Module 7
Module 7
INTRODUCTION TO
MANAGEMENT
INFORMATION SYSTEMS
Module 7 – Managing Knowledge
Module Objectives
What is the role of knowledge management systems in business?
What types of systems are used for enterprise-wide knowledge
management, and how do they provide value for businesses?
What are the major types of knowledge work systems, and how
do they provide value for firms?
What are the business benefits of using intelligent techniques for
knowledge management?
2
What is the Role of Knowledge
Management Systems in Business?
Knowledge management systems among fastest growing areas of
software investment
Information economy
• 37 percent U.S. labor force: knowledge and information workers
• 55 percent U.S. GDP from knowledge and information sectors
Substantial part of a firm’s stock market value is related to intangible
assets: knowledge, brands, reputations, and unique business
processes
Well-executed knowledge-based projects can produce extraordinary
ROI
3
Important Dimensions of Knowledge
4
Important Dimensions of Knowledge - Cont.
KNOWLEDGE IS A FIRM ASSET
Knowledge is an intangible asset
The transformation of data into useful information
and knowledge requires organisational resources
Knowledge is not subject to the law of diminishing
returns as are physical assets, but instead
experiences network effects as its value increases as
more people share
5
Important Dimensions of Knowledge - Cont.
KNOWLEDGE HAS A LOCATION
Knowledge is a cognitive event involving mental
models and maps of individuals.
There is both a social and an individual basis of
knowledge.
Knowledge is “sticky” (hard to move), situated
(enmeshed in a firm’s culture) and contextual (works
only in certain situations).
6
Important Dimensions of Knowledge - Cont.
KNOWLEDGE IS SITUATIONAL
Knowledge is conditional, knowing when to apply a
procedure is just as important as knowing the
procedure (conditional)
Knowledge is related the context; you must know
when to use a certain tool and under what
circumstances
7
Important Dimensions of Knowledge - Cont.
KNOWLEDGE HAS DIFFERENT FORMS
Knowledge can either be tactic or explicit (codified).
Knowledge involves know how, craft and skill.
Knowledge involves knowing how to follow
procedures.
Knowledge involves knowing why, not simply when
things happen.
8
Important Dimensions of Knowledge - Cont.
Knowledge-based core competencies
• Key organizational assets
Knowing how to do things effectively and efficiently in ways
others cannot duplicate is a prime source of profit and
competitive advantage
• Example: Having a unique build-to-order production system
Organizational learning
• Process in which organizations gain experience through
collection of data, measurement, trial and error, and feedback
9
The Knowledge Management Value
Chain
Knowledge management
• Set of business processes developed in an organization to create,
store, transfer, and apply knowledge
Knowledge management value chain
• Each stage adds value to raw data and information as they are
transformed into usable knowledge
o Knowledge acquisition
o Knowledge storage
o Knowledge dissemination
o Knowledge application
10
The Knowledge Management Value
Chain - Cont.
Knowledge acquisition
• Documenting tacit and explicit knowledge
o Storing documents, reports, presentations, best practices
o Unstructured documents (e.g., e-mails)
o Developing online expert networks
• Creating knowledge
• Tracking data from T P S and external sources
Knowledge storage
• Databases
• Document management systems
• Role of management 11
The Knowledge Management Value
Chain - Cont.
Knowledge dissemination
• Portals, wikis
• E-mail, instant messaging
• Search engines, collaboration tools
• A deluge of information?
o Training programs, informal networks, and shared
management experience help managers focus attention on
important information.
Knowledge application
• New business practices
• New products and services
• New markets 12
The Knowledge Management Value
Chain - Cont.
13
Capital: Collaboration,
Communities of
Practice, and Office
Environments
Developing new organizational roles and responsibilities for the
acquisition of knowledge
Chief knowledge officer executives
Dedicated staff / knowledge managers
Communities of practice (COPs)
• Informal social networks of professionals and employees
• Activities include education, online newsletters, sharing
knowledge
• Reduce learning curves of new employees
14
Types of Knowledge Management
Systems
Enterprise-wide knowledge management systems
• General-purpose firm-wide efforts to collect, store, distribute,
and apply digital content and knowledge
Knowledge work systems (KWS)
• Specialized systems built for engineers, scientists, other
knowledge workers charged with discovering and creating new
knowledge
Intelligent techniques
• Diverse group of techniques such as data mining used for
various goals: discovering knowledge, distilling knowledge,
discovering optimal solutions
15
Major Types of Knowledge
Management Systems – Cont.
16
Enterprise-Wide Knowledge
Management
Three major types of knowledge in an enterprise
• Structured documents
o Reports, presentations
o Formal rules
• Semi-structured documents
o E-mails, videos
• Unstructured, tacit knowledge
80% of an organization’s business content is semi-structured or
unstructured
17
Enterprise-Wide Knowledge
Management – Cont.
18
Knowledge Network
Systems
Provide online directory of corporate experts in well-defined
knowledge domains
Use communication technologies to make it easy for
employees to find appropriate expert in a company
May systematize solutions developed by experts and store
them in knowledge database
• Best-practices
• Frequently asked questions (FAQ) repository
19
Knowledge Network
Systems – Cont.
Systems for knowledge workers to help create new knowledge
and integrate that knowledge into business
Knowledge workers
Researchers, designers, architects, scientists, engineers who
create knowledge for the organization
Three key roles:
1. Keeping organization current in knowledge
2. Serving as internal consultants regarding their areas of expertise
3. Acting as change agents, evaluating, initiating, and promoting change
projects 20
Knowledge Network
Systems – Cont.
Requirements of KWS
Substantial computing power for
graphics, complex calculations
Powerful graphics and analytical tools
Communications and document
management
Access to external databases
User-friendly interfaces
Optimized for tasks to be performed
(design engineering, financial analysis) 21
Knowledge Network
Systems – Cont.
KNOWLEDGE WORK SYSTEMS FUNCTION IN ORGANISATION
CAD/CAM (computer aided Provides engineers, designers and
manufacturing) factory managers with precise control
over industrial design and
manufacturing.
Virtual reality systems Provide drug designers, architects,
engineers, and medical workers with
precise photo-realistic simulations of
objects
Investment workstations High-end PCs used in the financial sector
to analyze trading situations
instantaneously and facilitate portfolio
management.
22
Artificial Intelligence
Grand vision
• Computer hardware and software systems that are as “smart” as
humans
• So far, this vision has eluded computer programmers and scientists
Realistic vision
• Systems that take data inputs, process them, and produce outputs
(like all software programs) and that can perform many complex tasks
that would be difficult or impossible for humans to perform
23
Artificial Intelligence – Cont.
Examples:
• Recognize millions of faces in seconds
• Interpret millions of C T scans in minutes
• Analyze millions of financial records
• Detect patterns in very large Big Data databases
• Improve their performance over time (“learn”)
• Navigate a car in certain limited conditions
• Respond to questions from humans (natural language); speech
activated assistants like Siri, Alexa, and Cortana
24
Artificial Intelligence – Cont.
Major Types of A I
• Expert systems
• Machine learning
• Neural networks and deep learning networks
• Genetic algorithms
• Natural language Processing
• Computer vision
• Robotics
25
Internet Services and Communication
Tools – Cont.
Unified communications
• Communications systems that integrate voice, data, e-mail,
conferencing
Virtual private network (VPN)
• Secure, encrypted, private network run over Internet
• PPTP
• Tunneling
26
Internet Services and Communication
Tools – Cont.
VoIP
27
Internet Services and Communication
Tools – Cont.
29
The Web
Hypertext
• Hypertext Markup Language (HTML)
• Hypertext Transfer Protocol (HTTP):
• Uniform resource locator (URL):
o http://www.megacorp.com/content/features/082602.html
Web servers
• Software for locating and managing web pages
30
Searching for Information
on the Web
Mobile search
Semantic search
Social search
Visual search
Intelligent agent shopping bots
Search engine marketing
Search engine optimization (SEO)
31
Searching for Information
on the Web – Cont.
32
Searching for Information
on the Web – Cont.
How Google
works
33
The Future Web
More tools to make sense of trillions of pages on the Internet
Pervasive web
Internet of Things (IoT)
Internet of People
App Internet
Increased cloud computing and SaaS
Ubiquitous mobile connectivity
Greater seamlessness of web as a whole
34
Wireless Computer Networks and
Internet Access
Bluetooth (802.15)
• Links up to 8 devices in 10-meter area using low-power, radio-
based communication
• Useful for personal networking (PANs)
• Wi-Fi (802.11)
• Set of standards: 802.11
• Used for wireless L A N and wireless Internet access
• Use access points: device with radio receiver/transmitter for
connecting wireless devices to a wired LAN
35
Wireless Computer Networks and
Internet Access – Cont.
• Hotspots: one or more access points in public place to provide
maximum wireless coverage for a specific area
• Weak security features
WiMax (802.16)
• Wireless access range of 31 miles
• Require WiMax antennas
36
Wireless Computer Networks and
Internet Access – Cont.
37
Wireless Computer Networks and
Internet Access – Cont.
38
Radio Frequency
Identification (RFID)
Use tiny tags with microchips containing data about an item
and location
Tag antennas to transmit radio signals over short distances to
special RFID readers
Common uses:
• Automated toll-collection
• Tracking goods in a supply chain
Reduction in cost of tags making RFID viable for many firms
39
Radio Frequency
Identification (RFID) – Cont.
40
Wireless Sensor Networks
(WSNs)
Networks of hundreds or thousands of interconnected wireless
devices
Used to monitor building security, detect hazardous substances
in air, monitor environmental changes, traffic, or military
activity
Devices have built-in processing, storage, and radio frequency
sensors and antennas
Require low-power, long-lasting batteries and ability to endure
in the field without maintenance
Major sources of “Big Data” and fueling “Internet of Things” 41
Wireless Sensor Networks
(WSNs) – Cont.
42
Key Takeaways
The networking revolution has completely changed how
personal computers are used.
Data communication networks transmit digital data from one
computer to another computer using a variety of wired and
wireless communication channels.
One such network, the internet, is an immense global network
of smaller interconnected networks linking millions of
computers.
By connecting paying subscribers into the Internet
infrastructure, a company called an internet service provider
provides services, such as e-mail, and online access. 43
Key Takeaways – Cont.
The World Wide Web (“the Web”), is a subsystem of computers that
can be accessed by means of a special protocol known as hypertext
transfer protocol (HTTP).
Though the web couldn’t exist without the Internet, it’s the web that
provides such multimedia material as pictures, sounds, and
streaming videos.
The use of intranets and extranets has allowed organizations to
deploy functionality to employees and business partners alike,
increasing efficiencies and improving communications.
Businesses use the Internet for four purposes: presenting
information, selling products, acquiring goods and services, and
distributing digital products. 44
References
Laudon & Laudon (2016): Management Information Systems :
Managing the Digital Firm. Chapter 7
45
Thank you
Kerry-Ann Xavier
kerry-ann.xavier@roytec.edu