Murray Jennex - Academia.edu (original) (raw)
Papers by Murray Jennex
IGI Global eBooks, Jan 18, 2011
Projects can cause organizations to perform in new ways resulting in the generation of knowledge.... more Projects can cause organizations to perform in new ways resulting in the generation of knowledge. It is postulated that organizational learning occurs when new knowledge is captured and disseminated to the organization. It is expected that knowledge management facilitates organizational learning. Members of utility Y2K projects were surveyed with respect to knowledge benefits gained from their projects. Strong agreement for the existence of knowledge benefits was found and a listing of benefits generated. However, there was much less agreement on how to capture the benefits with many organizations taking little, if any, action. The conclusion is that while organizations recognize knowledge benefits, many do not have the tools or processes in place to take advantage of them.
IGI Global eBooks, Jan 18, 2011
... of Knowledge Mark N ssen, Naval Postgraduate School, USA Murray Jennex, San D ego Un vers ty,... more ... of Knowledge Mark N ssen, Naval Postgraduate School, USA Murray Jennex, San D ego Un vers ty, USA Abstract Many taxonomies and definitions of knowledge have been published in the KM ... Edwards, Handzic, Carlsson, and Nissen (2003) contrast this in terms of hard vs. ...
IGI Global eBooks, Jan 18, 2011
IGI Global eBooks, May 24, 2011
The need to develop a strategy for e-business applications is an important facet of doing busines... more The need to develop a strategy for e-business applications is an important facet of doing business, especially where organizations can provide value-added services to the customer base. In this chapter, we identify key value-added e-business applications and focus on success factors that clearly support small enterprise goals. Performance factors are presented that show the impact of e-business applications on the organization’s bottom line. The case study in this chapter uses a methodology of direct observation, unstructured interviews and document review to gather data for identifying issues in starting a small business using the Internet. The case organization provides services around office and business support, energy consulting, and Web development. The formation of International Business Solutions has been difficult due to the banking system, work culture, and infrastructure of Ukraine. IT issues investigated include telecommunications, energy, hardware, software, and the availability of technical skill sets. E-business issues that were found to be important in this study include: (1) difficulty of the user interface, (2) a lack of a planning process for e-business applications, (3) development and testing concerns, (4) finding the Web site and a lack of branding, and (5) the lack of evidence to support a formal budgeting process.
Springer eBooks, 2002
How much end user computing is too much? This paper reports on a study of the engineering organiz... more How much end user computing is too much? This paper reports on a study of the engineering organizations within an electric utility undergoing deregulation and change. The study was initiated when management perceived that too much engineering time was spent doing IS functions. The study found that there was significant effort being expended on system development, support, and ad hoc use. Several issues were identified affecting system development, use of programming standards, documentation, infrastructure integration, and system support. These issues cannot easily be resolved. The paper ends with recommendations for this situation that may be applicable to other organizations.
SAGE Publications, Inc. eBooks, May 15, 2012
IGI Global eBooks, May 24, 2011
Cyber war and cyber terrorism is real and is being waged. Cyber terrorists and cyber warriors are... more Cyber war and cyber terrorism is real and is being waged. Cyber terrorists and cyber warriors are attacking systems and succeeding in their attacks. This requires management to prepare for the worst case, the loss and destruction of critical data and systems. This chapter helps management prepare for this worst case by discussing how to design and build emergency response systems. These systems are used to respond to worst case attacks. Additionally, these systems are useful for responding to other disasters that can cause the loss of systems and data. This chapter presents research into emergency response systems and concludes with a model of what an emergency response system should consist of.
Advances in knowledge acquisition, transfer and management book series, Sep 13, 2010
Increased usage of cloud storage and other networking technologies in knowledge management (KM) s... more Increased usage of cloud storage and other networking technologies in knowledge management (KM) systems leave companies vulnerable to loss of proprietary rights as intellectual property law struggles to keep up with these advances. This paper reviews the current legal environment surrounding cloud and collaborative KM, discusses the implications for KM, and makes recommendations for how gaps between legal protection for intellectual property and KM can be overcome/corrected.
IGI Global eBooks, May 24, 2011
Alavi and Leidner (2001, p. 114) defined knowledge management systems (KMSs) as “IT-based systems... more Alavi and Leidner (2001, p. 114) defined knowledge management systems (KMSs) as “IT-based systems developed to support and enhance the organizational processes of knowledge creation, storage/retrieval, transfer, and application.” They observed that not all KM initiatives will implement an IT solution, but they support IT as an enabler of KM. Maier (2002) expanded on the IT concept for the KMS by calling it an ICT system that supported the functions of knowledge creation, construction, identification, capturing, acquisition, selection, valuation, organization, linking, structuring, formalization, visualization, distribution, retention, maintenance, refinement, evolution, access, search, and application. Stein and Zwass (1995) define an organizational memory information system (OMIS) as the processes and IT components necessary to capture, store, and bring to bear knowledge created in the past on decisions currently being made. Jennex and Olfman (2004) expanded this definition by incorporating the OMS into the KMS and adding strategy and service components to the KMS.
International journal of knowledge management, Oct 1, 2016
International journal of knowledge management, 2008
IGI Global eBooks, Jan 18, 2011
This is the third volume in the Advances in Knowledge Management and I thought it appropriate to ... more This is the third volume in the Advances in Knowledge Management and I thought it appropriate to start this volume with some reflection on where KM is at and where it is going. This chapter reflects on two key issues—the need to ensure KM is relevant and the risk of KM becoming a fad. The chapter concludes with reflection on the future of KM.
IGI Global eBooks, Jan 18, 2011
Projects can cause organizations to perform in new ways resulting in the generation of knowledge.... more Projects can cause organizations to perform in new ways resulting in the generation of knowledge. It is postulated that organizational learning occurs when new knowledge is captured and disseminated to the organization. It is expected that knowledge management facilitates organizational learning. Members of utility Y2K projects were surveyed with respect to knowledge benefits gained from their projects. Strong agreement for the existence of knowledge benefits was found and a listing of benefits generated. However, there was much less agreement on how to capture the benefits with many organizations taking little, if any, action. The conclusion is that while organizations recognize knowledge benefits, many do not have the tools or processes in place to take advantage of them.
IGI Global eBooks, Jan 18, 2011
... of Knowledge Mark N ssen, Naval Postgraduate School, USA Murray Jennex, San D ego Un vers ty,... more ... of Knowledge Mark N ssen, Naval Postgraduate School, USA Murray Jennex, San D ego Un vers ty, USA Abstract Many taxonomies and definitions of knowledge have been published in the KM ... Edwards, Handzic, Carlsson, and Nissen (2003) contrast this in terms of hard vs. ...
IGI Global eBooks, Jan 18, 2011
IGI Global eBooks, May 24, 2011
The need to develop a strategy for e-business applications is an important facet of doing busines... more The need to develop a strategy for e-business applications is an important facet of doing business, especially where organizations can provide value-added services to the customer base. In this chapter, we identify key value-added e-business applications and focus on success factors that clearly support small enterprise goals. Performance factors are presented that show the impact of e-business applications on the organization’s bottom line. The case study in this chapter uses a methodology of direct observation, unstructured interviews and document review to gather data for identifying issues in starting a small business using the Internet. The case organization provides services around office and business support, energy consulting, and Web development. The formation of International Business Solutions has been difficult due to the banking system, work culture, and infrastructure of Ukraine. IT issues investigated include telecommunications, energy, hardware, software, and the availability of technical skill sets. E-business issues that were found to be important in this study include: (1) difficulty of the user interface, (2) a lack of a planning process for e-business applications, (3) development and testing concerns, (4) finding the Web site and a lack of branding, and (5) the lack of evidence to support a formal budgeting process.
Springer eBooks, 2002
How much end user computing is too much? This paper reports on a study of the engineering organiz... more How much end user computing is too much? This paper reports on a study of the engineering organizations within an electric utility undergoing deregulation and change. The study was initiated when management perceived that too much engineering time was spent doing IS functions. The study found that there was significant effort being expended on system development, support, and ad hoc use. Several issues were identified affecting system development, use of programming standards, documentation, infrastructure integration, and system support. These issues cannot easily be resolved. The paper ends with recommendations for this situation that may be applicable to other organizations.
SAGE Publications, Inc. eBooks, May 15, 2012
IGI Global eBooks, May 24, 2011
Cyber war and cyber terrorism is real and is being waged. Cyber terrorists and cyber warriors are... more Cyber war and cyber terrorism is real and is being waged. Cyber terrorists and cyber warriors are attacking systems and succeeding in their attacks. This requires management to prepare for the worst case, the loss and destruction of critical data and systems. This chapter helps management prepare for this worst case by discussing how to design and build emergency response systems. These systems are used to respond to worst case attacks. Additionally, these systems are useful for responding to other disasters that can cause the loss of systems and data. This chapter presents research into emergency response systems and concludes with a model of what an emergency response system should consist of.
Advances in knowledge acquisition, transfer and management book series, Sep 13, 2010
Increased usage of cloud storage and other networking technologies in knowledge management (KM) s... more Increased usage of cloud storage and other networking technologies in knowledge management (KM) systems leave companies vulnerable to loss of proprietary rights as intellectual property law struggles to keep up with these advances. This paper reviews the current legal environment surrounding cloud and collaborative KM, discusses the implications for KM, and makes recommendations for how gaps between legal protection for intellectual property and KM can be overcome/corrected.
IGI Global eBooks, May 24, 2011
Alavi and Leidner (2001, p. 114) defined knowledge management systems (KMSs) as “IT-based systems... more Alavi and Leidner (2001, p. 114) defined knowledge management systems (KMSs) as “IT-based systems developed to support and enhance the organizational processes of knowledge creation, storage/retrieval, transfer, and application.” They observed that not all KM initiatives will implement an IT solution, but they support IT as an enabler of KM. Maier (2002) expanded on the IT concept for the KMS by calling it an ICT system that supported the functions of knowledge creation, construction, identification, capturing, acquisition, selection, valuation, organization, linking, structuring, formalization, visualization, distribution, retention, maintenance, refinement, evolution, access, search, and application. Stein and Zwass (1995) define an organizational memory information system (OMIS) as the processes and IT components necessary to capture, store, and bring to bear knowledge created in the past on decisions currently being made. Jennex and Olfman (2004) expanded this definition by incorporating the OMS into the KMS and adding strategy and service components to the KMS.
International journal of knowledge management, Oct 1, 2016
International journal of knowledge management, 2008
IGI Global eBooks, Jan 18, 2011
This is the third volume in the Advances in Knowledge Management and I thought it appropriate to ... more This is the third volume in the Advances in Knowledge Management and I thought it appropriate to start this volume with some reflection on where KM is at and where it is going. This chapter reflects on two key issues—the need to ensure KM is relevant and the risk of KM becoming a fad. The chapter concludes with reflection on the future of KM.