Communications of the Association for Information Systems, 2003
This paper examines the use of information technology in the electric and gas utilities of Ukrain... more This paper examines the use of information technology in the electric and gas utilities of Ukraine, Armenia, and Georgia. Data was gathered through the performance of Year 2000 risk assessments, small business visits, document research, and academic visits between 1999 and 2001. Data was analyzed by comparing IT usage in Ukraine, Armenia, and Georgia to that in the United States. Overall IT usage was found to be low, at about the level of the United States in the 1970s. Financial difficulties and managerial issues prevent the acquisition and implementation of IT. The electrical supply itself is insufficient to support a digital economy because of poor power quality and unreliable power sources and will require large investments to correct.
Management znanja v sodobnih organizacijah Znanstvene monografije Fakultete za management Koper U... more Management znanja v sodobnih organizacijah Znanstvene monografije Fakultete za management Koper Uredniški odbor izr. prof. dr. Roberto Biloslavo prof. dr. Štefan Bojnec prof. dr. Slavko Dolinšek doc. dr. Justina Erčulj izr. prof. dr. Tonči A. Kuzmanić prof. dr. Zvone Vodovnik i s s n 1855-0878
Communications of the Association for Information Systems, 2015
As an editor-in-chief, I perceive we are approaching a crisis point with literature reviews and t... more As an editor-in-chief, I perceive we are approaching a crisis point with literature reviews and the reviewing process. The quality of literature reviews in submitted research is dropping, while there are more submissions with an expectation of faster reviews. The impact is that appropriate sources are not being cited and limited reviewer resources are being stressed on reviewing literature reviews. This paper reviews the literature on literature reviews and discusses how to perform them. I categorize literature review issues into five categories and make recommendations on how to correct literature review issues.
The Journal of Information Technology Theory and Application, 2004
This paper describes Emergency Information Systems (EIS) used by a utility during the Year 2000 r... more This paper describes Emergency Information Systems (EIS) used by a utility during the Year 2000 rollover. The systems are analyzed with respect to the literature and lessons learned are discussed. Several factors are identified that impact the design and effectiveness of these systems. These factors are generalized to the overall design and management of current Emergency Systems. Of particular interest are the findings related to integration of EIS from different organizations and the difficulties that were encountered. Additional findings with respect to training, common nomenclature, and organizational turf needs are also discussed.
Proceedings of the ... Annual Hawaii International Conference on System Sciences, 2017
The Jennex and Olfman KM success model was first published at HICSS in 2004 and in the Internatio... more The Jennex and Olfman KM success model was first published at HICSS in 2004 and in the International Journal of Knowledge Management in 2006. Since then there has been many technology changes and innovations as well as further research on KM success. This paper reexamines the Jennex Olfman model and suggests a newer model that incorporates the past ten years of research and technology innovation.
Advances in knowledge acquisition, transfer and management book series, 2019
The knowledge pyramid has been used for several years to illustrate the hierarchical relationship... more The knowledge pyramid has been used for several years to illustrate the hierarchical relationships between data, information, knowledge, and wisdom. This chapter posits that the knowledge pyramid is too basic and fails to represent reality and presents a revised knowledge-KM pyramid. One key difference is that the revised knowledge-KM pyramid includes knowledge management as an extraction of reality with a focus on organizational learning. The revised pyramid includes newer initiatives such as business and/ or customer intelligence, big data, analytics, internet of things. Finally, this chapter discusses how KM strategy can be generated using the final revised pyramid.
Studies of organizational memory/ knowledge management, OM/KM, systems have found that using a co... more Studies of organizational memory/ knowledge management, OM/KM, systems have found that using a common infrastructure to facilitate access to and utilization of knowledge and memory increases the usability and success of these systems. The solution to this is for organizations to have an integrated network. This paper discusses using the Internet as the integrated network. Several systems are described that use the Internet for the OM/KM infrastructure. Theoretical support from case study research for using the Internet as a common knowledge infrastructure is provided through DeLone and McLean's IS Success Model modified and analyzed for knowledge/memory based systems.
Knowledge management literature does not provide much guidance on how to measure the success or b... more Knowledge management literature does not provide much guidance on how to measure the success or benefits of doing knowledge management. This paper discusses research that proposes a definition of knowledge management success and dimensions and measures that organizations can use to measure knowledge management success. A nuclear utility engineering organization and professional services firms in Europe are used as surrogate cases to illustrate how these dimensions and measures can be used to demonstrate the success of a knowledge management project.
What should a good knowledge management strategy incorporate? This paper uses a study that compar... more What should a good knowledge management strategy incorporate? This paper uses a study that compares a proposed set of knowledge management strategy components to the outcomes of knowledge management projects/initiatives. As expected it was found that highly successful knowledge management projects/initiatives are more likely to have the proposed set of knowledge management strategy components than less successful to unsuccessful knowledge management projects/initiatives. The conclusion of the paper is that the proposed set of knowledge management strategy components is an appropriate list that knowledge management practitioners and researchers can use to construct an organization's knowledge management strategy.
Purpose-The purpose of this paper is to propose a definition of KMS success. Design/methodology/a... more Purpose-The purpose of this paper is to propose a definition of KMS success. Design/methodology/approach-The paper uses a consensus-building approach to derive the definition. An expert panel was used to generate a list of possible KM success definitions. A survey was used to identify a likely definition from this list. A second survey was used to further refine the proposed KM success definition. Finally, analysis of the survey comments was used to finalize the proposed definition. Findings-KM success is a multidimensional concept. It is defined by capturing the right knowledge, getting the right knowledge to the right user, and using this knowledge to improve organizational and/or individual performance. KM success is measured by means of the dimensions: impact on business processes, impact on strategy, leadership, and knowledge content. Research limitations/implications-An additional survey should be performed that tests the constructs of the proposed KM success definition. Additionally, future research should focus on identifying a set of measures that can be used to measure KM success and determining whether KM and KM System (KMS), success are the same or different constructs. Practical implications-The proposed definition of KM success provides practitioners with four dimensions that can be used to construct organization-specific measures for indicating when their KM initiative is successful. Originality/value-This is important, as the literature, while providing much support for identifying KM critical success factors, does not provide a definition of when KM can be considered successful. Knowing when a KM initiative is successful is important for organizations and practitioners.
Journal of information technology case and application research, Jul 1, 2010
PRELUDE "This is your captain speaking". "We are 30,000 feet above sea level and i... more PRELUDE "This is your captain speaking". "We are 30,000 feet above sea level and in flight MH009 (Malaysia Airlines) and are flying at a ground speed of 869KM//hour ..." The destination is Bandar Seri Begawan, Brunei ..." Several hypothetical questions are on our minds as this paper is written.. What if one or more of the passengers in this flight takes control, as in uses the flight (or the remaining time therein) as part of a well-coordinated attack linked to terrorism? Can any knowledge and work in the area of information systems (and knowledge management systems) prevent that from happening? Well, clearly evidence from numerous man-made emergency situations (e.g. the London Subway bombings, the 911 1, the Bali Blasts etc.) would suggest that the answer is a resounding No. So, then why are researchers concerned with issues surrounding the design, development, implementation, and use of knowledge management systems in support of emergency situations? Are we wasting our time, efforts, and energy? Again, the answer is a resounding No!
This paper discusses system use as a measure of system success. It is proposed that for knowledge... more This paper discusses system use as a measure of system success. It is proposed that for knowledge management systems it is not the amount of use that is important, but rather, the quality of that use and the intention to use. Evidence is provided to support this proposition and a knowledge management system success model incorporating this proposition is discussed.
International journal of information systems for crisis response and management, Oct 1, 2010
Welcome to Crisis Response and Management and Emerging Information Systems: Critical Applications... more Welcome to Crisis Response and Management and Emerging Information Systems: Critical Applications! This book expands upon articles presented in the first volume of the International Journal of Information Systems for Crisis Response and Management, IJISCRAM, and is the first volume in an annual series of books that I expect to become an invaluable resource for crisis response and management researchers, practitioners, and students. The journal and this volume are focused on providing cutting edge research and advances in the crisis response discipline. Authors are a mix of established senior researchers, those beginning their academic careers, and some in between. To introduce the book, this first chapter will explore two technical innovations that made headlines in disasters and crises, starting with Hurricane Katrina. The first innovation is social media, and individuals have been using it with great success to save themselves or others. The second is cloud computing, which is a fairly recent name for the innovation trend that has included open source, software as a service, and service oriented architecture. The chapter proposes that for organizations to use these innovations successfully they should use knowledge management to guide their implementation. OVERVIEW Organizations need to be prepared to respond to crises. Traditionally, organizations prepare themselves for crisis response through planning, preparing response procedures and a crisis response system, and performing at least basic overview training to expected crisis responders. Crisis planning involves identifying potential crisis scenarios and determining what resources and actions will be needed to mitigate them (Raman, et al., 2010). Crisis response procedures provide direction to responders on how to recognize the crisis, what immediate actions to take, what communications to make, what long term actions are to be taken, and how to end the crisis (Jennex, 2004, 2008). Crisis response systems support communications, data gathering and analysis, and decision-making. Crisis response systems are rarely used but when needed, must function well and without fail. Designing and building these systems requires designers to anticipate what will be needed, what resources will be available, and how conditions will differ from normal. A standard model for a crisis response system is from Bellardo, Karwan, and Wallace (1984) and identifies the components as including:
International journal of knowledge management, Jul 1, 2013
The knowledge pyramid has been used for several years to illustrate the hierarchical relationship... more The knowledge pyramid has been used for several years to illustrate the hierarchical relationships between data, information, knowledge, and wisdom. This paper posits that the knowledge pyramid is too basic and fails to represent reality and presents a revised knowledge-KM pyramid. One key difference is that the revised knowledge-KM pyramid includes knowledge management as an extraction of reality with a focus on organizational learning. The model also posits that newer initiatives such as business and/or customer intelligence are the result of confusion in understanding the traditional knowledge pyramid that is resolved in the revised knowledge-KM pyramid.
Cyber war is real and is being waged. Cyber terrorists and cyber warriors are attacking systems, ... more Cyber war is real and is being waged. Cyber terrorists and cyber warriors are attacking systems, but fortunately, they are attacking systems in much the same way hackers attack systems. This is good for system security designers as the security controls installed to protect against hacking will work to protect against cyber terrorists and warriors. However, while there are several tools that can be used to identify security requirements including checklists, threat and risk analysis, and security policies, these methods are not integrated into an overall design methodology that can be used to ensure that security requirements are identified and then implemented. This chapter proposes using barrier analysis and the concept of defense in depth to modify Siponen and Baskerville's (2001) integrated design paradigm that is more graphical and easier to understand and use methodology that is expected to improve security to be built into systems and improve defenses against cyber warfare.
Knowledge management systems (KMSs) support the various knowledge management (KM) functions of kn... more Knowledge management systems (KMSs) support the various knowledge management (KM) functions of knowledge capture, storage, search, retrieval, and use. To do this, KMSs utilize a variety of technologies and enterprise systems. This chapter surveys the various technologies and enterprise systems. Specific attention is placed on enterprise systems that integrate KM into organizational business processes, and technologies that enhance the effectiveness of these implementations. The chapter is based primarily on research summarized in Case Studies in Knowledge Management (Jennex, 2005a) and articles published by the Knowledge Management Track at the Hawaii International Conference on System Sciences (HICSS).
Many taxonomies and definitions of knowledge have been published in the KM literature. This chapt... more Many taxonomies and definitions of knowledge have been published in the KM literature. This chapter defines knowledge as something that is multidimensional and existent on a continuum. Four dimensions describing knowledge are proposed—explicitness, reach, life cycle, and flow time—and a modeling method is discussed. The chapter concludes with a call for research in the dimensionality of knowledge.
Communications of the Association for Information Systems, 2003
This paper examines the use of information technology in the electric and gas utilities of Ukrain... more This paper examines the use of information technology in the electric and gas utilities of Ukraine, Armenia, and Georgia. Data was gathered through the performance of Year 2000 risk assessments, small business visits, document research, and academic visits between 1999 and 2001. Data was analyzed by comparing IT usage in Ukraine, Armenia, and Georgia to that in the United States. Overall IT usage was found to be low, at about the level of the United States in the 1970s. Financial difficulties and managerial issues prevent the acquisition and implementation of IT. The electrical supply itself is insufficient to support a digital economy because of poor power quality and unreliable power sources and will require large investments to correct.
Management znanja v sodobnih organizacijah Znanstvene monografije Fakultete za management Koper U... more Management znanja v sodobnih organizacijah Znanstvene monografije Fakultete za management Koper Uredniški odbor izr. prof. dr. Roberto Biloslavo prof. dr. Štefan Bojnec prof. dr. Slavko Dolinšek doc. dr. Justina Erčulj izr. prof. dr. Tonči A. Kuzmanić prof. dr. Zvone Vodovnik i s s n 1855-0878
Communications of the Association for Information Systems, 2015
As an editor-in-chief, I perceive we are approaching a crisis point with literature reviews and t... more As an editor-in-chief, I perceive we are approaching a crisis point with literature reviews and the reviewing process. The quality of literature reviews in submitted research is dropping, while there are more submissions with an expectation of faster reviews. The impact is that appropriate sources are not being cited and limited reviewer resources are being stressed on reviewing literature reviews. This paper reviews the literature on literature reviews and discusses how to perform them. I categorize literature review issues into five categories and make recommendations on how to correct literature review issues.
The Journal of Information Technology Theory and Application, 2004
This paper describes Emergency Information Systems (EIS) used by a utility during the Year 2000 r... more This paper describes Emergency Information Systems (EIS) used by a utility during the Year 2000 rollover. The systems are analyzed with respect to the literature and lessons learned are discussed. Several factors are identified that impact the design and effectiveness of these systems. These factors are generalized to the overall design and management of current Emergency Systems. Of particular interest are the findings related to integration of EIS from different organizations and the difficulties that were encountered. Additional findings with respect to training, common nomenclature, and organizational turf needs are also discussed.
Proceedings of the ... Annual Hawaii International Conference on System Sciences, 2017
The Jennex and Olfman KM success model was first published at HICSS in 2004 and in the Internatio... more The Jennex and Olfman KM success model was first published at HICSS in 2004 and in the International Journal of Knowledge Management in 2006. Since then there has been many technology changes and innovations as well as further research on KM success. This paper reexamines the Jennex Olfman model and suggests a newer model that incorporates the past ten years of research and technology innovation.
Advances in knowledge acquisition, transfer and management book series, 2019
The knowledge pyramid has been used for several years to illustrate the hierarchical relationship... more The knowledge pyramid has been used for several years to illustrate the hierarchical relationships between data, information, knowledge, and wisdom. This chapter posits that the knowledge pyramid is too basic and fails to represent reality and presents a revised knowledge-KM pyramid. One key difference is that the revised knowledge-KM pyramid includes knowledge management as an extraction of reality with a focus on organizational learning. The revised pyramid includes newer initiatives such as business and/ or customer intelligence, big data, analytics, internet of things. Finally, this chapter discusses how KM strategy can be generated using the final revised pyramid.
Studies of organizational memory/ knowledge management, OM/KM, systems have found that using a co... more Studies of organizational memory/ knowledge management, OM/KM, systems have found that using a common infrastructure to facilitate access to and utilization of knowledge and memory increases the usability and success of these systems. The solution to this is for organizations to have an integrated network. This paper discusses using the Internet as the integrated network. Several systems are described that use the Internet for the OM/KM infrastructure. Theoretical support from case study research for using the Internet as a common knowledge infrastructure is provided through DeLone and McLean's IS Success Model modified and analyzed for knowledge/memory based systems.
Knowledge management literature does not provide much guidance on how to measure the success or b... more Knowledge management literature does not provide much guidance on how to measure the success or benefits of doing knowledge management. This paper discusses research that proposes a definition of knowledge management success and dimensions and measures that organizations can use to measure knowledge management success. A nuclear utility engineering organization and professional services firms in Europe are used as surrogate cases to illustrate how these dimensions and measures can be used to demonstrate the success of a knowledge management project.
What should a good knowledge management strategy incorporate? This paper uses a study that compar... more What should a good knowledge management strategy incorporate? This paper uses a study that compares a proposed set of knowledge management strategy components to the outcomes of knowledge management projects/initiatives. As expected it was found that highly successful knowledge management projects/initiatives are more likely to have the proposed set of knowledge management strategy components than less successful to unsuccessful knowledge management projects/initiatives. The conclusion of the paper is that the proposed set of knowledge management strategy components is an appropriate list that knowledge management practitioners and researchers can use to construct an organization's knowledge management strategy.
Purpose-The purpose of this paper is to propose a definition of KMS success. Design/methodology/a... more Purpose-The purpose of this paper is to propose a definition of KMS success. Design/methodology/approach-The paper uses a consensus-building approach to derive the definition. An expert panel was used to generate a list of possible KM success definitions. A survey was used to identify a likely definition from this list. A second survey was used to further refine the proposed KM success definition. Finally, analysis of the survey comments was used to finalize the proposed definition. Findings-KM success is a multidimensional concept. It is defined by capturing the right knowledge, getting the right knowledge to the right user, and using this knowledge to improve organizational and/or individual performance. KM success is measured by means of the dimensions: impact on business processes, impact on strategy, leadership, and knowledge content. Research limitations/implications-An additional survey should be performed that tests the constructs of the proposed KM success definition. Additionally, future research should focus on identifying a set of measures that can be used to measure KM success and determining whether KM and KM System (KMS), success are the same or different constructs. Practical implications-The proposed definition of KM success provides practitioners with four dimensions that can be used to construct organization-specific measures for indicating when their KM initiative is successful. Originality/value-This is important, as the literature, while providing much support for identifying KM critical success factors, does not provide a definition of when KM can be considered successful. Knowing when a KM initiative is successful is important for organizations and practitioners.
Journal of information technology case and application research, Jul 1, 2010
PRELUDE "This is your captain speaking". "We are 30,000 feet above sea level and i... more PRELUDE "This is your captain speaking". "We are 30,000 feet above sea level and in flight MH009 (Malaysia Airlines) and are flying at a ground speed of 869KM//hour ..." The destination is Bandar Seri Begawan, Brunei ..." Several hypothetical questions are on our minds as this paper is written.. What if one or more of the passengers in this flight takes control, as in uses the flight (or the remaining time therein) as part of a well-coordinated attack linked to terrorism? Can any knowledge and work in the area of information systems (and knowledge management systems) prevent that from happening? Well, clearly evidence from numerous man-made emergency situations (e.g. the London Subway bombings, the 911 1, the Bali Blasts etc.) would suggest that the answer is a resounding No. So, then why are researchers concerned with issues surrounding the design, development, implementation, and use of knowledge management systems in support of emergency situations? Are we wasting our time, efforts, and energy? Again, the answer is a resounding No!
This paper discusses system use as a measure of system success. It is proposed that for knowledge... more This paper discusses system use as a measure of system success. It is proposed that for knowledge management systems it is not the amount of use that is important, but rather, the quality of that use and the intention to use. Evidence is provided to support this proposition and a knowledge management system success model incorporating this proposition is discussed.
International journal of information systems for crisis response and management, Oct 1, 2010
Welcome to Crisis Response and Management and Emerging Information Systems: Critical Applications... more Welcome to Crisis Response and Management and Emerging Information Systems: Critical Applications! This book expands upon articles presented in the first volume of the International Journal of Information Systems for Crisis Response and Management, IJISCRAM, and is the first volume in an annual series of books that I expect to become an invaluable resource for crisis response and management researchers, practitioners, and students. The journal and this volume are focused on providing cutting edge research and advances in the crisis response discipline. Authors are a mix of established senior researchers, those beginning their academic careers, and some in between. To introduce the book, this first chapter will explore two technical innovations that made headlines in disasters and crises, starting with Hurricane Katrina. The first innovation is social media, and individuals have been using it with great success to save themselves or others. The second is cloud computing, which is a fairly recent name for the innovation trend that has included open source, software as a service, and service oriented architecture. The chapter proposes that for organizations to use these innovations successfully they should use knowledge management to guide their implementation. OVERVIEW Organizations need to be prepared to respond to crises. Traditionally, organizations prepare themselves for crisis response through planning, preparing response procedures and a crisis response system, and performing at least basic overview training to expected crisis responders. Crisis planning involves identifying potential crisis scenarios and determining what resources and actions will be needed to mitigate them (Raman, et al., 2010). Crisis response procedures provide direction to responders on how to recognize the crisis, what immediate actions to take, what communications to make, what long term actions are to be taken, and how to end the crisis (Jennex, 2004, 2008). Crisis response systems support communications, data gathering and analysis, and decision-making. Crisis response systems are rarely used but when needed, must function well and without fail. Designing and building these systems requires designers to anticipate what will be needed, what resources will be available, and how conditions will differ from normal. A standard model for a crisis response system is from Bellardo, Karwan, and Wallace (1984) and identifies the components as including:
International journal of knowledge management, Jul 1, 2013
The knowledge pyramid has been used for several years to illustrate the hierarchical relationship... more The knowledge pyramid has been used for several years to illustrate the hierarchical relationships between data, information, knowledge, and wisdom. This paper posits that the knowledge pyramid is too basic and fails to represent reality and presents a revised knowledge-KM pyramid. One key difference is that the revised knowledge-KM pyramid includes knowledge management as an extraction of reality with a focus on organizational learning. The model also posits that newer initiatives such as business and/or customer intelligence are the result of confusion in understanding the traditional knowledge pyramid that is resolved in the revised knowledge-KM pyramid.
Cyber war is real and is being waged. Cyber terrorists and cyber warriors are attacking systems, ... more Cyber war is real and is being waged. Cyber terrorists and cyber warriors are attacking systems, but fortunately, they are attacking systems in much the same way hackers attack systems. This is good for system security designers as the security controls installed to protect against hacking will work to protect against cyber terrorists and warriors. However, while there are several tools that can be used to identify security requirements including checklists, threat and risk analysis, and security policies, these methods are not integrated into an overall design methodology that can be used to ensure that security requirements are identified and then implemented. This chapter proposes using barrier analysis and the concept of defense in depth to modify Siponen and Baskerville's (2001) integrated design paradigm that is more graphical and easier to understand and use methodology that is expected to improve security to be built into systems and improve defenses against cyber warfare.
Knowledge management systems (KMSs) support the various knowledge management (KM) functions of kn... more Knowledge management systems (KMSs) support the various knowledge management (KM) functions of knowledge capture, storage, search, retrieval, and use. To do this, KMSs utilize a variety of technologies and enterprise systems. This chapter surveys the various technologies and enterprise systems. Specific attention is placed on enterprise systems that integrate KM into organizational business processes, and technologies that enhance the effectiveness of these implementations. The chapter is based primarily on research summarized in Case Studies in Knowledge Management (Jennex, 2005a) and articles published by the Knowledge Management Track at the Hawaii International Conference on System Sciences (HICSS).
Many taxonomies and definitions of knowledge have been published in the KM literature. This chapt... more Many taxonomies and definitions of knowledge have been published in the KM literature. This chapter defines knowledge as something that is multidimensional and existent on a continuum. Four dimensions describing knowledge are proposed—explicitness, reach, life cycle, and flow time—and a modeling method is discussed. The chapter concludes with a call for research in the dimensionality of knowledge.
Uploads
Papers by Murray Jennex