN operates through applying KM TTPs to transfer and transform discrete data into valuable knowledge.

Research limitations/implications

This model covers the most important knowledge elicitation steps; however, users who are interested in using KIVN phases may need to slightly customize it based on their environment and OGD policy and procedure.

Practical implications

After its validation, the model allows facilitating systemic manipulation of OGD for both data-consuming industries and data-producing governments to establish new business models and governance schemes to better make use of OGD.

Originality/value

This paper offers new perspectives on eliciting knowledge from OGD and discussing crucial, but overlooked area of the OGD arena, namely, knowledge extraction through KM principles.

Details

VINE Journal of Information and Knowledge Management Systems, vol. 50 no. 3
Type: Research Article
ISSN: 2059-5891

Keywords

Article
Publication date: 26 June 2020

Mona Ali Mohamed

The purpose of this paper is to examine information technology and information systems (IT/IS) technology teaching and learning (T&L) as affected by three key factors of tacit…

Abstract

Purpose

The purpose of this paper is to examine information technology and information systems (IT/IS) technology teaching and learning (T&L) as affected by three key factors of tacit knowledge (TK). These factors are the de-contextualization, the faculty and students’ mental model gap and the intrinsic inability of faculty to teach what they know (i.e. the know-how-know what gap).

Design/methodology/approach

The approach is based on intensive literature review and synthesis of Nonaka’s socialization, externalization, combination and internalization model and other relevant knowledge management (KM) principles applied to understand the effects of mobilization and nurturing of TK in pedagogical activities and strategies.

Findings

This paper demonstrated a holistic view of the role of TK in teaching IT/IS through deep learning activities. It differentiates between faculty and student mental models and the ability of the faculty to convey real-world know-how to students.

Research limitations/implications

This study is by no means comprehensive in exploring the TK contextual dimensions of IT/IS T&L milieus. However, some of the assumptions and factors in this paper are not pertinent to some pedagogical environments.

Practical implications

The activities in this paper introduced new propositions on IT/IS teaching by focusing on TK concepts in light of its challenges. The study could be used by institutes to place emphasis on accommodating TK within effective IT/IS T&L activities.

Originality/value

Drawing on the KM literature and experience, this paper offers new insight into how TK can be innovatively incorporated into a pedagogical landscape.

Details

VINE Journal of Information and Knowledge Management Systems, vol. 51 no. 4
Type: Research Article
ISSN: 2059-5891

Keywords

Article
Publication date: 14 April 2020

Mona Mohamed, Joyram Chakraborty and Sharma Pillutla

The purpose of this study is to examine the effects of culture on the cross-cultural design of the recognition-based graphical password (RBG-P) interface as inferred from Chinese…

Abstract

Purpose

The purpose of this study is to examine the effects of culture on the cross-cultural design of the recognition-based graphical password (RBG-P) interface as inferred from Chinese and Saudi subjects’ image selections.

Design/methodology/approach

The authors use a between-group design adopted using two groups of participants from China and the Kingdom of Saudi Arabia to measure the differences caused by the effects of cultures on graphical password image selections. Three hypotheses have been tested in a four-week long study carried out using two questionnaires and an RBG-P webtool designed for images selection.

Findings

The results have indicated that participants are equally biased not only toward their own culture but also depending on their opinions about other cultures. In addition, when creating the password, it has been observed that culture not only influenced the image selection to create the password but also have an effect on the sequence of the images forming the password.

Research limitations/implications

Appropriately used image selection differences can be used appropriately in cross-cultural designs that will lead to better development of culturally adaptive interfaces that will boost the security posture of RBG-P authentication.

Practical implications

Some RBG-P interfaces that are produced outside the designer’s culture may suffer the effects of cultural differences. Hence, to incorporate culture in the interface, authentication systems within applications should be flexible by designing images that fit the culture in which the software will be used. To this end, access control interface testing should also be carried out in the environmental and cultural context in which it is will be used.

Originality/value

This paper provides useful information for international developers who develop cross-cultural usable secure designs. In such environments, the cross-culturally designs may have significant effects on the acceptability and adoption adaptation of the interface to multi-cultural settings.

Details

Journal of Systems and Information Technology, vol. 22 no. 1
Type: Research Article
ISSN: 1328-7265

Keywords

Article
Publication date: 6 April 2021

Mona Mohamed, Tobin Porterfield and Joyram Chakraborty

This study aims to examine the impact of cultural familiarity with images on the memorability of recognition-based graphical password (RBG-P).

Abstract

Purpose

This study aims to examine the impact of cultural familiarity with images on the memorability of recognition-based graphical password (RBG-P).

Design/methodology/approach

The researchers used a between-group design with two groups of 50 participants from China and the Kingdom of Saudi Arabia, using a webtool and two questionnaires to test two hypotheses in a four-week long study.

Findings

The results showed that culture has significant effects on RBG-P memorability, including both recognition and recall of images. It was also found that the login success rate depreciated quickly as time progressed, which indicates the memory decay and its effects on the visual memory.

Research limitations/implications

Collectively, these results can be used to design universal RBG-Ps with maximal password deflection points. For better cross-cultural designs, designers must allow users from different cultures to personalize their image selections based on their own cultures.

Practical implications

The RBG-P interfaces developed without consideration for users’ cultures may lead to the construction of passwords that are difficult to memorize and easy to attack. Thus, the incorporation of cultural images is indispensable for improving the authentication posture.

Social implications

The development of RBG-P with cultural considerations will make it easy for the user population to remember the password and make it more expensive for the intruder to attack.

Originality/value

This study provides an insight for RBG-P developers to produce a graphical password platform that increases the memorability factor.

Details

Journal of Systems and Information Technology, vol. 23 no. 1
Type: Research Article
ISSN: 1328-7265

Keywords

Article
Publication date: 24 October 2008

Mona A. Mohamed and Mirghani S. Mohamed

This paper aims to integrate and reflect on different ideas about the role of knowledge management (KM) technology that have been published in VINE. In effect, the paper seeks to

368

Abstract

Purpose

This paper aims to integrate and reflect on different ideas about the role of knowledge management (KM) technology that have been published in VINE. In effect, the paper seeks to relate, interpret, and synthesize various technology milestones discussed by various authors. It also aims to discusss the literature that describes technology as an “enabler”, but “not enough”.

Design/methodology/approach

This paper addresses the role and the importance of technology as appeared in articles in VINE about technology within the last three years. Different ideas from different authors are compared and contrasted with the general trend in technology advances in the field of KM.

Findings

Because of the immaturity of KM technology there is still disagreement about its real role in the KM lifecycle. There is an obvious lack of standardization and generalization about the role of inter‐ and/or intra‐organization technology transfer today. Although technology has made a quantum leap in the proportionality of the expressed tacit knowledge, many investigators still believe that technology is no more than an enabler.

Practical implications

This paper provides useful information as a result of summary and augmentation of different opinions discussed in this journal about technologies in the last three years.

Originality/value

This paper provides information to researchers and practitioners who need to know about the practical recent KM technology implementations.

Details

VINE, vol. 38 no. 4
Type: Research Article
ISSN: 0305-5728

Keywords

Article
Publication date: 29 August 2008

Mirghani S. Mohamed, Vincent M. Ribière, Kevin J. O'Sullivan and Mona A. Mohamed

The purpose of this paper is to provide reinforcement for ITIL V 2.0 implementation process through knowledge management principles embedded in enterprise management‐engineering

8890

Abstract

Purpose

The purpose of this paper is to provide reinforcement for ITIL V 2.0 implementation process through knowledge management principles embedded in enterprise management‐engineering framework (EMEF).

Design/methodology/approach

EMEF has been amended to include knowledge management (KM) activities that are imperative for a melioration of ITIL implementation. The framework of four domains has been documented in detail. Additionally, the three major amendments of structure, architecture, and context have been suggested for a configuration management database (CMDB) to comply with KM principles.

Findings

There are strong indications that implementing ITIL by following the system‐thinking approach may add and sustain competitive advantage. This may be achieved through the leveraging of knowledge, improvement of core competencies, and fostering a customer‐consciousness approach. The apprehension of knowledge continuum components, and the differentiation between knowledge types, are critical for fortifying the ITIL process path and supporting the decision‐making process throughout ITIL implementation. The four layers of the integrative management domain will significantly contribute to the tuning of operational misalignment between IT and business, and the betterment of the employee and processes effectiveness. The similarities found between ontology objects and CMDB configuration items will raise CMDB information to a higher level of conceptualization.

Originality/value

This paper will be valuable for ITIL customers, decision makers, and implementers by providing a more complete framework allowing organizations to attain effectiveness, efficiency and innovation throughout ITIL implementation.

Article
Publication date: 5 August 2014

Mona A. Mohamed and Sharma Pillutla

The main aim of this paper is to investigate the potential of Cloud Computing as a multilayer integrative collaboration space for knowledge acquisition, nurturing and sharing. The…

2240

Abstract

Purpose

The main aim of this paper is to investigate the potential of Cloud Computing as a multilayer integrative collaboration space for knowledge acquisition, nurturing and sharing. The paper will pinpoint benefits and challenges of Cloud Computing in satisfying the new techno-sociological requirements of the knowledge society through the provision of information technology (IT) green services. Furthermore, the article calls for the engagement of researchers to generate additional discussion and dialog in this emerging and challenging area.

Design/methodology/approach

The paper applies a conceptual analysis to explore the utilization of the Cloud ecosystem as a new platform for knowledge management (KM) technologies characterized by environmental and economic benefits.

Findings

This paper reveals the emergence of a new layer in the Cloud stack known as Knowledge Management-as-a-Service. The article discusses how KM has the opportunity to evolve in synergy with Cloud Computing technologies using the modified Metcalfe’s law, while simultaneously pursuing other benefits. This research reveals that if Cloud Computing is successfully deployed, it will contribute to the efficient use of the under-utilized computing resources and enable a low carbon economy. However, challenges such as security, information overload and legal issues must be addressed by researchers before Cloud Computing becomes the de facto KM platform.

Originality/value

While the technical, legal and environmental complications of Cloud Computing have received the attention warranted, the KM concepts and implementation facets within the realm of the knowledge society have not yet received adequate consideration. This paper provides enterprise KM architects, planners, chief information officers (CIOs) and chief knowledge officers (CKOs) with a comprehensive review of the critical issues, many of which are often overlooked or treated in a fragmented manner within the Cloud environment.

Article
Publication date: 14 September 2010

Mirghani Mohamed, Arthur Murray and Mona Mohamed

The purpose of this paper is to aim to quantitatively evaluate the importance of ICTs for sustainable development. A hypothesis about the criticality of ICTs to sustainable

7549

Abstract

Purpose

The purpose of this paper is to aim to quantitatively evaluate the importance of ICTs for sustainable development. A hypothesis about the criticality of ICTs to sustainable development has been tested. The consequences of other ICT elements on knowledge management also have been evaluated.

Design/methodology/approach

This research is carried out using surveys and interviews among members of the KM/ICT sustainable development community.

Findings

It has been found that ICT is critical for sustainable development. In effect, many respondents agreed that due to the geographical separation and multifaceted nature of international sustainable development, it cannot be carried out without ICT's support. However, for ICT infrastructure to be translated into worthwhile returns, the organization must adopt knowledge‐oriented ICT infrastructure. This is substantiated by ICT's role in decision quality, knowledge sharing, inter‐organizational links, and the contribution to the resolution of the implicit conflict between sustainability and economic growth.

Research limitations/implications

There was a imited amount of data subjected to statistical analysis. This may skew some of the results, and inflate the experimental error. However, the limited data is ascribable to the restricted nature of the targeted population itself.

Originality/value

The results in this paper address major issues surrounding the role of ICTs in sustainable development. The tackling of these issues is essential to the success of ICT in the sustainable development realm. The understanding and extrapolation of these results form a valuable guidance to the KM practitioners in supporting sustainable development.

Details

Journal of Knowledge Management, vol. 14 no. 5
Type: Research Article
ISSN: 1367-3270

Keywords

Article
Publication date: 11 September 2009

Mirghani Mohamed, Michael Stankosky and Mona Mohamed

The purpose of this paper is to empirically assess the importance of knowledge management (KM) for sustainable development. Two main hypotheses about the critical success factors

2912

Abstract

Purpose

The purpose of this paper is to empirically assess the importance of knowledge management (KM) for sustainable development. Two main hypotheses about the critical success factors of knowledge and technology contribution to sustainable development are tested.

Design/methodology/approach

The research is carried out using surveys and interviews among a KM/integrated information and communication technologies (IICTs) sustainable development community.

Findings

Results show that KM is critical for innovation, prioritization and efficient use of resources. A significant linear association between IICTs and KM across time and geography is detected. IICTs improve the quality of shared decision making in inter‐ and intra‐organizational settings. Paradoxically, IICTs lead to information overload, and digitization leads to knowledge dilution “de‐contextualization”. Nevertheless, these drawbacks are outweighed by the multitude of the converged technologies benefits.

Research limitations/implications

There is a limited amount of data subjected to the statistical analysis. This may skew some of the results, and inflate the experimental error. However, the limited data are due to the restricted targeted population itself.

Originality/value

The results in this paper led to the proposal of the knowledge iterative supply network (KISN) framework, which describes knowledge lifecycle that lessens technology negative impacts. This would be a valuable roadmap for KM practitioners who are planning to deploy KM technology for supporting sustainable development.

Details

Journal of Knowledge Management, vol. 13 no. 5
Type: Research Article
ISSN: 1367-3270

Keywords

Article
Publication date: 6 May 2021

Miral Sabry AlAshry

The purpose of this study is to investigate Libyan journalists’ perspectives regarding the media laws Articles 37,132, 38 and 46, which address media freedom in the new Libyan…

Abstract

Purpose

The purpose of this study is to investigate Libyan journalists’ perspectives regarding the media laws Articles 37,132, 38 and 46, which address media freedom in the new Libyan Constitution of 2017.

Design/methodology/approach

Focus group discussions were done with 35 Libyan journalists, 12 of them from the Constitution Committee, while 23 of them reported the update of the constitution in the Libyan Parliament.

Findings

The results of the study indicated that there were media laws articles that did not conform to the international laws and United Nations treaties, which the Libyan Parliament committee approved. Another finding from the journalists was the Constitution should provide and guarantee press freedom, while media laws articles approved to put a paragraph about “censorship” in the press and media as a tool to silence government opposition. In addition, journalists indicated future constitution should redraft Article 38 to conform with Article 19 of the “International Covenant on Civil and Political Rights,” to support the “principles of freedom of expression and information” without control. Moreover, Article 46 needs to be changed and linked to the “provisions of international law on the right of information access” to improve the access and dissemination of information in the media.

Practical implications

Redrafting the constitution articles in the future can be summarised as follows: First, the Libyan Constitution should provide and guarantee press freedom without any censorship and include clear articles to protect journalists in conflict zones. Second, Articles 37,132 and 38, about “freedom of information and publication,” need to be redrafted to link with Article 19 of the “International Covenant on Civil and Political Rights,” to support the principles of freedom of expression and information, and the use of this right must not be subject to prior control. Third, Article 46 needs to be changed and linked to the provisions of “International law on the Right of Access to Information” to improve access and dissemination of information in the media to protect confidentiality sources. The most important articles should be implemented (freedom of information and personal information act) because after the Arab Spring revolutions, there was a transitional period in societies and a change in the constitutions of Tunisia and Egypt. They developed legal articles about media freedom so that Libya resembles other Arab countries. From that point, the journalists recommended that all information should be protected from government interference to ensure transparency, combat corruption and protect independent journalists. These articles will open the way to add more development articles to media freedom rules in the Journalists’ Syndicate. Fourth, there are also various types of threats encountered by journalists in their work. In pursuit of their right and freedom of expression, they recommended that Libya must establish an independent self-regulatory media that are free from political and economic influence. Fifth, journalists need licenses for them to work through the syndicate. The new syndicate should play an active role to safeguard the rights of journalists, activists and media entities to carry out their work and end the self-censorship. Sixth, the constitution should also add articles to end the impunity and change the articles in the penal code. Overall, the journalists covering the conflict and war are encountering threats, violence and imprisonment. As a result, Libyan journalists must seek new legislation to defend independent journalism and freedom of expression in their deeply divided country. In addition, they need to have a strong central authority to defend journalists and journalism in wartime, where journalists are regularly threatened, abducted and sometimes killed. Also, the Libyan Journalists Syndicate should stress the importance of the media’s self-regulation to guarantee their rights to freedom of expression, grant their readers’ respect and minimise government’s interference. Finally, they need to develop new laws to grant media freedom from regulations and restrictions, as well as defend and promote democracy, the citizens’ right to be informed, as well as their right to discuss and disseminate information. There is also the need to implement articles in the constitution, articles about the protection of political speech, which would be specific enough to differentiate between what is legally permitted and what may be ethically offensive.

Originality/value

This study will help the new Libyan parliament after the legislative elections on 24 December 2021 to amend the media laws articles in the constitution.

Details

Journal of Information, Communication and Ethics in Society, vol. 19 no. 2
Type: Research Article
ISSN: 1477-996X

Keywords

1 – 10 of 30