2021 International Conference on Advanced Computer Science and Information Systems (ICACSIS) 2021
DOI: 10.1109/icacsis53237.2021.9631327
|View full text |Cite
|
Sign up to set email alerts
|

Knowledge Sharing System Development: A Systematic Literature Review

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 29 publications
0
3
0
Order By: Relevance
“…Effective online socialization for tacit knowledge sharing includes discussion, chat, face‐to‐face learning, and meetings 33 . A negative example of socialization for knowledge sharing is the alert system in EHR.…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…Effective online socialization for tacit knowledge sharing includes discussion, chat, face‐to‐face learning, and meetings 33 . A negative example of socialization for knowledge sharing is the alert system in EHR.…”
Section: Resultsmentioning
confidence: 99%
“…32 Effective online socialization for tacit knowledge sharing includes discussion, chat, face-to-face learning, and meetings. 33 A negative example of socialization for knowledge sharing is the alert system in EHR. It is commonly used as a reminder for nurses to receive the clinical decision changes based on the data in EHR.…”
Section: Socialmentioning
confidence: 99%
“…Preserving information security during the implementation stage of the software development life cycle (SDLC) process requires the adhesion to a series of strategic steps [1], [8], [10]- [18], [42], [48], [50],: Establish security requirements: Right at the commencement of the implementation stage, a pivotal step is to define the software's security requirements. Integration of these requirements into design and development processes is essential to establish a strong foundation for security [16].…”
Section: What Is Required To Protect Information Security During the ...mentioning
confidence: 99%