2.99 See Answer

Question: Describe the stages in the knowledge management


Describe the stages in the knowledge management value chain.


> Identify and describe each of the principal risk factors in information systems projects.

> Distinguish between tangible and intangible benefits.

> List and describe the major costs and benefits of information systems.

> Explain how key performance indicators, portfolio analysis, and scoring models can be used to select information systems projects.

> How can the full set of logistical and cross-functional drivers be used to create strategic fit for a cell phone manufacturer targeting both time sensitive and price conscious customers?

> Describe the purpose of an information systems plan and list the major categories in the plan.

> Name and describe the groups responsible for the management of information systems projects.

> Define project management. List and describe the project management activities and variables addressed by project management.

> Explain how project management software tools contribute to successful project management.

> Identify the organizational considerations that should be addressed by project planning and implementation.

> Identify and describe the strategies for controlling project risk.

> Explain why there is such a high failure rate for implementations involving enterprise applications, business process reengineering, and mergers and acquisitions.

> Explain why eliciting support of management and end users is so essential for successful implementation of information systems projects.

> Describe information system problems resulting from poor project management.

> Define information system prototyping. Describe its benefits and limitations. List and describe the steps in the prototyping process.

> What are some industries in which products have proliferated and life cycles have shortened? How have the supply chains in these industries adapted?

> Define the traditional systems lifecycle. Describe its advantages and disadvantages for systems building.

> Compare object-oriented and traditional structured approaches for modeling and designing systems.

> Describe the role of programming, conversion, production, and maintenance in systems development.

> Explain why the testing stage of systems development is so important. Name and describe the three stages of testing for an information system.

> Define information requirements and explain why they are difficult to determine correctly.

> Distinguish between systems analysis and systems design. Describe the activities for each.

> Define business process management and describe the steps required to carry it out.

> Explain the features of mobile application development and responsive web design.

> Explain how component-based development and web services help firms build and enhance their information systems.

> Define rapid application development (RAD), agile development, and DevOps and explain how they can speed up system building?

> How can a home-delivery company like Peapod use pricing of its delivery services to improve its profitability?

> Describe the advantages and disadvantages of using outsourcing for building information systems.

> Define end-user development and describe its advantages and disadvantages. Name some policies and procedures for managing end-user development.

> Define an application software package. Explain the advantages and disadvantages of developing information systems based on software packages.

> Describe each of the four kinds of organizational change that can be promoted with information technology.

> Compare two different management strategies for developing BI and BA capabilities.

> List and describe the analytic functionalities provided by BI systems.

> List and describe the elements of a business intelligence environment.

> Define and describe business intelligence and business analytics.

> Identify the specific managerial roles that can be supported by information systems.

> Compare the descriptions of managerial behavior in the classical and behavioral models.

> List and describe the stages in decision making.

> Distinguish between an unstructured, semistructured, and structured decision.

> Define a group decision-support system (GDSS) and explain how it differs from a DSS.

> Define and describe the balanced scorecard method and business performance management.

> Describe how MIS, DSS, or ESS provides decision support for each of these groups.

> List each of the major decision-making constituencies in an organization and describe the types of decisions each makes.

> Define an expert system, describe how it works, and explain its value to business.

> Describe how the following systems support knowledge work: CAD, virtual reality, and augmented reality.

> Define knowledge work systems and describe the generic requirements of knowledge work systems.

> Describe the role of the following in facilitating knowledge management: taxonomies, MOOCs, and learning management systems.

> How could an industrial supplies distributor use information to increase its responsiveness?

> Define and describe the various types of enterprise-wide knowledge management systems and explain how they provide value for businesses.

> Distinguish between data, knowledge, and wisdom and between tacit knowledge and explicit knowledge.

> Describe the important dimensions of knowledge.

> Define and describe fuzzy logic, genetic algorithms, and intelligent agents. Explain how each works and the kinds of problems for which each is suited.

> Define a neural network and describe how it works and how it benefits businesses.

> Define machine learning and give some examples.

> Define case-based reasoning and explain how it differs from an expert system.

> Define knowledge management and explain its value to businesses.

> Explain how Internet technology supports business-to-business electronic commerce.

> How could a bicycle manufacturer increase responsiveness through its facilities?

> Why should a firm such as Dell take into account total supply chain profitability when making decisions?

> Define the social graph and explain how it is used in e-commerce marketing.

> Define behavioral targeting and explain how it works at individual websites and on advertising networks.

> Explain how social networking and the wisdom of crowds help companies improve their marketing.

> Name and describe the e-commerce revenue models.

> Name and describe the principal e-commerce business models.

> Define a digital market and digital goods and describe their distinguishing features.

> List and describe the eight unique features of e-commerce.

> List and describe the four types of e-commerce presence.

> List and describe important types of m-commerce services and applications.

> Define and describe Net marketplaces and explain how they differ from private industrial networks (private exchanges).

> 1. Assess the importance of the Philly311 project for the city of Philadelphia and its citizens. 2. Why was the Philly311 project so successful? What management, organization, and technology factors contributed to its success? 3. What risk mitigation str

> Describe how partner relationship management (PRM) and employee relationship management (ERM) are related to customer relationship management (CRM).

> Define customer relationship management and explain why customer relationships are so important today.

> Distinguish between a push-based and pull-based model of supply chain management and explain how contemporary supply chain management systems facilitate a pull-based model.

> Describe the challenges of global supply chains and how Internet technology can help companies manage them better.

> Define and compare supply chain planning systems and supply chain execution systems.

> Explain how supply chain management systems help reduce the bullwhip effect and how they provide value for a business.

> Define a supply chain and identify each of its components.

> Describe how enterprise systems provide value for a business.

> Define social CRM and explain how customer relationship managements systems are using social networking.

> How are enterprise applications taking advantage of SOA, cloud computing, and open source software?

> Analyze ConAgra’s problems with its old system. What management, organization, and technology factors were responsible for these problems? What was the business impact of these problems? List and describe the information requirements of My Recipe. What t

> Explain how these challenges can be addressed.

> List and describe the challenges posed by enterprise applications.

> Distinguish between operational and analytical CRM.

> Describe the tools and capabilities of customer relationship management software for sales, marketing, and customer service.

> Define an enterprise system and explain how enterprise software works.

> Describe measures for improving software quality and reliability.

> Identify and describe the security problems cloud computing poses.

> Distinguish between disaster recovery planning and business continuity planning.

> Describe the role of encryption and digital certificates in a public key infrastructure.

> Explain how encryption protects information.

> 1. How is GE changing its business strategy and business model? What is the role of information technology in GE’s business? 2. On what business functions and level of decision making is GE focusing? 3. Describe three kinds of decisions that can be suppo

> Describe the roles of firewalls, intrusion detection systems, and antivirus software in promoting security.

> Name and describe three authentication methods.

> Explain how information systems auditing promotes security and control.

> Define and describe the following: security policy, acceptable use policy, and identity management.

> Describe the function of risk assessment and explain how it is conducted for information systems.

> Define application controls and describe each type of application control.

> Define general controls and describe each type of general control.

> Describe the relationship between security and control and recent U.S. government regulatory requirements and computer forensics.

2.99

See Answer