



全文预览已结束
下载本文档
版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领
文档简介
武汉大学信息管理学院2012-2013学年第二学期专业英语课程考试卷试卷类型 : 开卷(A)年级 2011 级 专业 档案学 科目 专业英语姓名 _ 学号 _ 考试及试题说明: 1. 本试卷用于课堂外开卷考试;2. 译文力求准确、流畅;3. 每位同学独立完成;4. 答案的纸质版于2013 年5月15日交卷。Translation I(5 for each)1. archival collection 档案收集2. Public Record Act 公共记录行为3. primary value & secondary value 第一价值 第二价值4. Repository guide 库指南5. General inventory 一般库存Translation IITask 1 (40)PRIOR TO E-GOVERNMENT, RECORDS and information were stored mainly on paper in files, filing cabinets, and vaults. Paper documents have a degree of separation between the client and the flow, storage, and retrieval of documents. Manual records management systems have established procedures to process and transfer documents through the system. These documents could also be tracked transparently through the organization; hence, if tampered with, the changes would be clearly evident. The security measures required to protect them focused mainly on the physical protection of the document and restricting permissions for people to physically access the records. They were written into polices and procedures and updated over many years. Although the documents could be copied, the paper type, the color, and the size would be difficult to match with or replace the original. Also, copying documents is traditionally a relatively slow process. This provided for documents a completely different degree of security to that of intranet- or Internet-based systems, which have the capability for immediately downloading information, giving the client (end user) the ability to copy and retransmit this information in nanoseconds. This vulnerability exists for any organization, whether private or public, that has a Web presence (Straub & Welke, 1998; Backhouse & Dhillon, 2001).Information system security in government has previously concentrated on confidentiality of documents stored electronically (Spinellis et al., 1999). In terms of the public perception of government organizations, security means the protection of records and data that are held for the purpose of recording, administering, and monitoring the actions and policies of government agencies. The rapid growth in the volume of information stored electronically and E-commerce within government may increase the need for security to protect the privacy of this information and prevent fraud. From the publics perspective, government is seen as one entity; hence, a security problem within one agency may be viewed as a failure of the whole of government process. Therefore, the process of maintaining and improving information security across all government agencies is viewed as an essential project.The administration, business, and legal processes associated with security and protection of electronic government information have not been fully developed (Scott, 2003; Kraemer & Dedrick, 2000; Teo et al., 2003). Consequently, government projects are endeavoring to develop policies and procedures to improve security (Frank, 2003). This article reports on research that is part of a longitudinal action research study to help inform and improve information security across government. The study reported here involved a forum for, and follow-up interviews with, key federal agencies to determine the key drivers and inhibitors for information system security and business continuity planning (BCP) within and across government.Task 2(35)Managing knowledge is a focal task for organizations today.对于知识和信息的管理是对当今的很多组织来说很重要的工作 Appreciating the importance of knowledge as a core capability or resource (Alavi & Leidner, 2001; Grant, 1996) has underscored the need for managing it strategically. 认识到将知识作为一种核心能力或资源的重要性已经作为一种战略性的管理需求被强调和突出Though the effort to manage what a company knows is not a recent phenomenon, 尽管去管理一个公司所“知道”的努力和尝试并不是最近才出现的现象,new technology and greater awareness fueled by a competitive business landscape has resulted in substantive attention paid to KM (Prusak, 2001).被更具竞争性的商业环境所刺激产生的新的科技和更高级的知识也导致了实质性的对于KM的关注。Knowledge can be conceptualized in different ways.知识可以被不同的方法概念化 It can be seen as embedded in practices (Orlikowski, 2002) or processes (Epple & Argote, 1996),它可以被看做是被 or as a separate entity or object (Schultze & Stabell, 2004). Another view of knowledge is that which is embedded in peoples heads and is a fluid mix of framed experience, values, contextual information and expert insight that provide a framework for evaluation and incorporating new experiences and information (Davenport & Prusak, 1997, p. 5). This type of knowledge is referred to as tacit. While explicit knowledge is easily codified, stored, and transferred, by the use of technology (such as knowledge repositories, document control systems, or databases) tacit knowledge is stickier (Hippel, 1994). Tacit knowledge, as conceptualized by Polanyi (1958) refers to knowing-how or embodied knowledge1, and is the characteristic of an expert2 who can perform a task without deliberation of the principles or rules involved (Ryle, 1949/1984). This goes beyond a mere technical or physical knowhow (Dretske, 1991) as it is highly contextual. Employees of a certain culture may have tacit knowledge about practices that employees of other cultures do not. Being able to deliberately leverage such tacit knowledge is hypothesized to generate value and be a key differentiator for an organization ( Alavi & Leidner, 1999, 2001; Grant, 1996). It is tacit knowledge that resides in employees heads, which is vital for problem solving and organizational learning (Davenport & Prusak, 1997). Due to the uneven distribution of expertise, the task of managing tacit knowledge is especially essential in todays dynamic and global business landscape. In the context of large, geographically distributed, multi-cultural firms where employees do not have the opportunity to interact face-to-face, communication and transfer of knowledge becomes even more challenging (Lapr
温馨提示
- 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
- 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
- 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
- 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
- 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
- 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
- 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
最新文档
- 鞋店全年促销活动策划方案(3篇)
- 桥梁砌体施工方案(3篇)
- 仙居员工拓展活动策划方案(3篇)
- 河床栏杆维修施工方案(3篇)
- 新年摄影楼活动方案策划(3篇)
- 叠合池施工方案(3篇)
- 装修装饰专项施工方案(3篇)
- 消防温泉活动策划方案模板(3篇)
- 女神节烧烤活动方案策划(3篇)
- 安徽省宣城市宁国市2023-2024学年高三下学期高考第三次模拟考试思想政治考题及答案
- (高清版)DB34∕T 5243-2025 预制舱式磷酸铁锂电池储能电站防火规范
- 神经内科常规用药指南
- 韩语考试题目及答案
- 矿业公司采矿管理制度
- 新疆维吾尔自治区国际创伤生命支持ITLS职业考试试卷与答案
- 新生儿多重耐药菌防控
- 非标设备公司采购管理制度
- 2025年的基层治理理论与实践考核试卷及答案
- 2025年江西省高考物理真题
- 甘肃白银有色集团股份有限公司招聘考试真题2024
- 第三届全国技能大赛竞赛-工业机器人系统操作赛项选拔赛备考试题库(附答案)
评论
0/150
提交评论