{"title":"Applying machine learning and text analysis to identify factors that may predict hypertensive heart disease patient outcomes in home healthcare","authors":"D. Patrishkoff, S. Bronsburg, Mariah Ali","doi":"10.36965/ojakm.2022.10(1)24-42","DOIUrl":"https://doi.org/10.36965/ojakm.2022.10(1)24-42","url":null,"abstract":"This research focuses on predicting the patient discharge disposition with initial patient assessment and therapy data as well as determining which therapy intervention text had positive impacts on hypertension heart disease patients in home healthcare environments. Older adults prefer to stay in their home, which is known as aging in place. Home healthcare is the last line of defense before advancing to other expensive healthcare options. This research used aggregate transactional data from 2,181 home healthcare patients in the United States (U.S.) from 2016-2022. We used the Centers for Disease Control and Prevention (CDC) Patient Driven Groupings Model and focused on the cardiac circulatory patient’s subcategory of hypertensive heart disease. Data was analyzed from Activity of Daily Life (ADL) assessment scores, the number of disease diagnosis codes per patient, the number of additional cardiac comorbidities, gender, age, standardized hospitalization risks, number of medications per patient, number of interventions per patient, and the length of stay in home healthcare. Machine learning and advanced text analysis were applied to determine which factors and therapy intervention text had the biggest impact on hypertensive heart disease patient outcomes. This research also identified those interventions with the best Signal to Noise (SN) ratios that are currently being piloted in home healthcare settings.","PeriodicalId":325473,"journal":{"name":"Online Journal of Applied Knowledge Management","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128130219","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cybersecurity capacity building of human capital: Nations supporting nations","authors":"Mical Michelle Ramim, Angel Hueca","doi":"10.36965/ojakm.2021.9(2)65-85","DOIUrl":"https://doi.org/10.36965/ojakm.2021.9(2)65-85","url":null,"abstract":"Capacity building of human capital can be described as the experience, knowledge, skill sets, and intangible assets that add economic value to individuals and the organizations they work for. With the ever-growing gap in cybersecurity skill sets, it is essential to have a shared understanding of the necessary current skills and what those skills represent in the form of human capital to not only individuals, but also the organizations they work for. As nations around the world are struggling with the increased dependencies on Information Systems (IS) and the massive cybersecurity incidents resulting from adversaries, it is evident that cybersecurity human capital is the key in overcoming such challenges. With that said, while major players fighting cyber adversaries such as the United States (U.S.) and other western nations are struggling with their own significant cybersecurity human capital shortage, less developed nations are even further challenged. For example, African nations continue to acquire and implement ISs, the pace in which these technologies are adopted outnumbers the rate at which the skills to protect these technologies are captured. In this study we introduce the concept of cybersecurity human capital at the national level in the African region, as well as specific steps necessary to develop and embed current cybersecurity skills in cybersecurity human capital. We discuss the challenges faced by Sub-Saharan African nations in the journey to develop their cybersecurity human capital at the national level. An overview of the programs developed by the U.S. Department of State’s Office of the Coordinator for Cyber Issues is provided across three case studies.","PeriodicalId":325473,"journal":{"name":"Online Journal of Applied Knowledge Management","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134379719","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Development of an integrated knowledge management and quality management model for small and medium sized companies in Trinidad and Tobago","authors":"Sandra Bissoon-Maharaj, R. Maharaj","doi":"10.36965/ojakm.2021.9(2)28-45","DOIUrl":"https://doi.org/10.36965/ojakm.2021.9(2)28-45","url":null,"abstract":"There appears to exist limited research regarding the integration of Knowledge Management (KM) and International Organization for Standardization (ISO)’s ISO9001 Quality Management Systems (QMS) for Small and Medium Sized Enterprises (SMEs), for Trinidad and Tobago (TT) and the Caribbean Region. TT has over 16,000 SMEs and approximately 10,000 micro enterprises, representing over 70% of all registered businesses, that employs over 50% of the workforce. SMEs spark competition, create jobs, as well as promote innovation and knowledge transfer, thus are the engine of economic growth. SMEs in TT need to develop KM practices to compete regionally and globally, especially with the advent of the COVID-19 pandemic, which has triggered the deepest economic recession worldwide. Existing integrated KM models in other jurisdictions cannot be adopted in TT as KM is a culturally sensitive platform that needs to be customized to its applied environment. Results of a survey identified the Critical Success Factors (CSFs) for both Quality Management (QM) and KM required for the successful implementation of a Knowledge Management System (KMS). Data obtained showed that although the SMEs in TT demonstrated insignificant KM maturity, there is KM readiness, due to the existence of QMSs, significant information systems, human resource support, technical infrastructure, and senior management commitment. A five phase KM/QM integration model for SMEs in TT is proposed. Managers of SMEs and other similar operations may apply the findings of this study to develop strategies to integrate QM and KM to improve business results.","PeriodicalId":325473,"journal":{"name":"Online Journal of Applied Knowledge Management","volume":"7 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133411627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The critical factors for cloud computing adoption during SARS-CoV-2 pandemic","authors":"Rodolfo Vareschi, W. Picoto","doi":"10.36965/ojakm.2021.9(2)46-64","DOIUrl":"https://doi.org/10.36965/ojakm.2021.9(2)46-64","url":null,"abstract":"Due to the rapid global spread of the pandemic caused by the new coronavirus, companies and institutions adopted precautionary measures to reduce the risk of contagion, such as asking employees to work remotely from their homes. In this scenario, cloud computing technology has proven to be a great ally of companies to overcome the crisis caused by the pandemic as it provides the necessary infrastructure to access the organizational systems and resources from anyplace, anywhere, and anytime. Although current research identifies important factors for cloud computing adoption, none has yet analyzed whether those are the same given the crisis cause by the pandemic. For this purpose, 18 factors were identified and presented to experts in cloud computing technology, to seek a consensus regarding the order of importance of these factors. Using the Delphi method conducted with two rounds of questions, an ordered list according to the degree of importance of the main factors that influence the adoption of cloud computing was obtained. According to the results, the six most important factors are: (1) adoption, migration, and acquisition cost; (2) availability and accessibility; (3) scalability; (4) cost of data confidentiality and availability loss; (5) security, and (6) customization.","PeriodicalId":325473,"journal":{"name":"Online Journal of Applied Knowledge Management","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131532603","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Net generation in times of pandemic: Customers’ technology savviness and social media communication impact on customer-based brand equity","authors":"Joanna Krywalski Santiago, Miguel Pimenta","doi":"10.36965/ojakm.2021.9(2)1-27","DOIUrl":"https://doi.org/10.36965/ojakm.2021.9(2)1-27","url":null,"abstract":"This paper follows the recent areas of interest trucked by Google Trends to investigate the importance of the customers’ technological savviness and firm’s social media communication at creation of brand equity. A special attention is paid at the so called ‘Net generation’ and its behavior during COVID-19 pandemic. The data was collected through an online survey distributed in Portugal with the assistance of Qualtrics online survey platform and counted with respondents that had a prior experience in following or engaging with brands on social media. To understand the relationships between Customer Technology Savviness (CTS), firm’s Social Media Communication (SMC) and Customer-Based Brand Equity (CBBE), this study applies the Partial Last Squares method of Structural Equation Modeling (PLS-SEM). The results of the multigroup analysis show that customers who used social media more heavily during pandemic denoted a stronger relationship between CTS and CBBE, CTS and SMC and between SMC and CBBE, of which the last was not confirmed in case of customers who made less use of social media since the outbreak of COVID-19 pandemic.","PeriodicalId":325473,"journal":{"name":"Online Journal of Applied Knowledge Management","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125908073","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Effects of employee monitoring notification policies on HR manager opinions","authors":"G. Kaupins","doi":"10.36965/ojakm.2021.9(1)62-81","DOIUrl":"https://doi.org/10.36965/ojakm.2021.9(1)62-81","url":null,"abstract":"As a variety of electronic monitoring methods such as global positioning systems are available, monitoring employees without notice is a consideration even though several laws ban it and ethical questions remain. Monitoring without notice has risks that Human Resources (HR) managers should consider when they set monitoring policies to enhance knowledge management. A total of 174 HR managers were asked about their top reasons to electronically monitor employees with or without notice. About half received information that a company did not notify employees of electronic monitoring and the other half received the opposite information. Prospect theory was the basis for collecting data to understand the importance of risk in setting policies. It states that people in perceived good conditions avoid risk because they feel there is more to lose than to gain. The leading reason to electronically monitor employees for both groups was computer virus and malware protection. Organizational threats associated with legal issues showed more HR support for monitoring without notice. Opportunities associated with employee productivity indicated relatively more support for monitoring with notice. As a result of this research, perceived threats in the workplace are significant reasons why HR managers might not provide notice of monitoring in the workplace. This has potential legal and ethical implications.","PeriodicalId":325473,"journal":{"name":"Online Journal of Applied Knowledge Management","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134461697","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Artificial intelligence for last-mile logistics - Procedures and architecture","authors":"André Rosendorff, A. Hodes, Benjamin Fabian","doi":"10.36965/ojakm.2021.9(1)46-61","DOIUrl":"https://doi.org/10.36965/ojakm.2021.9(1)46-61","url":null,"abstract":"Artificial Intelligence (AI) is becoming increasingly important in many industries due to its diverse areas of application and potential. In logistics in particular, increasing customer demands and the growth in shipment volumes are leading to difficulties in forecasting delivery times, especially for the last mile. This paper explores the potential of using AI to improve delivery forecasting. For this purpose, a structured theoretical solution approach and a method for improving delivery forecasting using AI are presented. In doing so, the important phases of the Cross-Industry Standard Process for Data Mining (CRISP-DM) framework, a standard process for data mining, are adopted and discussed in detail to illustrate the complexity and importance of each task such as data preparation or evaluation. Subsequently, by embedding the described solution into an overall system architecture for information systems, ideas for the integration of the solution into the complexity of real information systems for logistics are given.","PeriodicalId":325473,"journal":{"name":"Online Journal of Applied Knowledge Management","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125422762","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A novel taxonomy of organizational learning contextual factors: Review of 2004–2020 top-ranked journals","authors":"S. Scipioni","doi":"10.36965/ojakm.2021.9(1)16-30","DOIUrl":"https://doi.org/10.36965/ojakm.2021.9(1)16-30","url":null,"abstract":"As a dynamic phenomenon that interacts across different levels – individual, group, organizational, interorganizational – the development of a unique multilevel theory of Organizational Learning (OL) is absent and challenging. The intent of this paper is to contribute to the advancement of such a theory. In this context, a systematic review of the 2004-2020 literature was carried out, with analysis of 120 papers selected from management and organization science top-ranked journals. Based on the conceptualization of OL as multiple processes of knowledge creation, transfer, and retention, the reviewed papers highlight that internal and external environments, organizational culture, strategy, structure, leadership, technology, and shared environments need to be considered for a comprehensive understanding of vertical trickle-down OL processes, and of bottom-up emerging OL processes, in both single and multi-level OL analyses. This study contributes to the theory of OL with the presentation of a novel taxonomy of contextual factors that could help researchers in the development of comprehensive OL studies. The implications offered should support the definition of a multilevel theory for OL that embraces all the relevant factors that influence its processes across the different organizational levels. The review closes with specific recommendations for further studies in OL.","PeriodicalId":325473,"journal":{"name":"Online Journal of Applied Knowledge Management","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131296082","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An examination of historic data breach incidents: What cybersecurity big data visualization and analytics can tell us?","authors":"Emily Africk, Y. Levy","doi":"10.36965/ojakm.2021.9(1)31-45","DOIUrl":"https://doi.org/10.36965/ojakm.2021.9(1)31-45","url":null,"abstract":"Data breach incidents are reported in the media to be on the rise with continuously increasing numbers. Additionally, data breaches serve a major negative impact to organizations. This study focuses on combining experience in data analytics, visualization, and quantitative analysis for business intelligence in the context of cybersecurity big-data over a period of 15-years. A large data set containing 9,015 data breaches was provided via the Privacy Rights Clearinghouse data breach database from the start of 2005 to the end of 2019. The aim of this work was to slice the data as well as represent it into a business-related visualization using time-series analysis that can help executives understand complex cybersecurity breaches, their impact, and their trend over time. We have created visualization figures along with explanations of what each visualization means in the context of cyber-attacks over time. This project was set to serve as a breakdown of the important findings from the Privacy Rights Clearinghouse data breach database of over 15-years. These findings are communicated through both key numbers and quantitative analyses for business intelligence. While our project does not cover every aspect of the dataset (due to its significant size), it serves more as a focus on one particular part of the data: incident types and their volume over the 15-year timeframe to help business executives visualize cybersecurity trends. This paper ends with a conclusion and discussion on how such cybersecurity visualizations can help industries along with future research needed.","PeriodicalId":325473,"journal":{"name":"Online Journal of Applied Knowledge Management","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115357720","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Vered Silber Varod, Ingo Siegert, O. Jokisch, Yamini Sinha, N. Geri
{"title":"A cross-language study of speech recognition systems for English, German, and Hebrew","authors":"Vered Silber Varod, Ingo Siegert, O. Jokisch, Yamini Sinha, N. Geri","doi":"10.36965/ojakm.2021.9(1)1-15","DOIUrl":"https://doi.org/10.36965/ojakm.2021.9(1)1-15","url":null,"abstract":"Despite the growing importance of Automatic Speech Recognition (ASR), its application is still challenging, limited, language-dependent, and requires considerable resources. The resources required for ASR are not only technical, they also need to reflect technological trends and cultural diversity. The purpose of this research is to explore ASR performance gaps by a comparative study of American English, German, and Hebrew. Apart from different languages, we also investigate different speaking styles – utterances from spontaneous dialogues and utterances from frontal lectures (TED-like genre). The analysis includes a comparison of the performance of four ASR engines (Google Cloud, Google Search, IBM Watson, and WIT.ai) using four commonly used metrics: Word Error Rate (WER); Character Error Rate (CER); Word Information Lost (WIL); and Match Error Rate (MER). As expected, findings suggest that English ASR systems provide the best results. Contrary to our hypothesis regarding ASR’s low performance for under-resourced languages, we found that the Hebrew and German ASR systems have similar performance. Overall, our findings suggest that ASR performance is language-dependent and system-dependent. Furthermore, ASR may be genre-sensitive, as our results showed for German. This research contributes a valuable insight for improving ubiquitous global consumption and management of knowledge and calls for corporate social responsibility of commercial companies, to develop ASR under Fair, Reasonable, and Non-Discriminatory (FRAND) terms","PeriodicalId":325473,"journal":{"name":"Online Journal of Applied Knowledge Management","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125040039","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}