This study focuses on SME networks of design and high-tech companies in Southeast Netherland. By highlighting the personal networks of members across design and high-tech industries, the study attempts to identify the main brokers in this dynamic environment. In addition, we investigate whether specific characteristics are associated with these brokers. The main contribution of the paper lies in the fact that, in contrast to most other work, it is quantitative and that it focuses on brokers identified in an actual network (based on both suppliers and users of the knowledge infrastructure). Studying the phenomenon of brokerage provides us with clear insights into the concept of brokerage regarding SME networks in different fields. In particular we highlight how third parties contribute to the transfer and development of knowledge. Empirical results show, among others that the most influential brokers are found in the nonprofit and science sector and have a long track record in their branch.
DOCUMENT
Business is changing from an industrial- to a knowledge-based environment, building more from professionals and their expertise. Corporations need to create internal organizations in which there is more emphasis on human capital and creating/sharing knowledge and talents. Talent management and knowledge creation should be new foci to create sustainability and long-term success. On the whole, organisations are working too much on an ad hoc basis, focusing on technology instead of creating an environment in which talents reinforce each other. In this review article we explore knowledge circulation, link knowledge, and talent to innovation, and discuss optimum circumstances for corporations to benefit from these assets.
DOCUMENT
This article examines the network structure, criminal cooperation, and external interactions of cybercriminal networks. Its contribution is empirical and inductive. The core of this study involved carrying out 10 case analyses on closed cybercrime investigations – all with financial motivations on the part of the offenders - in the UK and beyond. Each analysis involved investigator interview and access to unpublished law enforcement files. The comparison of these cases resulted in a wide range of findings on these cybercriminal networks, including: a common division between the scam/attack components and the money components; the presence of offline/local elements; a broad, and sometimes blurred, spectrum of cybercriminal behaviour and organisation. An overarching theme across the cases that we observe is that cybercriminal business models are relatively stable.
DOCUMENT
School-university research networks aim at closer integration of research and practice by means of teacher research. Such practice-oriented research can enhance teachers' professional knowledge development, and can benefit both schools and university. This paper reports on 21 participants of a school-university research network embedded in a Master's program. The main question was: which aspects of a school-university research network play a role in processes of developing, sharing and using knowledge based on research by Master's students? 15 network aspects were distinguished, which together provide a useful framework for better understanding and further study of knowledge processes in school-university research networks.
LINK
A case study and method development research of online simulation gaming to enhance youth care knowlegde exchange. Youth care professionals affirm that the application used has enough relevance as an additional tool for knowledge construction about complex cases. They state that the usability of the application is suitable, however some remarks are given to adapt the virtual environment to the special needs of youth care knowledge exchange. The method of online simulation gaming appears to be useful to improve network competences and to explore the hidden professional capacities of the participant as to the construction of situational cognition, discourse participation and the accountability of intervention choices.
DOCUMENT
The energy management systems industry in the built environment is currently an important topic. Buildings use about 40% of the total global energy worldwide. Therefore, the energy management system’s sector is one of the most influential sectors to realize changes and transformation of energy use. New data science technologies used in building energy management systems might not only bring many technical challenges, but also they raise significant educational challenges for professionals who work in the field of energy management systems. Learning and educational issues are mainly due to the transformation of professional practices and networks, emerging technologies, and a big shift in how people work, communicate, and share their knowledge across the professional and academic sectors. In this study, we have investigated three different companies active in the building services sector to identify the main motivation and barriers to knowledge adoption, transfer, and exchange between different professionals in the energy management sector and explore the technologies that have been used in this field using the boundary-crossing framework. The results of our study show the importance of understanding professional learning networks in the building services sector. Additionally, the role of learning culture, incentive structure, and technologies behind the educational system of each organization are explained. Boundary-crossing helps to analyze the barriers and challenges in the educational setting and how new educational technologies can be embedded. Based on our results, future studies with a bigger sample and deeper analysis of technologies are needed to have a better understanding of current educational problems.
DOCUMENT
This paper attempts to extend the analysis of event effects by analysing the knowledge creation role of an Italian literary festival, the Festivaletteratura in Mantua. The festival uses its local network, consisting of cultural organisations, local firms, festival volunteers and civic organisations to develop and disseminate knowledge. This is linked to an (inter)national network of creative actors, including creative entrepreneurs and festival (ex) volunteers who help to focus attention on the event. The combination of the locally embedded network and an extensive international network are key to the development of the festival as a knowledge hub. In the analysis of such knowledge-based festivals, it is important to shift our focus from events as a happening at a specific moment in time, to their more permanent role as a creative hub embedded in a regional context.
LINK
We present a novel architecture for an AI system that allows a priori knowledge to combine with deep learning. In traditional neural networks, all available data is pooled at the input layer. Our alternative neural network is constructed so that partial representations (invariants) are learned in the intermediate layers, which can then be combined with a priori knowledge or with other predictive analyses of the same data. This leads to smaller training datasets due to more efficient learning. In addition, because this architecture allows inclusion of a priori knowledge and interpretable predictive models, the interpretability of the entire system increases while the data can still be used in a black box neural network. Our system makes use of networks of neurons rather than single neurons to enable the representation of approximations (invariants) of the output.
LINK
This paper reports on a multiple-case study of five participants in a school-university research network in a Dutch master's program. Outcomes indicate that use of existing network structures in master's programs is complex, but could be a promising avenue for creating succesful school-university networks.
LINK
Presentation by Rutger Leukfeldt on Financially motivated cybercriminal networks, during workshop on Cybercrime Offenders. Cybercrime perpetrators are as diverse and complex as the cybercrime that they commit. For example, they come from different backgrounds and have different (egotistical, technical, monetary, ideological, political, professional, vengeful, sexual or other) motivations. They may or may not be professional criminals, and individuals or part of organised groups or networks (example of Advanced Persistent Threats). Some may commit crime on their own account or make their services available to others, and some may be supported by or be state actors. A better understanding of the types of perpetrators and their motivations and techniques can be instrumental for the prevention of cybercrime and for a more effective criminal justice response. The aim of this workshop is to contribute to such a better understanding and to initiate steps towards a typology of offenders.
DOCUMENT