Contents

List of figures

List of acronyms and abbreviations

Audience

Acknowledgements

Introduction

Scope of content

Part I: Initiation

Chapter 1: Intranets explained

So what is an Intranet?

The technology

Cross-platform compatibility

Global access

Ease-of-use

Flexibility

Open standards

Cost

Business benefits

Chapter 2: Models for Implementation

Stage 1: Initiation

Chapter 3: Costing your Intranet

Client server costs

Server set-up costs

Networking infrastructure

Content creation

Training costs

3.1 Calculating Returns-On-Investment (ROIs)

Costs (investment)

Savings (returns)

3.2 ROI Case study

Chapter 4: Outsourcing

Part II: Contagion

Chapter 5: Achieving Critical Mass

Stage 2: Contagion

Chapter 6: Barriers to Access

Access points

Cultural aspects

A case study: Xerox

Chapter 7: Information Supply and Retrieval

Search engines

Intelligent agents

Portals

Portals: purchasing issues

Chapter 8: Filling the Intranet

Flat content

Interactive content

Commercial or externally-sourced information

Business Intelligence information

8.1 Legacy systems

Launching legacy systems via web-based menus

Convert existing documentation using conversion utilities

Chapter 9: Business Applications and Services

9.1 The personnel department

9.2 Library and Information Services

9.3 IT department

9.4 Training, education and e-learning

Part III: Control

Chapter 10: Procedures and Standardisation

Stage 3: Control

Chapter 11: Content Management Issues

Ownership of content

11.1 Management structures

Intranet management structures, example 1.

Webmaster and team

Local Intranet managers

Local Intranet developers

Information owners

Intranet management structures, example 2.

Intranet Management Group (IMG)

Content authorisers

Content providers

Editorial board

Service provider

Intranet Technical Sub-Committee

11.2 Electronic Document Management Systems

Version control

Storage of metadata

Security

Check-in/check-out facility

Search and indexing

File interdependencies and groupings utilities

Open standard interfaces

Structure and organisational capabilities

Supports multiple file types

Maintain file expiration dates

11.3 Content management and extranets

Chapter 12: Enhancing Web Content

Chapter 13: Implementing a Publishing Policy

Chapter 14: Information Overload

Email filters

Rerouting ‘spam’

Unsubscribe to services and updates

Things to watch out for before you send

Training

Selective browsing

Part IV: Integration

Chapter 15: Integrating Knowledge Management with your Intranet Strategy

Stage 4: integration

Knowledge Management: the definition

Chapter 16: Groupware

What is Groupware?

16.1 Shared reference library

16.2 Computer-Supported Collaborative Working (CSCW) systems

Purchasing issues

16.3 Workflow management systems

Availability of graphic tools

Routing capability

The establishment of groups

Performance metrics

Queue management

Management of events

Workload

Integration capacity

Monitoring

Simulation

Webflow

Task management

Process management

Documentation

Hardware and software considerations

Human factors

Process analysts and designers

Vendor/product reputation

Technical support

Canvass user needs

Acceptance

Cost of product

Chapter 17: Extranets

17.1 Remote workers

17.2 Teleworking

Cost savings

Increased productivity

Improved motivation

Organisation flexibility

Resilience

Benefits for individuals

Disadvantages

17.3 Customer and supplier systems

Customers

Scalability

Integration

Functionality

Multichannel

User interface: customer

User interface: agent

Vendor viability

Suppliers

Chapter 18: Implementing an Extranet

18.1 Remote access ‘networked services’

Public

Managed

Internet-based

Fears

Chapter 19: Transnational Intranets and Extranets

Language

Legal matters - encryption

Legal matters - EU Data Protection

Standardising client interfaces

A case study: Arthur Andersen

Chapter 20: Security

Overview of BS 7799

Data Protection Act and BS 7799

Internet/Intranet misuse

Internet Access Control

The Regulation of Investigatory Powers (RIP) Bill

Identifying security needs and measures

Part V: Pervasion

Chapter 21: Future Developments

21.1 Mobile and Wireless Computing

Web to mobile content

21.2 Application Service Providers

21.3 Unified Messaging

Improved customer satisfaction

A more efficient organisation

Reduced cost

21.4 Instant Messaging

21.5 Voice over IP

Chapter 22: The Everywhere-net

Ubiquitous Computing

Personal Area Networks

Pervasion, the fifth stage of Intranet development

References

Appendices

Appendix A: Sample ‘Computer Network and Internet Access Policy’

Disclaimer

Permitted Use of Internet and Company Computer Network

Computer Network Use Limitations

Duty Not to Waste or Damage Computer Resources

No Expectation of Privacy

Acknowledgement of Understanding

Further Reading

Groupwork, Content Management and Workflow

Departmental Applications

Extranets

Information Overload

Intranet Design

Intranet Management

Miscellaneous

Mobile Technologies and Teleworking

Retrieval Technologies

Security (and data protection)

Training and Education

Transnational Intranets

Index

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.147.83.8