首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到18条相似文献,搜索用时 93 毫秒
1.
徐海燕 《电子世界》2012,(12):82-82
本文分析了在Web2.0环境下,个人知识管理的意义,Web2.0对个人知识管理的影响及基于Web2.0的个人知识管理实施策略。  相似文献   

2.
中学教师作为社会上典型的知识工作者,知识是其生存和发展的重要资本。当前,部分中学教师虽然拥有丰富的知识,但在知识管理方面却存在不少问题。本文从中学教师个人知识管理存在的问题入手,在分析教师个人知识管理内涵的基础上,深入阐述教师实施个人知识管理的过程与方法,并提醒几个需要注意的事项,以期帮助教师实施有效的知识管理,提升个人价值和核心竞争力。  相似文献   

3.
个人知识管理为提升电子商务专业学生的实践能力提供了新的途径。本文分析了个人知识管理对电子商务专业学生的重要性,探讨提升学生个人知识管理能力的方法与对策。  相似文献   

4.
本研究分析基于混搭社会性软件促进中小学教师个人知识管理的现状,为进一步提出应用社会性软件促进中小学教师个人知识管理的策略做理论基础。  相似文献   

5.
宋晓丽  张勇波 《信息技术》2012,(4):159-161,165
个人知识管理作为提升个人竞争力的一种手段,近年来被各行各业高度重视,人们纷纷寻求各种方法来提高自身的个人知识管理能力。但他们过多的重视知识的个人价值,不注重知识的共享。PLE是基于Web2.0和社会性软件的一种理念,强调自主学习、交流共享,其中社会性软件为我们进行个人知识管理带来了很大的便利。在PLE中,充分利用社会性软件,加强对个人知识管理方法的研究,以此来促进综合素质的提升。  相似文献   

6.
知识管理是将个人和企业的知识资产有组织地集结、共享,并借此提高效率,生成价值。然而,目前很多人并未真正理解知识与“技术”或“信息”等概念间的差异  相似文献   

7.
本文探讨个人电子邮箱活动与PIM活动之间的关系,指出了运用电子邮箱进行PIM管理时存在的主要问题,并提出了相应的解决措施。  相似文献   

8.
知识被认为是企业最重要的战略资源,企业成功与否取决于知识管理的成败。知识共享是企业实施知识管理活动的重要议题。本文详细分析了软件企业员工知识的特点,识别出影响员工知识共享的关键因素,提出了影响软件企业知识共享的基本模式。  相似文献   

9.
知识管理是将个人和企业的知识资产有组织地集结、共享,并借此提高效率,生成价值。然而,目前很多人并未真正理解知识与"技术"或"信息"等概念间的差异从某种极端意义上来说,信息社会和知识社会可能是两个截然相反的世界。"知识"作为下一代产业经营的关键词正备受瞩目。20世纪90年代后半期开始风行的"知识管理"概念,可谓这一概念获得关注的表现形式。  相似文献   

10.
分析了基于知识的企业理论和组织学习的关系,在此基础上对组织学习的系统复杂性进行了论述,将知识管理的复杂性和组织学习的系统复杂性联系起来,阐明了知识管理复杂性对组织学习的作用。  相似文献   

11.
This paper offers the author's personal reflections on the past 50 years of research in engineering management. I suggest that the most important development in this field has been the continuing broadening of the relevant bodies of knowledge and the increased attention paid by scholars in the pertinent social science and systems disciplines to issues involving technology and its management. The paper concludes with a brief speculation on the future of the field.  相似文献   

12.
行动学习理论是以实际的工作任务或问题为导向, 以完成任务或解决问题为主线, 以个人能力为基础, 通 过在实际工作过程中对固有知识的质疑与反思, 以及团队支撑和同伴支持, 来提升自身的能力与水平。青 年教师是高职院校教师队伍的主力军, 其教学能力的高低对学校教学的影响较大, 需要学校给予更多的关 注。因此, 学院要根据青年教师的教学能力、专业背景、个人意愿, 以行动学习理论为指导, 以制度引领 为基础, 以专业支撑为核心, 以平台搭建为载体, 以自我提升为关键, 探寻提升高职青年教师教学能力的 路径与方法。  相似文献   

13.
郭志勇  毕恒  张辉 《信息技术》2003,27(8):78-80
介绍了知识管理的概念 ,其核心内容是企业知识的收集、共享、分类、检索、使用和创新。而管理信息系统是建立在信息技术基础上 ,为企业决策层及员工提供决策运行手段的管理平台。将知识管理有机地融入企业的管理信息系统中 ,将极大地提高企业管理信息系统的应用水平 ,使企业真正成为具有国际竞争力的“知识型”企业。  相似文献   

14.
As Internet is a prime vehicle for business and personal interactions, more and more organizations provide their users with personalized online services. Identity Management is, therefore, a key component for these organizations to manage users’ accounts (i.e. identities) and secure access to their personal services and information. Today, however, users’personal information and authentication are confined to organizations’ boundaries. This brings to a situation where the users have multiple identities on the Internet preventing both users and organizations to benefit from registrations and authentications already done at other organizations. Identity federation becomes, therefore, a key component of identity management enabling authentications and personal information to pass through organizations’boundaries in a privacy-friendly way. This article focuses on Single Sign-On and attribute sharing, two of the main functions Identity Management systems provide. It gives an overview of the main solutions available today.  相似文献   

15.
Mobile crowd-sensing can learn the aggregate statistics over personal data to produce useful knowledge about the world. Since personal data may be privacy-sensitive, the aggregator should only gain desired statistics without learning anything about the personal data. To guarantee differential privacy of personal data under an untrusted aggregator, existing approaches encrypt the noisy personal data, and allow the aggregator to get a noisy sum. However, these approaches lack of either efficient support of dynamic joins and leaves, or secure data-integrity verification, or fault tolerance. In this paper, we propose a novel private data aggregation scheme to address these issues for mobile crowd-sensing applications. In our scheme, we first design an efficient group management protocol to deal with the participants’ dynamic joins and leaves. Then we enhance the scheme with data-integrity verification by considering the security vulnerability of limited data range. Moreover, we guarantee fault tolerance by leveraging a future message buffering mechanism, enabling continuously obtaining aggregate results and integrity verifications when failures happen. The analysis indicates that our scheme achieves desired properties, and the performance evaluation demonstrates the scheme’s efficiency in terms of communication and computation overhead.  相似文献   

16.

The terminological composition of information management (IM) and knowledge management (KM) is described in order to evidence how much do these areas overlap within the library and information sciences (LIS) space. A term co-occurrence analysis is conducted as from documents extracted from Web of Science, covering the period 1980–2015. To examine the terminological (di) similarity two approaches are applied: ‘overlay visualization? and ‘topic detection?. The percentage of terminological similarity oscillates between 24% and 38% according to the ‘overlay visualization? and ‘topic detection? techniques. At the core of the terminological intersection between IM and KM lies the study around processes, technologies and information systems. However, they are semantically two separate areas that tend to address similar dimensions -such as the managerial, educational and medical, but emphasizing different approach. Moreover, IM refers to the library and information organizations, highlighting the focus on personal information management, human information behavior, health information management, and information resource management. Oppositely, KM highlights the business, management and accounting realms in which topics like knowledge sharing and social networks, knowledge management strategies, and knowledge management projects are prevailing. These results would help to (re) define curricular contents of LIS programs as well as research and practical activities conducted by academicians and managers. This is the most comprehensive quantitative study in examining the epistemic borders between IM and KM in the LIS research. The authors consider that the methodological procedures here employed might be suitable to understand the boundaries between similar fields.

  相似文献   

17.
近年来,随着智能终端在全球市场的成功推出,移动互联网的普及与应用得到了快速发展,并已成为日常生活中的重要组成部分,个人隐私泄露与保护问题也日益凸显。因此,亟需建立以身份管理为核心的信息网络基础设施,用于规范个人信息管理、提升政府的监管能力、促进ICT网络的融合与发展。本文从移动互联网面临的用户隐私信息保护问题入手,介绍了移动互联网中身份管理产业推进的情况,提出了身份管理作为信息网络重要基础设施的应对建议以及下一步的研究建议。  相似文献   

18.
赵俊 《电子测试》2016,(1):154-155
加强对商业银行的信用风险管理十分重要,在对信用风险进行管理的过程中,我们需要依托先进的科技手段,使用数据仓库对不良个人客户建立信用信息库,才是当前银行防范个人客户出现信用风险问题的着力点所在。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号