Information Technology Management Term Paper

¶ … Sharry, R Case What Specific Benefit does KM Software add to a global organization?

"In today's fast-paced society, an entity's knowledge base is quickly becoming its only sustainable competitive advantage. As such, this resource must be protected, cultivated and shared among entity members." (Answers to Frequently Asked Questions About Knowledge Management, 1998) For the global corporation Proctor & Gamble, Knowledge Sharing Software has created a common knowledge base amongst the diversity of international employees working for this entity. The consumer-products giant turned to Knowledge-Sharing Software to transform "departmental experts into tangible information resources for the whole company." (Moore, 2001)

In other words, Proctor & Gamble believes strongly in soliciting opinions from all experts working for the company, and wished to make the sharing of such expert knowledge a valuable and constant resource for all employees. It saw, in the potential accessibility that KM Software could bring, a way of making more effective use of its intellectual capital and resources. But how could all employees access the maximum amount of useful expert opinions for a particular problem, given the wide berth of the company's outreach and the diversity of languages, cultures, and locations of Proctor & Gamble's many staff members? KM Software enabled the company to create an intranet portal and point of information exchange for an expert in advertising in the United States, for example, to discuss with a copywriter the advertisements for P& G. products manufactured in Thailand. This also enabled the expert P& G. employee to get a better understanding of the point-of-view of that person living and working in the nation, without leaving his or her computer. (Moore, 2001)

Technology is occasionally and mistakenly seen as a barrier between the technically literate and illiterate. But the usefulness of P& G's portal demonstrates otherwise. Moreover, this portal is used by many P& G. staff members who are not...

...

The portal has proved useful in the areas of R& D, engineering, and all facets purchasing, and marketing. Originally, the P& G. intranet portal was only successful in providing workers with browser-based access to published information such as documents, reports, and data from a variety of disparate sources, without specifically organizing or tailoring such knowledge to employee requests. The intranet was thus limited because it was not specified enough in terms of the information it could extract, nor could it solicit and create exchanges of one of the company's most valued resources: employee knowledge. (Moore, 2001)
KM software creates a 'living' and responsive database of knowledge that can take place across international borders. Now, with the portal, high-level conversations between employees can take place in a common locus, enabling new knowledge to be created by sharing what is already known and tested, a goal of KM. (Wood, 2001, "Taking Stock of What You Know.") The software gave P& G. employees a place to go to ask questions of experts in their fields. The experts of P& G. could share their knowledge with others who had common concerns. All users liked the ease with which they could locate experts and the fact that the system was integrated with email so questions or feedback could be sent immediately, unlike searching documents as before, or waiting to contact experts across time zones. (Moore, 2001)

P& G. experts felt like they could "make more of an impact," as technical experts typically had "close circles" to "share experiences and knowledge with; this broadens their ability to share what they know, and the people with questions have a place to go." Although it was difficult to convince employees initially that this would not be a distraction to their daily life and work, a heartfelt attempt was made to implement the portal. This willingness of the company management at P& G. was a key aspect of the portal's success in facilitating the exchange of knowledge, and it is…

Sources Used in Documents:

Work Cited

"Answers to Frequently Asked Questions about Knowledge Management." (1 Feb 1998) Graduate School of Business: University of Texas at Austin. Retrieved 12 Oct 2005 athttp://www.mccombs.utexas.edu/kman/answers.htm

Cameron, P.D. (May 2002) "Managing Knowledge Assets." CMA Management. New York: Hamilton.

Moore, Cathleen. (12 Oct 2001) "Tapping Knowledge." InfoWorld. Retrieved 12 Oct 2005 at http://www.askmecorp.com/pdf/InfoWorld_PG.pdf

Wood, B. (Jul 2001) "Sharing the Intellectual Wealth." Chief Executive.


Cite this Document:

"Information Technology Management" (2005, October 16) Retrieved April 25, 2024, from
https://www.paperdue.com/essay/information-technology-management-70005

"Information Technology Management" 16 October 2005. Web.25 April. 2024. <
https://www.paperdue.com/essay/information-technology-management-70005>

"Information Technology Management", 16 October 2005, Accessed.25 April. 2024,
https://www.paperdue.com/essay/information-technology-management-70005

Related Documents

Vandalism Vandalism is a major concern because of the nature of the products manufactured by the organization and the high rate of theft generally associated with motor vehicles and motorcycles. It is recommended that the organization conduct a thorough perimeter and site security audit for the purposes of ensuring the maximum mitigation of any risks of vandalism and theft. To the extent that internal vandalism is a concern, it is recommended

Information Technology Management Case Study Why is it important to have several status review and decision points throughout the project's life cycle? It is important to have several review and decision points throughout the project's life cycle because that is the only effective way of identifying potential delays and other obstacles at the earliest possible point. That enables the team to mitigate the potential damage or delay to the project as much

Network Security Management From the onset, it is important to note that for data to flow from one computer to another, such computers should be interconnected in what is referred to as a network. With such interconnectedness comes the risk of data interception and it is for this reason that network security is considered crucial. In the recent past, the number of corporations that have experienced attacks on their computing resources

Project Management Like things information technology management, business intelligence typically implemented form a "project" --, a special kind organizational arrangement set specific things a specific period time, opposed a regular ongoing part organizational structure. Project management: My experience "To be successful in the field of BI, a project team needs members with an understanding of and appreciation for the information needs of the user community as well as the technologies" (Wu 2005: 1).

). Such security should also preplan strategic responses to attacks associated with the network (Dawkins et al.). A book entitled "Surviving Security: How to Integrate People, Process, and Technology" explains that the rapid expansion networking and networking technologies necessitates greater security needs. The author asserts that parts of the network such as routers, switches and even network printers are vulnerable (Andress). The article further explains that the router or switch contained

Technology Management and Improving Department Performance As the manager of a team of 25 customer service representatives our company, I've noticed the significant investments made in key technology, systems and processes are losing their effectiveness. Over the last year for example, the large investments in Customer Relationship Management (CRM) systems and training have only led to greater confusion on the part of customer service reps regarding escalation paths. The investments in