VUSuperior Chat Room

Wednesday, 3 December 2014

MGMT630 Knowledge Management Assignment No.1 FALL 2014 Solution

MGMT630 Knowledge Management 
Assignment No.1 Solution
FALL 2014
     Explicit knowledge easily communicated, stored and spread. it is easily search in books and internet. As a result the explicit knowledge approach assumes that the useful knowledge of individual in an organization can be articulated and made explicit. In explicit knowledge, five strategies/techniques that a learning organization can adopt to protect explicit knowledge.


Encryption:
Encryption use to protect the explicit knowledge. Encryption is the process of encoding message into useful information in this  way only interested and authorized  party can able to use it. Encryption does not of itself prevention interception but denies to the message content to the interceptor. We must need to protect Encryption process for the explicit knowledge through large computational resources and skills are required. Encryption by itself can protect the confidentially of message but other technique still needed for instance verification of a message authentication code or a digital signature, single error in system design or execution can allow successful attacks. If we adopt the encryption process it will help in protect the explicit knowledge.

Latest Antivirus:
When the organizations adopt the latest antivirus software used to prevent, detect and remove the virus. It is much saving than other knowledge. No one can asses to the knowledge. Explicit knowledge must codified and digitized in the form of records, reports or documents and is reusable for decision making so we need to protect our data through the latest version of antivirus because if data is corrupt and error full in the computer can’t be transmitted electronically or stored. Because its digital activity we should need to be protected through the latest antivirus in the technological world for the smooth operation in the organization.

Physical security of networks:
Organization requires protecting their physical security by using the lock up the excplicit data in server or protected file folder. Network can be easier to secure, if there is a single computer which hold the sensitive information, those are the computer which must be physically secured for the explicit knowledge. Other computers can be left less secure, provided the network itself is secure and the unsecured computer don’t have sensitive information on them such as network passwords. In big business the computer which store the sensitive information are often kept in a special computer room in a secured building. In small business or home enjoinments keep the separate don’t used them as regular computer Make certain that are behind the scene somewhere away from customer to protect the explicit knowledge.

Use Intranet rather than internet: 
Information system is usually seen as playing a central role in facilitating the dissemination of explicit knowledge asset over company intranet or between organizations via the internet. We should need to get intranet to protect her explicit knowledge. Intranet have emerged as one of today’s most effective ways  of sharing information and knowledge in organization.  They act as a nervous and circulatory system for a company supporting business process as well as follow of information of explicit knowledge.

Latest software in system as old software is risky:
Latest software is beneficial for the company as updated knowledge or the positions and security of the company. It’s handling to get the procedure automatically and make your work easily and can manage and control functionally. Old software may be risky for our system which has data in the system it can ever be expired at any time. So it should be protected by new software, which can effect on explicit knowledge.
 So an organization that must creates explicit knowledge assets must take care that those assets remain within the boundaries of the organization and do not “leak” to other organizations, especially competitors. Security measures of the type most organizations now routinely use to protect their databases must be extended to provide security for the organization’s explicit knowledge base.

1 comments:

  1. Students Enjoy The Solution of MGMT630, But Please Don't Copy Paste... Just Get Idea And Make Solution By Your Self.....

    ReplyDelete