Open Access. Powered by Scholars. Published by Universities.®

Library and Information Science Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 5 of 5

Full-Text Articles in Library and Information Science

Leading Firms As Knowledge Gatekeepers In A Networked Environment, Deogratias Harorimana Mr Nov 2008

Leading Firms As Knowledge Gatekeepers In A Networked Environment, Deogratias Harorimana Mr

Dr Deogratias Harorimana

This chapter introduces the role of the knowledge gatekeeper as a mechanism by which knowledge is created and transferred in a networked environment. Knowledge creation and transfer are essential for building a knowledge based economy. The chapter considers obstacles that inhibit this process and argues that leading firms create a shared socio-cultural context that enables the condivision of tacit meanings and codification of knowledge. Leading firms act as gatekeepers of knowledge through the creation of shared virtual platforms. There will be a leading firm that connects several networks of clients and suppliers may not interact directly with one another, but …


Towards A Business Model For Cellular Network And Telecommunication Operators: A Theoretical Framework, Mutaz M. Al-Debei, Ramzi El-Haddadeh, David Avison Jan 2008

Towards A Business Model For Cellular Network And Telecommunication Operators: A Theoretical Framework, Mutaz M. Al-Debei, Ramzi El-Haddadeh, David Avison

Dr. Mutaz M. Al-Debei

Cellular networks and telecommunications bring major change to the way businesses are conducted. Mobility has become one of the main priorities for users and this has impacted on cellular networks and telecommunication operators (CNTOs). However, entrants into the cellular industry have been confounded primarily by inexistent or weak Business Models (BMs). Designing a BM for a CNTO is complex and requires multiple actors to balance different and often conflicting design requirements. Nevertheless, most research about CNTOs has been technically oriented and has mainly addressed the technological and engineering issues related to their infrastructure. Less attention has been given to the …


Defining The Business Model In The New World Of Digital Business, Mutaz M. Al-Debei, Ramzi El-Haddadeh, David Avison Jan 2008

Defining The Business Model In The New World Of Digital Business, Mutaz M. Al-Debei, Ramzi El-Haddadeh, David Avison

Dr. Mutaz M. Al-Debei

Recent rapid advances in ICTs, specifically in Internet and mobile technologies, have highlighted the rising importance of the Business Model (BM) in Information Systems (IS). Despite agreement on its importance to an organization’s success, the concept is still fuzzy and vague, and there is no consensus regarding its definition. Furthermore, understanding the BM domain by identifying its meaning, fundamental pillars, and its relevance to other business concepts is by no means complete. In this paper we aim to provide further clarification by first presenting a classification of definitions found in the IS literature; second, proposing guidelines on which to develop …


Validation Of Programmes Of Higher Education In Ireland - The Role Of The Higher Education And Training Awards Council, Deirdre Lillis, Tara Ryan Jan 2008

Validation Of Programmes Of Higher Education In Ireland - The Role Of The Higher Education And Training Awards Council, Deirdre Lillis, Tara Ryan

Deirdre Lillis

This paper considers the programme validation arrangements in place in one half of the Irish higher education sector. It outlines how responsibility for programme validation can be safely delegated to Institutions within a robust overarching framework for quality assurance. It compares programme validation in Institutions with self awarding status with Institutions that have their programmes validated by a national Awarding agency. The paper concludes that when programme validation in Ireland and (potentially) across Europe is examined more closely, processes that appear to be very different on the surface can be quite similar in reality. From a philosophical perspective it appears …


Clinician Assessments Of Workplace Security Training - An Informatics Perspective, Juanita Fernando, Linda Dawson Dec 2007

Clinician Assessments Of Workplace Security Training - An Informatics Perspective, Juanita Fernando, Linda Dawson

Associate Professor Linda Dawson

This paper describes and analyses clinicians’ assessments of workplace privacy and security (PaS) training in the context of contemporary health information system (HIS) practice. The PaS training underpins national e-health frameworks. The paper draws on findings from a forthcoming dissertation. The ‘questerview’ technique was applied to this case study of 26 clinicians in three Victorian (Australia) public hospitals. The technique relies on data collection that applies standardised questions and questionnaires during interviews. Respondents were recorded while they completed the standardised questions and questionnaires and were encouraged to discuss their responses to items in detail. Data analysis involved the scrutiny of …