MGMT630 Knowledge Management
Assignment No.1 Solution
FALL 2014
FALL 2014
Explicit knowledge easily communicated,
stored and spread. it is easily search in books and internet. As a result
the explicit knowledge approach assumes that the useful knowledge of individual
in an organization can be articulated and made explicit. In explicit knowledge,
five strategies/techniques that a learning organization can adopt to protect
explicit knowledge.
Encryption:
Encryption use to protect the explicit knowledge. Encryption is the
process of encoding message into useful information in this way only interested and authorized party can able to use it. Encryption does not
of itself prevention interception but denies to the message content to the
interceptor. We must need to protect Encryption process for the explicit
knowledge through large computational resources and skills are required.
Encryption by itself can protect the confidentially of message but other
technique still needed for instance verification of a message authentication
code or a digital signature, single error in system design or execution can
allow successful attacks. If we adopt the encryption process it will help in
protect the explicit knowledge.
Latest Antivirus:
When the organizations adopt the latest antivirus software used to
prevent, detect and remove the virus. It is much saving than other knowledge.
No one can asses to the knowledge. Explicit knowledge must codified and
digitized in the form of records, reports or documents and is reusable for
decision making so we need to protect our data through the latest version of
antivirus because if data is corrupt and error full in the computer can’t be
transmitted electronically or stored. Because its digital activity we should
need to be protected through the latest antivirus in the technological world
for the smooth operation in the organization.
Physical security of networks:
Organization requires protecting
their physical security by using the lock up the excplicit data in server or
protected file folder. Network can be easier to secure, if
there is a single computer which hold the sensitive information, those are the
computer which must be physically secured for the explicit knowledge. Other
computers can be left less secure, provided the network itself is secure and
the unsecured computer don’t have sensitive information on them such as network
passwords. In big business the computer which store the sensitive information are
often kept in a special computer room in a secured building. In small business
or home enjoinments keep the separate don’t used them as regular computer Make
certain that are behind the scene somewhere away from customer to protect the
explicit knowledge.
Use Intranet rather than internet:
Information system is usually seen as playing a central role in
facilitating the dissemination of explicit knowledge asset over company
intranet or between organizations via the internet. We should need to get
intranet to protect her explicit knowledge. Intranet have emerged as one of
today’s most effective ways of sharing information and knowledge in
organization. They act as a nervous and circulatory system for a company
supporting business process as well as follow of information of explicit
knowledge.
Latest software in system as old software is risky:
Latest software is beneficial for the company as updated knowledge or the
positions and security of the company. It’s handling to get the procedure
automatically and make your work easily and can manage and control
functionally. Old software may be risky for our system which has data in the
system it can ever be expired at any time. So it should be protected by new
software, which can effect on explicit knowledge.
So an organization that must creates explicit
knowledge assets must take care that those assets remain within the boundaries
of the organization and do not “leak” to other organizations, especially
competitors. Security measures of the type most organizations now routinely use
to protect their databases must be extended to provide security for the
organization’s explicit knowledge base.







Students Enjoy The Solution of MGMT630, But Please Don't Copy Paste... Just Get Idea And Make Solution By Your Self.....
ReplyDelete