|
Showing 1 - 6 of
6 matches in All Departments
Knowledge has become increasingly complex and important for
organizations. Despite the growing recognition of the factors that
enable knowledge management in organizations, our understanding
about the unique cross-cultural challenges is rather limited. In
particular, how cultural differences influence people's
participation in knowledge management activities still remains
unclear. By conducting qualitative case studies and analytic
hierarchical process (AHP) with multinational firms in Brazil and
China, this book addresses the broader issue of cultural influences
on knowledge management. Specific emphasis has been put on their
indigenous cultural norms, including guanxi, face and jeitinho and
the impacts they have on knowledge sharing. Drawing on an
integrative knowledge management model, the results from AHP
analysis reveal how some cultural-specific factors related to
people, process and knowledge can affect the effectiveness of
socialization, externalization and internalization processes in a
production context. The book will be useful to both management
academics and business practitioners. While academics will gain
insight into the intricacies of knowledge sharing activities in
production organizations, managers will find some useful conceptual
tools to resolve the challenges of knowledge management in a
cross-cultural context.
To what extent do the Chinese cyber-warriors--within the People's
Liberation Army along with both state and non-state sponsored
hackers/crackers--represent a viable threat to both the security
and prosperity of our nation as a whole? In the past several years
the Chinese have developed a myriad of both lethal and non-lethal
cyber-weapons with the intention of denying or degrading an
adversary's ability to use space-based intercommunication network
platforms. The PRC and PLA have demonstrated a rapid expansion of
their asymmetric operations, especially in the realm of Cyberspace.
This paper will seek to ascertain the United States military's
ability to defend and enforce our national interests, both in
regards to our own domestic infrastructures as well as our partners
abroad from Chinese-directed cyber-attacks.
|
|
Email address subscribed successfully.
A activation email has been sent to you.
Please click the link in that email to activate your subscription.