Search results
11 – 20 of 88
The purpose of this study is to empirically investigate the extent to which knowledge sharing and organizational learning affect organizational effectiveness.
Abstract
Purpose
The purpose of this study is to empirically investigate the extent to which knowledge sharing and organizational learning affect organizational effectiveness.
Design/methodology/approach
The research samples have been drawn from all levels of employees in the organizational hierarchy of international tourist hotels in Taiwan. The questionnaires were distributed to 1,200 participants across nine international tourist hotels in Taiwan. These hotels are globally managed or franchised by international groups of hotels and resorts.
Findings
Of 499 usable questionnaires, the results suggest that knowledge sharing would facilitate the transformation of collective individual knowledge to organizational knowledge without the existence of orphaned knowledge and knowledge depreciation. Furthermore, this would result in the advancement of organizational learning and eventually, the enrichment of organizational effectiveness.
Practical implications
The more individual intellectual capital is transferred to organizational assets, the greater the degree of strength of organizational capabilities will become. If organizations do not implant mechanisms for storing that all employees collectively learn, effects are not enduring. There would furthermore be a limited contribution to organizational learning.
Originality/value
This study contributes to KM literature that suffers from a paucity of research on the empirical examination of this subject.
Details
Keywords
The purpose of this paper is to provide an overview of some issues and controversies surrounding arguments for regulating cyberspace.
Abstract
Purpose
The purpose of this paper is to provide an overview of some issues and controversies surrounding arguments for regulating cyberspace.
Design/methodology/approach
The paper begins with a brief investigation of some background questions such as “What is cyberspace?” and “What is meant by ‘regulation’?” It then considers some distinctions between descriptive and normative aspects of questions involving internet regulation. Next, the paper examines Lawrence Lessig's model, which describes four modes of regulation that can be applied to cyberspace. The paper then considers some recent controversies that have emerged because of “regulation by code” and the “privatization of information policy.”
Findings
Cyberspace regulation raises ethical concerns.
Research limitations/implications
Internet regulation is evolving.
Originality/value
The way cyberspace is viewed, either as a “place” or as a “medium,” affects how it will be regulated.
Details
Keywords
Abstract
Details
Keywords
Abstract
Details
Keywords
Purpose – To examine corporate social responsibility in cyberspace within the context of the experience of Google Corporation in China in order to provide greater understanding of…
Abstract
Purpose – To examine corporate social responsibility in cyberspace within the context of the experience of Google Corporation in China in order to provide greater understanding of the complexities that corporations encounter when operating across cyber borders.Design/methodology/approach – The research is grounded in the theoretical debate: The Internet as democratic and universal space versus the Internet as autocratic and sovereign space. Historical analysis is drawn from the case of Google Corporation in China.Findings – Freedom in cyberspace is more likely to be advanced universally with a collective commitment to corporate social responsibility in the information technology sector.Research limitations/implications – The study provides insights into the appropriate balance between the ethical responsibilities of the firm and its need to compete and survive in the highly competitive information age.Originality/value of chapter – The case of Google Corporation in China offers a venue for further discussion on the ethical role of transnational information technology corporations and their improvements in fostering human rights and free enterprise in cyberspace.
Details
Keywords
The paper aims to examine the profound transformations engendered by the information revolution in order to determine aspects of what should be visible or invisible in human…
Abstract
Purpose
The paper aims to examine the profound transformations engendered by the information revolution in order to determine aspects of what should be visible or invisible in human affairs. It seeks to explore the meaning of invisibility via an interdisciplinary approach, including computer science, law, and ethics.
Design/methodology/approach
The method draws on both theoretical and empirical material so as to scrutinise the ways in which today's information revolution is recasting the boundaries between visibility and invisibility.
Findings
The degrees of exposure to public notice can be understood as a matter of balance between access and control over information in a specific context, as well as a function of the ontological friction in a given region of the environment.
Originality/value
The originality of the case study on a new kind of recommender system is enhanced because of the procedural approach which is suggested to further develop the distinction between “good” and “evil” as anything that enriches, or damages, the informational complexity of the environment.
Details
Keywords
The 1960s in America was the decade of social responsibility, founded upon fifteen years of unparalleled economic growth. To some, world prosperity seemed a realizable ideal…
Abstract
The 1960s in America was the decade of social responsibility, founded upon fifteen years of unparalleled economic growth. To some, world prosperity seemed a realizable ideal. Social theorists like Buckminster Fuller, John Gardner, and John Rawls saw opportunities for sharing wealth in a cooperative net that assumed a rising standard of living across the world. While some might find little cheer in John Kenneth Galbraith's model of the “New Industrial State,” few would now argue that his model was not, in the main, correct. The following two decades proved that while global industrialization was realizable, perhaps inevitable, there was no guarantee that social equity across the board would be the result of that process. In a competitive world marketplace, it might seem that abstract considerations of justice and equity are a luxury few firms or nations can now afford.
The paper suggests overcoming the polarization of today's debate on peer‐to‐peer (P2P) systems by defining a fair balance between the principle of precaution and the principle of…
Abstract
Purpose
The paper suggests overcoming the polarization of today's debate on peer‐to‐peer (P2P) systems by defining a fair balance between the principle of precaution and the principle of openness. Threats arising from these file sharing applications‐systems should not be a pretext to limit freedom of research, speech or the right “freely to participate in the cultural life of the community”, as granted by the Universal Declaration of Human Rights from 1948. The paper aims to take sides in today's debate.
Design/methodology/approach
The paper adopts an interdisciplinary approach, including network theory, law and ethics. The method draws on both theoretical and empirical material so as to stress the paradox of the principle of precaution applied to P2P systems and why the burden of proof should fall on the party proposing that one refrain from action.
Findings
Censors and opponents of P2P systems who propose to apply the principle of precaution to this case deny the premise upon which that principle rests. “Levels of evidence” required by the precautionary principle show that – in many cases in which the outcomes of technology are ignored – another principle is needed for orienting action, namely, the principle of openness.
Social implications
Alarm about how P2P systems undermine crucial elements of the societies often led to the ban of this technology. The paper illustrates why it should not be the case: rather than shutting these networks down, they should be further developed.
Originality/value
The paper provides the comprehensive picture of a far too often fragmented debate.
Details
Keywords
Andrea Raymundo Balle, Mário Oscar Steffen, Carla Curado and Mírian Oliveira
This paper aims to uncover the combinations of knowledge sharing mechanisms that organizations in a science and technology park in Brazil use to share managerial and technical…
Abstract
Purpose
This paper aims to uncover the combinations of knowledge sharing mechanisms that organizations in a science and technology park in Brazil use to share managerial and technical knowledge.
Design/methodology/approach
This research adopts a qualitative approach that uses a fuzzy set qualitative comparative analysis to analyze data that are gathered from 51 managers of organizations in a science and technology park.
Findings
The results show that knowledge sharing happens regardless of the type of knowledge. There are more alternative paths that lead to knowledge sharing than to its absence. Regarding the type of knowledge shared, there are more alternative configurations that lead to managerial knowledge sharing than to technical knowledge sharing. Only the older organizations in the science and technology park abstain from knowledge sharing.
Research limitations/implications
Due to the qualitative nature of the study, no generalization is possible. Additionally, the study’s limitation is that it involves organizations from a single science and technology park.
Practical implications
The results offer managers of organizations in science and technology parks to choose from alternative combinations of mechanisms to either boost their knowledge sharing or to promote knowledge protection.
Originality/value
The paper provides an original contribution by identifying the combinations of mechanisms that organizations in a science and technology park use that leads to the sharing of specific knowledge types. The findings also identify the combination of mechanisms that older organizations use that prevents them from sharing knowledge.
Details
Keywords
The purpose of this paper is to explore the differences and similarities between computer ethics, internet ethics and cyberethics as reflected in the contents of the published…
Abstract
Purpose
The purpose of this paper is to explore the differences and similarities between computer ethics, internet ethics and cyberethics as reflected in the contents of the published literature as well as the search trends on Google.
Design/methodology/approach
The paper opted for an informetrics approach, and more specifically content analysis, to investigate the inter-relationships between computer ethics, internet ethics and cyberethics. The data sources for this study included Google Trends, Google Scholar and the Web of Science citation indexes. Different search queries were used, depending on the structure of each data source, to extract the relevant data sets.
Findings
Using different methods and techniques to analyse the data, the paper provides an alternative means of investigating relationships among concepts. The findings indicate that there is still no clear distinction between the concepts in terms of subject and title terms used to describe the published literature on the three concepts, as well as the research areas where the three concepts are applied. Going by the current trend, the paper envisages that cyberethics may, in the future, become a broader term to include computer ethics and internet ethics.
Research limitations/implications
The data sources that were selected for the study might have not been comprehensive in the coverage of the published literature on the three concepts and therefore there is need for further research, which will expand the scope of the data sources.
Practical implications
The paper’s findings may apply in the practice of indexing and abstracting as well as thesaurus construction as far as the three terms are concerned.
Originality/value
The paper offers an alternative technique that can be used to investigate relationships among concepts. The value of the paper could include curriculum development of programmes dealing with ethical issues that arise when developing and using computers and related technologies.
Details