Knowledge Exchange Protocols: a Second Study
نویسندگان
چکیده
In the knowledge management domain, the conversion of tacit knowledge to explicit knowledge is critical because it is a prerequisite to the knowledge amplification process wherein knowledge becomes part of an organization’s knowledge network. Moreover, this process is strategically important because it enhances an organization’s ability to create new knowledge that is inevitably expressed through the organization’s capabilities, products, and services. The conversion of tacit to explicit knowledge is particularly relevant to information technology (IT), because IT can only partially facilitate tacit knowledge management, while it offers a substantial number of techniques to support the management and sharing of explicit knowledge. In this paper, knowledge exchange protocols are examined as a vehicle for improving the tacit-toexplicit knowledge conversion process. In a second experiment testing the use of knowledge exchange protocols, initial findings are confirmed: while structure may significantly improve the tacit-to-explicit knowledge conversion process, it also matters how the structure is employed in this process.
منابع مشابه
Diffie-Hellman type key exchange protocols based on isogenies
In this paper, we propose some Diffie-Hellman type key exchange protocols using isogenies of elliptic curves. The first method which uses the endomorphism ring of an ordinary elliptic curve $ E $, is a straightforward generalization of elliptic curve Diffie-Hellman key exchange. The method uses commutativity of the endomorphism ring $ End(E) $. Then using dual isogenies, we propose...
متن کاملSecond Summary Report on Two-party Protocols Second Summary Report on Two-party Protocols
This report focuses on secure two-party protocols. We consider different notions of security and discuss the most attractive models and set-up assumptions (e.g., random oracle, common reference string, bare public keys, trusted computing base) that have been proposed so far. We consider many popular two-party games (e.g., zero-knowledge proof systems, commitment schemes, oblivious transfer, fai...
متن کاملComparing Two Different Teaching Methods for Teaching the Dietary Exchange List to Students of Nutritional Science
Introduction: Considering the importance of learning dietary exchange list in academic nutrition education, teaching it gains significance, too. Thus, this study is going to compare two different teaching methods regarding dietary exchange list to students of nutritional science. Methods: This quasi-experimental study was conducted on 49 students of nutritional science in two semesters ...
متن کاملSimple Security Definitions for and Constructions of 0-RTT Key Exchange
Zero Round-Trip Time (0-RTT) key exchange protocols allow for the transmission of cryptographically protected payload data without requiring the prior exchange of messages of a cryptographic key exchange protocol, while providing perfect forward secrecy. The 0-RTT KE concept was first realized by Google in the QUIC Crypto protocol, and a 0-RTT mode has been intensively discussed for inclusion i...
متن کاملSimple Security De nitions for and Constructions of 0-RTT Key Exchange
Zero Round-Trip Time (0-RTT) key exchange protocols allow for the transmission of cryptographically protected payload data without requiring the prior exchange of messages of a cryptographic key exchange protocol. The 0-RTT KE concept was rst realized by Google in the QUIC Crypto protocol, and a 0-RTT mode has been intensively discussed for inclusion in TLS 1.3. In 0-RTT KE two keys are generat...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- JIKM
دوره 2 شماره
صفحات -
تاریخ انتشار 2003