2013年专业英语考试及说明.doc_第1页
2013年专业英语考试及说明.doc_第2页
2013年专业英语考试及说明.doc_第3页
2013年专业英语考试及说明.doc_第4页
全文预览已结束

下载本文档

版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领

文档简介

武汉大学信息管理学院2012-2013学年第二学期专业英语课程考试卷试卷类型 : 开卷(A)年级 2011 级 专业 档案学 科目 专业英语姓名 _ 学号 _ 考试及试题说明: 1. 本试卷用于课堂外开卷考试;2. 译文力求准确、流畅;3. 每位同学独立完成;4. 答案的纸质版于2013 年5月15日交卷。Translation I(5 for each)1. archival collection 档案收集2. Public Record Act 公共记录行为3. primary value & secondary value 第一价值 第二价值4. Repository guide 库指南5. General inventory 一般库存Translation IITask 1 (40)PRIOR TO E-GOVERNMENT, RECORDS and information were stored mainly on paper in files, filing cabinets, and vaults. Paper documents have a degree of separation between the client and the flow, storage, and retrieval of documents. Manual records management systems have established procedures to process and transfer documents through the system. These documents could also be tracked transparently through the organization; hence, if tampered with, the changes would be clearly evident. The security measures required to protect them focused mainly on the physical protection of the document and restricting permissions for people to physically access the records. They were written into polices and procedures and updated over many years. Although the documents could be copied, the paper type, the color, and the size would be difficult to match with or replace the original. Also, copying documents is traditionally a relatively slow process. This provided for documents a completely different degree of security to that of intranet- or Internet-based systems, which have the capability for immediately downloading information, giving the client (end user) the ability to copy and retransmit this information in nanoseconds. This vulnerability exists for any organization, whether private or public, that has a Web presence (Straub & Welke, 1998; Backhouse & Dhillon, 2001).Information system security in government has previously concentrated on confidentiality of documents stored electronically (Spinellis et al., 1999). In terms of the public perception of government organizations, security means the protection of records and data that are held for the purpose of recording, administering, and monitoring the actions and policies of government agencies. The rapid growth in the volume of information stored electronically and E-commerce within government may increase the need for security to protect the privacy of this information and prevent fraud. From the publics perspective, government is seen as one entity; hence, a security problem within one agency may be viewed as a failure of the whole of government process. Therefore, the process of maintaining and improving information security across all government agencies is viewed as an essential project.The administration, business, and legal processes associated with security and protection of electronic government information have not been fully developed (Scott, 2003; Kraemer & Dedrick, 2000; Teo et al., 2003). Consequently, government projects are endeavoring to develop policies and procedures to improve security (Frank, 2003). This article reports on research that is part of a longitudinal action research study to help inform and improve information security across government. The study reported here involved a forum for, and follow-up interviews with, key federal agencies to determine the key drivers and inhibitors for information system security and business continuity planning (BCP) within and across government.Task 2(35)Managing knowledge is a focal task for organizations today.对于知识和信息的管理是对当今的很多组织来说很重要的工作 Appreciating the importance of knowledge as a core capability or resource (Alavi & Leidner, 2001; Grant, 1996) has underscored the need for managing it strategically. 认识到将知识作为一种核心能力或资源的重要性已经作为一种战略性的管理需求被强调和突出Though the effort to manage what a company knows is not a recent phenomenon, 尽管去管理一个公司所“知道”的努力和尝试并不是最近才出现的现象,new technology and greater awareness fueled by a competitive business landscape has resulted in substantive attention paid to KM (Prusak, 2001).被更具竞争性的商业环境所刺激产生的新的科技和更高级的知识也导致了实质性的对于KM的关注。Knowledge can be conceptualized in different ways.知识可以被不同的方法概念化 It can be seen as embedded in practices (Orlikowski, 2002) or processes (Epple & Argote, 1996),它可以被看做是被 or as a separate entity or object (Schultze & Stabell, 2004). Another view of knowledge is that which is embedded in peoples heads and is a fluid mix of framed experience, values, contextual information and expert insight that provide a framework for evaluation and incorporating new experiences and information (Davenport & Prusak, 1997, p. 5). This type of knowledge is referred to as tacit. While explicit knowledge is easily codified, stored, and transferred, by the use of technology (such as knowledge repositories, document control systems, or databases) tacit knowledge is stickier (Hippel, 1994). Tacit knowledge, as conceptualized by Polanyi (1958) refers to knowing-how or embodied knowledge1, and is the characteristic of an expert2 who can perform a task without deliberation of the principles or rules involved (Ryle, 1949/1984). This goes beyond a mere technical or physical knowhow (Dretske, 1991) as it is highly contextual. Employees of a certain culture may have tacit knowledge about practices that employees of other cultures do not. Being able to deliberately leverage such tacit knowledge is hypothesized to generate value and be a key differentiator for an organization ( Alavi & Leidner, 1999, 2001; Grant, 1996). It is tacit knowledge that resides in employees heads, which is vital for problem solving and organizational learning (Davenport & Prusak, 1997). Due to the uneven distribution of expertise, the task of managing tacit knowledge is especially essential in todays dynamic and global business landscape. In the context of large, geographically distributed, multi-cultural firms where employees do not have the opportunity to interact face-to-face, communication and transfer of knowledge becomes even more challenging (Lapr

温馨提示

  • 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
  • 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
  • 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
  • 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
  • 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
  • 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
  • 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

评论

0/150

提交评论