In this study, we explore the Wiki affordance of enabling shaping behavior within organizational intranets supported by Wikis. Shaping is the continuous revision of one's own and others' ...contributions to a Wiki. Shaping promotes knowledge reuse through improved knowledge integration. Recognizing and clarifying the role of shaping allows us to theorize new ways in which knowledge resources affect knowledge reuse. We examine the role of three knowledge resources of a Wiki contributor: knowledge depth, knowledge breadth, and assessment of the level of development of the Wiki community's transactive memory system. We offer preliminary evidence based on a sample of experienced organizational Wiki users that the three different knowledge resources have differential effects on shaping, that these effects differ from the effects on the more common user behavior of simply adding domain knowledge to a Wiki, and that shaping and adding each independently affect contributors' perceptions that their knowledge in the Wiki has been reused for organizational improvement. By empirically distinguishing between the different knowledge antecedents and consequences of shaping and adding, we derive implications for theory and research on knowledge integration and reuse.
Intranets became the central platform for internal corporate communication, business processes and information technology in the last decade. This huge application scope leads to severe project ...traps: How can a corporate-wide, interdisciplinary intranet strategy be developed, established and maintained? This article shows the challenges and potential problems for the development of an intranet strategy. It introduces a building block model for intranet strategy. The model includes strategic dimensions as well as cultural aspects and project scope.
With the development of the Internet, the company network architecture is also undergoing profound changes, and the boundaries between the original internal network and external network are becoming ...increasingly blurred with the emergence of cloud services. More and more company businesses are deployed on the cloud server, which increases the risk of data exchange between the cloud server and the intranet. An implementation method of zero-trust architecture is proposed in this paper to apply to this scenario. The method can ensure safe and reliable data exchange when the external application server accesses the internal network, effectively protect network communication and business access while not affecting the original internal network protection measures, and make the company network safer and controllable.
Pragmatisch oder wissenschaftlich? Körner, Thomas; Dammann, Jan Christian; Reinicke Stefanie
Informatik-Spektrum,
01/2021, Letnik:
44, Številka:
3
Journal Article
Recenzirano
ZusammenfassungDer Artikel beschäftigt sich mit der Frage, wie verschiedene Ansätze zum Erfolg von unternehmensinternen Innovationen beitragen können. Wir zeigen anhand eines Fallbeispiels, wie wir ...den Google Design Sprint und das Design Science Research Pattern für die Entwicklung eines Intranet-Portals eingesetzt haben. Die entwickelte Software listet Tools und deren Einsatzgebiete im Unternehmen sowie Ansprechpartner nutzerfreundlich auf.Während der Google Design Sprint dabei half, in kürzester Zeit den richtigen Lösungsansatz für ein unklares Problem zu finden, erlaubte das Design Science Research Pattern in unserem Fall eine tiefe Untersuchung eines Lösungsraums. Dabei kamen diese Ansätze für die initiale Produktentwicklung sowie die Weiterentwicklung zum Einsatz. Auf dem Weg vom ersten lauffähigen Prototyp hin zur produktiv nutzbaren Unternehmensanwendung wendeten wir weitere Praktiken an, um die Softwarelösung nachhaltig zu etablieren. Aus diesen Erfahrungen leiten wir Tipps für unternehmensinterne Innovationen ab.
This paper investigates how an organizational competence in boundary spanning emerges in practice by drawing on the concepts of boundary spanner and boundary object. Using data from two qualitative ...field studies, we argue that in order for boundary spanning to emerge a new joint field of practice must be produced. Our data illustrate that some agents partially transform their practices in local settings so as to accommodate the interests of their counterparts. While negotiating the new joint field, these agents become what we call boundary spanners-in-practice who produce and use objects which become locally useful and which acquire a common identity-hence, boundary objects-in-use. Moreover, we show how boundary spanners-in-practice use various organizational and professional resources including the influence that comes with being nominated to boundary spanners' roles to create the new joint field. The conditions necessary for boundary spanners-in-practice to emerge are outlined and discussed, as are important implications for IS implementation and use.
The paper presents a structural model of the modern typical corporate network (intranet). The detailed functional structure security architecture of the Network Security Center (NSC) within the ...intranet is proposed. The research results can be used to build an intranet, which initially aims to counteract computer attacks and, more importantly, to prevent information security (IS) incidents by implementing the most complete set of IS controls in the intranet's NSC.
The lack of internet access in underdeveloped nations, including the Philippines, has significant impact on the digital divide. One of the challenges faced by students in underdeveloped nations, ...particularly those in far-flung and hinterland schools, is the lack of access to up-to-date educational resources due to their geographic isolation. This can lead to a significant disadvantage in terms of academic performance and future opportunities. Thus, a Remote Learning Management System (RLMS) is proposed. The study includes the development and testing of the RLMS system, as well as an evaluation of its acceptance through the Technology Acceptance Model survey questionnaire. This system utilizes intranet networks and a Network File System to provide distant learning and teaching-based eLearning in far-flung and hinterland schools. The system intends to make sharing educational resources easier, such as to let students access their lessons, modules, and assignments, take exams and quizzes and even watch video lessons on their laptops, smartphones, and tablets, even without an internet connection. The results show that the RLMS system is fully functional and accessible, with positive acceptance and intention to use from teachers and students. Future studies can focus on enhancing the RLMS capabilities, improving user-friendliness, and providing in-depth training to teachers to maximize the system's potential. Overall, the RLMS system provides a viable alternative for blended learning in areas with slow and limited internet access.
Energy Internet, a futuristic evolution of electricity system, is conceptualized as an energy sharing network. Its features, such as plug-and-play mechanism, real-time bidirectional flow of energy, ...information, and money can lead to significant benefits and innovation in electricity production and utilization. Energy Internet integrates small-scale renewable energy systems, electric loads, storage devices, and electric vehicles for effective transaction of power backed by emerging technologies such as Internet of Things, vehicle-to-grid, and blockchain. At present, there is no scaled-up working model of Energy Internet, and literature is scarce, which makes the research in this domain significant, novel, and timely. Given this, an attempt is made to develop the conceptual model of an Energy Internet, elaborate its structure and components, and discuss its operational principles. First, a comprehensive overview of Energy Internet is presented along with its aptness as a future evolution of electricity system. Second, concepts, architectures, and features that underpin Energy Internet are outlined. Third, concept of ‘Energy Intranet’ is introduced to denote the scaled-down version of Energy Internet, which embodies energy prosumers and local energy markets to form a local energy cluster. Finally, discussion is presented on the network structure of Energy Internet, relevance of emerging technologies and innovative operational mechanisms.
Según lo regulado por la Oficina Nacional de Normalización es necesario llevar a cabo el registro y control de la asistencia, estadía y puntualidad a nivel empresarial. Una de las formas es a través ...de métricas y reportes que ayuden a planificar, controlar y tomar buenas decisiones. El CITI cuenta con una herramienta que gestiona la seguridad del centro, pero el sistema está enfocado en los aspectos de autorización y control de trazas, excluyendo cualquier métrica que sirva de apoyo en la toma de decisiones. Se propone una solución de Inteligencia de Negocio que permita obtener conocimiento del comportamiento de la asistencia y estadía de sus empleadosa través del tiempo, por área, por plantilla o por dirección, guardando un histórico de las entradas y salidas del centro. En paralelo se desarrolla un módulo para la intranet del centro que permita generar reportes y métricas de forma dinámicaa partir de los datos obtenidos. El módulo está desarrollado en el CMS Orchard sobre el que se encuentra la intranet del centro, integrándolo como un nuevo servicio.Este brinda reportes y métricas sobre la asistencia y estadía del personal tanto a los jefes de sus trabajadores, como por empleado. Esta solución permite contar con información en cualquier instante de tiempo y con diferentes niveles de filtrado. Es posible realizar análisis estadísticos del comportamiento y evolución en el tiempo de las diferentes áreas, plantillas o por empleados y analizar el cumplimiento o no de la asistencia.