Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Chalee Vorakulpipat is active.

Publication


Featured researches published by Chalee Vorakulpipat.


Advanced Engineering Informatics | 2010

Generations of knowledge management in the architecture, engineering and construction industry: An evolutionary perspective

Yacine Rezgui; Christina J. Hopfe; Chalee Vorakulpipat

The paper provides a critical and evolutionary analysis of knowledge management (KM) in the AEC (architecture, engineering, construction) industry. It spans a large spectrum of KM research published in the management, information systems, and information technology (IT) disciplines. An interpretive (subjectivist) stance is adopted so as to provide a holistic understanding and interpretation of organizational KM practice, research and models. Three generations of KM are identified and discussed. To sum up, to be effective organizations need not only to negotiate their migration from a knowledge sharing (first generation) to a knowledge nurturing (second generation) culture, but also to create sustained organizational and societal values. The latter form the third generation of KM and represent key challenges faced by modern organizations in the AEC industry. An evolutionary KM framework is provided that presents the three proposed generations of KM in terms of three dimensions that factor in (a) the capability of individuals, teams and organizations in the sector, (b) ICT evolution and adoption patterns, and (c) construction management philosophies. The paper suggests that value creation (third generation KM) is grounded in the appropriate combination of human networks, social capital, intellectual capital, and technology assets, facilitated by a culture of change.


Journal of Knowledge Management | 2008

An evolutionary and interpretive perspective to knowledge management

Chalee Vorakulpipat; Yacine Rezgui

Purpose – The purpose of the paper is to provide a review of knowledge management (KM) literature by adapting and extending McElroy’s KM generations model. Design/methodology/approach – The paper draws from a range of KM research published in the academic and trade literature. An interpretive stance is adopted to provide a holistic understanding and interpretation of organizational KM research and related knowledge management systems (KMS) and models. Findings – To be effective organizations need not only to negotiate their migration from a knowledge sharing (first generation) to a knowledge creation (second generation) culture, but also to create sustained organizational and societal values. The latter form the third generation KM and represent key challenges faced by modern organizations. A true value creation culture is nurtured through a blended approach that factors a number of perspectives to KM, including human networks, social capital, intellectual capital, technology assets, and change processes. Research limitations/implications – The interpretive approach adopted throughout the review is limited to, and focused on, understanding the implementation and organizational implications of KM initiatives and technology. Originality/value – While value creation focuses on the organizational and societal impact of knowledge management, the paper describes how human networks, social capital, intellectual capital, technology assets, and change processes emerge as essential conditions to enable knowledge value creation.


Knowledge Engineering Review | 2008

Value creation: The future of knowledge management

Chalee Vorakulpipat; Yacine Rezgui

The paper provides a review of knowledge management (KM) literature with a focus on recent value creation trends of the KM discipline. The review spans a large spectrum of KM research ranging from the ‘soft’ (socio-organizational) to technical dimensions of KM, published in the academic and trade literature. An interpretive stance is adopted so as to provide a holistic understanding and interpretation of organizational KM research and models. Value creation is grounded in the appropriate combination of human network, social capital, intellectual capital, and technology assets, facilitated by a culture of change. It is argued that to be effective organizations need not only to negotiate their migration from a knowledge sharing to a knowledge creation culture, but also to create sustained organizational and societal values. The latter form the foundation of the proposed ‘knowledge value creation’ concept and represent key organizational and societal challenges faced by modern organizations.


international engineering management conference | 2006

From Knowledge Sharing to Value Creation: Three Generations of Knowledge Management

Chalee Vorakulpipat; Yacine Rezgui

This paper provides a review of knowledge management (KM) literature by adapting and extending McElroys [1] KM generations model. An interpretive stance is adopted so as to provide a holistic understanding and interpretation of organizational KM research and related Knowledge Management Systems (KMS) and models. It is argued that to be effective organizations need not only to negotiate their migration from a knowledge sharing (first generation) to a knowledge creation (second generation) culture, but also to create sustained organizational and societal values. The latter forms the third generation KM and represents key challenges faced by modern organizations.


international engineering management conference | 2006

A Review of Thai Knowledge Management Practices: An Empirical Study

Chalee Vorakulpipat; Yacine Rezgui

The objective of this empirical study is to review current knowledge management (KM) practices in Thailand, and in particular to explore the knowledge sharing maturity and capability of Thai organizations and their readiness to embrace a knowledge creation culture. The survey focuses on a number of organizations drawn from an established taxonomy of organizations in Thailand using the stratified random sampling technique. The results indicate that (a) there is an established knowledge sharing culture supported by a corporate KM strategy, amongst high-tech organizations, as well as a preparedness for change to migrate to a knowledge creation culture; (b) a number of international organizations exhibit ad-hoc knowledge sharing practices as well as a growing awareness about the value of knowledge sharing and what can be termed as intangible assets; (c) a clear lack of any knowledge-oriented practice within ministry and department of public sectors. This empirical study provides a foundation to further the research and develop a framework for Thai organizations that promotes adoption of knowledge sharing practices as well as the migration from a knowledge sharing to a knowledge creation model.


Iete Technical Review | 2014

A Privacy-Preserving Framework for Location-Based Service: A Review of Structural Design and Analysis

Songpon Teerakanok; Montida Pattaranantakul; Chalee Vorakulpipat; Sinchai Kamolphiwong; Siwaruk Siwamogsatham

ABSTRACT Traditional location tracking and positioning systems rely on the implicit assumption that users are willing to reveal their credentials or private location to an untrustworthy service provider; if a situation suddenly deteriorates, personal information can be intercepted and abused by adversary attacks. Addressing the need for location privacy is essential to preserve users’ credentials when they need to access location information from their service providers. Therefore, this review paper will address the phases of authentication and the querying process in location-based services (LBS). The first contribution is to rigorously investigate the mechanisms of location-based authentication and location-based personal identification in order to determine the level of trust for deciding whether traditional methods have provided a strong enough security structure to preserve privacy. The second contribution is to resolve the above privacy problems in the existing LBS systems. The idea of early intervention has brought a conceptual and practical framework into the field of preserving location-privacy-based anonymizer solutions. The framework has been designed based on a simple, centralized architecture, and integrated with two important techniques: location anonymity and encryption technology. In this paper, one-way hash function is applied as a means to create a fingerprint of a message that can be used for subscription or authentication services, and thus data integrity can be preserved. Location blurring (also known as the k-anonymity model) has also been proposed as an important factor in disguising user location when users need to interact with untrusted service providers. In the querying process, time-fuzzy logic is used to examine the degree of confidence whether the user is requesting the service under the right privileges. Finally, performance analysis regarding the derived framework of preserving location privacy is presented.


IFIP Working Conference on Open IT-Based Innovation: Moving Towards Cooperative IT Transfer and Knowledge Diffusion | 2008

Exploring the influence of collectiveness on value creation adoption in an information technology organization

Chalee Vorakulpipat; Yacine Rezgui

The objective of this empirical study is to explore the influence of socio-cultural factors, with a focus on collectiveness, on knowledge-value creation practices in a Thai information technology organization. The research adopts an interpretive stance and employs a case study approach involving multiple data collection methods. The paper is based on one author’s personal expertise and close involvement in the selected case study organization. Using a grounded theory research approach, the study indicates that while collectiveness is overall perceived as a positive Thai cultural feature, it critically influences (1) the social network ties and relationship between employees within and across teams, (2) the resulting level of trust, and (3) the ability to share and create knowledge effectively in the organizational socio-cultural environment. The study is limited to a Thai organization, but can be generalized to other organizations that exhibit similar characteristics. This empirical study provides a foundation to further the research and the validation of the summary of themes that emerged from this empirical study.


security of information and networks | 2014

Managing Mobile Device Security in Critical Infrastructure Sectors

Chalee Vorakulpipat; Chantri Polprasert; Siwaruk Siwamogsatham

Information security in critical infrastructure sectors has become a crucial issue in recent years. A drastic increase of mobile device usage for accessing to corporate networks could expose the critical systems to major security risks. The paper provides an overview of research and practice trends in mobile device security focusing on critical infrastructure. This includes access control, next-generation firewall, BYOD control mechanism, and BYOD management and policy. Confidentiality, integrity, and availability issues related on the research and practice trends are discussed, followed by the conclusion.


Springer Topics in Signal Processing | 2017

Natural Language Watermarking

Mohammad Ali Nematollahi; Chalee Vorakulpipat; Hamurabi Gamboa Rosales

Nowadays, a mass traffic of Internet is occupied by text data transactions. Because text data is widely distributed, searched, and reused in various applications, it is essential to control the copyright over text as well as other forms of data including video, image, and audio. Semantic and syntactic structures of text are good candidates for embedding watermarks.


Security and Communication Networks | 2017

Optimization of a Blind Speech Watermarking Technique against Amplitude Scaling

Mohammad Ali Nematollahi; Chalee Vorakulpipat; Hamurabi Gamboa Rosales

This paper presents a gain invariant speech watermarking technique based on quantization of the Lp-norm. In this scheme, first, the original speech signal is divided into different frames. Second, each frame is divided into two vectors based on odd and even indices. Third, quantization index modulation (QIM) is used to embed the watermark bits into the ratio of the Lp-norm between the odd and even indices. Finally, the Lagrange optimization technique is applied to minimize the embedding distortion. By applying a statistical analytical approach, the embedding distortion and error probability are estimated. Experimental results not only confirm the accuracy of the driven statistical analytical approach but also prove the robustness of the proposed technique against common signal processing attacks.

Collaboration


Dive into the Chalee Vorakulpipat's collaboration.

Top Co-Authors

Avatar

Hamurabi Gamboa Rosales

Autonomous University of Zacatecas

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Sinchai Kamolphiwong

Prince of Songkla University

View shared research outputs
Top Co-Authors

Avatar

Songpon Teerakanok

Prince of Songkla University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Chantri Polprasert

Srinakharinwirot University

View shared research outputs
Researchain Logo
Decentralizing Knowledge