Tuesday, March 5, 2019

Mobile Knowledge Management: Systems and Policies

The terms friendship and companionship management be such broad topics that there gain zero(prenominal)common definitions. fellowship is or sothing that is believed and reliable, as distinguished from entropy which is a set of information arranged in meaningful patterns. acquaintance is information combined with experience, and reflection, integrating thought process and feeling.Knowledge management refers to a set of practices to capture and disseminate know-how among organizations somewhat the world (Denning, 1998) for reuse, learning and creating awargonness across organizations (Wikipedia) . It is easier and faster to transfer information than knowledge from one individual to another.(Denning, 1998). Among the benefits of knowledge management practices are change magnitude ability to capture knowledge from out incline organization and integrate knowledge from departments within the organization improved skills and knowledge of role players increased ability to adapt services to clients define and provide new services to clients improved worker efficiency and productivity alleviated the impacts of worker departures (Pratt, 2006).Knowledge management especially semantic web documents has been applied in integrating ecoinformatics resources and environmental information (Parr, et al., 2006). This was done using the tool ELVIS (Ecosystem Location Visualization and tuition System) to construct food webs (Parr, et al., 2006). Other applications were in data warehousing of schoolchild data in higher education (Palmer, 2006) and knowledge management frame team-based engineering (Reiner, 2006). The latter demonstrated the use of design history as a source of insight for team design process. It proposed a modelling framework for collaborative and distributed knowledge management for design teams (Reiner, 2006)Advances in estimator and information technologies have greatly enhanced knowledge management. Palmer (2006) employed netmail and the web to get participants to access a questionnaire on improving data quality in a data warehousing in a higher education setting . The use of metadata and end-substance abuser involvement were imperiously match with obtaining high-quality data in data warehousing.Today, mobility and transportability are the emerging as grand considerations for sharing information and knowledge. With ready phones and hand-held computers using wireless technologies, mess are no longer tied down to work in a sensible great power with rigid working hours but croup do things in the comfort of their homes or elsewhere in a virtual office.With the ease of sharing knowledge, abuses and infringement of intellectual properties were also make easier. Regulations within the organization and the national government in general are need to safeguard the companies against these potential abuses. Policies are also needed for auspices system and privacy and can determine the success or failure of a web ser vice (Bonatti, et al. 2006).Roman et al. (2006) proposed a combined WSMO (Web Service casting Ontology) and WS-policy framework consisting of a set of specifications with heavy industrial backing. This framework combines a conceptual model (Web Service Modeling Ontology), a formal phrase structure and language (Web Service Modeling Language) and an execution environment (Web Service exploit Environment) (Roman et al., 2006).2. Complete Problem Statement and GoalThe geld in knowledge management is headed towards the same direction as vigorous entertainment. Entertainment equipment has deceased down to the size of the i-pod and portability of the DVD complete with small screens and sound system. Although some of the features of the outstanding system are conveniently packed into the miniature system, there go forth always be a trade-off between the capabilities of the big system and the portable small system.This proposed research exit look at the plight of the small system, the size of the mobile phone or hand-held computers that rely on wireless technology. The goals are to optimize its use for the unalike knowledge management processes, and locate policies to safeguard its misuse especially the terror on knowledge security of the organization. The goals forget be measured in terms of the deed of process that the handheld cunnings can handle par with the phalanx computer, tot up of quantifys communications breakdown and their causes, frequency of security breakdown by the use of the mobile devices.Research questionTo what accomplishment will mobile systems, the size of mobile phones and hand-held calculators, be utilised in knowledge management?HypothesesDownsizing/outsourcing will be the trend in business which will require mobile systems for communication and knowledge management. Mobile systems will become more sophisticated and powerful to be able to perform tasks that are currently done by large systems. Security systems of company k nowledge (data) will evolve along with the increment of mobile systems 3. Relevance and significanceMore and more companies continue to drop in wireless e-mail, personal productivity applications, inventory management and sales automation. More than half of 250 IT executives surveyed in October 2003 recognize the importance of wireless technologies in their organizations overall goals and improve user satisfaction (Ware, 2004). some common wireless devices include a combination of mobile phones (with or without web browsers/email), laptop computers with wireless modem and PDAs with wireless connectivity and bulge PCs (Ware, 2004).Among the opposite wireless applications that companies will continue to reliever in the future, email access tops the list followed by schedule/scheduling, web access, personal productivity (word processing, spreadsheets, presentation softwares), text pass on, real time inventory management, factory floor, transactions, global positioning system ( GPS), human resources, pay/accounting, decision relief, CRM, sales automation, wireless e-commerce, and procurement (Ware, 2004).Overall 60% of those surveyed were positive that their wireless investment already paid for itself (Ware, 2004). The greatest benefits came from increased productivity, silken processes/greater efficiencies and improved user satisfaction (Ware, 2004). The challenges to wireless technologies are security, user support, privacy and budget restrictions (Ware, 2004).Downsizing can cut down the damage of doing knowledge management. Downsizing can be done through physical reduction in the size of the hardware (equipment), software that can be run on a hand-held computer or mobile phone set, or a networking system whereby the host computer does the data analysis and the final results downloadable to the mobile phones. Government and company policies are needed to safeguard against misuse, industrial espionage and other information security issues.4. ApproachF or guesswork No. 1This will be a time series analysis, with divisions as independent inconstant, and numbers of companies undergoing curtailment/outsourcing and mobile devices as dependent variables.A survey will be done on the lucre and from published news reports such as CIO Reports regarding number of businesses which had undergone downsizing or outsourcing of their operations, during the past decade. This will be correlated with the number of mobile devices used by different companies during the same period. The time series dapple of the data will show the trends in downsizing and/or outsourcing and number of mobile devices through the historic period. The years will be the independent variable while the number of companies and mobile devices will be the dependent variables. A correlation between the two dependent variables will be made. A significant positive correlation and increasing trends in the graphs will support Hypothesis No.1.For Hypotheses No. 2 and 3This study will identify two companies of different sizes (large and small in terms of facilities, number of faculty, display case and volume of business) that have a host computer, a local bowl network (either wired or WIFI) and broadband internet access, and staff who have their own or office-issued hand-held computers or mobile phones with wireless internet capabilities through the years.Questionnaires will be prepared and key management officers and office staff will be referenceed. Information to be gathered will include the company profile, the knowledge management system in pasture including softwares and consulting firms, knowledge management applications most frequently used, access security levels issued to different classes of office staff.The staff will be asked to enumerate the processes they could do or would want to do using their mobile units, from simple text messaging to internet browsing that help in the overall decision-making process in the company.The capabilities o f their host computer will be tabulated side by side with the capabilities of their most common mobile device (brand, model, year acquired). Capabilities will be measured in terms of available memory and the number of tasks the device is capable of performing. This is again a time series data with year as independent variable and the number of features or tasks performed by the host computer and the mobile systems will be the dependent variables. If hypothesis no. 2 is correct we would expect an increasing number of tasks that can be performed by the mobile system.For hypothesis No. 3, the dependent variable will the frequency of data security breakdowns and the independent variable will the years the company has been in operation. Another indicator will be the number of regulations formulated to curb security problems (dependent variable) through the years. Company management will be asked regarding existing company policies, code of ethics, data security and stock operational pro cedures through the years from the time the company was established.They will be asked how frequent did they suffer breakdown in data security through their mobile devices through the years. They will also be asked to comment on the ideal design for their computer hardwares and softwares and features for the mobile equipment. They will also be asked to comment of what kinds of government support and regulations are needed to curb plagiarization and infringement of their intellectual properties.This research will need the following resources interviewers to interview at least three key company officers, two staff per office department (e.g. human resources, procurement, marketing, operations, etc.) a knowledge management or IT specialist to evaluate knowledge management software system and how the usual staff can access to it using their mobile equipment.ReferencesBonatti, P.A., Ding, L., Finin, T. and Olmedilla, D. 2006. Proceedings of the second multinational Semantic Web Policy Workshop (SWPW06). 5th external Semantic Web Conference (ISWC). Athens, Georgia, USA. Nov. 5, 2006.Denning, S. What is knowledge management? Background stem to the World Development Report 1998. from Palmer, H. 2006. A data warehouse methodology and model for student data in higher education. PhD dissertation. Nova Southeastern University. UMI lean 3218332. 202pp. Parr, C.S., Parafiynyk, A., Sachs, J., Pan, R., Han, L., Ding, L., Finin, T., Wang, D. 2006. Using the semantic web to integrate ecoinformatics resources. American Association for Artficial information (www.aaai.org). Reiner, K.A. 2006. A framework for knowledge capture and a study of ontogenesis metrics in collaborative engineering design. PhD Dissertation. Stanford University. UMI Microform 3219361. 258 p. Roman, D., Kopecky, J., Toma, I. and Fensel, D. 2006. Aligning WSMO and WS-Policy. Proceedings of the second International Semantic Web Policy Workshop (SWPW06). 5th International Semantic Web Conference (ISWC). At hens, Georgia, USA. Nov. 5, 2006. Ware, L.C. 2004. The payoff of wireless IT investments. CIO Research Reports. FromWikipedia. Knowledge management. Fromhttp//en.wikipedia.org/wiki/Knowledge_management

No comments:

Post a Comment