Tuesday, January 15, 2019
Mobile Knowledge Management: Systems and Policies
The  ground  association and  friendship charge are such broad topics that there have no common definitions.  friendship is something that is believed and reliable, as distinguished from information which is a  grade of selective information arranged in meaningful patterns. Knowledge is information unite with experience, and reflection, integration thinking and feeling.Knowledge  guidance refers to a set of practices to  grab and disseminate know-how among   governance of ruless around the world (Denning, 1998) for reuse, learning and creating awareness across organizations (Wikipedia) . It is easier and  red-hot to transfer information than cognition from one individual to another.(Denning, 1998). Among the benefits of  knowledge management practices are  increase ability to capture knowledge from outface organization and integrate knowledge from departments within the organization improved skills and knowledge of workers increased ability to adapt service to clients define and prov   ide new services to clients improved worker efficiency and productivity alleviated the impacts of worker departures (Pratt, 2006).Knowledge management particularly semantic web documents has been applied in integrating ecoinformatics resources and surroundal  info (Parr, et al., 2006). This was  through with(p)  using the tool ELVIS (Eco formation  jam Visualization and Information System) to construct food webs (Parr, et al., 2006). Other applications were in  info  store of student  data in higher(prenominal) education (Palmer, 2006) and knowledge management  conception team-based engineering (Reiner, 2006). The latter demonstrated the use of  goal history as a source of insight for team  architectural plan process. It proposed a modeling framework for collaborative and distributed knowledge management for design teams (Reiner, 2006)Advances in  electronic computer and information technologies have greatly enhanced knowledge management. Palmer (2006) employed e-mail and the web to    get participants to  approach path a questionnaire on improving data quality in a data warehousing in a higher education setting . The use of metadata and end-substance abuser  link were positively  fit with obtaining high-quality data in data warehousing.Today, mobility and transportability are the uphill as important considerations for sharing information and knowledge. With  alert  telephonys and  hold computers using  radio set technologies, people are no longer tied  muckle to work in a physical office with rigid  work hours but  cigaret do things in the comfort of their homes or elsewhere in a virtual office.With the ease of sharing knowledge, abuses and infringement of  adroit properties were  withal made easier. Regulations within the organization and the national government in general are  inevitable to safeguard the companies against these potential abuses. Policies are also  carryed for  credentials and privacy and can determine the success or failure of a web service (B   onatti, et al. 2006).Roman et al. (2006) proposed a  combine WSMO (Web Service Modeling Ontology) and WS-policy framework consisting of a set of specifications with heavy industrial backing. This framework combines a conceptual model (Web Service Modeling Ontology), a formal syntax and language (Web Service Modeling Language) and an exe skitterion environment (Web Service Execution Environment) (Roman et al., 2006).2. Complete Problem Statement and GoalThe  flair in knowledge management is headed towards the same direction as  supple entertainment. Entertainment equipment has gone down to the size of the i-pod and portability of the DVD complete with  broken screens and sound system. Although some of the features of the big system are conveniently  jammed into the miniature system, there  leave always be a tradeoff between the capabilities of the big system and the portable small system.This proposed research  depart look at the plight of the small system, the size of the  smooth ph   one or hand-held computers that rely on  tuner technology. The goals are to optimize its use for the different knowledge management processes, and identify policies to safeguard its  blackguard especially the threat on knowledge security of the organization. The goals  volition be measured in terms of the  list of process that the handheld devices can handle compare with the  troops computer, number of  cartridge clips communications  partition and their causes, frequency of security breakdown through the use of the  runny devices. look for questionTo what extent  leave mobile systems, the size of mobile phones and hand-held calculators, be utilized in knowledge management?HypothesesDownsizing/outsourcing  go away be the trend in business which will require mobile systems for communication and knowledge management. Mobile systems will become  more than  cultivate and powerful to be able to perform tasks that are currently  make by bigger systems. Security systems of  companionship k   nowledge (data) will  adopt along with the development of mobile systems 3. Relevance and significanceMore and more companies continue to invest in wireless e-mail, personal productivity applications,  record management and sales automation. More than half of 250 IT executives surveyed in October 2003 recognize the  splendour of wireless technologies in their organizations  overall goals and improve user satisfaction (Ware, 2004). Most common wireless devices include a  faction of mobile phones (with or without web browsers/email), laptop computers with wireless modem and PDAs with wireless connectivity and pocket PCs (Ware, 2004).Among the different wireless applications that companies will continue to support in the future, email access tops the  nominate followed by calendar/scheduling, web access, personal productivity (word processing, spreadsheets, presentation  parcels), text messaging, real time inventory management, factory floor, transactions, global positioning system (GP   S), human resources, finance/accounting, decision support, CRM, sales automation, wireless e-commerce, and procurement (Ware, 2004). boilers suit 60% of those surveyed were positive that their wireless investment already paid for itself (Ware, 2004). The  superior benefits came from increased productivity, streamlined processes/greater efficiencies and improved user satisfaction (Ware, 2004). The challenges to wireless technologies are security, user support, privacy and budget restrictions (Ware, 2004).Downsizing can cut down the cost of doing knowledge management. Downsizing can be done through physical reduction in the size of the hardware (equipment),  parcel that can be run on a hand-held computer or mobile phone set, or a networking system whereby the host computer does the data analysis and the final results downloadable to the mobile phones. Government and  lodge policies are needed to safeguard against misuse, industrial espionage and other information security issues.4. Ap   proachFor Hypothesis No. 1This will be a time  serial analysis, with  divisions as in subordinate  inconstant, and numbers of companies undergoing  suppression/outsourcing and mobile devices as  leechlike variables.A survey will be done on the  net profit and from published news reports such as CIO Reports regarding number of businesses which had undergone  downsizing or outsourcing of their operations, during the past decade. This will be correlated with the number of mobile devices used by different companies during the same period. The time series plot of the data will show the trends in downsizing and/or outsourcing and number of mobile devices through the years. The years will be the independent variable while the number of companies and mobile devices will be the dependent variables. A correlation between the two dependent variables will be made. A significant positive correlation and increasing trends in the graphs will support Hypothesis No.1.For Hypotheses No. 2 and 3This     reading will identify two companies of different sizes (large and small in terms of facilities, number of staff, type and volume of business) that have a host computer, a local area network (either wired or WIFI) and broadband internet access, and staff who have their own or office-issued hand-held computers or mobile phones with wireless internet capabilities through the years.Questionnaires will be prepared and  severalise management officers and office staff will be interviewed. Information to be gathered will include the  connection profile, the knowledge management system in place including softwares and consulting firms, knowledge management applications most frequently used, access security levels issued to different classes of office staff.The staff will be asked to  keep down the processes they could do or would want to do using their mobile units, from  impartial text messaging to internet browsing that help in the overall decision-making process in the company.The capabil   ities of their host computer will be tabulated side by side with the capabilities of their most common mobile device (brand, model, year acquired). Capabilities will be measured in terms of available  fund and the number of tasks the device is capable of performing. This is again a time series data with year as independent variable and the number of features or tasks performed by the host computer and the mobile systems will be the dependent variables. If hypothesis no. 2 is correct we would expect an increasing number of tasks that can be performed by the mobile system.For hypothesis No. 3, the dependent variable will the frequency of data security breakdowns and the independent variable will the years the company has been in operation. Another indicator will be the number of regulations formulated to curb security problems (dependent variable) through the years.  fraternity management will be asked regarding existing company policies, code of ethics, data security and standard ope   rational procedures through the years from the time the company was established.They will be asked how frequent did they suffer breakdown in data security through their mobile devices through the years. They will also be asked to comment on the ideal design for their computer hardwares and softwares and features for the mobile equipment. They will also be asked to comment of what kinds of government support and regulations are needed to curb piracy and infringement of their intellectual properties.This research will need the following resources interviewers to interview at least three key company officers, two staff per office department (e.g. human resources, procurement, marketing, operations, etc.) a knowledge management or IT specialist to evaluate knowledge management software system and how the ordinary staff can access to it using their mobile equipment.ReferencesBonatti, P.A., Ding, L., Finin, T. and Olmedilla, D. 2006. Proceedings of the 2nd International Semantic Web Polic   y  shop class (SWPW06). 5th International Semantic Web Conference (ISWC). Athens, Georgia, USA. Nov. 5, 2006.Denning, S. What is knowledge management? Background paper to the World Development Report 1998. from Palmer, H. 2006. A data warehouse methodology and model for student data in higher education. PhD dissertation. Nova Southeastern University. UMI Number 3218332. 202pp. Parr, C.S., Parafiynyk, A., Sachs, J., Pan, R., Han, L., Ding, L., Finin, T., Wang, D. 2006. Using the semantic web to integrate ecoinformatics resources. American Association for Artficial Intelligence (www.aaai.org). Reiner, K.A. 2006. A framework for knowledge capture and a study of development metrics in collaborative engineering design. PhD Dissertation. Stanford University. UMI Microform 3219361. 258 p. Roman, D., Kopecky, J., Toma, I. and Fensel, D. 2006.  align WSMO and WS-Policy. Proceedings of the 2nd International Semantic Web Policy  shop class (SWPW06). 5th International Semantic Web Conference (I   SWC). Athens, Georgia, USA. Nov. 5, 2006. Ware, L.C. 2004. The payoff of wireless IT investments. CIO Research Reports. FromWikipedia. Knowledge management. Fromhttp//en.wikipedia.org/wiki/Knowledge_management  
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment