StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Information Technology and Entrepreneurship in Nielson Norman Group - Case Study Example

Cite this document
Summary
The paper "Information Technology and Entrepreneurship in Nielson Norman Group" states the company may yield an opportunity over the threat of fraud by plug-ins. The apps are used in cooperation with the intranet to ensure ease in the delivery of programs to the employees and clients…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER91.6% of users find it useful
Information Technology and Entrepreneurship in Nielson Norman Group
Read Text Preview

Extract of sample "Information Technology and Entrepreneurship in Nielson Norman Group"

? INFORMATION TECHNOLOGY AND ENTREPRENEURSHIP IN NIELSON NORMAN GROUP By Location Introduction Intranets are vital in propelling social media interactions in the modern economies. However, the services do not guarantee the acquisition of the set range of results in the relevant fields of study. In entrepreneurship, intranet serves to deliver different aspects that enhance the knowledge of the companies holds about the employment and service markets. Further, the services that emanate from intranet utilities may be extended to serve learners from different organizations. The Nielson Norman Group undertakes its programs and processes in line with computerized user interfaces. Such programs enable the company to bear the ability to provide consultation to clients from the firm. The Group’s success is evident since the company has built an overwhelming range of clientele in the global market since its foundation back in 1998. The following discussion seeks to highlight the prospective of intranets with various evaluation approaches to assert the fact that the programs do not necessarily provoke learning and inspirations (Collins, 2010, p, 130). Discussion of the features to build in an organization’s intranet the different intranet services seem to comprise of different features depending on the main purposes of their improvising. Each of the learning intranets was purported by its innovators as a certain approach to solving learning and problems. Distinctively, global enterprises realize that the social media is part of the community and may not fade out despite the pre-existing challenges Green, et al 2011, p, 90). Technical surveys implore organizations to abide in the use of social media holding that it is the most appropriate method from restructuring organization’s performances and building effective teams through the imposition of knowledge of the personnel and management. Experts have the notion that collaborative communication through the internet is certainly a useful course in all enterprises operating on a global platform. The effective nature of intranets is viewed as implicit to the gradual changes that are presumed to exist in organizations. This change is certain since there is enough and unprecedented evidence that functionality will shift gradually from the current prospects for the organizations’ advantages. The fact that intranets exist in different versions, the enterprise community of the society has a significant range to choose the intranet approach in accordance to the performance portfolio. Ideally, I-Space intranet provides learners with provident knowledge for use in ensuring organizational development and prowess in performances. Mainly, the I-Space intranet service provides various knowledgeable aspects ranging from the provision of public knowledge to the ideology of enhancing common sense (Collins, 2010, p, 133). A detailed survey undertaken by the Norman Group asserts that the intranet survey phenomenon comprises of the aspects of codification and diffusion of reading materials, a factor that is defined as the public knowledge approach. On the second account, the intranet approach ascertains to its users that they will accrue proprietary knowledge through its intriguing provision of patented entities, official secrets, and other critical information sources. The intranet approach asserts that users seeking proprietary knowledge shall find that its lack of diffusion despite the codification as an ethical barrier to provision of security on the pertinent materials. Lastly, the account provides employees and other concerned stakeholders seeking information with personal knowledge whereby codification and diffusion equally lack thus; guaranteeing users to sort out for any information related to their needs. I-Space accounting approaches assert knowledge on common sense, the type of information that all people have knowledge about their existence. However, the service is extremely diffused and without codifications thus enabling any person visiting the social media with equated mandate of accessibility (Collins, 2010, p, 139). Through the I-Space intranet’s Cynefin framework, presumptions are that there exists a three-phase knowledge transmission process from the point of abstraction to the point of diffusion enroute codification. The model is ideal for learners and employees to conceive independent knowledge (Napier, Rivers, and Hoggatt, 2012, p, 24). Another model that the Nielson Norman Group upholds as of importance is the Dreyfus model that stipulates various aspects, which comprise of knowledgeable approaches ideal for the presentation of information to the recipients. The group identifies to the learners that the novice approach proposes stringent rules and plans in every exercise while restraining from the execution of discretionary judgments. Similarly, the intranet approach provides users with information based on one's background of orientation (Gibson, 2008, p, 142). Mainly, the intranet service provides the advanced beginner’s aspect that reinforces the application of situational perceptions. Subsequently, the organization is able to identify all aspects prevailing in the firm as independent and separable from each other while still holding equal importance upon each. The third resolution related to Dreyfus context is the application of competence. The service provides enterprises with prospective resolutions to enable their constituent personnel cope with the bulk of differentiated activities (Verghese, 2012, p, 42). The move asserts that employees and other learners in different organizations would be taming proficiency through the application of the technology thus drawing closer towards the achievement of expertise. Nielson Norman Groups adopts the intranet approach with a notion that it is a progressive aspect in presenting holistic ideologies, and acquainting recipients with a holistic mandate to establish their judgment (Hofstadter, 2007, p, 61). Therefore, it is important to abide by the of the Dreyfus model as a serviceable intranet approach to restoring competence in organizations since employees and learners are able to suppress any threats that may serve as deterrence to the acquisition of information. Surprisingly, it is evident that Dreyfus intranet approach enables organization’s internal stakeholders to learn all the important tasks without challenging costs. NLearning is an evident approach to resolving distance problems in the global society, which seem to be persistent barriers in communication between organizations and their employees. Further, the approach vitally serves in enabling people to learn and interact with each other in the global platform thus reducing the barriers that hinder informative discussions (Napier, Rivers, and Hoggatt, 2012, p, 42). The platform acquaints learners and other groups of individuals in the market with knowledge relevant to the handling a wide range of challenging tasks. Therefore, nLearning rests as the salient resolutions to the global society irrespective of the locality and multilingual diversities. Nielson Norman Group asserts that the application of nLearning is ideal for reaching prospective groups in the different geographical locations, and acquainting them with the necessary information concerning their job descriptions (Goodman, 2006, p, 63). Similarly, the corporation is able to provide e-learning programs through the intranet services to its potential employees (Collins, 2010, p, 148). The technology further offers plagiarism detection solutions that enable the organization to deviate from the threat of accounting unoriginal data. It is sound to assert that the aspect is advantageous to the NNG organization since the constitution executes heavy fines over the crime of handling unoriginal information without the copyright of the owner (Manktelow, 2005, 86). NLearning is further a vital tool for manufacturers since they must resolve to establish the available opportunities and threats as a mode of defining the available markets, and the clientele groups. The level of competition and dynamic changes in the market place implicates to the variety of needs and preferences of the consumers. NNG emphasizes on the use of intranet utilities for manufacturers to establish precise resolutions to ensure success upon winning a profitable market share, and working with competent personnel. NNG adopts the double-loop learning intranet application to amass a wide range of beneficial stakeholders from the global environment (Lencioni, 2013, P, 15). The organization’s research indicates that the double-loop learning approach enables individuals to be able to interact freely and share information in relation to its programs. Arguments are the application enables a firm to offer accessibility to the right groups of people while restraining those visitors who seem to have fraudulent profiles (Bidgoli, 2011, p, 89). The resolutions tame the organization to deal with the clients and employees who seem crucial for the businesses’ prosperity while avoiding those who seem to be visiting the sites for malicious purposes. Through information technology strategic approaches, a company establishes the use of browsers as of intrinsic importance to its personnel and external stakeholders as they will ensure a fast flow of communication and encourage the consumers to place prompt orders in accordance to their needs and income capabilities. However, web-based attacks pose threats to the company because of the presence of malpractices in the cyber space who may defraud the company during transactions. Intranet services acquaint the management of different organizations to reduce their costs of operations (Coyne, Nielsen, and Goodwin, 2001, p, 15). For instance, NNG indicates that the application of the Software in its operations is salient to dividing its stakeholders into required groups for each of the visiting individuals shall seek the sites of their relevance. Arguably, the dissemination of traffic through intranets shall enable the organization to monitor its traffic profitably (Schade, Schwartz, and Nielsen, 2007, p, 169). The double loop approach is certainly the course that enables NNG to prosper since it provides various strategic approaches to limit destructive outcomes. Double-loop provides organizations with the ability to govern the pre-existing variables thus being certain of beneficial outcomes despite the threat of inconsistency in operations. Secondly, the service provides the organization with the ability to implement its action strategies upon realizing any forms of threats from the general environment. Other threats emanate from inconsistencies in browser configuration and settings. At this point, intruders may fraudulently gain access to the company’s business profile and tamper with the records or cause considerable harm to the company-customer relations (Manktelow, 2005, P, 107). However, the intranet approaches discussed as of vital importance to organizations restrain fraudulent individuals from gaining access through the imposition of passwords. Such applications enable organizations to deal with their legal employees and clients. Eventually, the organizations are able to accrue successful outcomes from the programs (Bidgoli, 2011, p, 99). Similarly, the survey implements that intranets are crucial in determining the end results of each operation of dealing with external clients through the measure of results and consequences. Conclusion NNG may yield an opportunity over the threat of fraud by of plug-ins, which serve to customize online programs for privatized use, for example, Java, QuickTime, and the adobe flash player. The applications are used in cooperation with the salient intranet approaches to ensure ease in delivery of programs to the employees and to the clients. Employees’ practices of ethics in the workplace serve for integration opportunities to e-mail linkages in the company thus the company can easily grow a large market share as the employees communicate benefits to the external environment, luring them to purchase the available products (Coyne, Nielsen, and Goodwin, 2001, p, 19). The intranet approach asserts that users seeking proprietary knowledge shall find that its lack of diffusion despite the codification as an ethical barrier to provision of security on the pertinent materials. Updates may be fraudulent and the management should observe them for threats since their sources are unrealistic. The use of social media serves to the importance of reaching a wider clientele group, and inhibiting the threat of competition by establishing blogs that display on the company’s products to conjure loyalty. Bibliography Bidgoli, H, 2011, MIS 2010, Mason, Ohio, South-Western, Collins, H, M, 2010, Tacit and Explicit Knowledge, University of Chicago, Press Chicago. Coyne, K, P, Nielsen, J, and Goodwin, C, 2001, Intranet Design Annual: The Ten Best Intranets of 2001, Fremont, Ca, Nielsen Norman Group. Gibson, K, R, 2008, Tools, Language and Cognition in Human Evolution, Cambridge, Cambridge Univ, Press. Goodman, J, 2006, Intranet Strategy, Ark Group, London. Green, Anne, Rogerson, Robert, Sadler, Sue, and Wong, Cecilia, 2011, Sustainable Communities Skills and Learning for Place-Making, Univ of Hertfordshire PR. Hofstadter, D, R, 2007, I Am A Strange Loop, Basic Books, New York. Lencioni, P, M, 2013, The Five Dysfunctions of a Team A Leadership Fable, San Francisco, Jossey-Bass, Calif. Manktelow, J, 2005, Mind Tools Essential Skills for an Excellent Career, Mind Tools, Swindon. Napier, H, A, Rivers, O, N, and Hoggatt, J, 2012, Learning With Computers, I I, South-Western,Mason, Ohio. Schade, A, Schwartz, M, and Nielsen, J, 2007, Intranet Information Architecture, Fremont, Nielsen Norman Group, Calif. Verghese, A, K, 2012, Internal Communications: Insights, Practices and Models, Sage Publications, Los Angeles. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“IT and Entrepreneurship Essay Example | Topics and Well Written Essays - 1750 words”, n.d.)
IT and Entrepreneurship Essay Example | Topics and Well Written Essays - 1750 words. Retrieved from https://studentshare.org/information-technology/1495828-it-and-entrepreneurship
(IT and Entrepreneurship Essay Example | Topics and Well Written Essays - 1750 Words)
IT and Entrepreneurship Essay Example | Topics and Well Written Essays - 1750 Words. https://studentshare.org/information-technology/1495828-it-and-entrepreneurship.
“IT and Entrepreneurship Essay Example | Topics and Well Written Essays - 1750 Words”, n.d. https://studentshare.org/information-technology/1495828-it-and-entrepreneurship.
  • Cited: 0 times

CHECK THESE SAMPLES OF Information Technology and Entrepreneurship in Nielson Norman Group

The Mobile Phone Industry in the UK

Historically, the relationship between economics and technology has been a subject of investigation even in the works of the early masters such as Adam Smith, Ricardo, or Karl Marx.... 1)This marked a major step forward in the understanding of the economic aspects of technological change because today, intuitively, one can see that there is a strong relationship between technology change or innovation and competitive market structures and the resultant fight for market share by different firms....
20 Pages (5000 words) Essay

Preventive Oral Health

It has been noted among experts about the lack of information on what is the extent of damage on fluoride use to children (Moss, 2005).... Preventive practices have decreased oral diseases in some US populations in the last decades but growing population from immigrants, war refugees, and others as well as the increasing population of children from low-income families make oral care provision a challenge (Nowak, 2006)....
13 Pages (3250 words) Essay

Needs and Critical Aspects of Small and Medium Enterprises

iscuss the relationships among entrepreneurship, innovation, and marketing in the SME new venture context.... And this is the point that brings us to our discussion regarding 'Relationship among entrepreneurship, innovation, and marketing in SME new venture context.... However, with the start of entrepreneurship, per capita, wealth generation and earnings in the West rose interestingly by 20 percent in the 1700s and kept on increasing to 740 percent in the1900s (Drayton, 2004)....
22 Pages (5500 words) Essay

Ecommerce and Web 2.0

Online communities have become so popular in today's world that 2 out of every 3 people of the global online population visit online communities –… The reasons for which a person is motivated to form, join, or even idolize an online community are often very different.... There are three types of needs which a person may feel at a particular time - Biogenic Needs, Psychogenic Needs or Motive....
12 Pages (3000 words) Essay

A 3-Year Marketing Plan for a new smart phone

The company already has its production facilities and required technology in order to launch the venture of Matching international standards would not be easy and the company would need a massive investment (shown in detail in the Financials heading) and the capital will mostly be used in marketing activities and recruiting trained professionals....
16 Pages (4000 words) Coursework

Information Technology and Business

In the essay “information technology and Business” the author analyzes the application of the available types of technology in different aspects of a human being's life.... hellip; The author states that the Internet, which is a vital part of information technology, is one of the most important means of communication in the world today.... Businesses with information technology receive changes are able to respond to them swiftly.... udging from the above uses of information technology, it is just to say that this is a very important part of any business....
2 Pages (500 words) Essay

Social Change Movements

They challenge status quo in attitudes, methods, institutions or ways of life (Brinkerhoff et al.... 2013).... The main purpose of social… Such social movements include but not limited to The Occupy Movement, Landless movements in Brazil, The Environmental Movement in United States and the famous Civil Rights Movement which started in 1955 The key ingredients of social movements are the unity of intention and purpose driven by collective and innovative behavior....
10 Pages (2500 words) Essay

The Mobile Phone Industry in the UK

From the paper "The Mobile Phone Industry in the UK" it is clear that the attempt to match theory with reality shows that at present there is no single theory that can claim to capture most of the significant or important aspects of the reality represented by the mobile phone industry.... nbsp;… Generally speaking, what factors prompt firms to spend on research and development and develop new technologies, new manufacturing processes or new products?...
20 Pages (5000 words) Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us