Managing Knowledge and Collaboration: Management Information Systems
Managing Knowledge and Collaboration: Management Information Systems
Managing Knowledge and Collaboration: Management Information Systems
LEARNING OBJECTIVES
1
05-02-2013
2
05-02-2013
• Three major types of knowledge management Major Types of Knowledge Management Systems
systems:
• Enterprise-wide knowledge management systems
• General-purpose firm-wide efforts to collect, store, distribute, and
apply digital content and knowledge
• Knowledge work systems (KWS)
• Specialized systems built for engineers, scientists, other knowledge
workers charged with discovering and creating new knowledge
• Intelligent techniques
• Diverse group of techniques such as data mining used for various
goals: discovering knowledge, distilling knowledge, discovering
optimal solutions There are three major categories of knowledge management systems, and each can be
broken down further into more specialized types of knowledge management systems.
Figure 11-3
11.17 © 2010 by Prentice Hall 11.18 © 2010 by Prentice Hall
3
05-02-2013
4
05-02-2013
Knowledge work systems require strong links to external knowledge bases in addition to specialized hardware and software.
Figure 11-6
11.29 © 2010 by Prentice Hall 11.30 © 2010 by Prentice Hall
5
05-02-2013
Figure 11-8
11.35 © 2010 by Prentice Hall 11.36 © 2010 by Prentice Hall
6
05-02-2013
7
05-02-2013
Reality Mining
How a Neural Network Works
• Read the Interactive Session: Technology, and then
discuss the following questions:
• Why might businesses be interested in location-based mobile
networking?
• What technological developments have set the stage for the
growth of Sense Networks and the success of their products?
• Do you feel that the privacy risks surrounding CitySense are
significant? Would you sign up to use Sense Network
services? Why or why not?
A neural network uses rules it “learns” from patterns in data to construct a hidden layer of logic. The hidden
layer then processes inputs, classifying them based on the experience of the model. In this example, the
neural network has been trained to distinguish between valid and fraudulent credit card purchases.
Figure 11-11
11.43 © 2010 by Prentice Hall 11.44 © 2010 by Prentice Hall
Figure 11-12
11.45 © 2010 by Prentice Hall 11.46 © 2010 by Prentice Hall
8
05-02-2013
Intelligent Techniques