¶ … Sharry, R Case
What Specific Benefit does KM Software add to a global organization?
"In today's fast-paced society, an entity's knowledge base is quickly becoming its only sustainable competitive advantage. As such, this resource must be protected, cultivated and shared among entity members." (Answers to Frequently Asked Questions About Knowledge Management, 1998) For the global corporation Proctor & Gamble, Knowledge Sharing Software has created a common knowledge base amongst the diversity of international employees working for this entity. The consumer-products giant turned to Knowledge-Sharing Software to transform "departmental experts into tangible information resources for the whole company." (Moore, 2001)
In other words, Proctor & Gamble believes strongly in soliciting opinions from all experts working for the company, and wished to make the sharing of such expert knowledge a valuable and constant resource for all employees. It saw, in the potential accessibility that KM Software could bring, a way of making more effective use of its intellectual capital and resources. But how could all employees access the maximum amount of useful expert opinions for a particular problem, given the wide berth of the company's outreach and the diversity of languages, cultures, and locations of Proctor & Gamble's many staff members? KM Software enabled the company to create an intranet portal and point of information exchange for an expert in advertising in the United States, for example, to discuss with a copywriter the advertisements for P& G. products manufactured in Thailand. This also enabled the expert P& G. employee to get a better understanding of the point-of-view of that person living and working in the nation, without leaving his or her computer. (Moore, 2001)
Technology is occasionally and mistakenly seen as a barrier between the technically literate and illiterate. But the usefulness of P& G's portal demonstrates otherwise. Moreover, this portal is used by many P& G. staff members who are not...
Vandalism Vandalism is a major concern because of the nature of the products manufactured by the organization and the high rate of theft generally associated with motor vehicles and motorcycles. It is recommended that the organization conduct a thorough perimeter and site security audit for the purposes of ensuring the maximum mitigation of any risks of vandalism and theft. To the extent that internal vandalism is a concern, it is recommended
Information Technology Management Case Study Why is it important to have several status review and decision points throughout the project's life cycle? It is important to have several review and decision points throughout the project's life cycle because that is the only effective way of identifying potential delays and other obstacles at the earliest possible point. That enables the team to mitigate the potential damage or delay to the project as much
Network Security Management From the onset, it is important to note that for data to flow from one computer to another, such computers should be interconnected in what is referred to as a network. With such interconnectedness comes the risk of data interception and it is for this reason that network security is considered crucial. In the recent past, the number of corporations that have experienced attacks on their computing resources
Project Management Like things information technology management, business intelligence typically implemented form a "project" --, a special kind organizational arrangement set specific things a specific period time, opposed a regular ongoing part organizational structure. Project management: My experience "To be successful in the field of BI, a project team needs members with an understanding of and appreciation for the information needs of the user community as well as the technologies" (Wu 2005: 1).
). Such security should also preplan strategic responses to attacks associated with the network (Dawkins et al.). A book entitled "Surviving Security: How to Integrate People, Process, and Technology" explains that the rapid expansion networking and networking technologies necessitates greater security needs. The author asserts that parts of the network such as routers, switches and even network printers are vulnerable (Andress). The article further explains that the router or switch contained
Technology Management and Improving Department Performance As the manager of a team of 25 customer service representatives our company, I've noticed the significant investments made in key technology, systems and processes are losing their effectiveness. Over the last year for example, the large investments in Customer Relationship Management (CRM) systems and training have only led to greater confusion on the part of customer service reps regarding escalation paths. The investments in
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now