130 likes | 393 Views
INTEGRATION OF SECURITY MECHANISMS INTO KNOWLEDGE MANAGEMENT OF LOCAL MANUFACTURING COMPANY OLADEJO Bolanle F. & ADABALE, AFOLABI A. TOKI 2016.
E N D
INTEGRATION OF SECURITY MECHANISMS INTO KNOWLEDGE MANAGEMENT OF LOCAL MANUFACTURING COMPANY OLADEJO Bolanle F. & ADABALE, AFOLABI A. TOKI 2016
The need to create an enabling environment that encourages sharing of knowledge among people within an organization to prevent organizational memory loss has been a major challenge confronting majority of our local industries. What then can we assert as Knowledge Management? Knowledge Management is about the knowledge exploitation and improvement of a company to achieve the organization’s objectives INTRODUCTION
This project focuses on a local manufacturing organization that had in the past encountered some problemssuch as loss of sensitive business information to third party and sadly to fire accident as well. The problems occurred as a result of inadequacy in the management and preservation of the organization’s knowledge assets. This work therefore explores possible solutions through the adoption of appropriate ICT tool fortified with adequate information security measures and with the capability to manage business information effectively. INTRODUCTION…
The need for efficient management of organizational knowledge assets. • The need to adequately preserve organizational knowledge assets • The need to prevent organizational memory loss, such as losing of intellectual capital and sensitive business information to exiting staff or those taking on new job roles within the same organization. RATIONALE of the study
To create a centralized knowledge base-type repository, where knowledge assets can be deposited to be accessed , retrieved, and applied to business processes. • To transform knowledge to add value to business processes and operations of the organization and use same to provide a competitive gain for its business. • To establish a platform that supports knowledge sharing and collaboration in an organization. • To ensure the preservation of sensitive business information by implementing suitable information security measures which includes access control, encryption, e.t.c. • To manage the discovered and elicited knowledge by developing a Secured Collaborative Knowledge Management System (SCKMS). CRUX OF SECURITY OF KNOWLEDGE ASSETS
The adopted model in this phase of SCKMS system development is a linear- sequential model. The architecture of the system is as depicted below: Fig.1.1: Architecture of SCKMS System Methodology Point where the effectiveness of one of the security measures implemented at the backend of the system is verified.
DOCUMENTATION OF SCKMS • The SCKMS system architecture illustrates the modus operandi of the system. The organization memory has two parts; the team knowledgebase and the organizational knowledge. • In this context, the Organizational Memory is the knowledge base-type repository that houses various kinds of knowledge relevant to business operations. E.g. product formulation. • The SCKMS interfaces the users, the organizational memory and the knowledge repository. • The SCKMS as the system mechanism, accepts user’s requests, searches the repository for the information requested and makes it available to users via the interface.
This is the operational stage of the SCKMS system. At this stage the system was tested just after its implementation. It was hosted and the intended users were provided with the URL –www.corporatecollaborationsystem.com, to have a hand-on practice. Below are the user account creation interface and the account creation successful report page: SYSTEM IMPLEMENTATION
Development of centralized knowledge repository to replace the manual system used by our case study –PMNL. • Access Control to sensitive business information in the PMNL’s knowledge repository. • The preservation of the organizational knowledge assets was ensured to address the information security issue facing our case study -PMNL. CONTRIBUTIONS
The SCKMS system is found to have met the needs and expectations of the intended users and hence accepted to be an appropriate tool for managing knowledge assets. it is thus recommended for effective collaboration among people and any knowledge based organization. There is of course a room for improvement, particularly in the area of information security as technology advances with time. Particularly if any organization chooses to make its knowledge repository accessible over the internet. Conclusion & RECOMMENDATIONS