Location

Hilton Waikoloa Village, Hawaii

Event Website

http://hicss.hawaii.edu/

Start Date

1-3-2018

End Date

1-6-2018

Description

Blockchains permit to store information in a tamper-resistant and irrevocable manner by reverting to distributed computing and cryptographic technologies. The primary purpose is to keep track of the ownership of tangible and intangible assets. In the paper at hand we apply these concepts and technologies to the domain of knowledge management. Based on the explication of knowledge in the form of enterprise models this permits the application of so-called knowledge proofs for a. enabling the transparent monitoring of knowledge evolution, b. tracking the provenance, ownership, and relationships of knowledge in an organization, c. establishing delegation schemes for knowledge management, and d. ensuring the existence of patterns in models via zero-knowledge proofs. To validate the technical feasibility of the approach a first technical implementation is described and applied to a fictitious use case.

Share

COinS
 
Jan 3rd, 12:00 AM Jan 6th, 12:00 AM

Knowledge Blockchains: Applying Blockchain Technologies to Enterprise Modeling

Hilton Waikoloa Village, Hawaii

Blockchains permit to store information in a tamper-resistant and irrevocable manner by reverting to distributed computing and cryptographic technologies. The primary purpose is to keep track of the ownership of tangible and intangible assets. In the paper at hand we apply these concepts and technologies to the domain of knowledge management. Based on the explication of knowledge in the form of enterprise models this permits the application of so-called knowledge proofs for a. enabling the transparent monitoring of knowledge evolution, b. tracking the provenance, ownership, and relationships of knowledge in an organization, c. establishing delegation schemes for knowledge management, and d. ensuring the existence of patterns in models via zero-knowledge proofs. To validate the technical feasibility of the approach a first technical implementation is described and applied to a fictitious use case.

http://aisel.aisnet.org/hicss-51/ks/ks_creation/3