Monday, August 12, 2019

Tacit Knowledge, Systems for Combating Identity Theft Article

Tacit Knowledge, Systems for Combating Identity Theft - Article Example Also devise a method for a medical or financial organization to determine its security measures are sufficient. Develop an organizational plan for information systems to address potential identity theft issues. Tacit Knowledge: Making It Explicit Reference Information: http://www2.lse.ac.uk/economicHistory/Research/facts/tacit.pdf Purpose of Study: Provide an understanding of tacit knowledge and the risks related to it. Sampling Comments: According to TACIT KNOWLEDGE(n.d), tacit knowledge is â€Å"information that the actor knows he has (how to catch a ball, tie a knot, and mark a line) but which he cannot, nonetheless, describe in terms other than its own (skilful) performance†(TACIT KNOWLEDGE, n.d.). Measures: The article reviews aspects related to tacit knowledge. The aspect of transfer of knowledge from one person to the other is the core factor in tacit knowledge. Polanyi (2002) argues that transformation of such information creates problems. Personal knowledge is commonl y used despite the fact that it is shared among many. Findings/Results/Main Points: Personal information works best when instruments used in technology are not available. Availability of machines used in communication and softwares that encourage social behavior contributes to tacit. During this process, many employees are tricked to leak secret information that lead to identity theft. Conclusion: The importance of tacit knowledge remains debatable in relation to the risks involved. Its effectiveness is noted from the ability that it lacks explicit information. Organizations need to sensitize their employees on use on internet to avoid leakage of secret information that leads to identity theft. Systems for Combating Identity Theft- A Theoretical Framework Reference Information: Ji’, S. Smith-Chao, S. & Min, Qing-Fei. (2008, August). Systems Plan for Combating Identity Theft- A Theoretical Framework. J. Serv. Sci. & Management Journal, 1: 143-152. SciRes. Purpose of Study: To examine the starting point used for organizational systems design in roles played by identity owner, the issuer, checker and protector. Sampling Comments: â€Å"From system analysis and design perspective, understanding identity theft problem and designing managerial and technological systems to combat identity theft requires a holistic and comprehensive framework† (Ji, Smith-Chao & Min, 2008). Measures: Identity thieves use several techniques to retrieve data from their victims. Some of unsophisticated means used are stolen wallets, cell phones and laptops. Social engineering is used in convincing internet users to reveal their secret information. Processes needed to stop identity theft rely on information technology and its systems. Findings/Results/Main Points: Identity theft takes place through stage managed steps. Step one; the identity thief gets personal information of the victim. In step two; the identity thief tries to misuse stolen information of the victim. The fin al step involves the victim suffers emotionally or financially after the identity thief has vandalized the victim’s property. Conclusion: The world has turned to a global village through technology. Use of internet has increased from individual use to organizations. Internet is used for communication and business. Personal information

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.