Search results for: neighbor based key sharing
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 27947

Search results for: neighbor based key sharing

27917 A Generalization of the Secret Sharing Scheme Codes Over Certain Ring

Authors: Ibrahim Özbek, Erdoğan Mehmet Özkan

Abstract:

In this study, we generalize (k,n) threshold secret sharing scheme on the study Ozbek and Siap to the codes over the ring Fq+ αFq. In this way, it is mentioned that the method obtained in that article can also be used on codes over rings, and new advantages to be obtained. The method of securely sharing the key in cryptography, which Shamir first systematized and Massey carried over to codes, became usable for all error-correcting codes. The firewall of this scheme is based on the hardness of the syndrome decoding problem. Also, an open study area is left for those working for other rings and code classes. All codes that correct errors with this method have been the working area of this method.

Keywords: secret sharing scheme, linear codes, algebra, finite rings

Procedia PDF Downloads 47
27916 A Selection Approach: Discriminative Model for Nominal Attributes-Based Distance Measures

Authors: Fang Gong

Abstract:

Distance measures are an indispensable part of many instance-based learning (IBL) and machine learning (ML) algorithms. The value difference metrics (VDM) and inverted specific-class distance measure (ISCDM) are among the top-performing distance measures that address nominal attributes. VDM performs well in some domains owing to its simplicity and poorly in others that exist missing value and non-class attribute noise. ISCDM, however, typically works better than VDM on such domains. To maximize their advantages and avoid disadvantages, in this paper, a selection approach: a discriminative model for nominal attributes-based distance measures is proposed. More concretely, VDM and ISCDM are built independently on a training dataset at the training stage, and the most credible one is recorded for each training instance. At the test stage, its nearest neighbor for each test instance is primarily found by any of VDM and ISCDM and then chooses the most reliable model of its nearest neighbor to predict its class label. It is simply denoted as a discriminative distance measure (DDM). Experiments are conducted on the 34 University of California at Irvine (UCI) machine learning repository datasets, and it shows DDM retains the interpretability and simplicity of VDM and ISCDM but significantly outperforms the original VDM and ISCDM and other state-of-the-art competitors in terms of accuracy.

Keywords: distance measure, discriminative model, nominal attributes, nearest neighbor

Procedia PDF Downloads 85
27915 Analyzing the Critical Factors Influencing Employees' Tacit and Explicit Knowledge Sharing Intentions for Sustainable Competitive Advantage: A Systematic Review and a Conceptual Framework

Authors: Made Ayu Aristyana Dewi

Abstract:

Due to the importance of knowledge in today’s competitive world, an understanding of how to enhance employee knowledge sharing has become critical. This study discerning employees’ knowledge sharing intentions according to the type of knowledge to be shared, whether tacit or explicit. This study provides a critical and systematic review of the current literature on knowledge sharing, with a particular focus on the most critical factors influencing employees’ tacit and explicit knowledge sharing intentions. The extant literature was identified through four electronic databases, from 2006 to 2016. The findings of this review reveal that most of the previous studies only focus on individual and social factors as the antecedents of knowledge sharing intention. Therefore, those previous studies did not consider some other potential factors, like organizational and technological factors that may hinder the progress of knowledge sharing processes. Based on the findings of the critical review, a conceptual framework is proposed, which presents the antecedents of employees’ tacit and explicit knowledge sharing intentions and its impact on innovation and sustainable competitive advantage.

Keywords: antecedents, explicit knowledge, individual factors, innovation, intentions, knowledge sharing, organizational factors, social factors, sustainable competitive advantage, tacit knowledge, technological factors

Procedia PDF Downloads 281
27914 Minimum Vertices Dominating Set Algorithm for Secret Sharing Scheme

Authors: N. M. G. Al-Saidi, K. A. Kadhim, N. A. Rajab

Abstract:

Over the past decades, computer networks and data communication system has been developing fast, so, the necessity to protect a transmitted data is a challenging issue, and data security becomes a serious problem nowadays. A secret sharing scheme is a method which allows a master key to be distributed among a finite set of participants, in such a way that only certain authorized subsets of participants to reconstruct the original master key. To create a secret sharing scheme, many mathematical structures have been used; the most widely used structure is the one that is based on graph theory (graph access structure). Subsequently, many researchers tried to find efficient schemes based on graph access structures. In this paper, we propose a novel efficient construction of a perfect secret sharing scheme for uniform access structure. The dominating set of vertices in a regular graph is used for this construction in the following way; each vertex represents a participant and each minimum independent dominating subset represents a minimal qualified subset. Some relations between dominating set, graph order and regularity are achieved, and can be used to demonstrate the possibility of using dominating set to construct a secret sharing scheme. The information rate that is used as a measure for the efficiency of such systems is calculated to show that the proposed method has some improved values.

Keywords: secret sharing scheme, dominating set, information rate, access structure, rank

Procedia PDF Downloads 361
27913 Benefit Sharing of Research Participants in Human Genomic Research: Ethical Concerns and Ramifications

Authors: Tamanda Kamwendo

Abstract:

The concept of benefit sharing has been a prominent global debate in the world, gaining traction in human research ethics. Despite its prevalence, the concept of benefit sharing is not without controversy over its meaning and justification. This is due to the fact that it lacks a broadly accepted definition and many proponents discuss benefit sharing by arguing for its necessity rather than engaging in critical intellectual engagement with technical issues such as what it implies. What is clear in the literature is that the underlying premise of benefit-sharing is that research involving underprivileged and marginalized people is currently unjust and inequitable because these people are denied access to these gains; thus, benefit-sharing arrangements are required for these research projects to be just and equitable. This paper, therefore, investigates the discourses and justifications behind the concept of benefit sharing to human participants, particularly when dealing with human genomics research. Furthermore, considering that benefit sharing is generally viewed as a transaction between research organizations and research participants, it raises ethical concerns concerning the commodification of human material and undermines the sanctity of the human genome. This is predicated on the idea that research sponsors would be compelled to deliver a minimum set of possible benefits to research participants and communities in exchange for their involvement in the study. There is, therefore, need to protect benefit-sharing practices in international health research by developing a governance legal framework. A legal framework of benefit sharing will also dispel the issue of commodification of human material where human genomic research is done.

Keywords: benefit sharing, human participants, human genomic research, ethical concerns

Procedia PDF Downloads 38
27912 Investigating the Interaction of Individuals' Knowledge Sharing Constructs

Authors: Eugene Okyere-Kwakye

Abstract:

Knowledge sharing is a practice where individuals commonly exchange both tacit and explicit knowledge to jointly create a new knowledge. Knowledge management literature vividly express that knowledge sharing is the keystone and perhaps it is the most important aspect of knowledge management. To enhance the understanding of knowledge sharing domain, this study is aimed to investigate some factors that could influence employee’s attitude and behaviour to share their knowledge. The researchers employed the social exchange theory as a theoretical foundation for this study. Three essential factors namely: Trust, mutual reciprocity and perceived enjoyment that could influence knowledge sharing behaviour has been incorporated into a research model. To empirically validate this model, data was collected from one hundred and twenty respondents. The multiple regression analysis was employed to analyse the data. The results indicate that perceived enjoyment and trust have a significant influence on knowledge sharing. Surprisingly, mutual reciprocity did not influence knowledge sharing. The paper concludes by highlight the practical implications of the findings and areas for future research to consider.

Keywords: perceived enjoyment, trust, knowledge sharing, knowledge management

Procedia PDF Downloads 405
27911 The Role of Knowledge Sharing in Market Response: The Case of Saman Bank of Iran

Authors: Fatemeh Torabi, Jamal El-Den, Narumon Sriratanviriyakul

Abstract:

Perpetual changes in the workplace and daily business activities bring a need for imbedding organizational knowledge sharing within the organizations’ culture, routines and processes. Organizations should adapt to the changing in the environment in order to survive. Accordingly, the management should promote a knowledge sharing culture which might result in knowledge accumulation, hence better response to these changing environmental conditions. Researchers in the field of strategy and marketing stressed that employees’, as well as the overall performance of the organization, would improve as a result of implementing a knowledge-oriented culture. The research investigated the significant impact of knowledge sharing on market response and the competitiveness of organizations. A knowledge sharing framework was developed based on current literary frameworks with additional constructs such as employees’ learning commitments, experiences and prior knowledge. Linear regression was used to analyze the relationships among dependent and independent variables. The research’s results indicated strong positive correlation between the dependent and independent variables, especially in organizational market sharing. We anticipate that this correlation would improve organizational knowledge sharing related practices and the associated knowledge entities. The research posits the introduced framework could be a solid ground for further investigations on how some organizational factors would influence the organization’s response to the market as well as on competitiveness. Final results support all hypotheses. Finding of this research show that knowledge sharing intention had the significant and positive effect on market response and competitiveness of organizations.

Keywords: knowledge management, knowledge sharing, market response, organizational competitiveness

Procedia PDF Downloads 176
27910 Moderating Role of Positive External Factors in Relationship of Abusive Supervision and Knowledge Sharing

Authors: I.Hussain, A. Gulzar

Abstract:

Knowledge sharing is very important in organizations for their future progress and survival. This study investigates the impact of destructive leadership (abusive supervision) on knowledge sharing in employees. Further, the authors want to investigate a context variable (group cohesion) and explore its cross level influence on the relationship of abusive supervision and knowledge sharing. Conservation of resource theory (COR) claims loss of psychological capital (an internal positive resource) in employees due to abusive supervision and hence decrease occurs in knowledge sharing. This study tests psychological capital as mediator and group cohesion as moderator in relationship of abusive supervision and knowledge sharing. Data was collected from 239 respondents from more than 40 different organizations and 50 different groups from all over Pakistan. Results show that abusive supervision has negative effect on knowledge sharing through reduction in psychological capital of employees, and increased group cohesion in employees reduces this negative effect improving psychological capital in employees.

Keywords: abusive supervision, knowledge sharing, psychological capital, group cohesion, conservation of resources

Procedia PDF Downloads 178
27909 Security in Resource Constraints: Network Energy Efficient Encryption

Authors: Mona Almansoori, Ahmed Mustafa, Ahmad Elshamy

Abstract:

Wireless nodes in a sensor network gather and process critical information designed to process and communicate, information flooding through such network is critical for decision making and data processing, the integrity of such data is one of the most critical factors in wireless security without compromising the processing and transmission capability of the network. This paper presents mechanism to securely transmit data over a chain of sensor nodes without compromising the throughput of the network utilizing available battery resources available at the sensor node.

Keywords: hybrid protocol, data integrity, lightweight encryption, neighbor based key sharing, sensor node data processing, Z-MAC

Procedia PDF Downloads 114
27908 Strengthening Farmer-to-farmer Knowledge Sharing Network: A Pathway to Improved Extension Service Delivery

Authors: Farouk Shehu Abdulwahab

Abstract:

The concept of farmer-farmer knowledge sharing was introduced to bridge the extension worker-farmer ratio gap in developing countries. However, the idea was poorly accepted, especially in typical agrarian communities. Therefore, the study explores the concept of a farmer-to-farmer knowledge-sharing network to enhance extension service delivery. The study collected data from 80 farmers randomly selected through a series of multiple stages. The Data was analysed using a 5-point Likert scale and descriptive statistics. The Likert scale results revealed that 62.5% of the farmers are satisfied with farmer-to-farmer knowledge-sharing networks. Moreover, descriptive statistics show that lack of capacity building and low level of education are the most significant problems affecting farmer-farmer sharing networks. The major implication of these findings is that the concept of farmer-farmer knowledge-sharing networks can work better for farmers in developing countries as it was perceived by them as a reliable alternative for information sharing. Therefore, the study recommends introducing incentives into the concept of farmer-farmer knowledge-sharing networks and enhancing the capabilities of farmers who are opinion leaders in the farmer-farmer concept of knowledge-sharing to make it more sustainable.

Keywords: agricultural productivity, extension, farmer-to-farmer, livelihood, technology transfer

Procedia PDF Downloads 19
27907 How Information Sharing Can Improve Organizational Performance?

Authors: Syed Abdul Rehman Khan

Abstract:

In today’s world, information sharing plays a vital role in successful operations of supply chain; and boost to the profitability of the organizations (end-to-end supply chains). Many researches have been completed over the role of information sharing in supply chain. In this research article, we will investigate the ‘how information sharing can boost profitability & productivity of the organization; for this purpose, we have developed one conceptual model and check to that model through collected data from companies. We sent questionnaire to 369 companies; and will filled form received from 172 firms and the response rate was almost 47%. For the data analysis, we have used Regression in (SPSS software) In the research findings, our all hypothesis has been accepted significantly and due to the information sharing between suppliers and manufacturers ‘quality of material and timely delivery’ increase and also ‘collaboration & trust’ will become more stronger and these all factors will lead to the company’s profitability directly and in-directly. But unfortunately, companies could not avail the all fruitful benefits of information sharing due to the fear of ‘compromise confidentiality or leakage of information’.

Keywords: collaboration, information sharing, risk factor, timely delivery

Procedia PDF Downloads 383
27906 Lossless Secret Image Sharing Based on Integer Discrete Cosine Transform

Authors: Li Li, Ahmed A. Abd El-Latif, Aya El-Fatyany, Mohamed Amin

Abstract:

This paper proposes a new secret image sharing method based on integer discrete cosine transform (IntDCT). It first transforms the original image into the frequency domain (DCT coefficients) using IntDCT, which are operated on each block with size 8*8. Then, it generates shares among each DCT coefficients in the same place of each block, that is, all the DC components are used to generate DC shares, the ith AC component in each block are utilized to generate ith AC shares, and so on. The DC and AC shares components with the same number are combined together to generate DCT shadows. Experimental results and analyses show that the proposed method can recover the original image lossless than those methods based on traditional DCT and is more sensitive to tiny change in both the coefficients and the content of the image.

Keywords: secret image sharing, integer DCT, lossless recovery, sensitivity

Procedia PDF Downloads 369
27905 A New Bound on the Average Information Ratio of Perfect Secret-Sharing Schemes for Access Structures Based on Bipartite Graphs of Larger Girth

Authors: Hui-Chuan Lu

Abstract:

In a perfect secret-sharing scheme, a dealer distributes a secret among a set of participants in such a way that only qualified subsets of participants can recover the secret and the joint share of the participants in any unqualified subset is statistically independent of the secret. The access structure of the scheme refers to the collection of all qualified subsets. In a graph-based access structures, each vertex of a graph G represents a participant and each edge of G represents a minimal qualified subset. The average information ratio of a perfect secret-sharing scheme realizing a given access structure is the ratio of the average length of the shares given to the participants to the length of the secret. The infimum of the average information ratio of all possible perfect secret-sharing schemes realizing an access structure is called the optimal average information ratio of that access structure. We study the optimal average information ratio of the access structures based on bipartite graphs. Based on some previous results, we give a bound on the optimal average information ratio for all bipartite graphs of girth at least six. This bound is the best possible for some classes of bipartite graphs using our approach.

Keywords: secret-sharing scheme, average information ratio, star covering, deduction, core cluster

Procedia PDF Downloads 330
27904 Heritage Sharing Problems in Land Registry: Case Study of Konya, Turkey

Authors: Tayfun Cay, Sabahattin Akkus

Abstract:

Due to inheritance, urban areas can not be arranged in a planned and programmed manner. As a result of this, the social fabric is disrupted and the hostility is increasing among the people. This contradicts the understanding of the social state. The Turkish Civil Code and the Urban Development Law are effective in sharing heritage in urban areas in Turkey. Within the framework of this legislation; How to make heritage sharing and services in the title deed. In this study, these laws, regulations, and statutes are examined. In the frame of this legislation, land registry problems on inheritance are examined and the province of Konya - Selçuk district, is selected as an application place to solve the problems. In this study, the problems of heritage sharing in the land registry were investigated. The evaluation of the work is done and the results are determined and possible solutions are proposed.

Keywords: land, land registry, heritage sharing, sharing problems of heritage

Procedia PDF Downloads 257
27903 Privacy Preserving in Association Rule Mining on Horizontally Partitioned Database

Authors: Manvar Sagar, Nikul Virpariya

Abstract:

The advancement in data mining techniques plays an important role in many applications. In context of privacy and security issues, the problems caused by association rule mining technique are investigated by many research scholars. It is proved that the misuse of this technique may reveal the database owner’s sensitive and private information to others. Many researchers have put their effort to preserve privacy in Association Rule Mining. Amongst the two basic approaches for privacy preserving data mining, viz. Randomization based and Cryptography based, the later provides high level of privacy but incurs higher computational as well as communication overhead. Hence, it is necessary to explore alternative techniques that improve the over-heads. In this work, we propose an efficient, collusion-resistant cryptography based approach for distributed Association Rule mining using Shamir’s secret sharing scheme. As we show from theoretical and practical analysis, our approach is provably secure and require only one time a trusted third party. We use secret sharing for privately sharing the information and code based identification scheme to add support against malicious adversaries.

Keywords: Privacy, Privacy Preservation in Data Mining (PPDM), horizontally partitioned database, EMHS, MFI, shamir secret sharing

Procedia PDF Downloads 374
27902 Knowledge Sharing Model Based on Individual and Organizational Factors Related to Faculty Members of University

Authors: Mitra Sadoughi

Abstract:

This study presents the knowledge-sharing model based on individual and organizational factors related to faculty members. To achieve this goal, individual and organizational factors were presented through qualitative research in the form of open codes, axial, and selective observations; then, the final model was obtained using structural equation model. Participants included 1,719 faculty members of the Azad Universities, Mazandaran Province, Region 3. The samples related to the qualitative survey included 25 faculty members experienced at teaching and the samples related to the quantitative survey included 326 faculty members selected by multistage cluster sampling. A 72-item questionnaire was used to measure the quantitative variables. The reliability of the questionnaire was 0.93. Its content and face validity was determined with the help of faculty members, consultants, and other experts. For the analysis of quantitative data obtained from structural model and regression, SPSS and LISREL were used. The results showed that the status of knowledge sharing is moderate in the universities. Individual factors influencing knowledge sharing included the sharing of educational materials, perception, confidence and knowledge self-efficiency, and organizational factors influencing knowledge sharing included structural social capital, cognitive social capital, social capital relations, organizational communication, organizational structure, organizational culture, IT infrastructure and systems of rewards. Finally, it was found that the contribution of individual factors on knowledge sharing was more than organizational factors; therefore, a model was presented in which contribution of individual and organizational factors were determined.

Keywords: knowledge sharing, social capital, organizational communication, knowledge self-efficiency, perception, trust, organizational culture

Procedia PDF Downloads 365
27901 Effective Leadership Styles Influence on Knowledge Sharing Behaviour among Employees of SME's in Nigeria

Authors: Christianah Oyelekan Oyewole, Adeniyi Temitope Adetunji

Abstract:

Earlier researchers acknowledge the significance of knowledge sharing among employees in improving their responsiveness when dealing with unpredicted situations. Effective leadership styles have been known to impact employee knowledge-sharing behavior within an organisation positively. The role of influential leaders in knowledge sharing is accomplished through enhanced social networks and technology. However, preliminary research pointed to a lack of clear conclusions from recently published studies on the impact of effective leadership styles on knowledge-sharing behaviour among employees. The present study addressed this problem through a structured literature review. The review demonstrated that knowledge managers incorporate incentives and reward systems with their leadership styles to influence knowledge-sharing behaviour among employees positively. There was ample evidence that rational, innovative, stable and participatory organisational cultures combined with supportive and command leadership enhance employee intention for knowledge sharing in the organisation. The analysis revealed that transformational, transactional, and mentor leadership styles enhance employees’ knowledge-sharing behavior. Overall, it was resolved that the relationship between knowledge-sharing behavior among employees and leadership styles is mediated by the ability of the organisation to prioritize employee development.

Keywords: leadership styles, knowledge sharing, transactional leadership, transformational leadership, mentor leadership, team performance, team productivity, motivation, and creativity

Procedia PDF Downloads 41
27900 Identity Verification Using k-NN Classifiers and Autistic Genetic Data

Authors: Fuad M. Alkoot

Abstract:

DNA data have been used in forensics for decades. However, current research looks at using the DNA as a biometric identity verification modality. The goal is to improve the speed of identification. We aim at using gene data that was initially used for autism detection to find if and how accurate is this data for identification applications. Mainly our goal is to find if our data preprocessing technique yields data useful as a biometric identification tool. We experiment with using the nearest neighbor classifier to identify subjects. Results show that optimal classification rate is achieved when the test set is corrupted by normally distributed noise with zero mean and standard deviation of 1. The classification rate is close to optimal at higher noise standard deviation reaching 3. This shows that the data can be used for identity verification with high accuracy using a simple classifier such as the k-nearest neighbor (k-NN). 

Keywords: biometrics, genetic data, identity verification, k nearest neighbor

Procedia PDF Downloads 221
27899 Performance Comparison of Different Regression Methods for a Polymerization Process with Adaptive Sampling

Authors: Florin Leon, Silvia Curteanu

Abstract:

Developing complete mechanistic models for polymerization reactors is not easy, because complex reactions occur simultaneously; there is a large number of kinetic parameters involved and sometimes the chemical and physical phenomena for mixtures involving polymers are poorly understood. To overcome these difficulties, empirical models based on sampled data can be used instead, namely regression methods typical of machine learning field. They have the ability to learn the trends of a process without any knowledge about its particular physical and chemical laws. Therefore, they are useful for modeling complex processes, such as the free radical polymerization of methyl methacrylate achieved in a batch bulk process. The goal is to generate accurate predictions of monomer conversion, numerical average molecular weight and gravimetrical average molecular weight. This process is associated with non-linear gel and glass effects. For this purpose, an adaptive sampling technique is presented, which can select more samples around the regions where the values have a higher variation. Several machine learning methods are used for the modeling and their performance is compared: support vector machines, k-nearest neighbor, k-nearest neighbor and random forest, as well as an original algorithm, large margin nearest neighbor regression. The suggested method provides very good results compared to the other well-known regression algorithms.

Keywords: batch bulk methyl methacrylate polymerization, adaptive sampling, machine learning, large margin nearest neighbor regression

Procedia PDF Downloads 266
27898 Sustainability of Widlife Community Based Natural Resource Management under Benefit Sharing Mechanism in Game Management Areas in Zambia

Authors: Darius Phiri, Moses Chibesa, Donald Zulu, Robby Kasubika

Abstract:

In Zambia, wildlife is co-managed by Zambia Wildlife Authority (ZAWA) and the local communities by sharing management responsibilities and benefits derived from harvesting wildlife resources under a benefit sharing mechanism. Although the benefit sharing mechanism has been formulated under good principles, it is still facing numerous challenges. In response to these challenges, a study on the sustainability of ZAWA benefit sharing mechanism was carried out in order to assess its potential and continuity in line with community empowerment and wildlife resources management. Systematic sampling was used with a sampling intensity of 4% to administer three types of questionnaires to community members in Mumbwa Game Management Area (GMA), ZAWA officers, and to the Ministry of Tourism, Environment and Natural Resources (MTENR) staffs. The collected data was then analysed using SPSS version 16.5. The findings indicated that many people in the GMA do not participate fully because of lacking satisfactory benefits. However, the mechanism contribute to the community well-being and can still remain sustainable especially if measures to address the current challenges are put in place.

Keywords: benefit sharing, concessions, licenses, poaching, local communities, sustainability

Procedia PDF Downloads 365
27897 A Conceptual Framework of the Individual and Organizational Antecedents to Knowledge Sharing

Authors: Muhammad Abdul Basit Memon

Abstract:

The importance of organizational knowledge sharing and knowledge management has been documented in numerous research studies in available literature, since knowledge sharing has been recognized as a founding pillar for superior organizational performance and a source of gaining competitive advantage. Built on this, most of the successful organizations perceive knowledge management and knowledge sharing as a concern of high strategic importance and spend huge amounts on the effective management and sharing of organizational knowledge. However, despite some very serious endeavors, many firms fail to capitalize on the benefits of knowledge sharing because of being unaware of the individual characteristics, interpersonal, organizational and contextual factors that influence knowledge sharing; simply the antecedent to knowledge sharing. The extant literature on antecedents to knowledge sharing, offers a range of antecedents mentioned in a number of research articles and research studies. Some of the previous studies about antecedents to knowledge sharing, studied antecedents to knowledge sharing regarding inter-organizational knowledge transfer; others focused on inter and intra organizational knowledge sharing and still others investigated organizational factors. Some of the organizational antecedents to KS can relate to the characteristics and underlying aspects of knowledge being shared e.g., specificity and complexity of the underlying knowledge to be transferred; others relate to specific organizational characteristics e.g., age and size of the organization, decentralization and absorptive capacity of the firm and still others relate to the social relations and networks of organizations such as social ties, trusting relationships, and value systems. In the same way some researchers have highlighted on only one aspect like organizational commitment, transformational leadership, knowledge-centred culture, learning and performance orientation and social network-based relationships in the organizations. A bulk of the existing research articles on antecedents to knowledge sharing has mainly discussed organizational or environmental factors affecting knowledge sharing. However, the focus, later on, shifted towards the analysis of individuals or personal determinants as antecedents for the individual’s engagement in knowledge sharing activities, like personality traits, attitude and self efficacy etc. For example, employees’ goal orientations (i.e. learning orientation or performance orientation is an important individual antecedent of knowledge sharing behaviour. While being consistent with the existing literature therefore, the antecedents to knowledge sharing can be classified as being individual and organizational. This paper is an endeavor to discuss a conceptual framework of the individual and organizational antecedents to knowledge sharing in the light of the available literature and empirical evidence. This model not only can help in getting familiarity and comprehension on the subject matter by presenting a holistic view of the antecedents to knowledge sharing as discussed in the literature, but can also help the business managers and especially human resource managers to find insights about the salient features of organizational knowledge sharing. Moreover, this paper can help provide a ground for research students and academicians to conduct both qualitative as well and quantitative research and design an instrument for conducting survey on the topic of individual and organizational antecedents to knowledge sharing.

Keywords: antecedents to knowledge sharing, knowledge management, individual and organizational, organizational knowledge sharing

Procedia PDF Downloads 283
27896 Risk-Sharing Financing of Islamic Banks: Better Shielded against Interest Rate Risk

Authors: Mirzet SeHo, Alaa Alaabed, Mansur Masih

Abstract:

In theory, risk-sharing-based financing (RSF) is considered a corner stone of Islamic finance. It is argued to render Islamic banks more resilient to shocks. In practice, however, this feature of Islamic financial products is almost negligible. Instead, debt-based instruments, with conventional like features, have overwhelmed the nascent industry. In addition, the framework of present-day economic, regulatory and financial reality inevitably exposes Islamic banks in dual banking systems to problems of conventional banks. This includes, but is not limited to, interest rate risk. Empirical evidence has, thus far, confirmed such exposures, despite Islamic banks’ interest-free operations. This study applies system GMM in modeling the determinants of RSF, and finds that RSF is insensitive to changes in interest rates. Hence, our results provide support to the “stability” view of risk-sharing-based financing. This suggests RSF as the way forward for risk management at Islamic banks, in the absence of widely acceptable Shariah compliant hedging instruments. Further support to the stability view is given by evidence of counter-cyclicality. Unlike debt-based lending that inflates artificial asset bubbles through credit expansion during the upswing of business cycles, RSF is negatively related to GDP growth. Our results also imply a significantly strong relationship between risk-sharing deposits and RSF. However, the pass-through of these deposits to RSF is economically low. Only about 40% of risk-sharing deposits are channeled to risk-sharing financing. This raises questions on the validity of the industry’s claim that depositors accustomed to conventional banking shun away from risk sharing and signals potential for better balance sheet management at Islamic banks. Overall, our findings suggest that, on the one hand, Islamic banks can gain ‘independence’ from conventional banks and interest rates through risk-sharing products, the potential for which is enormous. On the other hand, RSF could enable policy makers to improve systemic stability and restrain excessive credit expansion through its countercyclical features.

Keywords: Islamic banks, risk-sharing, financing, interest rate, dynamic system GMM

Procedia PDF Downloads 289
27895 Lightweight Cryptographically Generated Address for IPv6 Neighbor Discovery

Authors: Amjed Sid Ahmed, Rosilah Hassan, Nor Effendy Othman

Abstract:

Limited functioning of the Internet Protocol version 4 (IPv4) has necessitated the development of the Internetworking Protocol next generation (IPng) to curb the challenges. Indeed, the IPng is also referred to as the Internet Protocol version 6 (IPv6) and includes the Neighbor Discovery Protocol (NDP). The latter performs the role of Address Auto-configuration, Router Discovery (RD), and Neighbor Discovery (ND). Furthermore, the role of the NDP entails redirecting the service, detecting the duplicate address, and detecting the unreachable services. Despite the fact that there is an NDP’s assumption regarding the existence of trust the links’ nodes, several crucial attacks may affect the Protocol. Internet Engineering Task Force (IETF) therefore has recommended implementation of Secure Neighbor Discovery Protocol (SEND) to tackle safety issues in NDP. The SEND protocol is mainly used for validation of address rights, malicious response inhibiting techniques and finally router certification procedures. For routine running of these tasks, SEND utilizes on the following options, Cryptographically Generated Address (CGA), RSA Signature, Nonce and Timestamp option. CGA is produced at extra high costs making it the most notable disadvantage of SEND. In this paper a clear description of the constituents of CGA, its operation and also recommendations for improvements in its generation are given.

Keywords: CGA, IPv6, NDP, SEND

Procedia PDF Downloads 355
27894 Trust: The Enabler of Knowledge-Sharing Culture in an Informal Setting

Authors: Emmanuel Ukpe, S. M. F. D. Syed Mustapha

Abstract:

Trust in an organization has been perceived as one of the key factors behind knowledge sharing, mainly in an unstructured work environment. In an informal working environment, to instill trust among individuals is a challenge and even more in the virtual environment. The study has contributed in developing the framework for building trust in an unstructured organization in performing knowledge sharing in a virtual environment. The artifact called KAPE (Knowledge Acquisition, Processing, and Exchange) was developed for knowledge sharing for the informal organization where the framework was incorporated. It applies to Cassava farmers to facilitate knowledge sharing using web-based platform. A survey was conducted; data were collected from 382 farmers from 21 farm communities. Multiple regression technique, Cronbach’s Alpha reliability test; Tukey’s Honestly significant difference (HSD) analysis; one way Analysis of Variance (ANOVA), and all trust acceptable measures (TAM) were used to test the hypothesis and to determine noteworthy relationships. The results show a significant difference when there is a trust in knowledge sharing between farmers, the ones who have high in trust acceptable factors found in the model (M = 3.66 SD = .93) and the ones who have low on trust acceptable factors (M = 2.08 SD = .28), (t (48) = 5.69, p = .00). Furthermore, when applying Cognitive Expectancy Theory, the farmers with cognitive-consonance show higher level of trust and satisfaction with knowledge and information from KAPE, as compared with a low level of cognitive-dissonance. These results imply that the adopted trust model KAPE positively improved knowledge sharing activities in an informal environment amongst rural farmers.

Keywords: trust, knowledge, sharing, knowledge acquisition, processing and exchange, KAPE

Procedia PDF Downloads 83
27893 Discussion on the Impact and Improvement Strategy of Bike Sharing on Urban Space

Authors: Bingying Liu, Dandong Ge, Xinlan Zhang, Haoyang Liang

Abstract:

Over the past two years, a new generation of No-Pile Bike sharing, represented by the Ofo, Mobike and HelloBike, has sprung up in various cities in China, and spread rapidly in countries such as Britain, Japan, the United States and Singapore. As a new green public transportation mode, bike sharing can bring a series of benefits to urban space. At first, this paper analyzes the specific impact of bike sharing on urban space in China. Based on the market research and data analyzing, it is found that bike sharing can improve the quality of urban space in three aspects: expanding the radius of public transportation service, filling service blind spots, alleviating urban traffic congestion, and enhancing the vitality of urban space. On the other hand, due to the immature market and the imperfect system, bike sharing has gradually revealed some difficulties, such as parking chaos, malicious damage, safety problems, imbalance between supply and demand, and so on. Then the paper investigates the characteristics of shared bikes, business model, operating mechanism on Chinese market currently. Finally, in order to make bike sharing serve urban construction better, this paper puts forward some specific countermeasures from four aspects. In terms of market operations, it is necessary to establish a public-private partnership model and set up a unified bike-sharing integrated management platform. From technical methods level, the paper proposes to develop an intelligent parking system for regulating parking. From policy formulation level, establishing a bike-sharing assessment mechanism would strengthen supervision. As to urban planning, sharing data and redesigning slow roadway is beneficial for transportation and spatial planning.

Keywords: bike sharing, impact analysis, improvement strategy, urban space

Procedia PDF Downloads 137
27892 An Adaptive Opportunistic Transmission for Unlicensed Spectrum Sharing in Heterogeneous Networks

Authors: Daehyoung Kim, Pervez Khan, Hoon Kim

Abstract:

Efficient utilization of spectrum resources is a fundamental issue of wireless communications due to its scarcity. To improve the efficiency of spectrum utilization, the spectrum sharing for unlicensed bands is being regarded as one of key technologies in the next generation wireless networks. A number of schemes such as Listen-Before-Talk(LBT) and carrier sensor adaptive transmission (CSAT) have been suggested from this aspect, but more efficient sharing schemes are required for improving spectrum utilization efficiency. This work considers an opportunistic transmission approach and a dynamic Contention Window (CW) adjustment scheme for LTE-U users sharing the unlicensed spectrum with Wi-Fi, in order to enhance the overall system throughput. The decision criteria for the dynamic adjustment of CW are based on the collision evaluation, derived from the collision probability of the system. The overall performance can be improved due to the adaptive adjustment of the CW. Simulation results show that our proposed scheme outperforms the Distributed Coordination Function (DCF) mechanism of IEEE 802.11 MAC.

Keywords: spectrum sharing, adaptive opportunistic transmission, unlicensed bands, heterogeneous networks

Procedia PDF Downloads 310
27891 Message Authentication Scheme for Vehicular Ad-Hoc Networks under Sparse RSUs Environment

Authors: Wen Shyong Hsieh, Chih Hsueh Lin

Abstract:

In this paper, we combine the concepts of chameleon hash function (CHF) and identification based cryptography (IBC) to build a message authentication environment for VANET under sparse RSUs. Based on the CHF, TA keeps two common secrets that will be embedded to all identities to be as the evidence of mutual trusting. TA will issue one original identity to every RSU and vehicle. An identity contains one public ID and one private key. The public ID, includes three components: pseudonym, random key, and public key, is used to present one entity and can be verified to be a legal one. The private key is used to claim the ownership of the public ID. Based on the concept of IBC, without any negotiating process, a CHF pairing key multiplied by one private key and other’s public key will be used for mutually trusting and to be utilized as the session key of secure communicating between RSUs and vehicles. To help the vehicles to do message authenticating, the RSUs are assigned to response the vehicle’s temple identity request using two short time secretes that are broadcasted by TA. To light the loading of request information, one day is divided into M time slots. At every time slot, TA will broadcast two short time secretes to all valid RSUs for that time slot. Any RSU can response the temple identity request from legal vehicles. With the collected announcement of public IDs from the neighbor vehicles, a vehicle can set up its neighboring set, which includes the information about the neighbor vehicle’s temple public ID and temple CHF pairing key that can be derived by the private key and neighbor’s public key and will be used to do message authenticating or secure communicating without the help of RSU.

Keywords: Internet of Vehicles (IOV), Vehicular Ad-hoc Networks (VANETs), Chameleon Hash Function (CHF), message authentication

Procedia PDF Downloads 357
27890 The Relationship between Social Capital and Knowledge Sharing in the Ministry of Culture and Islamic Guidance(Iran)

Authors: Narges Sadat Myrmousavy, Maryam Eslampanah

Abstract:

The aim of this study was to investigate the relationship between social capital and knowledge sharing is the Ministry of Culture and Islamic Guidance. They are descriptive correlation study. The study sample consisted of all the experts in the Ministry of Culture and Islamic Guidance helping professionals headquarters in Tehran in the summer period is 2012, the number is 650. Random sampling is targeted. The sample size is 400. The data collection tool was a questionnaire that was used for the preparation of a standard questionnaire. They also examine the assumptions of the regression coefficient for the relationship between variables in order to investigate the main hypothesis test is used. The findings suggest that the structural and knowledge-sharing between components, there is a direct relationship. The components of the relationship between Impression management and knowledge sharing, there is a direct relationship. There was no significant relationship between Individual pro-social motives and knowledge sharing. Both components of the cognitive aspects of open mindedness and competence are directly related with knowledge sharing. Finally, the comparison between the different dimensions of social capital, the largest of its structure, and its relationship with knowledge sharing is the least relation.

Keywords: social capital, knowledge sharing, ministry of culture and Islamic guidance (Iran), open mindedness, pro-social motives

Procedia PDF Downloads 473
27889 Partners Sharing Resources, Costs, and Risks

Authors: Lee Li

Abstract:

The strategic management literature posits that the major motive of strategic alliances is to share resources, costs and risks. However, the literature also indicates that such sharing leads to transaction costs which are positively correlated with environmental dynamism. As such, it is not clear why firms are willing to cover high transaction costs for sharing resources, costs and risks. This study categorizes resources into firm-specific and general resource; costs into accounting and non-accounting cost; and risks into visible and invisible risks. Using data from 167 Canadian firms in technology industries, we find that sharing firm-specific resources and non-accounting costs are negatively correlated with environmental dynamism but sharing general resources, accounting costs and visible risks are positively correlated with environmental dynamism. Findings suggest that sharing certain resources, costs and risks do not necessarily incur high transaction costs.

Keywords: environmental dynamism, strategic alliances, resource/cost/risk sharing

Procedia PDF Downloads 335
27888 Sharing Tacit Knowledge: The Essence of Knowledge Management

Authors: Ayesha Khatun

Abstract:

In 21st century where markets are unstable, technologies rapidly proliferate, competitors multiply, products and services become obsolete almost overnight and customers demand low cost high value product, leveraging and harnessing knowledge is not just a potential source of competitive advantage rather a necessity in technology based and information intensive industries. Knowledge management focuses on leveraging the available knowledge and sharing the same among the individuals in the organization so that the employees can make best use of it towards achieving the organizational goals. Knowledge is not a discrete object. It is embedded in people and so difficult to transfer outside the immediate context that it becomes a major competitive advantage. However, internal transfer of knowledge among the employees is essential to maximize the use of knowledge available in the organization in an unstructured manner. But as knowledge is the source of competitive advantage for the organization it is also the source of competitive advantage for the individuals. People think that knowledge is power and sharing the same may lead to lose the competitive position. Moreover, the very nature of tacit knowledge poses many difficulties in sharing the same. But sharing tacit knowledge is the vital part of knowledge management process because it is the tacit knowledge which is inimitable. Knowledge management has been made synonymous with the use of software and technology leading to the management of explicit knowledge only ignoring personal interaction and forming of informal networks which are considered as the most successful means of sharing tacit knowledge. Factors responsible for effective sharing of tacit knowledge are grouped into –individual, organizational and technological factors. Different factors under each category have been identified. Creating a positive organizational culture, encouraging personal interaction, practicing reward system are some of the strategies that can help to overcome many of the barriers to effective sharing of tacit knowledge. Methodology applied here is completely secondary. Extensive review of relevant literature has been undertaken for the purpose.

Keywords: knowledge, tacit knowledge, knowledge management, sustainable competitive advantage, organization, knowledge sharing

Procedia PDF Downloads 369