[HTML][HTML] Opportunities and challenges surrounding the use of data from wearable sensor devices in health care: qualitative interview study

I Azodo, R Williams, A Sheikh, K Cresswell - Journal of Medical Internet …, 2020 - jmir.org
Background Wearable sensors connected via networked devices have the potential to
generate data that may help to automate processes of care, engage patients, and increase …

Will enterprise social networking systems promote knowledge management and organizational learning? An empirical study

C Qi, PYK Chau - Journal of Organizational Computing and …, 2018 - Taylor & Francis
Nowadays, enterprise social media practitioners and researchers are keen to know how the
enterprise usage of social media can be converted into the improved organizational …

The nature of knowledge in the social media age: Implications for knowledge management models

J Hemsley, RM Mason - 2012 45th Hawaii International …, 2012 - ieeexplore.ieee.org
Social media comprise the set of tools that" enable people to connect, communicate, and
collaborate," and these tools include blogs, wikis and social network sites. This paper …

Knowledge and knowledge management in the social media age

J Hemsley, RM Mason - Journal of Organizational Computing and …, 2013 - Taylor & Francis
Social media comprise the set of tools identified as blogs, wikis, and other social networking
platforms that “enable people to connect, communicate, and collaborate.” These tools create …

[HTML][HTML] The Disaster-Knowledge Matrix–Reframing and evaluating the knowledge challenges in disaster risk reduction

R Spiekermann, S Kienberger, J Norton… - International Journal of …, 2015 - Elsevier
Within the context of disaster risk reduction, including climate change adaptation, significant
thematic discourse has been dedicated to the difficulty of implementing research-based …

Insider attacks in cloud computing

AJ Duncan, S Creese… - 2012 IEEE 11th …, 2012 - ieeexplore.ieee.org
The computer-security industry is familiar with the concept of a Malicious Insider. However, a
malicious insider in the cloud might have access to an unprecedented amount of information …

Dense 3D reconstruction method using a single pattern for fast moving object

R Sagawa, Y Ota, Y Yagi, R Furukawa… - 2009 IEEE 12th …, 2009 - ieeexplore.ieee.org
Dense 3D reconstruction of extremely fast moving objects could contribute to various
applications such as body structure analysis and accident avoidance and so on. The actual …

The potential for implementing a big data analytic-based smart village in Indonesia

ET Tosida, Y Herdiyeni… - … Conference on Computer …, 2020 - ieeexplore.ieee.org
Smart village is one of the solutions to reduce poverty in rural areas. The main objective of
this research is to map the potential implementation of the concept of smart villages based …

Knowledge intensive business processes: theoretical foundations and research challenges

O Marjanovic, R Freeze - 2011 44th hawaii international …, 2011 - ieeexplore.ieee.org
In very recent times, the pressing need to compete on the basis of human-centered
knowledge rather than process automation, has expanded the field of Business Process …

[PDF][PDF] Data Governance and Information Governance: Set of Definitions in Relation to Data and Information as Part of DIKW.

J Merkus, R Helms, RJ Kusters - ICEIS (2), 2019 - researchgate.net
Chaos emerges with the ever growing amounts of data and information within organisations.
But it is problematic to manage these valuable assets and also remain accountable and …