The Role of Network Layers in Supporting Knowledge Management Implementations
Journal Title: UNKNOWN - Year 2015, Vol 4, Issue 1
Abstract
Knowledge management (KM) approach has been adopted in virtually every business unit in organizations as a means to improve the competitive advantages of organizations. The benefits of KM in maximizing resources and at the same time minimizing costs are two important economic advantages of knowledge management. The organizations focus on how to improve the knowledge management implementation through adopting efficient knowledge management processes to manage the explicit and tacit knowledge. Most researchers focus on managing knowledge activities using IT services based on the interrelation between knowledge management processes. Knowledge management processes can be managed by having the architecture of IT infrastructure, i.e. network layers to provide effective integration between knowledge management layers and the architecture of IT infrastructures. This paper focuses on managing the knowledge processes based on network layers rather than IT services to maximize the management performance of knowledge implementations. The literature review is the main basement of this research. The knowledge management processes could be integrated efficiently depending on three main network layers; service agreement layer, management agreement layer, and infrastructure layer.
Privacy Preserving Suppression Algorithm for Anonymous Databases
Suppose a medical facility connected with a research institution and the researchers can use the medical details of a patient without knowing the personal details. Thus the research data base used by the researchers must...
A Technique for Filtering Unnecessary Messages from Online Social Network
One fundamental issue in today's Online Social Networks (OSNs) is to give users the ability to control the messages posted on their own private space to avoid that unwanted content is displayed. Up to now, OSNs provide l...
Intelligent Real Time Traffic Controller Using Image Processing – A Survey
Extensive number of traffic on roads and improper methods of controls of that traffic creates traffic jam. Bad traffic management leads to wastage of time, person-hour and increase in pollution. The frequent jams require...
Fingerprint Compression Technique using Sparse Representation
Fingerprint is the most famous biometric that is mostly used in various authentication systems. Fingerprint of human being exhibit certain details marked on it, categorized it as minutiae, which can be used as a unique i...
Encryption Algorithms Used for Secured Communication
With the development of the digital devices, computers and networks, our world relies more and more on the digital data. In many cases, storing data safely is a very big concern. These data have to be protected so as to...