Skip to main content
main-content

Über dieses Buch

This book contains the refereed proceedings of the 5th Annual Global Innovation and Knowledge Academy, GIKA 2015, held in Valencia, Spain, in July 2015. The theme of the conference was “New Knowledge Impacts on Designing Implementable Innovative Realities.” The GIKA conference offers a unique opportunity for researchers, professionals, and students to present and exchange ideas concerning management, information systems, and business economics and see its implications in the real world. The 13 contributions accepted for GIKA 2015 were selected from 102 submissions and include research that contributes to the creation of a solid evidence base concerning new information and communication technologies for knowledge management, measuring the impact and diffusion of new technologies within organizations, and highlighting the role of new technologies and tools in the relationships between knowledge management and organizational innovation.

Inhaltsverzeichnis

Frontmatter

The STUDENTSCALE: Measuring Students’ Motivation, Interest, Learning Resources and Styles

Abstract
It becomes important to consider the role of Information Technologies (IT) in society and at school, including its impact on the teaching-learning process transformation. The use of IT should be done in an integrated and inclusive way, it is critical to teach how to use, consume and interact with technology. This study intends to contribute to a more depth understanding of the IT impact in the teaching-learning process. Our main goal is to create a scale to measure the Subjects’ Interest and Motivation, Motivation and Involvement with Learning Resources and Learning Styles. Those are important factors that impact on students’ Learning Performance. Insights from an empirical study of 357middle education students indicate that this multi-dimensional scale incorporates the following constructs: a) Interest and Motivation, b) Motivation and Involvement with IT’s Learning Resources, c) Motivation and Involvement with Teachers’ Learning Resources, and d) Non Literary Learning Styles. Discussion centers on this scale implications for theory development and management decisions. Teachers’ and schools’ managers may better understand the learning resources and styles preferred by students, and thus to create more motivational learning programs. Directions for future research are also presented.
Rui Moreira, Cláudia Seabra, José Luís Abrantes, Belmiro Rego

Contribution of Computing Services to Benchmarking Asset Management Knowledge Management

Abstract
Asset management has broadened from a focus on maintenance management to whole of life cycle asset management requiring a suite of new competencies from asset procurement to management and disposal. Well-developed skills and competencies as well as practical experience are a prerequisite to maintain capability, to manage demand as well to plan and set priorities and ensure on-going asset sustainability. This paper has as its focus to establish critical understandings of data, information and knowledge for asset management along with the way in which benchmarking these attributes through computer-aided design may aid a strategic approach to asset management. The paper provides suggestions to improve sharing, integration and creation of asset-related knowledge through the application of codification and personalization approaches.
Anna Wiewiora, Kerry Brown, Javier Tafur

Financing of Productive Investments: A Model with Coordinated Scenarios

Abstract
This research raises a company that knows the cash requirements to purchase capital equipments in order to satisfy the demand for the products of each of the proposed scenarios. The company is negotiating with credit institutions a series of loans at different interest rates. Also, the company can make capital increases. A model focused on the financial needs using scenarios allows us to combine funding sources to cover the costs of the acquisition of production equipment to meet the demand for each scenario. This combination remunerates own financing, settles interest and repays the borrowed capital. The results indicate that the model is robust and minimizes the financial cost of a possible combination of external and internal sources in each possible scenario.
Carlos Lassala, Manuel Mocholí, Valentín Navarro

A Fuzzy Logic Approach to Modeling Brand Value: Evidence from Taiwan’s Banking Industry

Abstract
With the growing recognition that brands are valuable assets to organizations, the measurement of brand equity has thus been of interest to the academic and practice communities. Various approaches to measuring brand value have developed but are not yet universally accepted. To capture the qualitative characteristics of brands, this paper attempts to apply fuzzy logic analysis to model the brand values of Taiwan’s banking industry. And, we adopt the Hirose model to examine the effectiveness of the fuzzy logic approach in the context of brand valuation. Our findings show that the fuzzy logic and the Hirose models present similar trends in relation to brand estimation. The evidence provided by this paper would enrich our understanding of the brand valuation methodology.
David Han-Min Wang, Tiffany Hui-Kuang Yu

Human Resource Characteristics and E-Business: ANfsQCA Analysis

Abstract
Electronic business (e-business) is becoming a real alternative to traditional market channels, particularly for the organic product sector. Traditionally, this sector has faced a multitude of commercial obstacles that e-business can solve.
The present paper examines how the characteristics of the company’s manager – following upper echelon theory – and the number of office employees available can boost or limit this sector’s use of information and communication technology (ICT) and, specifically, electronic business.
This study, which used the fuzzy set Quality Comparative Analysis (fsQCA) method, confirms that for companies in this sector to make full use of e-business, the number of office employees available and the characteristics of the manager (age, educational background, knowledge of ICTs and view of the benefits of ICTs for product marketing) are important.
Enrique Bernal-Jurado, Miguel Jesús Medina-Viruel, Adoración Mozas-Moral

The Complexity of Cyber Attacks in a New Layered-Security Model and the Maximum-Weight, Rooted-Subtree Problem

Abstract
This paper makes three contributions to cyber-security research. First, we define a model for cyber-security systems and the concept of a cyber-security attack within the model’s framework. The model highlights the importance of game-over components—critical system components which if acquired will give an adversary the ability to defeat a system completely. The model is based on systems that use defense-in-depth/layered-security approaches, as many systems do. In the model we define the concept of penetration cost}, which is the cost that must be paid in order to break into the next layer of security. Second, we define natural decision and optimization problems based on cyber-security attacks in terms of doubly weighted trees, and analyze their complexity. More precisely, given a tree T rooted at a vertex r, a penetrating cost edge function c on T, a target-acquisition vertex function p on T, the attacker’s budget and the game-over threshold B ,GQ + respectively, we consider the problem of determining the existence of a rooted subtree T’ of T within the attacker’s budget (that is, the sum of the costs of the edges in T’ is less than or equal to B) with total acquisition value more than the game-over threshold (that is, the sum of the target values of the nodes in T’ is greater than or equal to G). We prove that the general version of this problem is intractable. We also analyze the complexity of three restricted versions of the problems, where the penetration cost is the constant function, integer-valued, and rational-valued among a given fixed number of distinct values. Using recursion and dynamic-programming techniques, we show that for constant penetration costs an optimal cyber-attack strategy can be found in polynomial time, and for integer-valued and rational-valued penetration costs optimal cyber-attack strategies can be found in pseudo-polynomial time. Third, we provide a list of open problems relating to the architectural design of cyber-security systems and to the model.
Geir Agnarsson, Raymond Greenlaw, Sanpawat Kantabutra

Are Problems with Violence and the Lack of Public Safety a Barrier to Entrepreneurship?

Abstract
Scholars cite violence as a potential barrier to entrepreneurial activity in El Salvador. Using AHP, this research aims to rank the socioeconomic and political barriers to entrepreneurship in El Salvador. The analysis stresses the importance of citizen security as a barrier to entrepreneurial activity.
Pablo Pinazo-Dallenbach, Norat Roig-Tierno, Alicia Mas-Tur

The Development of ICTs and the Introduction of Entrepreneurial Capital

Abstract
Building on an extensive literature review, this article presents a conceptual study of the relationships between information and communication technologies (ICTs) and intellectual capital (IC), placing special emphasis on entrepreneurial capital. IC comprises human capital, structural capital, and relational capital. Relational capital consists of two sub-components: social capital and organizational capital. Human capital’s main elements are knowledge, experience, and education. Knowledge is a fundamental resource for any organization (Baden-Fuller & Pitt, 1996; Grant, 1996; Spender, 1996). Entrepreneurial capital was recently introduced as a component of human capital (Audretsch & Keilbach, 2004). A firm’s entrepreneurial capital consists of employees who innovate and take risks to change how the firm acts. In addition to addressing IC, this research examines new ICT use. An ICT firm can be defined as a firm that is technologically connected in real time. Technology, information, and communication are the most powerful tools to develop firms (Hafkin & Taggart, 2001). As such, technology, information, and communication may also have profound links to entrepreneurial capital. ICTs and IC are two keys to entrepreneurship (Costa, 2012). ICT firms need their employees’ intellectual capital, or else these firms will never achieve long-term sustainability (Madsen, Neergaard, & Ulhøi, 2003). Similarly, intellectual capital benefits from ICT firms to transfer knowledge via networks.
Gema Albort-Morant, Andrea Rey-Martí

Analysis and Improvement of Knowledge Management Processes in Organizations Using the Business Process Model Notation

Abstract
Successful knowledge management is one of the main challenges for any kind of organization. This paper aims to enhance knowledge management processes within companies and institutions, by analyzing different processes that are part of common stages along all knowledge management lifecycles described in the literature. The processes have been modeled using the Business Process Model and Notation with a high abstraction level, in order to cover a wide range of organizations. The paper also presents a possible evolution and enhancement of knowledge management processes using the Business Process Model and Notation diagrams, including the use of superior and better performing technological solutions to support knowledge management processes. As a result, we propose a set of improvements that can be extrapolated to other knowledge management-related business processes.
Alicia García-Holgado, Francisco José García-Peñalvo, Ángel Hernández-García, Faraón Llorens-Largo

Re-examining the Consistency in fsQCA

Abstract
Fuzzy set Quality Comparative Analysis (fsQCA) is gaining popularity in social studies. FsQCA uses set theory to describe the sufficient relationship between the combination of antecedents and outcome. Hence, the assessment of the relationship is very important. One of the functions is called consistency. FsQCA consider the sufficient relationship as a subset relationship, which is different from the relationship in logic. This study aims to re-examine the function of consistency and propose a new function. A data set is used to demonstrate process. The new consistency suits logic theory and yields more combinations of antecedents than those of the current consistency.
Kun-Huang Huarng

A Web Services-Based Application for LMS Data Extraction and Processing for Social Network Analysis

Abstract
The emergence of learning analytics as a discipline of its own has given way to a diverse subset of research fields offering very different approximations to the topic. One of the most recent and active approaches is social learning analytics, which focuses primarily on the application of social network analysis (SNA) techniques and visualizations to study and help understanding interactions in online courses as a key pillar of social construction of learning. However, and despite this interest, current tools for analysis and visualization are very limited for advanced social learning analytics, and SNA applications cannot directly process data from learning management systems. This paper presents a technical view of the design and implementation of a web services-based application that aims to overcome these limitations by extracting and processing educational data about forum interactions in online courses to generate the corresponding social graphs and enable advanced social network analysis on SNA software.
Julián Chaparro-Peláez, Emiliano Acquila-Natale, Santiago Iglesias-Pradas, Ignacio Suárez-Navas

Fault Tolerance Patterns Mining in Dynamic Databases

Abstract
Mining of frequent patterns in database has been studied for several years. However, real-world data tends to be dirty and frequent pattern mining which extracts patterns that are absolutely matched is not enough. An approach, called frequent fault-tolerant pattern (FT-pattern) mining, is more suitable for extracting interesting information from real-world data that may be polluted by noise. Previous research on frequent fault-tolerant pattern mining has been widely studied. However, all of the researches focus on static database. In this paper, we propose an efficient framework to analyze the frequent FT-patterns mining in dynamic database. To avoid re-scanning the whole database, beside of keeping the fault-tolerance pattern, we will also keep the potential fault-tolerance pattern that has higher possibility of becoming a fault-tolerance pattern. The experimental results show that by re-using the existing pattern that had been generated, the proposed algorithms are highly efficient in terms of execution time and maximum memory usage for mining fault-tolerance frequent pattern in dynamic database compare to FFM algorithm.
Delvi Ester, Guanling lee

A Unified Approach for the Longest Path Problem on Some Tree-Like Graphs

Abstract
In a graph, a maximal biconnected component is called a block. A graph is called a block (resp., cactus and probe block) graph if its every block is a clique (resp., an edge or cycle, and complete split graph). In this paper, we propose a unified approach for the longest path problem on block, cactus, and probe block graphs. As a result, the longest path problem can be solved in linear time on block and probe block graphs, and in quadrat time on cactus graphs.
Ang-Lin Dong, Sheng-Lung Peng

Backmatter

Weitere Informationen

Premium Partner

    Bildnachweise