Please tell us what you think of this issue! Feedback
Bulletin, June/July 2009
Selected Abstracts from JASIST
Authors who choose to do so prepare and submit these summaries to the editor of the Bulletin.
From JASIS&T v. 60 (4)
Wu, I.-L.& Lin, H.-C., (2009). A strategy-based process for implementing knowledge management: An integrative view and empirical study (789-802).
Study and Results: This study proposes a strategy-based process for implementing knowledge management with four components: competitive strategy, knowledge strategy, implementation approach and company performance. It develops three hypotheses to verify the relationships between any two consecutive components. Measurement is designed from relevant literature and used to collect empirical data. The firms from knowledge-intensive industries, including manufacturing, service and financial industries, are selected as the study sample. Chief information/knowledge officers are the major respondents. We used contingency tables with Chi-square statistics to analyze their relationships. The results indicate that different competitive strategies will have significant impact on the selection of knowledge strategies and, in turn, technology implementation approaches, to effectively manage knowledge resources.
What’s New? Many researchers explore knowledge management performance from knowledge infrastructure and process within organizational boundaries. This study has approached it from the perspective of competitive strategy. This approach has shown better company performance through effective knowledge management. We suggest that practitioners consider this model to plan their knowledge management projects in the future.
Limitations: The respondents are mainly from manufacturing industries, and the empirical results may possibly limit ability to generalize to other industries.
Liu, R.-L. (2009). Context recognition for hierarchical text classification (803-813).
Study and Results: Automatic text classification may be improved by recognizing each category's context of discussion (COD), which is governed by the main contents of the category's ancestor categories in a given hierarchy.
What’s New? A novel COD recognition technique is developed, whose performance is both better and more stable. It does not require any trials to manually set parameters and, therefore, is more portable and easier to implement. The contributions are significant to the management and dissemination of information, since much textual information has been hierarchically organized, and by classifying texts into suitable categories, information may be properly archived, retrieved and recommended to those users interested in corresponding categories.
Limitations: A set of texts labelled with suitable categories in a hierarchy needs to be given so that the text classifier may be constructed automatically.
Westbrook, L. (2009). Information myths and intimate partner violence: Sources, contexts, and consequences (826-836).
Study and Results: Survivors of intimate partner violence (IPV) face more than information gaps; many face powerful barriers in the form of information myths. Triangulating data from in-depth interviews and community bulletin board postings, this study incorporates insights from survivors, police and shelter staff to begin mapping the information landscape through which survivors move. An unanticipated feature of that landscape is a set of 28 compelling information myths that prevent some survivors from making effective use of the social, legal, economic and support resources available to them. The myths fall into four categories: (1) IPV, abusers and survivors; (2) issues with children; (3) interacting with government agencies, including police and Child Protective Services (CPS); and (4) interacting with shelters and civil law.
What’s New? Librarians are particularly well situated to help service providers address the implications of and identify resources to counter the effects of these information myths. By examining the information perspective in serving these individuals in crisis, librarians can assist both IPV survivors and those social service staff who support survivor safety.
Limitations: This qualitative study draws primarily from U.S. bulletin board postings and interviews throughout the state of Texas. Additional sites and online communities may well deal with additional myths.
Articles in this Issue
What's New? Selected Abstracts from JASIST