Tuesday, May 5, 2020

Evaluating Impact of Knowledge Capture †MyAssignmenthelp.com

Question: Discuss about the Evaluating Impact of Knowledge Capture. Answer: Introduction: They key ideas from the first video clip are that organization should be based upon the set goals and adjust their process and objectives. Basin et al. (2014) mentioned that if this alignment is not performed, an organization cannot identify mistakes and errors. Moreover, I agree that without this alignment, one cannot assess their performance at all and it will be difficult to identify whether or not they have achieved the targeted goals (Agyei 2015). However, it is also mentioned that usually, organization follow a strategy and listed down their performance but it is necessary to formulate new objectives that drives their profitability and productivity. Professor Malik also highlighted that contemporary company should also concentrate on fewer objectives and set short- term goal like for 3 months. This is because it is easy to achieve short term goals and analyze the performance (Karjoth 2015). I also agree with Prof Maliks view that company should not rank their objectives accordi ng to priorities as every set objectives are essential and need to be achieved. Lastly, it is also mentioned that management plays a role when objectives cannot be quantified, but it is also important to not to quantify the objectives (Agyei 2015). The key ideas in this context are that objectives like trust, relationship and engagement cannot be quantified but are the essential objective to attain for an organization. Moreover, the objectivesshould be assessed regularly and management should get rid of the wrong ones that are not required in future years so that new objectives can be included. In the second activity, the key ideas are to highlight the comparison between the two project management concepts that are critical path methods and PERT (Project Evaluation and Review Technique) methods to identify the project paths. Kerzner (2013) also mentioned that a critical path method use only one time estimate; while, PERT uses three time estimates. Thus, it can be said that in former case, project managers have the surety regarding the tasks completion time, while the latter case signifies the uncertain situation. Moreover, project managers should consider the maximum time for completion of a project so that the entire thing can be completed within the assigned time (Agyei 2015). In addition to that, these calculations can be evaluated by assessing activities and after that, the predecessor should also be evaluated with respect to each activity. This process provides a systematic way for deciding the completion time of the project time (Agyei 2015). However, the most importa nt thing to consider is that there the considered path should have zero lack time. Thus, I think critical path for planning is important as it successfully estimated the time required for completing the project. Application of Management by Objectives In developing this assessment also, I have selected two major objectives. First, is to learn the key ideas from the videos first. My second objective is to link every asked question with the learned information. In this way, I avoid complexity to solve this assessment by not focusing on multiple objectives. In future, I also decide to learn some applications related to the learned theories so that I can provide more effectiveness to the assignment. Another example is, in case of Woolworths, their objective is to satisfy all their customers and create positive brand recognition. They are following these two major objectives and taking effective steps to fulfil the crucial goals. Recently they have taken initiatives for development of virtual shopping to enhance the shopping experience of customers and their engagement. Thus, Woolworths also take multiple initiatives to fulfil their one objective that is to enhance their business operation for ensuring customer engagement. Application of PERT I now realize that every individual in everyday lives uses this technique and I can relate this technique with my experience for preparing my high- school assignment. In that time, I have to complete my assignment by reading many resources either from library or from other authentic internet sources. Thus, before writing the main content of the project assignment, I have to complete the process of collecting required resources, attaining knowledge regarding the concept and then finally write down my assignment. I can also say that PERT technique will help me in future by estimating a completion time and maximum possible delay in completion of the project. Taken for instance, Starbucks requires employees to complete tasks, completing sales and including making drinks. In this case, the employees utilize the PERT-CPM method for taking and fulfilling the order with little wasted time. The management also uses this technique by allocating different tasks to different employees like one employee focuses on taking orders while another employee should allocate the work for making coffee drinks. The prime reason for the same is the division of laborresults in faster delivery of customer orders. Conclusion Thus, it can be concluded that there are two concepts learned in this assessment. The first process is the management of objectives and the second case is the project planning methods. It is also found that every organization should follow a strategy and listed down their performance but it is necessary to formulate new objectives that drive their profitability and productivity. In the first concept, it can be said that it is better to follow few objectives that can bring advancement to the business. Moreover, in this case, it can also be said that fewer objectives or short- term goals are easy to achieve. Company should also concentrate on fewer objectives and set short- term goal like for 3 months. The second theory reflects the project planning steps that helps to identify the project estimation time for completion. In addition to that, the critical path method use only one time estimates; while, PERT uses three time estimates. In addition to that, project managers should consider also the maximum time for completion of a project so that the entire thing can be completed within the assigned time. In addition to that, both of these application is related with my experiences. Reference List Basin, D., Burri, S.J. and Karjoth, G., 2014. Obstruction-free authorization enforcement: Aligning security and business objectives. Journal of Computer Security, 22(5), pp.661-698. Kerzner, H., 2013. Project management: a systems approach to planning, scheduling, and controlling. John Wiley Sons. Agyei, W., 2015. Project Planning And Scheduling Using PERT and CPM Techniques With Linear Programming: Case Study. International Journal of Scientific Technology Research, 4(8), pp.222-227. Han, W., Jiang, H., Lu, T., Zhang, X. and Li, W., 2015. An Optimized Resolution for Software Project Planning with Improved MaxMin Ant System Algorithm. International Journal of Multimedia and Ubiquitous Engineering, 10(6), pp.25-38. Mazlum, M. and Gneri, A.F., 2015. CPM, PERT and Project Management with Fuzzy Logic Technique and Implementation on a Business. Procedia-Social and Behavioral Sciences, 210, pp.348-357. Papke-Shields, K.E. and Boyer-Wright, K.M., 2017. Strategic planning characteristics applied to project management. International Journal of Project Management, 35(2), pp.169-179. Rane, S., 2014. Evaluating Impact of Knowledge Capture and Sharing on the Project Planning. Case: NGO. Balfe, N., Leva, M.C., Ciarapica-Alunni, C. and OMahoney, S., 2016. Total project planning: Integration of task analysis, safety analysis and optimisation techniques. Safety Science. Thornton, M. and Park, B., 2014. Accounting for Rework-Based Uncertainty in Project Scheduling: Comparison Study on PERT vs. Monte Carlo Simulation. Professional Constructor: The Journal of the American Institute of Constructors, 38(1). Karjoth, G., 2015, March. Aligning Security and Business Objectives for Process-Aware Information Systems. In Proceedings of the 5th ACM Conference on Data and Application Security and Privacy (pp. 243-243). ACM.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.