Search For:

Displaying 1-17 out of 17 total
Introduction to Knowledge Management and Security Minitrack
Found in: 2014 47th Hawaii International Conference on System Sciences (HICSS)
By Alexandra Durcikova,Murray E. Jennex
Issue Date:January 2014
pp. 3431
None
   
Introduction to KM and Security: Protecting Intellectual Property Minitrack
Found in: 2013 46th Hawaii International Conference on System Sciences (HICSS 2013)
By Alexandra Durcikova,Murray E. Jennex
Issue Date:January 2013
pp. 3467
This is the first year for the KM and Security: Protecting Intellectual Property Minitrack at HICSS and it has attracted a total of four papers of which two were accepted for presentation. It is expected that future years will see the minitrack grow as it ...
   
Integrating IS Security with Knowledge Management: Are We Doing Enough to Thwart the Persistent Threat?
Found in: 2014 47th Hawaii International Conference on System Sciences (HICSS)
By Murray Jennex,Alexandra Durcikova
Issue Date:January 2014
pp. 3452-3459
Knowledge management focuses on capturing and sharing knowledge. Because of this, KM researchers tend to focus on issues related to knowledge capture, storage, and sharing. However, because knowledge is valuable, it is a target needing to be protected. Thi...
   
Enhancing the Motivation, Opportunity, and Ability of Knowledge Workers to Participate in Knowledge Exchange
Found in: 2014 47th Hawaii International Conference on System Sciences (HICSS)
By Kelly J. Fadel,Alexandra Durcikova
Issue Date:January 2014
pp. 3605-3614
The strategic value of knowledge lies in its effective transfer from those who have it to those who need it through a process of knowledge exchange. Organizations invest significant resources in communities of practice, knowledge repositories, and other in...
   
Assessing Knowledge Loss Risk
Found in: 2013 46th Hawaii International Conference on System Sciences (HICSS)
By Murray E. Jennex,Alexandra Durcikova
Issue Date:January 2013
pp. 3478-3487
Knowledge has been recognized as a critical asset for companies that want to compete in today's turbulent business environment. Researchers and practitioners recognize that the loss of knowledge due to loss of employees that hold valuable knowledge can hav...
   
Introduction to Knowledge Management in a Changing Society: Using Knowledge to Change Societies
Found in: Hawaii International Conference on System Sciences
By Alexandra Durcikova,Murray E. Jennex
Issue Date:January 2012
pp. 3669
none
   
Forget the Fluff: Examining How Media Richness Influences the Impact of Information Security Training on Secure Behavior
Found in: Hawaii International Conference on System Sciences
By Jeffrey L. Jenkins,Alexandra Durcikova,Mary B. Burns
Issue Date:January 2012
pp. 3288-3296
User-initiated security breaches are common and can be very costly to organizations. Information security training can be used as an effective tool to improve users' secure behavior and thus alleviate security breaches. Via the lens of learning, media rich...
   
It's Not
Found in: Hawaii International Conference on System Sciences
By Alexandra Durcikova,Kelly J. Fadel
Issue Date:January 2012
pp. 3959-3968
The value of an electronic knowledge repository depends on the degree to which it offers high quality knowledge to its users. Consequently, firms that use such repositories often implement validation procedures to monitor and ensure the quality of submitte...
   
Elaboration Likelihood in Knowledge Management: A Model and Experimental Test
Found in: Hawaii International Conference on System Sciences
By Kelly J. Fadel, Alexandra Durcikova, Hoon S. Cha
Issue Date:January 2008
pp. 359
Understanding knowledge transfer using computer-mediated context is becoming essential given that organizations are spread more and more globally. In this paper, we adopt elaboration likelihood theory to investigate knowledge transfer processes in a Knowle...
   
Influence of System, Environment, and Procedures on Knowledge Submission Frequency
Found in: Hawaii International Conference on System Sciences
By Alexandra Durcikova, Susan A. Brown
Issue Date:January 2007
pp. 192c
Organizations continue to struggle with encouraging employees to participate in knowledge management initiatives. Research is replete with examples of organizations that implemented knowledge management systems in order to find them under utilized. In this...
   
Cognitive Fit and an Intelligent Agent for a Word Processor: Should Users Take All That Advice?
Found in: Hawaii International Conference on System Sciences
By Dennis F. Galletta, Alexandra Durcikova, Andrea Everard, Brian Jones
Issue Date:January 2003
pp. 41a
While intelligent agents have been developed to provide objective and expert advice to users, most experienced users know that they should not be followed blindly. Cognitive fit theory was developed about ten years ago to support the notion that tools shou...
   
Studying Knowledge Management System Success in System Administration
Found in: Hawaii International Conference on System Sciences
By Nicole F. Velasquez, Alexandra Durcikova, Rajiv Sabherwal
Issue Date:January 2009
pp. 1-7
Significant temporal and monetary costs are associated with the development and implementation of a knowledge management system (KMS). To justify this investment, it is important for organizations to measure the success of such systems. To help achieve thi...
   
Knowledge Sourcing from Repositories: The Role of System Characteristics and Autonomy
Found in: Hawaii International Conference on System Sciences
By Alexandra Durcikova, Kelly J. Fadel
Issue Date:January 2010
pp. 1-10
Organizations invest in the development of knowledge repositories (KR) to foster knowledge reuse and integration. Yet many KR initiatives fail to meet expectations, in part because knowledge workers underutilize the KR as a knowledge source. To date, littl...
   
Adoption of an Electronic Knowledge Repository: A Feature-Based Approach
Found in: Hawaii International Conference on System Sciences
By Nicole F. Velasquez, Rajiv Sabherwal, Alexandra Durcikova
Issue Date:January 2011
pp. 1-10
Many organizations dedicate money and time to implement electronic knowledge repositories (EKRs). To better implement these systems and motivate users to contribute knowledge, we must better understand how different types of users actually employ an EKR. W...
   
What Kind of Interventions Can Help Users from Falling for Phishing Attempts: A Research Proposal for Examining Stage-Appropriate Interventions
Found in: 2013 46th Hawaii International Conference on System Sciences (HICSS)
By Mary B. Burns,Alexandra Durcikova,Jeffrey L. Jenkins
Issue Date:January 2013
pp. 4023-4032
Because successful phishing attacks are expensive to society, it is imperative to understand how to promote protective behavior for IS end-users. Our research program in progress will extend IS Security research by empirically testing a theoretical hybrid ...
   
Sysadmins and the need for verification information
Found in: Proceedings of the 2nd ACM Symposium on Computer Human Interaction for Management of Information Technology (CHiMiT '08)
By Alexandra Durcikova, Nicole F. Velasquez
Issue Date:November 2008
pp. 77-81
Traditional usability measures may not be sufficient for some specialized users, such as system administrators. Because of their broad range of responsibilities for highly complex and risky business environments, these users also need tools that are powerf...
     
Does spell-checking software need a warning label?
Found in: Communications of the ACM
By Alexandra Durcikova, Andrea Everard, Brian M. Jones, Dennis F. Galletta
Issue Date:July 2005
pp. 82-86
Users---ironically, often those most verbally armed---put too much trust and little effort in questioning spell- and grammar-checking programs.
     
 1