KM implementation in Malaysian telecommunication industry: An empirical analysis
Purpose - This paper aims assess to the perceived importance (PI) and actual implementation (AI) of five preliminary knowledge management (KM) success factors, i.e. business strategy, organizational structure, knowledge team, knowledge audit, and knowledge map in the Malaysian telecommunication indu...
| Main Authors: | Chong, Chin Wei, Chong, Siong, Heng, Paul Ping Yeow |
|---|---|
| Format: | Article |
| Published: |
Emerald Publishing Limited
2006
|
| Subjects: | |
| Online Access: | http://shdl.mmu.edu.my/2080/ |
Similar Items
Implementation of KM strategies in the Malaysian telecommunication industry: An empirical analysis
by: Chong, Chin Wei, et al.
Published: (2007)
by: Chong, Chin Wei, et al.
Published: (2007)
Criteria for measuring KM performance outcomes in organisations
by: Chong, Siong Choy, et al.
Published: (2006)
by: Chong, Siong Choy, et al.
Published: (2006)
Mobile Phone Use in a Developing Country: A Malaysian Empirical Study
by: Heng, Paul Ping Yeow, et al.
Published: (2008)
by: Heng, Paul Ping Yeow, et al.
Published: (2008)
Accepting Multipurpose “Smart” Identity Cards in a Developing Country
by: Heng, Paul Ping Yeow, et al.
Published: (2007)
by: Heng, Paul Ping Yeow, et al.
Published: (2007)
Securing Telecommunication Based On Speaker Voice As The Public Key.
by: Enayah, Monther Rateb, et al.
Published: (2007)
by: Enayah, Monther Rateb, et al.
Published: (2007)
Dynamic Technique for Optimizing Universal Mobile Telecommunication System Active Set.
by: Mutlag, Samer Abdulsada
Published: (2010)
by: Mutlag, Samer Abdulsada
Published: (2010)
Identifying Criteria For The Implementation Of Augmented Reality In Malaysian Tourism Industry
by: Ahmed, Abdul Salam Waqar
Published: (2022)
by: Ahmed, Abdul Salam Waqar
Published: (2022)
Key usability factors of service-oriented web sites for students: an empirical study
by: Nathan, Robert J., et al.
Published: (2008)
by: Nathan, Robert J., et al.
Published: (2008)
Design and Implementation of an XML Firewall
by: Loh, Yin-soon, et al.
Published: (2006)
by: Loh, Yin-soon, et al.
Published: (2006)
An Empirical Study of Learning Object Acceptance in Multimedia Learning Environment
by: Lau, Siong Hoe, et al.
Published: (2008)
by: Lau, Siong Hoe, et al.
Published: (2008)
Adoption of interorganizational system standards in supply chains - An empirical analysis of RosettaNet standards
by: Alain Chong Yee, Loong, et al.
Published: (2008)
by: Alain Chong Yee, Loong, et al.
Published: (2008)
Spatial Kernel-based Generalized C-mean Clustering for Medical Image Segmentation.
by: Lee, Song Yeow
Published: (2010)
by: Lee, Song Yeow
Published: (2010)
A fair AQM scheme for aggregated ECN and non-ECN traffic
by: Chong, P
Published: (2004)
by: Chong, P
Published: (2004)
Translation and scale invariants of Legendre moments
by: Chong, C
Published: (2004)
by: Chong, C
Published: (2004)
Translation invariants of Zernike moments
by: Chong, C
Published: (2003)
by: Chong, C
Published: (2003)
A comparative analysis of algorithms for fast computation of Zernike moments
by: Chong, C
Published: (2003)
by: Chong, C
Published: (2003)
Domain name and site hosting preferences: empirical evidence
by: O’Daniel, Thomas, et al.
Published: (2000)
by: O’Daniel, Thomas, et al.
Published: (2000)
An efficient algorithm for fast computation of pseudo-Zernike moments
by: Chong, Chee-Way
Published: (2003)
by: Chong, Chee-Way
Published: (2003)
Enhancing security on IPv6 neighbor discovery using trust-ND.
by: Chong , Yung Wey
Published: (2017)
by: Chong , Yung Wey
Published: (2017)
Knowledge Management Implementation Inthe Malaysian Telecommunication Industry: An Empirical Evaluation
by: Chong, Chin Wei
Published: (2007)
by: Chong, Chin Wei
Published: (2007)
Empirical Analysis on Factors Impacting on Intention to Use M-learning in Basic Education in Egypt
by: Ali, Reham Adel, et al.
Published: (2018)
by: Ali, Reham Adel, et al.
Published: (2018)
A practical implementation of a 3-D game engine
by: Cheah, Thomas C. S., et al.
Published: (2005)
by: Cheah, Thomas C. S., et al.
Published: (2005)
VLSI implementation of Inverse Discrete Wavelet Transform for JPEG 2000
by: Bhuyan, Mohammad Shaharia, et al.
Published: (2007)
by: Bhuyan, Mohammad Shaharia, et al.
Published: (2007)
The scale invariants of pseudo-Zernike moments
by: Chong, Chee Way, et al.
Published: (2003)
by: Chong, Chee Way, et al.
Published: (2003)
Design and implementation of a power quality disturbance classifier: An Al approach
by: Reaz, , M. B. I, et al.
Published: (2006)
by: Reaz, , M. B. I, et al.
Published: (2006)
A comparative study of Virtual Communities in Bangladesh and the USA
by: Majharul, Talukder, et al.
Published: (2007)
by: Majharul, Talukder, et al.
Published: (2007)
Conceptual change modeling using Dynamic Bayesian network
by: Ting, Choo Yee, et al.
Published: (2006)
by: Ting, Choo Yee, et al.
Published: (2006)
Iris authentication using privatized advanced correlation filter
by: Chong, , SC, et al.
Published: (2006)
by: Chong, , SC, et al.
Published: (2006)
Implementation of evolutionary active force control in a 5-link biped robot
by: Kwek,, LC, et al.
Published: (2005)
by: Kwek,, LC, et al.
Published: (2005)
Implementation Of Mediator-Based Integration System For A Transparent Access To Multiple Biological Databases.
by: Husain, Wahidah, et al.
Published: (2007)
by: Husain, Wahidah, et al.
Published: (2007)
CPT316
–
Programming Language Implementation and Paradigms
(Pelaksanaan dan Paradigma Bahasa Pengaturcaraan)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2023)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2023)
User acceptance of Online Banking Service in Australia
by: Heng, Paul Ping Yeow, et al.
Published: (2008)
by: Heng, Paul Ping Yeow, et al.
Published: (2008)
User acceptance of ATM and transit applications embedded in Malaysia's national identity smartcard
by: Yeow, Paul H. P., et al.
Published: (2007)
by: Yeow, Paul H. P., et al.
Published: (2007)
A technology acceptance study of online banking service in Malaysia
by: Paul H. P., Yeow, et al.
Published: (2008)
by: Paul H. P., Yeow, et al.
Published: (2008)
k-Resilient Identity-Based Encryption in the Standard Model
by: HENG, S.-H.
Published: (2006)
by: HENG, S.-H.
Published: (2006)
An integrated approach for head gesture based interface
by: Lee, Gin Chong, et al.
Published: (2012)
by: Lee, Gin Chong, et al.
Published: (2012)
Interactivities in music intelligent tutoring system
by: Phon-Amnuaisuk, S., et al.
Published: (2005)
by: Phon-Amnuaisuk, S., et al.
Published: (2005)
Observing the Evolution of Neural Networks Learning to Play the Game of Othello
by: Chong, S.Y., et al.
Published: (2005)
by: Chong, S.Y., et al.
Published: (2005)
Identifying And Classifying Unknown Words In Malay Texts.
by: Bali, Ranaivo-Malançon, et al.
Published: (2007)
by: Bali, Ranaivo-Malançon, et al.
Published: (2007)
Rewind: Cbt-Based Serious Game To Improve Cognitive Emotion Regulations And Anxiety Disorders
by: Heng, Yew Ken
Published: (2023)
by: Heng, Yew Ken
Published: (2023)
Similar Items
-
Implementation of KM strategies in the Malaysian telecommunication industry: An empirical analysis
by: Chong, Chin Wei, et al.
Published: (2007) -
Criteria for measuring KM performance outcomes in organisations
by: Chong, Siong Choy, et al.
Published: (2006) -
Mobile Phone Use in a Developing Country: A Malaysian Empirical Study
by: Heng, Paul Ping Yeow, et al.
Published: (2008) -
Accepting Multipurpose “Smart” Identity Cards in a Developing Country
by: Heng, Paul Ping Yeow, et al.
Published: (2007) -
Securing Telecommunication Based On Speaker Voice As The Public Key.
by: Enayah, Monther Rateb, et al.
Published: (2007)