International Transaction Journal of Engineering, Management, & Applied Sciences & Technologies


:: International Transaction Journal of Engineering, Management, & Applied Sciences & Technologies

ISSN 2228-9860
eISSN 1906-9642


Vol.13(2) (2022)

  • Strategies of Knowledge Management Techniques in Saudi Higher Education Institutions

    Hanaa Mohamed said (Department of Business Management Information System, College of Science and Humanities at Aalghat, Majmaah University, Al-Majmaah 11952, SAUDI ARABIA, and Faculty of Computing Science IT, Cairo, Egypt, Ahram Canadian University, 6 October, Cairo, EGYPT),
    Mona Gaber A. Abdel Hafez (Department of English, College of Science and Humanities at Aalghat, Majmaah University, Al-Majmaah 11952, SAUDI ARABIA, and Faculty of Islamic and Arabic Studies, Al Azhar University, Sohag, EGYPT),
    Rehab Farouk Elweza, (Department of English, College of Science and Humanities at Aalghat, Majmaah University, Al-Majmaah 11952, SAUDI ARABIA).

    Disciplinary: Knowledge Management.

    ➤ FullText

    doi: 10.14456/ITJEMAST.2022.27

    Keywords: higher education institutions; knowledge management techniques; artificial neural networks (ANN).

    Many technical means are used to transform organizational inputs into outputs that contribute to knowledge management and development. Technologies are the most important determinant of knowledge management. Institutions that employ technologies in the best way to manage knowledge will have the best ability to survive and continuity in light of the current competition in the knowledge services market. The use of knowledge management techniques works to collect, classify, store, communicate or share knowledge between people and institutions, as well as improving the ability of employees to communicate with each other because there are no barriers that exist due to place, time, and job level, in addition to providing more flexibility in knowledge sharing. In light of this, this study seeks to shed light on recent trends in employing knowledge management techniques in Saudi higher education institutions

    Paper ID: 13A2F

    Cite this article:

    Said, H. M., Hafez, M. G. A., Elweza, R. F. (2022). . Strategies of Knowledge Management Techniques in Saudi Higher Education InstitutionsInternational Transaction Journal of Engineering, Management, & Applied Sciences & Technologies, 13(2), 13A2F, 1-14. http://TUENGR.COM/V13/13A2F.pdf DOI: 10.14456/ITJEMAST.2022.27


  1. Agung, A. (2014). Knowledge Management System Readiness Analysis: Case Study at Human Resource Consulting Company. The 2nd International Conference on Technology, Informatics, Management, Engineering & Environment. Indonesia, Bandung, 201-205, Access date 2020
  2. AI-Alawi, A.& A1-Marzoogi, N. & Mohammad, Y. (2007). Organizational culture and knowledge sharing: critical success factors. Journal of Knowledge Management, 11(2), 22-42.
  3. Almalky, N. A. (2019). Knowledge Management in Human Resource in Oil Companies from Technologies Perspectives a Literature Review. International Journal of Engineering & Technology, 8(1), 136-143.
  4. Daft, R. (2006). Organization Theory and Design. Thomson Learning, South-Western, USA, 200p.
  5. Hashemi, Parvin (2018). Developing a domain ontology for knowledge management technologies. Online Information Review, 42(1), 28-44.
  6. Jabar, M., Alnatsha, A. (2014). Knowledge Management System Quality: A Survey of Knowledge Management System Quality Dimensions. Computer and Information Sciences (ICCOINS), 1-5.
  7. Malafsky, G. & Newman, B.D. (2004). Organizing Knowledge with Ontologies and Taxonomies. Fairfax, VA. 1-12.
  8. Malhotra, Y. (2004). Why Knowledge Management Systems Fail? - Enablers and Constraints of Knowledge Management in Human - Enterprises. American Society for Information Science and Technology Monograph Series, 87-112.
  9. Oseledchik, M. (2018). Using Social Networks in Knowledge Management - System. Social Science, Education and Humanities Research, 205, 911-914.
  10. O'Sullivan, K.J., & Azeem, S.W. (2007) An Analysis of Collaborative Group Structure Technological Facilitation from a Knowledge Management Perspective. Electronic Journal of Knowledge Management, 5(2), 223-230.
  11. Pulkkinen. J. (2008). Knowledge Management and Emerging Technologies. Discussion Paper for Train4Dev. KM subgroup, 1-5.
  12. Rexwhite, T. (2017). Information and communication technologies for knowledge management in academic libraries in Nigeria and South Africa. South African Journal of Information Management.
  13. Santoro, G. (2017). The Internet of Things: Building a knowledge management system for open innovation and knowledge management capacity. Technological Forecasting and Social Change.
  14. Turban, E. & Aronson, J. (1998). Decision Support Systems and Intelligent Systems. Prentice-Hall International, New Jersey, pp. 214-215.
  15. Young, R. (2010). Knowledge Management Tools and Techniques Manual. Japan: Asian Productivity Organization. 94p.
  16. Zawiyah, M.Y. (2014). Preliminary Overview of Data Mining Technology for Knowledge Management System in Institutions of Higher Learning. World Academy of Science, Engineering and Technology, 74, 80-85.
  17. Zyngier, S. (2014). The role of technology in Knowledge Management: trends in the Australian corporate Environment.
  18. Aggarwal, C. C., Yu, P. S. (1998). Online generation of association rules. In: Proceedings of the 14th International Conference on Data Engineering, Los Alamitos, Calif: IEEE Computer Society Press, 402-411.
  19. Agrawal, R., Srikant, R. (1994). Fast Algorithms for Mining Association Rules. In: Proceedings of the 20th International Conference on Very Large Databases, J. B. Bocca, M. Jarke, and C. Zaniolo, Eds., San Francisco: Morgan Kaufmann, 487-499.
  20. Agrawal, R., Srikant, R. (1995). Mining Sequential Patterns. In: Proceedings of the Eleventh International Conference on Data Engineering, Los Alamitos, Calif.: IEEE Computer Society Press, 3-14.
  21. Aitkin, M., Anderson, D., Francis, B., and Hinde, J. (1989). Statistical Modelling in GLIM. Oxford: Oxford Science Publications.
  22. Arya, S., and Mount, D. M. (1993). Algorithms for fast vector quantization. In: Proceedings of the Data Compression Conference 1993, 381-390.
  23. Biggs, D., B. de Ville, and E. Suen. (1991). A method of choosing multiway partitions for classification and decision trees. Journal of Applied Statistics, 18, 49-62.
  24. Bishop, C. M. (1995). Neural Networks for Pattern Recognition, 3rd ed. Oxford: Oxford UniversityPress.
  25. Box, G. E. P., and D. R. Cox. 1964. An analysis of transformations. Journal of the Royal Statistical Society, Series B, 26, 211-246.
  26. Breiman, L., J. H. Friedman, R. A. Olshen, and C. J. Stone.(1984). Classification and Regression Trees. New York: Chapman & Hall/CRC.
  27. Breslow, N. E. (1974). Covariance analysis of censored survival data. Biometrics, 30, 89-99.
  28. Brockwell, P. J., and R. A. Davis. (1991). Time Series: Theory and Methods. 2 Ed., Springer Verlag.
  29. Cain, K. C., and N. T. Lange. (1984). Approximate case influence for the proportional hazardsregression model With censored data. Biometrics, 40, 493-499.
  30. Cameron, A. C., and P. K. Trivedi. (1998). Regression Analysis of Count Data. Cambridge:Cambridge University Press.
  31. Chang, C. C., and C. J. Lin. (2003). LIBSVM: A library for support vector machines. Technical Report. Taipei, Taiwan: Department of Computer Science, National Taiwan University.
  32. Chow, C. K., and C. N. Liu. (1968). Approximating discrete probability distributions With Dependence trees. IEEE Transactions on Information Theory, 14, 462-467.
  33. van Wyk, K. R. (2007). Penetration Testing Tools. Software Engineering Institute, Carnegie
  34. Bishop, M. (2014). Introduction to Computer Security. European Journal of Computer Science and Information Technology, 2(4), 29-39.
  35. Bishop, M. (2014). About Penetration Testing. Security & Privacy, IEEE.
  36. Box, G. E. P., G. M. Jenkins, and G. C. Reinsel. (1994). Time series analysis: Forecasting and control. 3rd Ed. Englewood Cliffs, N.J.: Prentice Hall.

Other issues:


Call-for-Scientific Papers
Call-for-Research Papers:
ITJEMAST invites you to submit high quality papers for full peer-review and possible publication in areas pertaining engineering, science, management and technology, especially interdisciplinary/cross-disciplinary/multidisciplinary subjects.

To publish your work in the next available issue, your manuscripts together with copyright transfer document signed by all authors can be submitted via email to Editor @ (no space between). (please see all detail from Instructions for Authors)

Publication and peer-reviewed process:
After the peer-review process (4-10 weeks), articles will be on-line published in the available next issue. However, the International Transaction Journal of Engineering, Management, & Applied Sciences & Technologies cannot guarantee the exact publication time as the process may take longer time, subject to peer-review approval and adjustment of the submitted articles.