skip to main content
article

24-hour knowledge factory: Using Internet technology to leverage spatial and temporal separations

Published: 01 August 2007 Publication History

Abstract

Several of the outsourcing endeavors of today will gradually converge to a hybrid outsourcing model that will involve a team spread across three or more strategically-located centers interconnected by Internet technology. White-collar professionals in the US, Australia, and Poland, for example, could each work on a standard 9--5 basis, transfer the activity to a colleague in the next center, thereby enabling work to be performed on a round-the-clock basis. The effective use of sequential workers in such a 24-hour knowledge factory requires that professional tasks be broken down to the level where individuals can work on them with minimal interaction with their peers, and where new approaches can be employed to reduce the effort involved in transitioning from one employee to the next. This article describes an Internet-based prototype system that uses a Web-based interactive approach, coupled with a unique data model, to optimize collection and storage of design rationale and history from stakeholders and workers. The idea of multiple individuals acting as one “composite persona” is explored in the context of facilitating tasks and knowledge to be shared across the Internet in a seamless manner. The article also describes related activities in the commercial arena.

References

[1]
Aron, R. and Singh, J. 2004. IT enabled strategic outsourcing: Knowledge intensive firms, information work and the extended organizational form. Tech. Rep., The Wharton School, University of Pennsylvania.
[2]
Bartmess, A. and Cerny, K. Winter 1993. Building competitive advantage through a global network of competencies. CA. Manag. Rev. 78--103.
[3]
Battin, R. D., Crocker, R., Kreidler, J., and Subramanian, K. 2001. Leveraging resources in global software development. IEEE Software.
[4]
Beck, K. 2000. Extreme Programming Explained: Embrace Change. Addison Wesley.
[5]
Berger, S. 2005. How We Compete. DoubleDay.
[6]
Blaxill, M. and Hout, T. 1991. The fallacy of the overhead quick fix. Harv. Bus. Rev., 93--101.
[7]
Bohanec, M. and Zupan, B. 2004. A function-decomposition method for development of hierarchical decision models. Decis. Sup. Syst. 36, 3, 215--233.
[8]
Boneh, D., Ding, X., and Tsudik, G. 2004. Fine-grained control of security capabilities. ACM Trans. Inter. Tech. 4, 1, 60--82.
[9]
Brice, A. and Johns, B. 1998. Improving process design by improving the design process. A DRAMA White Paper. QuantiSci.
[10]
Carmel, E. and Agarwal, R. 2002. The maturation of offshore sourcing of information technology work. MIS Quart. Exec.
[11]
Cederqvist, P. et al. 2005. Version Management with CVS for CVS 1.12.12. Free Software Foundation, Inc.
[12]
Champy, J. 2003. Is technology delivering on its productivity promise? Finan. Exec., 34--39.
[13]
Chaczko, Z., Klempous, R., Nikodem, J., and Rozenblit, J. 2006. 24/7 Software development in virtual student exchange groups: Redefining the work and study week. ITHET 7th Annual International Conference. Sydney, Australia.
[14]
Denny, N. 2006. The nexus of entrepreneurship and technology (NEXT) initiative tech. Rep. # 20060810, Eller College of Management, University of Arizona.
[15]
Diffie, W. and Hellman, M. E. 1976. New Directions in Cryptography. IEEE Trans. Info. Theorm, 644--654.
[16]
Evaristo, R. J. and Scudder, R. 2000. Distributed project teams: A dimensional analysis. In Proceedings of the 33rd Hawaii International Conference on System Sciences. Geographically, 1--11.
[17]
Fertig, S., Freeman, E., and Gelernter, D. 1996. Lifestreams: an alternative to desktop metaphor. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. 410--411.
[18]
Funk, J. L. 1997. Concurrent engineering and the underlying structure of the design problem. IEEE Trans. Engin. Manage. 44, 3, 305--315.
[19]
Fielding, R., Gettys, J., Mogul, J., Frystyk, H., and Berners-Lee, T. 1997. Hypertext Transfer Protocol---HTTP1.1. RFC 2068, Internet Engineering Task Force.
[20]
Gao, J. Z., Chen, C., Toyoshimo, Y., and Leung, D. K. 1999. Engineering on the Internet for global software production. IEEE Comput. 33, 10, 38--47.
[21]
Grune, D. 1986. Concurrent versions system, a method for independent cooperation. The Netherlands. Tech. Rep. IR 113. Vrije Universiteit. Amsterdam, 9.
[22]
Gupta, A. 2001. A four-faceted knowledge based approach to surmounting national and other borders. J. Knowl. Manag. 5, 4.
[23]
Gupta, A., Denny, N., and Seshasai-Eds, S. 2007. Special issue on offshoring and outsourcing. J Electr. Commer. Organiz. 5, 2.
[24]
Hickman, K. 1995. The SSL Protocol. Netscape Communications Corp.
[25]
Hill, C., Yates, R., Jones, C., and Kogan, S. 2006. Beyond predictable workflows: Enhancing productivity in artful business processes. IBM Syst. J. 45, (4).
[26]
Humphrey, W. S. 1995. Introducing the personal software process. Ann. Softw. Engin. 1.
[27]
Kaptelinin. 2003. UMEA: Translating interaction histories into project contents. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. 353--360.
[28]
Keller, K. R., Schauer, R., Robitaille, S., and Page, P. 1999. Pattern-based reverse-engineering of design components. In Proceedings of the IEEE 21st International Conference on Software Engineering. 226--235.
[29]
Klensin, J. 2001. Simple mail transfer protocol. RFC 2821.
[30]
Lacity, M., Willcocks, D., and Feeny, D. 1995. IT outsourcing: maximize flexibility and control. Harv. Busi. Rev. 84--93.
[31]
Lei, D. and Slocum, J. 1992. Global strategy, competence building and strategic alliances. CA. Manage. Rev. 81--97.
[32]
MacCormack, A., Newman, L., and Rosenfeld, D. 1994. The new dynamics of global manufacturing site location. Sloan Manag. Rev. 69--80.
[33]
Mitra, A. and Gupta, A. 2006. Agile Systems with Reusable Patterns of Business Knowledge a Component Based Approach. Artech House Press.
[34]
Myers, J. and Rose, M. 1996. Post Office Protocol---Version 3, STD 53, RFC 1939.
[35]
National Institute of Science and Technology. FIPS PUB 180-2, 2002. Secure Hash Standard (SHS).
[36]
National Institute of Science and Technology. FIPS PUB 197, 2001. Advanced Encryption Standard (AES).
[37]
National Institute of Standards and Technology. FIPS PUBS 46-3, 1999. Data encryption standard (DES).
[38]
Orlikowski, W. and Yates, J. 2002. It's about time: temporal structuring in organizations. Organiz. Sci. 13, 6. 684--700.
[39]
Pena-Mora, F., Sriram, R., and Logcher, R. 1995. Conflict mitigation system for collaborative engineering. In Artificial Intelligence in Engineering Design, Analysis and Manufacturing. 101--124.
[40]
Pisano, G. and Wheelwright, S. 1995. The new logic of high tech R&D. Harv. Bus. Rev. 93--105.
[41]
Powell, W. 1998. Learning from collaboration: Knowledge and networks in the biotechnology and pharmaceutical industries. CA. Manag. Rev., 228--240.
[42]
QuestMap 2000 v3.12 The Soft Bicycle Company.
[43]
Quinn, J. 1999. Strategic outsourcing---leveraging knowledge capabilities. Sloan Manag. Rev.
[44]
Rekimoto, J. 1999. TimeScape: A time machine for desktop environment. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. 45--54.
[45]
Sambamurthy, V., Bharadwhaj, A., and Grover, V. 2003. Shaping agility through digital options: Reconceptualizing the role of information technology in contemporary firms. MIS Quar. 27, 2, 237--263.
[46]
Seitz, M. and Peattie, K. 2004. Meeting the closed-loop challenge. CA. Manag. Rev. 74--89.
[47]
Seshasai, S. and Gupta, A. 2004. A knowledge-based approach to engineering design. AIAA J. Spacecrafts Rockets, 41, 1.
[48]
Stallings, W. 2000. Cryptography and Network Security: Principles and Practice, 4th Ed. (Chapters 1 to 13, and 16). Prentice Hall.
[49]
Seshu, R. and Denny, N. 2007. The nexus of entrepreneurship and technology (NEXT) initiative tech. rep. # 20070220, Eller College of Management, University of Arizona.
[50]
Schwaber, K. and Beedle, M. 2002. Agile Software Development with Scrum. (Series in agile software development.) Upper Saddle: Prentice Hall.
[51]
Sriram, D., Logcher, R. D., Groleau, N., and Cherneff, J. 1992. DICE: Object oriented programming environment for cooperative engineering design. In Artificial Intelligence in Engineering Design (Vol. III): Knowledge Acquisition, Commercial Systems, and Integrated Environments. Academic Press, San Diego, CA. 303--366.
[52]
Tan, G., Hayes, C., and Shaw, M. 1991. An Intelligent agent framework for concurrent product design and planning. IEEE Trans. Engin. Manag. 43, 3.
[53]
Tridgell, A. 2000. The RSYNC algorithm. Ottawa Linux Symposium, Canada.
[54]
Wharton. 2005. How some BPO providers seek to build and protect their turf. knowledge. Wharton Research Report.
[55]
Wharton. 2006. Realizing the Indian dream. 11th Wharton India Economic Forum.
[56]
Whitehead, E. J. 1997. World Wide Web distributed authoring and versioning (WebDAV): An introduction. StandardView 5, 1, 3--8.
[57]
Wu, J., Doong, H., Lee, C., Hisa, T., and Liang, T. 2004. A methodology for designing form-based decision support systems. Decis. Supp. Syst. 36, 3, 313--335.
[58]
Yap, M. 2005. Follow the sun: Distributed extreme programming development. Agile Development Conference (ADC'05). 218--224.

Cited By

View all
  • (2023)Brain Tumor Detection with Ensemble of Convolutional Neural Networks and Vision Transformer2023 2nd International Engineering Conference on Electrical, Energy, and Artificial Intelligence (EICEEAI)10.1109/EICEEAI60672.2023.10590129(1-6)Online publication date: 27-Dec-2023
  • (2022)Intelligent Deep Fusion Network for Anomaly Identification in Maritime Transportation SystemsIEEE Transactions on Intelligent Transportation Systems10.1109/TITS.2022.3151490(1-9)Online publication date: 2022
  • (2022)Intelligent deep fusion network for urban traffic flow anomaly identificationComputer Communications10.1016/j.comcom.2022.03.021189:C(175-181)Online publication date: 1-May-2022
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Transactions on Internet Technology
ACM Transactions on Internet Technology  Volume 7, Issue 3
Special Issue on the Internet and Outsourcing
August 2007
97 pages
ISSN:1533-5399
EISSN:1557-6051
DOI:10.1145/1275505
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 August 2007
Published in TOIT Volume 7, Issue 3

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Knowledge management
  2. geographic boundaries
  3. global teams
  4. knowledge sharing
  5. outsourcing
  6. temporal boundaries

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)36
  • Downloads (Last 6 weeks)3
Reflects downloads up to 03 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2023)Brain Tumor Detection with Ensemble of Convolutional Neural Networks and Vision Transformer2023 2nd International Engineering Conference on Electrical, Energy, and Artificial Intelligence (EICEEAI)10.1109/EICEEAI60672.2023.10590129(1-6)Online publication date: 27-Dec-2023
  • (2022)Intelligent Deep Fusion Network for Anomaly Identification in Maritime Transportation SystemsIEEE Transactions on Intelligent Transportation Systems10.1109/TITS.2022.3151490(1-9)Online publication date: 2022
  • (2022)Intelligent deep fusion network for urban traffic flow anomaly identificationComputer Communications10.1016/j.comcom.2022.03.021189:C(175-181)Online publication date: 1-May-2022
  • (2020)Time Zone Differences, Service Trade and Implications for Factor PricesVirtual Trade and Comparative Advantage10.1007/978-981-15-3906-0_10(139-154)Online publication date: 10-Apr-2020
  • (2019)Studies on Time Zones and International Trade:An Introductory OverviewThe International Economy10.5652/internationaleconomy.ie2019.01.nnOnline publication date: 2019
  • (2019)Time Zone Differences and Service TradeDigitalisation and Development10.1007/978-981-13-9996-1_7(183-197)Online publication date: 4-Dec-2019
  • (2014)E-Mentoring in Global Software Development TeamsSoftware Design and Development10.4018/978-1-4666-4301-7.ch075(1534-1549)Online publication date: 2014
  • (2014)Social Knowledge EnvironmentsBusiness & Information Systems Engineering10.1007/s12599-014-0318-46:2(81-88)Online publication date: 20-Feb-2014
  • (2014)Soziale WissensumgebungenSocial Knowledge EnvironmentsWIRTSCHAFTSINFORMATIK10.1007/s11576-014-0409-356:2(91-100)Online publication date: 20-Feb-2014
  • (2013)E-Mentoring in Global Software Development TeamsMulticulturalism in Technology-Based Education10.4018/978-1-4666-2101-5.ch010(160-175)Online publication date: 2013
  • Show More Cited By

View Options

Login options

Full Access

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media