SCSB -BSBINM501 PPTs (Aspire's).pptx

Managing the use of the system involves o monitoring

Info icon This preview shows pages 50–61. Sign up to view the full content.

View Full Document Right Arrow Icon
Managing the use of the system involves: o Monitoring the implementation of system policies and procedures o Addressing implementation issues and problems o Monitoring the integration and alignment with data and information systems o Collecting information on the achievement of performance measures o Managing contingencies by accessing technical specialist help as required
Image of page 50

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
The need for a KMS policy or procedure may be identified by: o an evaluation or an audit o an incident occurring for which there is no appropriate policy in place o new legislation or standards o a gap analysis.
Image of page 51
To persuade management that a new policy or procedure is required, demonstrate: o how the issue relates to organisational goals o whether significant risks are involved o whether there are legislative or compliance issues o whether standardisation or consistency is at risk o whether tasks can be easily carried out.
Image of page 52

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
When implementing policies or procedures relating to the KMS: o limit the number of policies to the key determinates of quality o ensure consistency with organisational vision, mission and values o consider legislative requirements o focus on assisting decision-making, not controlling activities o ensure required staff and management behaviour is included.
Image of page 53
Policies and procedures may need to comply with legislative requirements including: o Privacy and confidentiality o Defamation o Occupational health and safety o Anti-discrimination
Image of page 54

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Effective information systems are efficient, accurate and relevant. Strategies for achieving this include: o using intuitive functionality o checking data entry using parity checking, peer review or authority levels o using effective data retrieval tools, such as targeted search engines, using standardised information folders and centralising data.
Image of page 55
Strategies to help maintain integrity and confidentiality include: o restricting access to authorised or qualified individuals o using consistent styles and formats o developing policies to enforce compliance o using templates for forms and templates.
Image of page 56

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Monitor data in the KMS to maintain relevance. Strategies for monitoring data may include: o conducting regular reviews o setting parameters to delete data automatically.
Image of page 57
A key function of any KMS is to allow users to share and access data. Examples of sharing data include: o mobile device banking using wireless internet devices o policy and procedure guidelines o authority structures.
Image of page 58

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
When implementing policies and procedures relating to information or knowledge management systems, identify: o where monitoring is required o what is most important to the organisation o what is happening and what should be happening o whether action is required o what action is required.
Image of page 59
Monitoring tools are used to identify implementation issues. They will generally be targeted to the situation and may include: o Computer databases o Project management software o Personal schedulers o Financial controls o Production controls o Informal monitoring
Image of page 60

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Image of page 61
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern