StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Understanding of Network - Essay Example

Cite this document
Summary
The paper "Understanding of Network" highlights that a manager is a good decision-maker, therefore he needs to understand the prevailing network within the organisation. Knowing this would help pave the way for his part to initiate a sound decision from time to time. …
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98.1% of users find it useful
Understanding of Network
Read Text Preview

Extract of sample "Understanding of Network"

?Understanding of network There is power in connection and building of relationship in today’s society where many people have appreciated the value of a network. This is a substantial part of human innovation that people created and orchestrated in order to provide advantages in sustaining the vital piece of organising and taking the plans successfully into actions. In doing this, it is vital that connections have to be created by which each member could relate to everyone in a particular way, leading to spatial interactions and design practices to be formulated (Burke and Tierney, 2007). From the past, a businessman for instance has strong reliance on successfully creating a network because of the associated benefits with it for his business. Having many connections would mean an opportunity from a businessman’s point of view. While it is true that a network could exactly do this, its general meaning does not literally mean that one must confine its application in the business context alone. A network is everywhere and since the earliest time of the human existence it already existed for as long as the presence of communication, interaction and the ability of social beings to relate with each other in myriad ways were remarkably present. Today, everyone has personal connection, but the good point with a network is the opportunity that one’s network could also be part of somebody else’s. No one could contest that if one would based it on the observation, this is the product of the ability of each individual to relate to everyone in a specific way using technological innovation. There are many ways on how to allow a person to relate with the other. In fact, today there is a maximum effort that people initiated. Technology has played a crucial role in ensuring successful network. Apple Incorporated is just one of the companies trying to innovate possibilities on how to explore the ultimate potential and concepts behind a network. The presence of mobile gadgets, created to enhance communication is in reality tries to augment the full potential of the management context. In other words, a network in great detail has substantial application in creating social connection in the digital age and in the networked society (Papacharissi, 2011; Van Dijk, 2005). Network therefore nowadays is strongly powered by the existence of advanced technology and new technological innovations in the future. It would be easy to keep in touch with someone and to keep information flows around in a fast pace. In the presence of these advantages, companies, organizations and individuals learn to appreciate the fact that in the management context there must have many things that need to be considered when a network has to be taken into account. A network is therefore a complex concept because technology which is constantly innovating tries to influence it in many ways. This means that a network changes dynamically as technology itself modifies its forms in a vigorous way. Network therefore is about connection, in which today’s advanced society could also mean as the use of technology in connecting people and allowing almost everyone around the globe to keep in touch dynamically in the most possible and even convenient way in the age of globalisation and digital revolution (Grewal, 2008). This is a stong image depicted by a society that has burly dependence on the emergence of technology and other related technological innovation that is particularly linked up with information. The emergence of social networking media is a fundamental example how network is integrating social and technological concerns. With the aid of technological advancement, it is now easy to connect everyone and be part of the whole network that allows each member to freely communicate, interact and exchange remarkable information. In other words, the emergence of major social networking platforms for instance is just a remarkable indication how people place the modern network into high level of exploitation. Many people have seen the power of the network. Some realised the good sense behind it. Others have become interested how it could provide connective power. The network could also provide communicative action as a powerful means to initiate and implement things. In the context of management, all of these could mean a big impact on how to ensure good management action and operational standard. However, there are uncertainties that need to be addressed in a network (Koppenjan and Klijn, 2004). These uncertainties are challenges that requires substantial attention. Having all of these have become the ultimate reason why there are prevailing studies related with the network that continue to provide important implications on the management framework. In the next section are some important ideas associated with network analysis. The importance raised for network analysis What researchers especially in the field of management have in common when it comes to network analysis is the idea about understanding more about it and how it could possibly provide a remarkable impact for keeping everything smooth in an organisation. Thus, the idea about the managerial implications of the network is one important concern in network analysis. In some studies, social network analysis could pave the way for enhancing the system requirements for information management in organizational analysis (Pereira and Soares, 2007). Information management especially in the digital age is such a critical consideration when it comes to establishing an organisation. For this reason, a network should be reliably organise in order to make sure that information management flows as smoothly as possible. This could prevent harming the organisation especially that there are some associated risks when it comes to employing a network in the digital age, where there are some important things that remain unknown and waiting to be finally unearthed. On the other hand, particularly in the business context, concern on profitability is linked with network management (Niehaus et al., 2009). This enhances the potential contribution of network analysis in order to ensure profitability concern within the management context. For instance, the idea about supplier-distributor relationship includes matters concerning the establishment of profit. For this concern, a distributor would ensure long-standing relationship with suppliers in order to guarantee availability of supplies and a smooth-flowing business operation. In addition, network analysis could also help find the best method to support good performance particularly in dissiminating good information and ensuring safety (Merrill et al., 2007). In the age of technological progression, it is hard to remarkably put the entire trust in a network especially that there are varied possibilities of coming across some perils associated with the innovative technology. For instance, the presence of hackers and other networks of opportunistic groups are also looking forward to keep their chances. Moreover, human resource management and performance management and evaluation are some important concerns that network analysis could address (Stavrou et al., 2007; Masquefa, 2008; Philip et al., 2005). Since network today is an image depicting the co-existing group of people and advanced technology, the management aspect is trying to bring the traditional human resource management effort with a touch of technological works. This may sound complex, but the presence of network analysis makes it possible to see the most important points and even unknown events which require meaningful attention. Thus, peformance management and evaluation nowadays have become dependent on the existence of technology and the network. In addition to the above points, network analysis is also essential in strategic analysis of logistics and supply chain management systems (Meade and Sarkis, 1998). A network could be a group of suppliers and producers. For this reason, a network has specific contribution in the actual management affair. Furthermore, in analysing a network, one would be able to investigate a structural frame of some networks and their associated characterisitcs (Kim et al., 2011). For instance, the marketing department which is also composed of network may significantly understand the network linked within the accounting department. Understanding this on both parties would mean a smooth-flowing operation especially in the implementation of cutting-edge technology. Additionally, the inclusion of network in management concept may provide substantial contribution to the kind of decision support (Bode, 1998). A manager is a good decision maker, therefore he needs to understand the prevailing network within the organisation. Knowing this would help pave the way for his part to initiate a sound decision from time to time. Finally, in some case, management involved in the communication networks look forward to finding for assured quality of service (Kumar and Venkataram, 1997). This is common to happen in a sales-oriented organisation where its primarily goal or target is to provide high value for customers while employing technological innovation with its product or service offerings. It is therefore interesting to know that there are many things left to learn more about a network especially in its integration with continously evolving technology. For this reason, the traditional network is advancing and so there are many things left to be learned prior to its successful implementation in the contemporary time. Furthermore, this would also take into account individual case or situation, leading to the point that not everyone who would want to implement a network should create the same design. Of course, one should also consider the actual needs and prevailing situations involved in order to successfully weigh the needed action to be taken. Thus, in the digital age, the integration of the network with it requires more meaningful investigations through various research resulting to reliable empirical findings. References Kim, Y., Choi, T. Y., Yan, T., and Dooley, K. (2011). Structural investigation of supply networks: A social netork analysis approach. Journal of Operations Management. 29(3): 194-211. Koppenjan, J. F., and Klijn, E. H. (2004). Managing uncertainties in Networks: A network approach to problem solving and decision making. London: Routledge. Kumar, G. P., and Venkataram, P. (1997). Artificial intelligence approaches to network management: recent advances and a survey. Computer Communications. 20(15): 1313-1322. Burke, A., and Tierney, T. (2007). Network Practices. Princeton: Princeton Architectural Press. Bode, J. (1998). Decision support with neural networks in the management of research and development: Concepts and application to cost estimation. Information & Management. 34(1): 33-40. Grewal, D. S. (2008). Network power: The social dynamics of globalization. London: Yale University Press. Masquefa, B. (2008). Top management adoption of a locally driven performance measurement and evaluation system: A social network perspective. Management Accounting Research. 19(2): 182-207. Meade, L., and Sarkis, J. (1998). Strategic analysis of logistics and supply chain management systems using the analytical network process. Transportation Research Part E: Logistics and Transportation Review. 34(3): 201-215. Merrill, J., Bakken, S., Rockoff, M., Gebbie, K., and Carley, K. M. (2007). Description of a method to support public health information management: Organizational network analysis. Journal of Biomedical Informatics. 40(4): 422-428. Niehaus, T., Ruehle, J., and Knigge, A. (2009). Relevance of route and network profitability analysis for the network management process of network carriers. Journal of Air Transport Management. 15(4): 175-183. Papacharissi, Z. (2011). A Networked Self: Identity, Community and Culture on Social Network Sites. New York, NY: Taylor & Francis. Pereira, C. S., and Soares, A. L. (2007). Improving the quality of collaboration requirements for information management through social networks analysis. International Journal Information Management. 27(2): 86-103. Philip, S. J., Ghosh, J., and Qiao, C. (2005). Performance evaluation of a multilevel hierarchical location management protocol for ad hoc networks. Computer Communications. 28(10): 1110-1122. Stavrou, E. T., Charalambous, C., and Spiliotis, S. (2007). Human resource management and performance: A neural network analysis. European Journnal of Operational Research. 181(1): 453-467. Van Dijk, J. (2005). The Network Society: Social aspects of new media. 2nd ed. London: SAGE. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Network analysis Essay Example | Topics and Well Written Essays - 1500 words”, n.d.)
Network analysis Essay Example | Topics and Well Written Essays - 1500 words. Retrieved from https://studentshare.org/management/1466676-network-analysis
(Network Analysis Essay Example | Topics and Well Written Essays - 1500 Words)
Network Analysis Essay Example | Topics and Well Written Essays - 1500 Words. https://studentshare.org/management/1466676-network-analysis.
“Network Analysis Essay Example | Topics and Well Written Essays - 1500 Words”, n.d. https://studentshare.org/management/1466676-network-analysis.
  • Cited: 0 times

CHECK THESE SAMPLES OF Understanding of Network

Network Security

It helped narrow down my Understanding of Network security by providing me direction and grounds to be open minded and also recognize facts from fiction in network engineering.... The author gives a large overview of Jackson, Chris "Network security auditing", Harrington Jan "Network security: A Practical approach", Douglas Comer “Computer Networks and Internets” and other works on the topic of network security.... It examines the importance of network security in organizations and the importance of protecting data....
18 Pages (4500 words) Annotated Bibliography

Virtual Private Network Tools

The focus in this paper is on a VPN, a network connection that is built on top of already existing publicly accessible telecommunication infrastructure like the internet and is used to provide access to the central organizational network to traveling users and remote offices.... According to the research findings, it can, therefore, be said that reliability, privacy, and security of data are some of the key component considered essential with critical data and information being exchanged within an organization's network....
18 Pages (4500 words) Term Paper

Unified standards

The same is true of computer and network systems.... network administrators are not security professionals, and therefore their primary mission is not establishing a secure network, but rather a functional one.... What must be evaluated is how much risk is acceptable, and therefore what level of functionality will be sacrificed to ensure a reasonably secure network with an acceptable level of risk.... The identification of access points into a network and establishing the appropriate access controls such as firewalls and monitoring solutions is necessary....
6 Pages (1500 words) Essay

Practitioners Influence Public Involvement

This paper ''Practitioners Influence Public Involvement'' tells us that Public Health in the UK is vital in educating, preventing, and containing outbreaks of providing many types of health services of its population.... A 2005 Workforce Survey by the Faculty of Public Health identifies fewer specialists in 2005 than 2003....
7 Pages (1750 words) Essay

Article Review: Network Analysis of Supply Chain Systems by Bellamy and Basole

The research revealed that the development of an effective SCS calls for an Understanding of Network architecture, network strategy and network dynamics.... To understand the impact of network analytics, three interdependent themes evaluated are SCS system architecture or network structure, SCS system behaviour or network dynamics, and SCS system policy and control or network strategy.... Bellamy & Basole (2013) article relies on objectives of network analysis systematic review in the literature of supply chain; organization into an integrative framework and suggestions for future directions....
2 Pages (500 words) Essay

The Issues Involved in Internet Security

The same is true of computer and network systems.... "The Issues Involved in Internet Security" paper formulates how an organization can develop confidence in the security of their networked systems when they are opening their systems to Internet access, illustrates why an organization might select such software for mission-critical applications....
7 Pages (1750 words) Assignment

Communication Networks and the Process of Imparting or Exchanging Information

The development of a multilevel approach is critical to 'account for different properties of networks', to investigate how network components can exist at varying network levels, and to introduce a three-tiered approach to be used in conjunction which will provide a deeper Understanding of Network creation, composition and proliferation (294-5).... The organization used interchangeably with the notion of network, shifts in meaning as social values evolve due to social circumstance....
5 Pages (1250 words) Book Report/Review

Analysis of VPN Tools

From the paper "Analysis of VPN Tools" it is clear that reliability, privacy and security of data are some of the key components considered essential with critical data and information being exchanged within an organization's network (Viega & Messier, 2010).... In addition to the provision of an alternative to the use of proxy servers for remote access to campus resources, VPN also ensures secure methods to authenticate to the campus wireless network hence data security through the use of encryption technologies such as PPTP, L2TP, IPSec and SOCKS....
8 Pages (2000 words) Term Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us