A Study on Knowledge Management with the Employees SIPCOT & SIDCO Phase II Entrepreneur Finished Leather Effluent Treatment Company (P) Ltd
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2016, Vol 4, Issue 12
Abstract
Knowledge Management is the establishment of a system that captures knowledge purposefully forin corporating into business strategies, policies, and practices at all levels of the company. This course will teach the learner how to initiate a knowledge management program at work. When it comes to knowledge management, any organization is able to implement a strategy. Wherever there are humans working together for one goal, there is knowledge to be harvested, stored, and dispensed as needed. Knowledge management is a program or system designed to create, capture, share and leverage knowledge towards the success of the organization. This is easier said than done because instituting a knowledge management program requires many changes and support at all levels of the organization. This project explain about Knowledge management, what is Knowledge Management, meaning of knowledge management, History , values, concepts, principles, models, elements, types, benefits, goals and future development of knowledge management. And also their project enables how the management utilize the knowledge employees and their knowledge and skills and how they improve the skills of employees through knowledge management Programs. And the data should be collected from the employees how the knowledge management program should be effectively in the organization and the data should be included for the hypothesis testing and finally suggested the opinions for the organizations through the samples.
Authors and Affiliations
V. Nivethitha, M. Bommi, V. S. Palaniammal, B. Saravanan
An Optimized Survey on Security Issues in Mobile Adhoc Network
Security has become a prime concern in order to provide protected communication between mobile nodes in a hostile environment. Unlike the wire line networks, the unique characteristics of mobile ad hoc networks pose a n...
Protection And Security Of An Operating System
In this research paper first of all we gave a brief introduction of the operating system, furthers its types is also explained with an example and its component also. In this paper we show that what kind of problem aris...
Virtual Private Network Security
This research is on the implementation of Virtual Private Network (VPN). Owing to the demand at the present time to connect to internal networks from distant locations, the significant of establishing safe links across...
Performance Analysis of Filters on Complex Images for Text Extraction through Binarization
Text data present in image contain useful information and extraction of text from complex images is an extremely difficult task and challenging job due to variation in style, font,alignment,background intensity, illumin...
IOT Based E-Voting System
The Election Commission of India, which oversees the country’s elections, is still sticking to its position that the machines are “perfect” and “fully tamperproof”. Everyone must be to recognize the vulnerabilities of E...