Literature surrounding the Knowledge Management process of identifying what knowledge exists with... more Literature surrounding the Knowledge Management process of identifying what knowledge exists within an organisation is scarce. This research project set out to fill the research gaps surrounding that particular Knowledge Management process called Knowledge Identification. This paper reports on the findings of a survey sent to 973 Australian organisations to investigate their Knowledge Identification practices. The survey findings show that while organisations do perceive Knowledge Identification to be important, the practice of KI has not reached mainstream adoption yet. The reasons why and why not, and the range of methods organisations currently use to establish what knowledge exists within their four walls are identified. The survey findings also reveal two opposing approaches organisations take in practising KI: proactive KI and reactive KI.
Literature surrounding the Knowledge Management process of identifying what knowledge exists with... more Literature surrounding the Knowledge Management process of identifying what knowledge exists within an organisation is scarce. This research project set out to fill the research gaps surrounding that particular Knowledge Management process called Knowledge Identification. This paper reports on the findings of a survey sent to 973 Australian organisations to investigate their Knowledge Identification practices. The survey findings show that while organisations do perceive Knowledge Identification to be important, the practice of KI has not reached mainstream adoption yet. The reasons why and why not, and the range of methods organisations currently use to establish what knowledge exists within their four walls are identified. The survey findings also reveal two opposing approaches organisations take in practising KI: proactive KI and reactive KI.
Abstrak Internet Protocol (IP), the underlying protocol upon which the Internet is based, has a n... more Abstrak Internet Protocol (IP), the underlying protocol upon which the Internet is based, has a number of serious flaws, including limited address space, security and performance limitations. Since the early 1990s a new version of IP (IPv6) has been developed in which these problems are addressed. Yet despite years of “hype”, adoption of IPv6 has been minimal or non-existent. Many efforts have been made to encourage IPv6 adoption around the world but none have been widely successful. The decision to adopt is influenced by the information available to the decision maker. This paper reports the results of studies of attitudes and perceptions to IPv6 in three countries and determines that the prevalent information about the standard in each country is often scarce and inaccurate. This contributes to reluctance to adopt IPv6 and further exacerbates the problem. The paper concludes with recommendations to improve available information so as to increase IPv6 acceptance and adoption.
IPv6 is the replacement for the Internet's incumbent protocol, IPv4. Although exhaustion of t... more IPv6 is the replacement for the Internet's incumbent protocol, IPv4. Although exhaustion of the IPv4 address space is now imminent there has been no meaningful uptake of IPv6 since its standardisation in 1998. Data from a national survey of the top 1,000 IT user organisations in Australia are analysed, revealing that they have made little or no preparation for IPv6. This creates the potential for considerable disadvantage for Australian organisations. The author recommends that governments and regulatory bodies should consider regulatory or policy action to encourage the diffusion of IPv6. The author also recommends that enterprise organisations develop a longterm IPv6 strategy, implement IPv6 training programs, update their policy frameworks, and assess their IT assets and applications portfolios.
The dramaturgical framework of sociologist Erving Goffman's is applied to the various forms o... more The dramaturgical framework of sociologist Erving Goffman's is applied to the various forms of computer mediated communication (CMC) on the Internet. The paper examines the implications for situational boundaries, participants? roles, identity play and audience segregation. It argues that audience segregation is a prime factor in determining which CMC applications (such as e-mail, ICQ, IRC or Usenet) are used and when. As the Internet becomes increasingly common in households and is used more for recreational purposes rather than a tool for professional use, the use of anonymous and private services is likely to increase.
Despite it being more than a decade old, and nearly two decades since the problems with IPv4 were... more Despite it being more than a decade old, and nearly two decades since the problems with IPv4 were first identified, IPv6 still has not diffused significantly through the Internet. Policies advocating market forces to promote IPv6 diffusion are widespread, and thus this paper examines IPv6 adoption from the perspectives of Hotelling’s economics of exhaustible resources and the economics of permit markets, concluding in both cases that significant IPv6 diffusion will not occur until after the IPv4 address space is exhausted. This outcome is not desirable, and therefore new policy alternatives must be debated.
One of the first knowledge management (KM) processes, on which subsequent processes depend, has b... more One of the first knowledge management (KM) processes, on which subsequent processes depend, has been largely under-researched. A review of the literature shows that in contrast to other processes, the process of Knowledge Identification (KI) has been less researched. More specifically, what problems face KM stakeholders with respect to KI is yet to be understood. Despite this lack of understanding, a number of KI methods exist and new ones are emerging. This paper has identified and critiqued some of the KI methods. However, whether these KI methods are perceived as effective by KM stakeholders, what other KI methods are currently being used, and what factors influence the effectiveness of KI methods, remain unclear. These constitute research gaps which this research will contribute to fill. This research project will consist of three phases. To collect data, surveys, interviews, and case studies will be used. A mix of quantitative and qualitative data analysis methods will be carri...
The current crisis in Information Communications Technology (ICT) skills shortage is generally at... more The current crisis in Information Communications Technology (ICT) skills shortage is generally attributed to falling enrolments since 2001. The number of student enrolments in ICT degrees offered by universities has been decreasing globally over the last few years. Whilst the industry and government stakeholders play a vital role in addressing the ICT skills shortage, universities play an equally important role in ensuring the alignment of ICT course curriculum with the industry. This paper describes the development of an industry professional or practicum program with a two-fold aim: (i) to attract students and to de-mystify that IT is not an interesting career and (ii) to prepare and train students to be multi-disciplinary (ie Business and IT) ready graduates to meet the employability needs of industry. This paper recounts the experiences of four students who undertook a 16 week industry placement in an IS/IT organisation. This practice based paper also reports on the experiences ...
Globalisation is leading to an increasing incidence of multinational/multicultural work teams acr... more Globalisation is leading to an increasing incidence of multinational/multicultural work teams across the globe. This is particularly the case in the world of business, where English also dominates as the most commonly used language in intercultural situations. This paper describes a project which aimed to prepare English as a Second Language (ESL) students for the English speaking work environment in Australia. Information Systems majors in their final year of a Bachelor of Commerce degree at Curtin University of Technology in Western Australia undertook a specially-designed, preparatory two-day intensive communication skills program, followed by a 16-week work placement in large local companies.
This paper reports on research conducted to explore the problems that organisations have with res... more This paper reports on research conducted to explore the problems that organisations have with respect to a key first step in effective Knowledge Management: Knowledge Identification. The paper reports on the results from an exploratory, interpretive investigation on the problems organisations have with respect to identifying what knowledge exists within their boundaries. The research conducted 17 interviews of Knowledge Management practitioners, the data from which were analysed using domain analysis and cognitive mapping. The research identified 25 lower-level problems with Knowledge Identification and 4 higher-level factors that potentially explain Knowledge Identification Effectiveness: Knowledge Needs Identification, Knowledge Recording, KI Methods Effectiveness and KI Operationalisation. The paper explains the four factors and formulates them into a nascent (untested) theory that explains Knowledge Identification Effectiveness, which is further hypothesised to influence Knowled...
William Newk-Fon Hey Tow, School of Information Systems, Curtin University, WA, Australia, w.newk... more William Newk-Fon Hey Tow, School of Information Systems, Curtin University, WA, Australia, w.newk-fonheytow@postgrad.curtin.edu.au ... John Venable, School of Information Systems, Curtin University, WA, Australia, j.venable@curtin.edu.au
Dell Peter Thorlai Acting Your Age a Study of the Relationship Between Online Social Interaction and Identity in Older Adults Phd Thesis Murdoch University, 2008
Page 1. Acting Your Age: A Study of the Relationship between Online Social Interaction and Identi... more Page 1. Acting Your Age: A Study of the Relationship between Online Social Interaction and Identity in Older Adults Peter Thorlai Dell This thesis is presented for the degree of Doctor of Philosophy of Murdoch University. 2008 Page 2. Page 3. i Declaration ...
20 Australasian Conference on Information Systems Integrating Industry Program 2-4 Dec 2009, Melb... more 20 Australasian Conference on Information Systems Integrating Industry Program 2-4 Dec 2009, Melbourne Chang, Dell & Lane Australian Information and Industry Association, tertiary institutions, TAFEs and others have joined forces to increase the profile and prospects of ...
Literature surrounding the Knowledge Management process of identifying what knowledge exists with... more Literature surrounding the Knowledge Management process of identifying what knowledge exists within an organisation is scarce. This research project set out to fill the research gaps surrounding that particular Knowledge Management process called Knowledge Identification. This paper reports on the findings of a survey sent to 973 Australian organisations to investigate their Knowledge Identification practices. The survey findings show that while organisations do perceive Knowledge Identification to be important, the practice of KI has not reached mainstream adoption yet. The reasons why and why not, and the range of methods organisations currently use to establish what knowledge exists within their four walls are identified. The survey findings also reveal two opposing approaches organisations take in practising KI: proactive KI and reactive KI.
Literature surrounding the Knowledge Management process of identifying what knowledge exists with... more Literature surrounding the Knowledge Management process of identifying what knowledge exists within an organisation is scarce. This research project set out to fill the research gaps surrounding that particular Knowledge Management process called Knowledge Identification. This paper reports on the findings of a survey sent to 973 Australian organisations to investigate their Knowledge Identification practices. The survey findings show that while organisations do perceive Knowledge Identification to be important, the practice of KI has not reached mainstream adoption yet. The reasons why and why not, and the range of methods organisations currently use to establish what knowledge exists within their four walls are identified. The survey findings also reveal two opposing approaches organisations take in practising KI: proactive KI and reactive KI.
Abstrak Internet Protocol (IP), the underlying protocol upon which the Internet is based, has a n... more Abstrak Internet Protocol (IP), the underlying protocol upon which the Internet is based, has a number of serious flaws, including limited address space, security and performance limitations. Since the early 1990s a new version of IP (IPv6) has been developed in which these problems are addressed. Yet despite years of “hype”, adoption of IPv6 has been minimal or non-existent. Many efforts have been made to encourage IPv6 adoption around the world but none have been widely successful. The decision to adopt is influenced by the information available to the decision maker. This paper reports the results of studies of attitudes and perceptions to IPv6 in three countries and determines that the prevalent information about the standard in each country is often scarce and inaccurate. This contributes to reluctance to adopt IPv6 and further exacerbates the problem. The paper concludes with recommendations to improve available information so as to increase IPv6 acceptance and adoption.
IPv6 is the replacement for the Internet's incumbent protocol, IPv4. Although exhaustion of t... more IPv6 is the replacement for the Internet's incumbent protocol, IPv4. Although exhaustion of the IPv4 address space is now imminent there has been no meaningful uptake of IPv6 since its standardisation in 1998. Data from a national survey of the top 1,000 IT user organisations in Australia are analysed, revealing that they have made little or no preparation for IPv6. This creates the potential for considerable disadvantage for Australian organisations. The author recommends that governments and regulatory bodies should consider regulatory or policy action to encourage the diffusion of IPv6. The author also recommends that enterprise organisations develop a longterm IPv6 strategy, implement IPv6 training programs, update their policy frameworks, and assess their IT assets and applications portfolios.
The dramaturgical framework of sociologist Erving Goffman's is applied to the various forms o... more The dramaturgical framework of sociologist Erving Goffman's is applied to the various forms of computer mediated communication (CMC) on the Internet. The paper examines the implications for situational boundaries, participants? roles, identity play and audience segregation. It argues that audience segregation is a prime factor in determining which CMC applications (such as e-mail, ICQ, IRC or Usenet) are used and when. As the Internet becomes increasingly common in households and is used more for recreational purposes rather than a tool for professional use, the use of anonymous and private services is likely to increase.
Despite it being more than a decade old, and nearly two decades since the problems with IPv4 were... more Despite it being more than a decade old, and nearly two decades since the problems with IPv4 were first identified, IPv6 still has not diffused significantly through the Internet. Policies advocating market forces to promote IPv6 diffusion are widespread, and thus this paper examines IPv6 adoption from the perspectives of Hotelling’s economics of exhaustible resources and the economics of permit markets, concluding in both cases that significant IPv6 diffusion will not occur until after the IPv4 address space is exhausted. This outcome is not desirable, and therefore new policy alternatives must be debated.
One of the first knowledge management (KM) processes, on which subsequent processes depend, has b... more One of the first knowledge management (KM) processes, on which subsequent processes depend, has been largely under-researched. A review of the literature shows that in contrast to other processes, the process of Knowledge Identification (KI) has been less researched. More specifically, what problems face KM stakeholders with respect to KI is yet to be understood. Despite this lack of understanding, a number of KI methods exist and new ones are emerging. This paper has identified and critiqued some of the KI methods. However, whether these KI methods are perceived as effective by KM stakeholders, what other KI methods are currently being used, and what factors influence the effectiveness of KI methods, remain unclear. These constitute research gaps which this research will contribute to fill. This research project will consist of three phases. To collect data, surveys, interviews, and case studies will be used. A mix of quantitative and qualitative data analysis methods will be carri...
The current crisis in Information Communications Technology (ICT) skills shortage is generally at... more The current crisis in Information Communications Technology (ICT) skills shortage is generally attributed to falling enrolments since 2001. The number of student enrolments in ICT degrees offered by universities has been decreasing globally over the last few years. Whilst the industry and government stakeholders play a vital role in addressing the ICT skills shortage, universities play an equally important role in ensuring the alignment of ICT course curriculum with the industry. This paper describes the development of an industry professional or practicum program with a two-fold aim: (i) to attract students and to de-mystify that IT is not an interesting career and (ii) to prepare and train students to be multi-disciplinary (ie Business and IT) ready graduates to meet the employability needs of industry. This paper recounts the experiences of four students who undertook a 16 week industry placement in an IS/IT organisation. This practice based paper also reports on the experiences ...
Globalisation is leading to an increasing incidence of multinational/multicultural work teams acr... more Globalisation is leading to an increasing incidence of multinational/multicultural work teams across the globe. This is particularly the case in the world of business, where English also dominates as the most commonly used language in intercultural situations. This paper describes a project which aimed to prepare English as a Second Language (ESL) students for the English speaking work environment in Australia. Information Systems majors in their final year of a Bachelor of Commerce degree at Curtin University of Technology in Western Australia undertook a specially-designed, preparatory two-day intensive communication skills program, followed by a 16-week work placement in large local companies.
This paper reports on research conducted to explore the problems that organisations have with res... more This paper reports on research conducted to explore the problems that organisations have with respect to a key first step in effective Knowledge Management: Knowledge Identification. The paper reports on the results from an exploratory, interpretive investigation on the problems organisations have with respect to identifying what knowledge exists within their boundaries. The research conducted 17 interviews of Knowledge Management practitioners, the data from which were analysed using domain analysis and cognitive mapping. The research identified 25 lower-level problems with Knowledge Identification and 4 higher-level factors that potentially explain Knowledge Identification Effectiveness: Knowledge Needs Identification, Knowledge Recording, KI Methods Effectiveness and KI Operationalisation. The paper explains the four factors and formulates them into a nascent (untested) theory that explains Knowledge Identification Effectiveness, which is further hypothesised to influence Knowled...
William Newk-Fon Hey Tow, School of Information Systems, Curtin University, WA, Australia, w.newk... more William Newk-Fon Hey Tow, School of Information Systems, Curtin University, WA, Australia, w.newk-fonheytow@postgrad.curtin.edu.au ... John Venable, School of Information Systems, Curtin University, WA, Australia, j.venable@curtin.edu.au
Dell Peter Thorlai Acting Your Age a Study of the Relationship Between Online Social Interaction and Identity in Older Adults Phd Thesis Murdoch University, 2008
Page 1. Acting Your Age: A Study of the Relationship between Online Social Interaction and Identi... more Page 1. Acting Your Age: A Study of the Relationship between Online Social Interaction and Identity in Older Adults Peter Thorlai Dell This thesis is presented for the degree of Doctor of Philosophy of Murdoch University. 2008 Page 2. Page 3. i Declaration ...
20 Australasian Conference on Information Systems Integrating Industry Program 2-4 Dec 2009, Melb... more 20 Australasian Conference on Information Systems Integrating Industry Program 2-4 Dec 2009, Melbourne Chang, Dell & Lane Australian Information and Industry Association, tertiary institutions, TAFEs and others have joined forces to increase the profile and prospects of ...
Uploads
Papers by Peter Dell