MBA632 Knowledge Management. Ass 2
Individually, you are required to record a 10-minute video, in which you must briefly discuss ethical breaches that arise in the absence of knowledge management systems and how these are alleviated in knowledge-rich environments.
This assessment will allow students to investigate ethical breachers that arise in the absence of a knowledge management system. They will also explore how these breaches are alleviated in knowledge-rich environments.
This assessment is an individual assessment. You are required to analyse an organisation you know (preferably the organisation/company you worked for in the past, you are currently working, etc.). The findings presented in the written analysis must be based on extensive research and should be supported by academic sources. You must also incorporate theories and concepts of Knowledge Management discussed in Weeks 1 to 7.
Your video presentation must include analysis, discussion of the ethical breach(es) and recommendations related to knowledge management in the researched organisation.
Your video presentation must include recommendations for mitigating risks related to potential ethical breaches arising in the absence of knowledge management systems.
Presentation format:
• An Introduction that summarises the purpose of the Video Presentation.
• A brief overview of the organisation you researched.
• Detailed information about the ethical breach(es) arising in the absence of knowledge management systems discussed, and the implications of the breach(es).
• Discussion of the importance of “having the right Knowledge Management Strategy in place”.
• Recommendations for dealing with the impact of the discussed ethical breach(es) in the researched organisation.
• Recommendations for mitigating risks related to ethical breaches arising in the absence of knowledge management systems.
• A conclusion.
• Reference list.
As part of your video presentation, you will need to create “the PowerPoint slides”. Only the video file is submitted. PowerPoint slides are a part of your video presentation delivery. There is no separate submission of the PowerPoint presentation required/permitted.
A Reference list must be included in the PowerPoint slide deck. To help you start this assessment on the right track, over weeks 1-7 of the trimester, your workshop facilitator will engage you and the rest of the class in preliminary discussions about the organisation you wish to research. Please pay specific attention to your workshop facilitator’s instructions regarding this assessment. The findings presented in the video presentation must be based on relevant primary research and secondary data.
You must use at least five (10) sources of information and reference these in accordance with the Kaplan Harvard Referencing Style. These may include primary and secondary sources of data collected from websites, social media sites, industry reports, census data, journal articles, newspaper articles, etc. These references should be presented as in-text citations and a reference list at the end of your written analysis (not included in the word limit). Wikipedia and other ‘popular’ sites are not to be used.
As per the MBA Assignment Expert overview,
â—Ź Knowledge is stored and retrieved using a knowledge management system (KMS) to enhance comprehension, teamwork, and operational processes (Santoro et al., 2018).
â—Ź Platforms for managing information can be found within individuals or organisations, but they may also be employed to organise a firm's expertise for its clients or consumers.
â—Ź The following study will analyse how the lack of KMS could result in ethical violations for companies and the significance of KMS with a focus on Amazon Company.
Speaker Notes: The responsible approach seeks to limit the dissemination of detailed information, maintain privacy, safeguard individual proprietary information, and refrain from using knowledge against any partners. Many information management techniques have more devious goals and are frequently self-serving (Santoro et al., 2018). It is crucial to emphasise that Amazon functions in a technologically dependent sector of the economy and also that studying knowledge management would be helpful in regulating actions.
â—Ź The 1994-founded corporation Amazon is renowned for its modern, strategic method of business management.
â—Ź The business has recently gained more popularity as a result of the reason it uses comprehensive knowledge management to achieve its goals.
â—Ź By using organised procedures with the firm's current data, reducing errors, and enhancing the accessibility of knowledge, Intelligent Automation of KMS in AWS (Amazon Web Services) has boosted creativity (AWS, 2023).
Speaker Notes: Unique KMS projects that have altered the world's direction have already been promoted by Amazon in the first place. Although the company initially created the infrastructure for cloud computing to aid better web applications, it has subsequently begun offering similar solutions to other businesses (AWS, 2023). By using encryption, the corporation has been able to keep its relationships with consumers and clients positive.
â—Ź Privacy protection, data governance, cybersecurity, data management, as well as the credibility of information seem to be just a few of the ethical problems that come up in KMS (Senyo, Addae and Boateng, 2018).
â—Ź A data leak caused by improper KMS could endanger the company's reputation and its customers' confidence.
â—Ź One key issue is information security, as gaining personal data available may result in unethical activity on the part of the firm and constitute a breach of security (ViiBE, 2022).
Speaker Notes: Because of inappropriate KMS, security breaches occur, disrupting confidence and posing a danger of safety compromise or loss. It is a flagrant disregard for the rule and a breach of decency (ViiBE, 2022). The corporation must control it, personnel who have exposure to the data must be supervised, and monitoring is necessary to stop the potential unethical activity. Also, the lack of KMS could make way for online hackers to access information on individuals.
â—Ź A lack of KMS could lead to sensitive documents getting into the wrong hands, which could be disastrous for the business and its clients.
â—Ź It is comparable to being taken from the company's tangible assets because the knowledge structure, as well as proprietary information, are important assets.
â—Ź It caused customer service representatives from the organisation to provide clients with erroneous information or gave the hackers a brand-new access point (Shelf, 2019).
Speaker Notes: A significant portion of security breaches are due to a lack of KMS or unintentional KMS disclosure rather than a purposeful attack. Without appropriate KMS, many varieties of cyberattacks could spread quickly and attack sizable portions of a company's network (Senyo, Addae and Boateng, 2018). There could be no method to regain access if a company does not keep a suitable KMS solution or if the malware is successful in infecting the network servers.
â—Ź Failure to maintain good KMS could lead to a privacy breach, which could cause a large monetary loss because of a spike in the number of unhappy consumers.
â—Ź Whenever a corporation's data is compromised, resulting in a violation that can lead to fraudulent activity, consumers who trust the organisation with their private details frequently seek legal recourse against the organisation (Hislop et al., 2018).
â—Ź Additionally, security breaches may harm a company's reputation and weaken public confidence.
Speaker Notes: Organisations that encounter security breaches must deal with significant and growing repercussions. The additional increasing pressure to notify the people whose information has been exposed is mostly to blame for this (Hislop et al., 2018). Companies that conduct business abroad, like Amazon, may have clients in numerous countries and must adhere to several rules. Some businesses may consider the expenses associated with this system, in addition to potential fines, damages recompense, and also any consequent litigation, as an imminent threat.
â—Ź Organisations can increase the amount of knowledge possessed by selected individuals or sections and disseminate information by setting up effective KMS (Santoro et al., 2018).
â—Ź It raises institutional consciousness and presents a convincing explanation for any prospective advantages to the organisation.
â—Ź KMS are capable of arranging information depending on the kind of data contained and also who requires access to what (Wang and Meng, 2019).
Speaker Notes: Successful information-gathering, storing, and sharing organisations can foster a spirit of cooperation and openness. Companies consequently observe increased productivity and contented workers. An efficient KMS makes company data more available while simplifying it. Since it is simpler to retrieve essential information, proper KMS could enhance practically any operation (Wang and Meng, 2019). Increased productivity, in addition to economic and cultural advantages, can result from enhanced knowledge exchange and cooperation.
â—Ź One of a firm's biggest accomplishments is knowledge, which creates an advantage for the corporation and enables highly cohesive and proactive decision-making.
â—Ź It lessens the chance of compromising information and data, which is often lost or erased electronically, and moreover cuts down on time needed to produce analyses or reevaluate data (Mizintseva and Gerbina, 2018).
â—Ź Systems theory offers a basis for such an integrated knowledge and therefore can improve organisational KMS implementation.
Speaker Notes: The KMS strategy requires businesses to outline the precise steps that will enable them to realise their vision.Making connections between KMS and corporate strategy is essential to ensuring that it is business-driven and develops with the company. In the fast-paced business environment of today, when almost all firms seek to rely on information, these competencies are increasingly desirable (Mizintseva and Gerbina, 2018). The appropriate KMS approach can boost a firm's ability to apply its common understanding to expand its marketplace reach, improve its goods and services, and win consumers' confidence.
â—Ź Enhancing methods for managing data and safeguarding that knowledge could be useful in fostering efficiency at Amazon.
â—Ź Amazon management must concentrate on keeping security mechanisms in place to safeguard protected data and make sure that workers sign NDAs that forbid them from spreading knowledge to anybody outside the organisation (Medium, 2020).
â—Ź The KMS platform from Amazon must be protected by authentications and passwords that are unique to each worker.
Speaker Notes: Machine learning and big data insights could be used by Amazon to gain traction in the current market. Nevertheless, it is crucial to remember that gathering data on digital channels might aid in building a sizable database of knowledge management-related data (Tseng, 2016). Also, implementing a bottom-up strategy enables the business to collect data that may be helpful in making future decisions.
â—Ź The KMS server must be protected by routinely enlightening and reinforcing the staff about knowledge of database safety practices.
â—Ź Workers must agree to abide by company privacy policies, and organisations must train workers on how to carefully prevent actions that can violate privacy.
â—Ź Setting authorisation based on criteria like level of expertise, work function, job needs, as well as security approval also represents one of the ideal ways to improve KMS safety and avoid data breaches (Tan, 2016).
Speaker Notes: Without the knowledge and understanding that KMS possesses, organisations might not be capable of providing clients with the same high-quality support. KMS seems to be the foundation of every firm (Centobelli, Cerchione and Esposito, 2017). Furthermore, the absence of a proper KMS would prevent the organisation from making decisions. Businesses could keep their data secure and accessible whenever they most require it by safeguarding KMS by following information database safety guiding principles.
â—Ź From the analysis above, it can be concluded that KMS is one of the essential components in the business environment for an organisation to function properly.
â—Ź Implementation of the appropriate KMS techniques will be essential in boosting prosperity for businesses like Amazon.
â—Ź Lastly, the recommendations offered in this analysis can be valuable for many other organisations to effectively maintain their KMS platform in order to improve operational processes and gain customers' trust.
Speaker Notes: The above-mentioned analysis has covered the idea of KMS and how it is used in contemporary organisations like Amazon. This study's analysis effectively encompassed a variety of security vulnerabilities that may occur as a result of a lack of a KMS infrastructure and its repercussions for a business. Additionally, the advantages of proper KMS platforms have been discussed, along with suggestions for how the chosen company should manage their effect.
AWS, (2023). Knowledge Management | AWS Solutions for Cross-Industry. Available at: https://aws.amazon.com/solutions/cross-industry/knowledge-management/ [Accessed 10 January 2023]
Centobelli, P., Cerchione, R. and Esposito, E., (2017). Knowledge management in startups: Systematic literature review and future research agenda. Sustainability, 9(3), p.361. Accessed from: https://www.mdpi.com/2071-1050/9/3/361/pdf
Hislop, D., Murray, P.A., Shrestha, A., Syed, J. and Mouzughi, Y., (2018). Knowledge management:(potential) future research directions. In The Palgrave Handbook of Knowledge Management (pp. 691-703). Palgrave Macmillan, Cham. Accessed from: https://link.springer.com/chapter/10.1007/978-3-319-71434-9_28
Medium, (2020). Ethical issues that may arise in information management. Available at: https://smiling-swati20.medium.com/ethical-issues-that-may-arise-in-information-management-6abfa1b64fd4 [Accessed 10 January 2023]
Mizintseva, M.F. and Gerbina, T.V., (2018). Knowledge management: a tool for implementing the digital economy. Scientific and Technical Information Processing, 45(1), pp.40-48. Accessed from: https://link.springer.com/article/10.3103/S0147688218010094
Santoro, G., Vrontis, D., Thrassou, A. and Dezi, L., (2018). The Internet of Things: Building a knowledge management system for open innovation and knowledge management capacity. Technological forecasting and social change, 136, pp.347-354. Accessed from: https://fardapaper.ir/mohavaha/uploads/2017/09/The-Internet-of-Things.pdf
Shelf, (2019). Critical Security Considerations when Assessing Knowledge Management Software. Available at: https://shelf.io/blog/critical-security-considerations-when-assessing-knowledge-management-software/ [Accessed 10 January 2023]
Tseng, S.M., (2016). The effect of knowledge management capability and customer knowledge gaps on corporate performance. Journal of Enterprise Information Management. Accessed from: https://www.academia.edu/download/59049943/JURNAL_UTAMA_UNTUK_PROPOSAL20190427-116251-121hmbc.pdf
ViiBE, (2022). Critical security considerations in assessing knowledge management. Available at: https://blog.viibe.co/critical-security-considerations-in-assessing-knowledge-management/ [Accessed 10 January 2023]
Wang, H. and Meng, X., (2019). Transformation from IT-based knowledge management into BIM-supported knowledge management: A literature review. Expert Systems with Applications, 121, pp.170-187. Accessed from: https://www.sciencedirect.com/science/article/pii/S0957417418307796