Knowledge Exchange Protocols: a Second Study

نویسندگان

  • Richard T. Herschel
  • Hamid R. Nemati
  • David M. Steiger
چکیده

In the knowledge management domain, the conversion of tacit knowledge to explicit knowledge is critical because it is a prerequisite to the knowledge amplification process wherein knowledge becomes part of an organization’s knowledge network. Moreover, this process is strategically important because it enhances an organization’s ability to create new knowledge that is inevitably expressed through the organization’s capabilities, products, and services. The conversion of tacit to explicit knowledge is particularly relevant to information technology (IT), because IT can only partially facilitate tacit knowledge management, while it offers a substantial number of techniques to support the management and sharing of explicit knowledge. In this paper, knowledge exchange protocols are examined as a vehicle for improving the tacit-toexplicit knowledge conversion process. In a second experiment testing the use of knowledge exchange protocols, initial findings are confirmed: while structure may significantly improve the tacit-to-explicit knowledge conversion process, it also matters how the structure is employed in this process.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Diffie-Hellman type key exchange protocols based on isogenies

‎In this paper‎, ‎we propose some Diffie-Hellman type key exchange protocols using isogenies of elliptic curves‎. ‎The first method which uses the endomorphism ring of an ordinary elliptic curve $ E $‎, ‎is a straightforward generalization of elliptic curve Diffie-Hellman key exchange‎. ‎The method uses commutativity of the endomorphism ring $ End(E) $‎. ‎Then using dual isogenies‎, ‎we propose...

متن کامل

Second Summary Report on Two-party Protocols Second Summary Report on Two-party Protocols

This report focuses on secure two-party protocols. We consider different notions of security and discuss the most attractive models and set-up assumptions (e.g., random oracle, common reference string, bare public keys, trusted computing base) that have been proposed so far. We consider many popular two-party games (e.g., zero-knowledge proof systems, commitment schemes, oblivious transfer, fai...

متن کامل

Comparing Two Different Teaching Methods for Teaching the Dietary Exchange List to Students of Nutritional Science

Introduction: Considering the importance of learning dietary exchange list in academic nutrition education, teaching it gains significance, too. Thus, this study is going to compare two different teaching methods regarding dietary exchange list to students of nutritional science. Methods: This quasi-experimental study was conducted on 49 students of nutritional science in two semesters ...

متن کامل

Simple Security Definitions for and Constructions of 0-RTT Key Exchange

Zero Round-Trip Time (0-RTT) key exchange protocols allow for the transmission of cryptographically protected payload data without requiring the prior exchange of messages of a cryptographic key exchange protocol, while providing perfect forward secrecy. The 0-RTT KE concept was first realized by Google in the QUIC Crypto protocol, and a 0-RTT mode has been intensively discussed for inclusion i...

متن کامل

Simple Security De nitions for and Constructions of 0-RTT Key Exchange

Zero Round-Trip Time (0-RTT) key exchange protocols allow for the transmission of cryptographically protected payload data without requiring the prior exchange of messages of a cryptographic key exchange protocol. The 0-RTT KE concept was rst realized by Google in the QUIC Crypto protocol, and a 0-RTT mode has been intensively discussed for inclusion in TLS 1.3. In 0-RTT KE two keys are generat...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • JIKM

دوره 2  شماره 

صفحات  -

تاریخ انتشار 2003