Discuss the five major forces driving knowledge management

Assignment Help Basic Computer Science
Reference no: EM131135850

KNOWLEDGE MANAGEMENT

You have been provided with the Case study "Case Study: Microsoft- Norway: How Knowledge Management Strategies Resolving Issues at Small and Mid-markets" along with this assessment information sheet.

[Source: Management Information Systems , Laudon and Laudon, Edition 10 Part Three Key System Applications for the Digital Age][Source: Management Information Systems , Laudon and Laudon, Edition 10 Part Three Key System Applications for the Digital Age]

This is provided as the initial background; you need to understand more about the organisational perspective by reading more resources and also by understanding the current status of the organisation by going through its website.

Required:

You are required to read, understand and analyse the case given to you by using SWOT, Porters Five Forces Model and evaluate the case within the context of knowledge management. Make notes based on your understanding of the concepts of the Knowledge Management module presented in the classroom sessions, material provided in the sessions and also through books or internet resources.

Intended Learning Objectives:

1. Explain the requirement of knowledge management, what knowledge management is, why it is important, and why it is complex.

2. Classify different approaches to KM and apply these to a small case study.

1. Discuss the five major forces driving knowledge management (KM) in today's world. Would you say they have contributed towards driving Microsoft in deciding on the need for knowledge networking? Justify your answer.

2. Discuss the challenges faced by Microsoft before the implementation.For each challenge identified, discuss how the implementation providedthe necessary solutions.

3. Discuss the types of knowledge being captured by Microsoft and how are they being captured and from where?

4. Discuss the benefits of the knowledge networking initiative set up by Microsoft. Your discussion should cover the benefits for individuals, community of practice and the Microsoft as an organization.

5. Discuss the strategies used by Microsoft to encourage the contributing and the sharing of knowledge by its members. Are there any other strategies that Microsoft could have used?

6. With the importance of KM, discuss the role played by different strategies taken to manage valuable knowledge at Microsoft (KMLC). Provide specific example(s) for each strategy.

7. Summarize the Microsoft ' analysis in your own words highlighting the key points which are relevant to kM.

Reference no: EM131135850

Questions Cloud

Determine over and under billings for a company : Determine over and underbillings for a company with the following information: Job Number: 311 Job Name: Smith Remodel Current Contract Amount: $22,530 Total Estimated Cost at Completion: $17,264  Actual Costs to Date: $16,538 Total Billed: $21,000
Sufficient conditions for an optimal path of human capital : Verify that Theorems 7.13 and 7.14 from Chapter 7 can be applied to the Ben-Porath and lead to (10.14) as necessary and sufficient conditions for an optimal path of human capital investments. [Hint: use a similar argument to that in Section 7.7 in..
Answer the following question : I need to write a business plan for my supervisor at Comcast. - The plan involves coming up with innovative idea to promote closer customer relationships.
Options traded on the chicago board options exchange : General Furnishings, Inc., has both call and put options traded on the Chicago Board Options Exchange. Both options have the same exercise price of $40 and the same expiration date. The options will expire in one year.
Discuss the five major forces driving knowledge management : Discuss the five major forces driving knowledge management (KM) in today's world. Would you say they have contributed towards driving Microsoft in deciding on the need for knowledge networking? Justify your answer.
How the federal bureau of investigations trains agents : Compare and contrast the training method ideologies associated with how the Federal Bureau of Investigations trains agents versus the quasi-militarism (also called para-militarism) characteristic methodology typically used in the typical police ..
Print the minimum cost of conversion : Print the minimum cost of conversion for each string to super ascii string
Determine the conditions on the function u : In the Dixit-Stiglitz model in Section 12.4.1, determine the conditions on the function u(., .) in (12.7) such that an increase in N raises the profits of a monopolist.
Define herzberg theory : Define Herzberg's Theory. Identify specific proactive steps supervisors can take to influence employee motivation according to the theory. Discuss how different generations might or might not be motivated according to the theory.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  What technologies are responsible for the recent increases

What technologies are responsible for the recent increases in transmission rates, both for fiber-optic cable and wifi?

  Explain the use of wimp

For this Assignment, you will create a PowerPoint presentation in which you explain the use of WIMP and various other components that are present in common interfaces.

  Write a c program to use the rti to time-multiplex

Set up the interrupt vectors for the enhanced capture timer Ch1, enhanced capture timer Ch0, RTI, and IRQ to work with the CodeWarrior IDE by modifying the vectors.c file given in Example 6.5.

  How you would plan an iis7 application hosting

From the first e-Activity, discuss the uses and advantages for an enterprise utilizing an SMTP server.

  Describe the hardware you will purchase or build

Describe the hardware you will purchase or build (inclusive of computers, memory, storage, video cards, printers, routers and cabling). Justify your hardware selection.

  Can we search over different values of k more intelligently

Can we search over the different values of k more intelligently?

  Educating employees on safe computer

You are part of an IT support team for a large company. In the past, employees have unintentionally compromised the computer system by not having strong passwords, clicking on hoax links, and other activities. It is your job to help create an educ..

  Java program that creates the shoutbox class

Write a Java program that creates the ShoutBox class for your Virtual World. Your ShoutBox class will have a shoutOutCannedMessage() method that returns a String type. The shoutOutCannedMessage will use an Array or an ArrayList to store 10 messag..

  Running time of insertion sort

1. Sort the sequence 3, 1, 4, 1, 5, 9, 2, 6, 5 using insertion sort. 2. What is the running time of insertion sort if all elements are equal?

  Design circuit buffer last-in first-out lifo

I want design circuit this Buffer(LIFO). This blocking is for FIFO memory but i want design circuit Buffer Last-in First-out LIFO 4*4

  How many ways can we choose 5 receivers out of 10

With 10 receivers, what is the probability half will send in one particular 5% subinterval? Multiply this by 20 for an estimate of the probability half will all send in the same arbitrary 5% subinterval. Hint: How many ways can we choose 5 receive..

  Application that allows you to enter any first name

Create a program that accepts a series of employee ID numbers, first names and last names from the keyboard and saves the data to a file. Save the program as WriteEmployeeList.java. When you execute the program, be sure to enter multiple records..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd