{"title":"Understanding knowledge hiding behaviors in the workplace using a serious game data collection approach","authors":"Kaiyu Yang, V. Ribière, A. Bartel-Radic","doi":"10.36965/ojakm.2022.10(3)27-45","DOIUrl":"https://doi.org/10.36965/ojakm.2022.10(3)27-45","url":null,"abstract":"Knowledge hiding, knowledge hoarding, and knowledge withholding have drawn increasing research attention in recent decades. Most researchers approached this topic by collecting quantitative data using questionnaires with self-reported scales. However, the underreporting nature of self-report measurement, particularly when studying sensitive and socially undesirable behavior, has been identified as a prominent limitation in extant research, which shows the urgent need for less biased and more innovative research methods. Scenarios incorporating critical incidents that represent a simulation of actual working conditions appear to be a relevant technique to address the above-mentioned shortcoming. Hence, an experimental design, adopting meticulously crafted scenarios, is worth investigating. This paper presents the value of using serious games/simulations to collect data related to knowledge hiding behaviors as well as the design stages of a knowledge hiding serious game","PeriodicalId":325473,"journal":{"name":"Online Journal of Applied Knowledge Management","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121400641","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The impact of knowledge hiding and toxic leadership on knowledge worker productivity – Evidence from IT sector of Pakistan","authors":"Sameen Khalid, Yi-Yen Li, Khawaja Fawad Latif, Chunyong Tang","doi":"10.36965/ojakm.2022.10(3)46-67","DOIUrl":"https://doi.org/10.36965/ojakm.2022.10(3)46-67","url":null,"abstract":"This study intends to identify the impact of Knowledge Hiding and Toxic Leadership on Knowledge Management Process at Information Technology (IT) companies of Pakistan and explore the overall impact on Knowledge Worker Productivity by keeping knowledge worker ambidexterity as mediator. Any factor that could negatively influence the knowledge management process would hamper employees’ productivity in that setup. The knowledge-based view is used as base theory which characterizes knowledge as the most significant strategic utensil for performance, however, the IT sector being a highly knowledge-intensive sector provides rationale for conducting study in this area. The study is quantitative and the sample size consists of 405 respondents selected based on convenience sampling. However, Analysis was performed using Structural Equation Modelling Software Smart Partial Least-Square (SEM-PLS). The findings show that evasive hiding, playing dumb and toxic leadership does not have any significant impact on knowledge management process, however, rationalized hiding was positively related to knowledge management process and knowledge worker productivity. Also, partial mediation of knowledge worker ambidexterity was observed. Furthermore, this study is a significant addition to the existing literature as to the best of our knowledge, it is one of the earlier contributions to explore knowledge hiding as a barrier to the knowledge management process along with toxic leadership introducing mediating role of knowledge worker ambidexterity. Theoretical contributions and practical implications are also discussed at the end.","PeriodicalId":325473,"journal":{"name":"Online Journal of Applied Knowledge Management","volume":"128 7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131139509","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Special issue editorial: Knowledge hiding and knowledge hoarding in different environments","authors":"","doi":"10.36965/ojakm.2022.10(3)1-5","DOIUrl":"https://doi.org/10.36965/ojakm.2022.10(3)1-5","url":null,"abstract":"This Special Issue contributes to a better understanding of knowledge hiding and knowledge hoarding. Articles illustrate what these behaviors are all about and how to move forward the research on these topics.","PeriodicalId":325473,"journal":{"name":"Online Journal of Applied Knowledge Management","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123716964","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Knowledge hiding and knowledge hoarding: Using grounded theory for conceptual development","authors":"Tiago Gonçalves","doi":"10.36965/ojakm.2022.10(3)6-26","DOIUrl":"https://doi.org/10.36965/ojakm.2022.10(3)6-26","url":null,"abstract":"Knowledge hiding and knowledge hoarding define two organizational behaviors that integrate knowledge withholding related phenomena in organizations. Although recent literature presents efforts to conceptually differentiate knowledge hiding and knowledge hoarding, evidence shows that there are emerging gaps resulting from conceptual and empirical inconsistencies between the constructs. This paper addresses the need for theoretical and empirical clarification by developing on the use of Grounded Theory (GT) as a systematic methodology to expand knowledge on both phenomena. This work explores core characteristics and procedures related to GT that can support the pursuit of theoretical refinement behind knowledge hiding and knowledge hoarding as dimensions of knowledge withholding. It presents three philosophical rationales that can support knowledge hiding and knowledge hoarding conceptualization using Classic, Interpretivist and Constructivist GT. Specifically, it provides a conceptual framework that discusses concerns of the researcher, literature review processes, data collection methods, and data coding and analysis strategies that should be considered to ensure quality in GT research. Lastly, it discusses an integration of research using mixed methods GT to address quantitative concerns surrounding GT. This paper contributes to the theoretical and empirical development of knowledge hiding and knowledge hoarding related phenomena by suggesting research conducts and designs to support the usage of GT approaches in the study of both phenomena","PeriodicalId":325473,"journal":{"name":"Online Journal of Applied Knowledge Management","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126478952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Assessing SMEs’ cybersecurity organizational readiness: Findings from an Italian survey","authors":"Martina Neri, F. Niccolini, R. Pugliese","doi":"10.36965/ojakm.2022.10(2)1-22","DOIUrl":"https://doi.org/10.36965/ojakm.2022.10(2)1-22","url":null,"abstract":"The Small and Medium-sized Enterprises’ (SMEs) level of organizational cybersecurity readiness has been poorly investigated to date. Currently, all SMEs need to maintain an adequate level of cybersecurity to run their businesses, not only those wishing to fully exploit digitalization’s benefits. Unfortunately, due to their lack of resources, skills, and their low level of cyber awareness, SMEs often seem unprepared. It is essential that they address the digital threats that they face by using technology and complementary (and not alternative) factors, such as guidelines, formal policies, and training. All these elements trigger development processes regarding skills, awareness, the organizational cybersecurity culture, and the organizational resilience. This paper describes Italy’s first multidisciplinary attempt to assess its SMEs’ overall cybersecurity readiness level. We used a survey as its initial quantitative assessment approach, although SMEs can also use it as a cyber self-assessment tool, which prepares them better to navigate the digital ecosystem. Thereafter, we held semi-structured interviews to explore the critical points that had emerged from the study’s first phase. The overall results show that SMEs have not yet achieved high levels of organizational readiness. SMEs are currently starting to set the stage for their organizational cyber readiness and will, therefore, have to take many more proactive steps to address their cyber challenges.","PeriodicalId":325473,"journal":{"name":"Online Journal of Applied Knowledge Management","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133462834","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Pilot testing of experimental procedures to measure user's judgment errors in simulated social engineering attacks","authors":"Tommy Pollock, Y. Levy, Wei Li, Ajoy Kumar","doi":"10.36965/ojakm.2022.10(2)23-40","DOIUrl":"https://doi.org/10.36965/ojakm.2022.10(2)23-40","url":null,"abstract":"Distracted users appear to have difficulties correctly distinguishing between legitimate and malicious emails or search engine results. Additionally, mobile phone users appear to have a more challenging time identifying malicious content due to the smaller screen size and the limited security features in mobile phone applications. Thus, the goal of this research study was to conduct a pilot test and validate a set of field experiments based on Subject Matter Experts (SMEs) feedback to assess users’ judgment when exposed to two types of simulated social engineering attacks: phishing and Potentially Malicious Search Engine Results (PMSER), based on the interaction of the environment (distracting vs. non-distracting) and type of device used (mobile vs. computer). This paper provides the results from the pilot test we conducted using recruited volunteers consisting of 10 participants out of 20 volunteers invited. Due to COVID-19 restrictions, all interactions in this pilot testing were conducted remotely. These restrictions somewhat limited our ability to control the testing environment to ensure a completely non-distractive environment during these parts of the study; however, a significant attempt was made to ensure such a non-distractive environment was genuinely adhered to during that part of the study. Our initial pilot testing results indicate that the findings were counterintuitive for the Phishing Intelligence Quotient (IQ) tests. In contrast, results of the PMSER were intuitive with improved detection on a computer compared to mobile. We conclude with a discussion on the study limitations and further research.","PeriodicalId":325473,"journal":{"name":"Online Journal of Applied Knowledge Management","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123746863","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Implementation of privacy by design model to an eHealth information system","authors":"Matjaž Drev, D. Stanimirović, Boštjan Delak","doi":"10.36965/ojakm.2022.10(1)77-87","DOIUrl":"https://doi.org/10.36965/ojakm.2022.10(1)77-87","url":null,"abstract":"This paper reports ongoing research on the process and results of implementing a conceptual model of privacy by design. The model is based on building blocks derived from a comparative analysis of approaches to privacy by design by different authors. We then implemented the model to the data processing operations of Slovenia's central health information system (eHealth). The main goal of our research was to ensure personal data processing compliance with the General Data Protection Regulation (GDPR) and privacy by design criteria set by the model. Findings were used to answer the research questions: whether the proposed conceptual model is general enough to be used in most personal data processing operations, regardless of context; does the successful implementation of conceptual model requirements in personal data processing operations lead to compliance with the GDPR and with the additional requirements of privacy by design, and is the efficiency of complying with personal data processing higher when using the conceptual model compared to other approaches. Current results show that the model is robust enough to be used in a complex system of personal data processing. It also enables a relatively quick assessment of the gap between the actual and target situation, while suggesting which measures should be taken to comply. However, the model still must be tested in several organizations and other contexts of personal data processing, as only a comparative meta-analysis can provide reliable answers to the questions posed.","PeriodicalId":325473,"journal":{"name":"Online Journal of Applied Knowledge Management","volume":"469 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122738149","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Towards the quantification of cybersecurity footprint for SMBs using the CMMC 2.0","authors":"Y. Levy, Ruti Gafni","doi":"10.36965/ojakm.2022.10(1)43-61","DOIUrl":"https://doi.org/10.36965/ojakm.2022.10(1)43-61","url":null,"abstract":"Organizations, small and big, are faced with major cybersecurity challenges over the past several decades, as the proliferation of information systems and mobile devices expand. While larger organizations invest significant efforts in developing approaches to deal with cybersecurity incidents, Small and Medium Businesses (SMBs) are still struggling with ways to both keep their businesses alive and secure their systems to the best of their abilities. When it comes to critical systems, such as defense industries, the interconnectivities of organizations in the supply-chain have demonstrated to be problematic given the depth required to provide a high-level cybersecurity posture. The United States (U.S.) Department of Defense (DoD) with the partnership of the Defense Industry Base (DIB) have developed the Cybersecurity Maturity Model Certification (CMMC) in 2020 with a third-party mandate for Level 1 certification. Following an outcry from many DIB organizations, a newly revised CMMC 2.0 was introduced in late 2021 where Level 1 (Fundamental) was adjusted for annual self-assessment. CMMC 2.0 provides the 17 practices that organizations should self-assess. While these 17 practices provide initial guidance for assessment, the specific level of measurement and how it impacts their overall cybersecurity posture is vague. Specifically, many of these practices use non-quantifiable terms such as “limit”, “verify”, “control”, “identify”, etc. The focus of this work is to provide SMBs with a quantifiable method to self-assess their Cybersecurity Footprint following the CMMC 2.0 Level 1 practices. This paper outlines the foundational literature work conducted in support of the proposed quantification Cybersecurity Footprint Index (CFI) using 26 elements that correspond to the relevant CMMC 2.0 Level 1 practices.","PeriodicalId":325473,"journal":{"name":"Online Journal of Applied Knowledge Management","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131240694","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Testing the interaction effect of knowledge management and creative climate towards organizational innovation: Evidence from parastatal organizations in Uganda","authors":"Samuel Mafabi, Fred Lwanga","doi":"10.36965/ojakm.2022.10(1)1-23","DOIUrl":"https://doi.org/10.36965/ojakm.2022.10(1)1-23","url":null,"abstract":"Extant literature shows that knowledge management needs the support of creative climate towards organizational innovation. However, existing studies have paid less attention regarding the interaction effect of knowledge management and creative climate on organizational innovation. This paper aims to clarify this relationship by examining the interaction effect of knowledge management and creative climate on organizational innovation in parastatal organizations in Uganda. This paper seeks to broaden the knowledge based innovation system domain by including the creative climate. This paper used an explanatory cross-sectional design where quantitative data were collected from 235 managers of 51 parastatals using a survey instrument. Data were aggregated to a parastatal level. Partial Least Squares Structural Equation Modeling (PLS-SEM) was used to test the interaction effect. This paper clarifies the interaction effect of knowledge management and creative climate towards organizational innovation. Knowledge management and creative climate independently rather than interactively enhance organizational innovation. The findings suggest that effective knowledge management practices and favorable creative climate are essential for organizational innovation. This paper suggests the adoption of an effective knowledge management system and a favorable creative climate as antecedents for organizational innovation. This paper makes a contribution on the question whether knowledge management interacts with creative climate to build organizational innovation, which seems to have been less studied.","PeriodicalId":325473,"journal":{"name":"Online Journal of Applied Knowledge Management","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121619477","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Georg Schmidt, S. Stüring, Norman Richnow, Ingo Siegert
{"title":"Handling of “unknown unknowns” - classification of 3D geometries from CAD open set datasets using Convolutional Neural Networks","authors":"Georg Schmidt, S. Stüring, Norman Richnow, Ingo Siegert","doi":"10.36965/ojakm.2022.10(1)62-76","DOIUrl":"https://doi.org/10.36965/ojakm.2022.10(1)62-76","url":null,"abstract":"This paper refers to the application of Convolutional Neural Networks (CNNs) for the classification of 3D geometries from Computer-Aided Design (CAD) datasets with a large proportion of unknown unknowns (classes unknown after training). The motivation of the work is the automatic recognition of standard parts in the large CAD-based image data set and thus, reducing the time required for the manual preparation of the data set. The classification is based on a threshold value of the Softmax output layer (first criterion), as well as on three different methods of a second criterion. The three methods for the second criterion are the comparison of metadata relating to the geometries, the comparison of feature vectors from previous dense layers of the CNN with a Spearman correlation, and the distance-based difference between multivariate Gaussian models of these feature vectors using Kullback-Leibler divergence. It is confirmed that all three methods are suitable to solve an open set problem in large 3D datasets (more than 1000 different geometries). Classification and training are image-based using different multi-view representations of the geometries.","PeriodicalId":325473,"journal":{"name":"Online Journal of Applied Knowledge Management","volume":"185 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132305992","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}