­
IT And Knowledge Creation - All Articles - CISO Platform

IT And Knowledge Creation

[Posted on behalf Dennis Leber Cybersecurity Executive | CISO | Board Member | Educator | Speaker | Author | University of Tennessee health science center]

IT and Knowledge Creation

This article focuses on the effective use of information technology in the process of knowledge creation and knowledge sharing.

An example of an organization is also included that has been successfully implemented information technology for its knowledge management.

IT and Knowledge Creation

Knowledge is a driving factor in business and contributes to remaining competitive. To properly use the data captured in business, one must ensure that the right data is captured, ensure it is needed, and presented in a manner that is usable.

There are numerous mindsets, and models as it pertains to knowledge management, this article provides an overview of how information technology assists in managing knowledge.

Knowledge Management
According to Jones (2003), managing knowledge effectively is paramount and dictated by an ever changing environment.  Knowledge guides a business to new products, services, and customers. With this appreciation for knowledge, there is the creation of new technologies and roles. One of these roles is the Chief Knowledge Officer, or CKO. The CKO is important in discussing IT to manage knowledge; the CKO must understand the concepts of KM, the organization, its technologies, and alignment with business strategy.

Technologies
Technology used to manage knowledge must blend with financial restraints, human capital, and the technology. Technology that manage KM must include communication technologies, collaboration technologies, web based, be compatible with mobile technologies, and have the ability built in to grow with new technologies that emerge. Technologies that contribute to knowledge management are; document libraries, knowledge servers and databases, and collaborative technologies such as SharePoint.

Document Libraries

Document libraries are used to store the knowledge and make it available to users. An example of document libraries are built in knowledge based articles, electronic document and records management systems, and wikis.

Knowledge Servers and Databases

Data must be available across the business, the data must be logical stored, and accessible. Data must be secured and protected with access control to limit access to a need to know basis. Some examples of this technology are SQL server data bases, oracle data bases, KANA software, and SaaS developed solutions.

Collaboration

Collaboration technologies are a combination of the total technologies to act as a gateway to the knowledge. It is often referred to as an information portal or knowledge portal. Technologies that serve as these gateways are Intranet pages, virtual meeting rooms, blogs, wikis, social networking software, e-learning, and built in knowledge based articles.

Votes: 0
E-mail me when people leave their comments –

You need to be a member of CISO Platform to add comments!

Join CISO Platform

Join The Community Discussion

CISO Platform

A global community of 5K+ Senior IT Security executives and 40K+ subscribers with the vision of meaningful collaboration, knowledge, and intelligence sharing to fight the growing cyber security threats.

Join CISO Community Share Your Knowledge (Post A Blog)
 

 

 

CISO Platform Talks : Security FireSide Chat With A Top CISO or equivalent (Monthly)

  • Description:

    CISO Platform Talks: Security Fireside Chat With a Top CISO

    Join us for the CISOPlatform Fireside Chat, a power-packed 30-minute virtual conversation where we bring together some of the brightest minds in cybersecurity to share strategic insights, real-world experiences, and emerging trends. This exclusive monthly session is designed for senior cybersecurity leaders looking to stay ahead in an ever-evolving landscape.

    We’ve had the privilege of…

  • Created by: Biswajit Banerjee
  • Tags: ciso, fireside chat

CISO Talk (Chennai Chapter) - AI Code Generation Risks: Balancing Innovation and Security

  • Description:

    We’re excited to invite you to an exclusive CISO Talk (Chennai Chapter) on “AI Code Generation Risks: Balancing Innovation and Security” featuring Ramkumar Dilli (Chief Information Officer, Myridius).

    In this session, we’ll explore how security leaders can navigate the risks of AI-generated code, implement secure development guardrails, and strike the right balance between innovation and security. AI…

  • Created by: Biswajit Banerjee
  • Tags: ciso talk

CISO MeetUp: Executive Cocktail Reception @ Black Hat USA , Las Vegas 2025

  • Description:

    We are excited to invite you to the CISO MeetUp: Executive Cocktail Reception if you are there at the Black Hat Conference USA, Las Vegas 2025. This event is organized by EC-Council & FireCompass with CISOPlatform as proud community partner. 

    This evening is designed for Director-level and above cybersecurity professionals to connect, collaborate, and unwind in a relaxed setting. Enjoy…

  • Created by: Biswajit Banerjee
  • Tags: black hat 2025, ciso meetup, cocktail reception, usa events, cybersecurity events, ciso

6 City Playbook Round Table Series (Delhi, Mumbai, Bangalore, Pune, Chennai, Kolkata)

  • Description:

    Join us for an exclusive 6-city roundtable series across Delhi, Mumbai, Bangalore, Pune, Chennai, and Kolkata. Curated for top cybersecurity leaders, this series will spotlight proven strategies, real-world insights, and impactful playbooks from the industry’s best.

    Network with peers, exchange ideas, and contribute to shaping the Top 100 Security Playbooks of the year.

    Date : Sept 2025 - Oct 2025

    Venue: Delhi, Mumbai, Bangalore, Pune,…

  • Created by: Biswajit Banerjee