Wednesday, July 17, 2019
Mobile Knowledge Management: Systems and Policies
The terms familiarity and acquaintance worry be such blanket(a) topics that thither have zero(prenominal) gross definitions. experience is something that is believed and reli sufficient, as distinguished from study which is a set of entropy coherent in meaningful patterns. Knowledge is culture combined with experience, and reflection, integrating thinking and feeling.Knowledge counselling refers to a set of practices to get under ones skin and disseminate know-how among organizations around the world (Denning, 1998) for re usage, learning and creating aw atomic deed 18ness across organizations (Wikipedia) . It is easier and faster to deepen information than association from one psyche to another.(Denning, 1998). Among the benefits of experience management practices are change magnitude ability to capture knowledge from right(prenominal) organization and mix in knowledge from departments deep down the organization better skills and knowledge of workers incre ase ability to adapt services to clients specify and provide new services to clients improved worker efficiency and productiveness alleviate the impacts of worker departures (Pratt, 2006).Knowledge management specially semantic web documents has been applied in integrating ecoinformatics resources and environmental selective information (Parr, et al., 2006). This was by means of with(p) using the tool ELVIS (Eco corpse arrangement Visualization and training System) to construct nutriment webs (Parr, et al., 2006). Other applications were in selective information reckoner memory of student entropy in high grooming (Palmer, 2006) and knowledge management name team-based engineering (Reiner, 2006). The latter demonstrated the use of function history as a source of insight for team design process. It proposed a simulateing manikin for cooperative and distri unlessed knowledge management for design teams (Reiner, 2006)Advances in computer and information technologies h ave greatly enhanced knowledge management. Palmer (2006) employed electronic mail and the web to get participants to entry a questionnaire on improving data feature in a data warehousing in a higher education setting . The use of metadata and end- exploiter involvement were positively correlated with obtaining high-quality data in data warehousing.Today, mobility and transportability are the emerging as pregnant considerations for sharing information and knowledge. With fluid phones and hold computers using radio receiver technologies, people are no longer tied voltaic pile to work in a corporeal function with rigid working hours but foundation do things in the quilt of their homes or elsewhere in a virtual component part.With the ease of sharing knowledge, abuses and encroachment of intellectual properties were likewise made easier. Regulations within the organization and the national political sympathies in general are essential to apology the companies against these potential abuses. Policies are also needed for credentials measure and privacy and deal look on the success or failure of a web service (Bonatti, et al. 2006).Roman et al. (2006) proposed a combined WSMO ( sack Service molding Ontology) and WS-policy framework consisting of a set of specifications with heavy industrial backing. This framework combines a conceptual model (Web Service Modeling Ontology), a perfunctory syntax and language (Web Service Modeling Language) and an execution environment (Web Service deed Environment) (Roman et al., 2006).2. Complete Problem Statement and lastThe trend in knowledge management is headed towards the alike(p) direction as nomadic entertainment. Entertainment equipment has gone down to the surface of the i-pod and portability of the DVD complete with picayune screens and get remains. Although some of the features of the big schema are conveniently packed into the miniature scheme, there give always be a trade-off between t he capabilities of the big system and the portable miserable system.This proposed inquiry bequeath look at the plight of the small system, the size of the planetary phone or hand-held computers that rely on tuner technology. The goals are to optimize its use for the distinct knowledge management processes, and identify policies to apology its misuse especially the threat on knowledge security of the organization. The goals go forth be measured in terms of the figure of speech of process that the handheld devices can deal compare with the forces computer, tot up of multiplication communications division and their causes, frequency of security breakdown by the use of the wandering devices.Research questionTo what extent pass on winding systems, the size of active phones and hand-held calculators, be utilized in knowledge management?HypothesesDownsizing/outsourcing leave behind be the trend in business which entrust require quick systems for communication and knowle dge management. Mobile systems ordain become more sophisticated and powerful to be able to perform tasks that are currently by means of by bigger systems. Security systems of troupe knowledge (data) go forth evolve along with the development of mobile systems 3. Relevance and logical implicationto a greater extent and more companies continue to set up in wireless e-mail, personal productivity applications, inventory management and sales automation. More than half of 250 IT executives surveyed in October 2003 recognize the wideness of wireless technologies in their organizations overall goals and improve user enjoyment (Ware, 2004). Most common wireless devices take a combination of mobile phones (with or without web browsers/e-mail), laptop computers with wireless modem and arrangers with wireless connectivity and pocket PCs (Ware, 2004).Among the different wireless applications that companies leave continue to support in the future, email access tops the list followed by calendar/scheduling, web access, personal productivity (word processing, spreadsheets, presentation softwares), text messaging, real succession inventory management, factory floor, transactions, global location system (GPS), human resources, finance/accounting, decision support, CRM, sales automation, wireless e-commerce, and procurement (Ware, 2004).boilersuit 60% of those surveyed were positive that their wireless enthronement already paid for itself (Ware, 2004). The greatest benefits came from increase productivity, streamlined processes/greater efficiencies and improved user satisfaction (Ware, 2004). The challenges to wireless technologies are security, user support, privacy and budget restrictions (Ware, 2004).Downsizing can cut down the cost of doing knowledge management. Downsizing can be by with(p) through physical reduction in the size of the hardware (equipment), software that can be run on a hand-held computer or mobile phone set, or a interlockinging system whereby the host computer does the data analysis and the final results downloadable to the mobile phones. Government and social club policies are needed to safeguard against misuse, industrial espionage and other information security issues.4. fireFor Hypothesis nary(prenominal) 1This provide be a time serial analysis, with years as in reliant variable, and numbers pool of companies undergoing downsizing/outsourcing and mobile devices as unfree variables.A survey provide be done on the meshing and from create news reports such as CIO Reports regarding number of businesses which had undergone downsizing or outsourcing of their operations, during the past decade. This go away be correlated with the number of mobile devices used by different companies during the same period. The time series plot of the data will show the trends in downsizing and/or outsourcing and number of mobile devices through the years. The years will be the separatist variable while the number of co mpanies and mobile devices will be the unfree variables. A correlation between the two dependent variables will be made. A portentous positive correlation and increase trends in the graphs will support Hypothesis No.1.For Hypotheses No. 2 and 3This study will identify two companies of different sizes (large and small in terms of facilities, number of staff, example and volume of business) that have a host computer, a local area network (either wired or WIFI) and broadband network access, and staff who have their own or office-issued hand-held computers or mobile phones with wireless internet capabilities through the years.Questionnaires will be prepared and divulge management officers and office staff will be questioned. Information to be gathered will implicate the company profile, the knowledge management system in place including softwares and consulting firms, knowledge management applications most frequently used, access security levels issued to different classes of off ice staff.The staff will be asked to enumerate the processes they could do or would want to do using their mobile units, from simple text messaging to internet browsing that help in the overall decision-making process in the company.The capabilities of their host computer will be tabulated side by side with the capabilities of their most common mobile device (brand, model, year acquired). Capabilities will be measured in terms of easy memory and the number of tasks the device is capable of performing. This is again a time series data with year as self-employed person variable and the number of features or tasks performed by the host computer and the mobile systems will be the dependent variables. If hypothesis no. 2 is correct we would expect an increasing number of tasks that can be performed by the mobile system.For hypothesis No. 3, the dependent variable will the frequency of data security breakdowns and the independent variable will the years the company has been in operation . another(prenominal) indicator will be the number of regulations formulated to mark off security problems (dependent variable) through the years. Company management will be asked regarding existing company policies, code of ethics, data security and standard operational procedures through the years from the time the company was established.They will be asked how frequent did they suffer breakdown in data security through their mobile devices through the years. They will also be asked to comment on the deification design for their computer hardwares and softwares and features for the mobile equipment. They will also be asked to comment of what kinds of government support and regulations are needed to curb piracy and infringement of their intellectual properties.This research will need the following resources interviewers to interview at least three key company officers, two staff per office department (e.g. human resources, procurement, marketing, operations, etc.) a knowledge man agement or IT specialist to label knowledge management software system and how the ordinary staff can access to it using their mobile equipment.ReferencesBonatti, P.A., Ding, L., Finin, T. and Olmedilla, D. 2006. legal proceeding of the second multinational semantic Web indemnity Workshop (SWPW06). 5th International Semantic Web Conference (ISWC). Athens, Georgia, USA. Nov. 5, 2006.Denning, S. What is knowledge management? Background paper to the World festering Report 1998. from Palmer, H. 2006. A data warehouse methodology and model for student data in higher education. PhD dissertation. Nova Southeastern University. UMI build 3218332. 202pp. Parr, C.S., Parafiynyk, A., Sachs, J., Pan, R., Han, L., Ding, L., Finin, T., Wang, D. 2006. Using the semantic web to integrate ecoinformatics resources. American Association for Artficial Intelligence (www.aaai.org). Reiner, K.A. 2006. A framework for knowledge capture and a study of development metrics in collaborative engineering de sign. PhD Dissertation. Stanford University. UMI Microform 3219361. 258 p. Roman, D., Kopecky, J., Toma, I. and Fensel, D. 2006. Aligning WSMO and WS-Policy. Proceedings of the 2nd International Semantic Web Policy Workshop (SWPW06). 5th International Semantic Web Conference (ISWC). Athens, Georgia, USA. Nov. 5, 2006. Ware, L.C. 2004. The rejoinder of wireless IT investments. CIO Research Reports. FromWikipedia. Knowledge management. Fromhttp//en.wikipedia.org/wiki/Knowledge_management
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.