Deck 13: The Future of Knowledge Management

ملء الشاشة (f)
exit full mode
سؤال
In the conventional decision-making process, the emphasis is first on defining the terms of a model, then on recognizing the problem.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
The solutions to wicked problems are usually not good, but are easily applied to future instances of the problem.
سؤال
Implementing an ERP is an example of a wicked problem.
سؤال
Organizations usually know if their wicked problem went good or bad on implementation date.
سؤال
The organization and social perspective for KM support involves looking at ethical and aesthetic issues.
سؤال
The technical perspective for KM support involves analyzing the alternatives and implementing the chosen alternative.
سؤال
The same technologies that allow sharing of knowledge in an organization could also cause knowledge to leak outside the organization.
سؤال
Corporate espionage is a type of knowledge leakage.
سؤال
The more modifiable knowledge is, the less sensitive it is to leakage.
سؤال
A nondisclosure agreement is an informal understanding between third parties not to reveal the knowledge of a contracting organization that owns certain knowledge
سؤال
Patents protect expressions of work and traditionally have been used for literary works, works of art, architecture, and music.
سؤال
Copyrights grant the holder an exclusive monopoly to any product containing the copyrighted works.
سؤال
Patents are excellent vehicles for protecting valuable information about technical innovations and products.
سؤال
An organization may want to avoid the legal process to protect IP and regard it a still legally protected form of IP.
سؤال
The main reason Web 2.0 has been so successful is that it leverages crowd sourcing for knowledge creation.
سؤال
Privacy concerns may inhibit individuals from sharing knowledge because they fear political retribution from within their organization.
سؤال
Knowledge is power concerns may stem from a user's fear for their job security.
سؤال
Most executives are willing to allow the redundancy needed in order to be accepting of KM.
سؤال
Which of the following is not a step in the traditional decision making model?

A)recognize the problem
B)define the problem in terms of a model
C)analyze alternative solutions
D)call tech support
E)implement the best solution
سؤال
Which of the following is not a characteristic of wicked problems?

A)one shot occurrences
B)instantaneously knowing whether it went well or bad
C)it has repercussions that go well into the future
D)they have enormous economic consequences for an organization
E)it is common and easy to apply lessons learned to future instances of the problem
سؤال
Which of these is a wicked problem?

A)starting a company blog
B)implementing an ERP
C)switching IT hardware vendors
D)renegotiating a software licensing contract
E)All of the above
سؤال
Which of the following a perspective to consider when implementing a KM system?

A)technical
B)personal and individual
C)organizational and social
D)ethical and aesthetic
E)all of the above
سؤال
Which is the only perspective relevant to consider in existing decision support and KM systems?

A)technical
B)personal and individual
C)organizational and social
D)ethical and aesthetic
E)all of the above
سؤال
What is lost with knowledge leakage?

A)Intellectual property
B)Competitive advantage
C)Trade secrets
D)All of the above
E)None of the above
سؤال
Intellectual property includes which of the following?

A)inventions
B)designs
C)blog entries
D)marketing plans
E)All of the above
سؤال
All of the following are sources of knowledge leakage except

A)data mining
B)employee turnover
C)reverse engineering
D)hacking the information systems
E)physical theft
سؤال
What are some legal steps can organizations take to protect from actually losing their IP?

A)nondisclosure agreements
B)patents
C)copyrights
D)classify knowledge as a trade secret
E)none of the above
سؤال
A nondisclosure agreement is typically made between all of the following parties except

A)employees
B)third parties
C)customers
D)suppliers
E)all of the above may have to sign nondisclosure agreements
سؤال
Which of the following can prevent the loss of IP?

A)use of encryption
B)keep information on a need to know basis
C)use of firewalls
D)a & b
E)A & c
سؤال
Which of the following describe crowdsourcing

A)outsourcing of tasks
B)performed by a large group of people
C)the product must be free
D)A & B
E)A & C
سؤال
What are the main problems for individuals' contributions to KM?

A)privacy concerns
B)knowledge is power
C)management overzealousness to adapt
D)a & b
E)a & c
سؤال
Why might an employee be concerned about privacy?

A)fear of political retribution
B)fear that over time comments may be misconstrued
C)modesty
D)a & b
E)All of the above
سؤال
Which might apply to concerns about knowledge as power?

A)Fear of corporate conspiracy
B)Privately held knowledge makes someone indispensible
C)Fear for job security
D)a & b
E)b & c
سؤال
Why might senior executve be reluctant to adapt?

A)fear of losing their hierarchical position
B)fear of getting a salary reduction
C)fear of being seen as dead weight
D)fear of being obsolete
E)fear to change
سؤال
Which of the following could senior executives do to enable KM at their organizations?

A)create a bonus/incentive program
B)create a flatter organizational structure
C)introduce more employee benefits
D)increase the IT budget
E)All of the above
سؤال
Discuss the traditional decision making process.
سؤال
Describe what is a wicked problem and given an example.
سؤال
What are the new multiple perspectives to consider for KM support?
سؤال
Briefly describe what is knowledge leakage and why is it an important issue to address?
سؤال
List the ways that IP can be lost.
سؤال
List the legal ways of mitigating/preventing potential damage from loss of IP?
سؤال
What are some ways to protect from loss of IP?
سؤال
Explain three reasons why employees may resist contributing to KM.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/43
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 13: The Future of Knowledge Management
1
In the conventional decision-making process, the emphasis is first on defining the terms of a model, then on recognizing the problem.
False
2
The solutions to wicked problems are usually not good, but are easily applied to future instances of the problem.
False
3
Implementing an ERP is an example of a wicked problem.
True
4
Organizations usually know if their wicked problem went good or bad on implementation date.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 43 في هذه المجموعة.
فتح الحزمة
k this deck
5
The organization and social perspective for KM support involves looking at ethical and aesthetic issues.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 43 في هذه المجموعة.
فتح الحزمة
k this deck
6
The technical perspective for KM support involves analyzing the alternatives and implementing the chosen alternative.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 43 في هذه المجموعة.
فتح الحزمة
k this deck
7
The same technologies that allow sharing of knowledge in an organization could also cause knowledge to leak outside the organization.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 43 في هذه المجموعة.
فتح الحزمة
k this deck
8
Corporate espionage is a type of knowledge leakage.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 43 في هذه المجموعة.
فتح الحزمة
k this deck
9
The more modifiable knowledge is, the less sensitive it is to leakage.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 43 في هذه المجموعة.
فتح الحزمة
k this deck
10
A nondisclosure agreement is an informal understanding between third parties not to reveal the knowledge of a contracting organization that owns certain knowledge
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 43 في هذه المجموعة.
فتح الحزمة
k this deck
11
Patents protect expressions of work and traditionally have been used for literary works, works of art, architecture, and music.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 43 في هذه المجموعة.
فتح الحزمة
k this deck
12
Copyrights grant the holder an exclusive monopoly to any product containing the copyrighted works.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 43 في هذه المجموعة.
فتح الحزمة
k this deck
13
Patents are excellent vehicles for protecting valuable information about technical innovations and products.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 43 في هذه المجموعة.
فتح الحزمة
k this deck
14
An organization may want to avoid the legal process to protect IP and regard it a still legally protected form of IP.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 43 في هذه المجموعة.
فتح الحزمة
k this deck
15
The main reason Web 2.0 has been so successful is that it leverages crowd sourcing for knowledge creation.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 43 في هذه المجموعة.
فتح الحزمة
k this deck
16
Privacy concerns may inhibit individuals from sharing knowledge because they fear political retribution from within their organization.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 43 في هذه المجموعة.
فتح الحزمة
k this deck
17
Knowledge is power concerns may stem from a user's fear for their job security.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 43 في هذه المجموعة.
فتح الحزمة
k this deck
18
Most executives are willing to allow the redundancy needed in order to be accepting of KM.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 43 في هذه المجموعة.
فتح الحزمة
k this deck
19
Which of the following is not a step in the traditional decision making model?

A)recognize the problem
B)define the problem in terms of a model
C)analyze alternative solutions
D)call tech support
E)implement the best solution
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 43 في هذه المجموعة.
فتح الحزمة
k this deck
20
Which of the following is not a characteristic of wicked problems?

A)one shot occurrences
B)instantaneously knowing whether it went well or bad
C)it has repercussions that go well into the future
D)they have enormous economic consequences for an organization
E)it is common and easy to apply lessons learned to future instances of the problem
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 43 في هذه المجموعة.
فتح الحزمة
k this deck
21
Which of these is a wicked problem?

A)starting a company blog
B)implementing an ERP
C)switching IT hardware vendors
D)renegotiating a software licensing contract
E)All of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 43 في هذه المجموعة.
فتح الحزمة
k this deck
22
Which of the following a perspective to consider when implementing a KM system?

A)technical
B)personal and individual
C)organizational and social
D)ethical and aesthetic
E)all of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 43 في هذه المجموعة.
فتح الحزمة
k this deck
23
Which is the only perspective relevant to consider in existing decision support and KM systems?

A)technical
B)personal and individual
C)organizational and social
D)ethical and aesthetic
E)all of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 43 في هذه المجموعة.
فتح الحزمة
k this deck
24
What is lost with knowledge leakage?

A)Intellectual property
B)Competitive advantage
C)Trade secrets
D)All of the above
E)None of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 43 في هذه المجموعة.
فتح الحزمة
k this deck
25
Intellectual property includes which of the following?

A)inventions
B)designs
C)blog entries
D)marketing plans
E)All of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 43 في هذه المجموعة.
فتح الحزمة
k this deck
26
All of the following are sources of knowledge leakage except

A)data mining
B)employee turnover
C)reverse engineering
D)hacking the information systems
E)physical theft
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 43 في هذه المجموعة.
فتح الحزمة
k this deck
27
What are some legal steps can organizations take to protect from actually losing their IP?

A)nondisclosure agreements
B)patents
C)copyrights
D)classify knowledge as a trade secret
E)none of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 43 في هذه المجموعة.
فتح الحزمة
k this deck
28
A nondisclosure agreement is typically made between all of the following parties except

A)employees
B)third parties
C)customers
D)suppliers
E)all of the above may have to sign nondisclosure agreements
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 43 في هذه المجموعة.
فتح الحزمة
k this deck
29
Which of the following can prevent the loss of IP?

A)use of encryption
B)keep information on a need to know basis
C)use of firewalls
D)a & b
E)A & c
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 43 في هذه المجموعة.
فتح الحزمة
k this deck
30
Which of the following describe crowdsourcing

A)outsourcing of tasks
B)performed by a large group of people
C)the product must be free
D)A & B
E)A & C
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 43 في هذه المجموعة.
فتح الحزمة
k this deck
31
What are the main problems for individuals' contributions to KM?

A)privacy concerns
B)knowledge is power
C)management overzealousness to adapt
D)a & b
E)a & c
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 43 في هذه المجموعة.
فتح الحزمة
k this deck
32
Why might an employee be concerned about privacy?

A)fear of political retribution
B)fear that over time comments may be misconstrued
C)modesty
D)a & b
E)All of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 43 في هذه المجموعة.
فتح الحزمة
k this deck
33
Which might apply to concerns about knowledge as power?

A)Fear of corporate conspiracy
B)Privately held knowledge makes someone indispensible
C)Fear for job security
D)a & b
E)b & c
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 43 في هذه المجموعة.
فتح الحزمة
k this deck
34
Why might senior executve be reluctant to adapt?

A)fear of losing their hierarchical position
B)fear of getting a salary reduction
C)fear of being seen as dead weight
D)fear of being obsolete
E)fear to change
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 43 في هذه المجموعة.
فتح الحزمة
k this deck
35
Which of the following could senior executives do to enable KM at their organizations?

A)create a bonus/incentive program
B)create a flatter organizational structure
C)introduce more employee benefits
D)increase the IT budget
E)All of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 43 في هذه المجموعة.
فتح الحزمة
k this deck
36
Discuss the traditional decision making process.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 43 في هذه المجموعة.
فتح الحزمة
k this deck
37
Describe what is a wicked problem and given an example.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 43 في هذه المجموعة.
فتح الحزمة
k this deck
38
What are the new multiple perspectives to consider for KM support?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 43 في هذه المجموعة.
فتح الحزمة
k this deck
39
Briefly describe what is knowledge leakage and why is it an important issue to address?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 43 في هذه المجموعة.
فتح الحزمة
k this deck
40
List the ways that IP can be lost.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 43 في هذه المجموعة.
فتح الحزمة
k this deck
41
List the legal ways of mitigating/preventing potential damage from loss of IP?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 43 في هذه المجموعة.
فتح الحزمة
k this deck
42
What are some ways to protect from loss of IP?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 43 في هذه المجموعة.
فتح الحزمة
k this deck
43
Explain three reasons why employees may resist contributing to KM.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 43 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 43 في هذه المجموعة.