Get AI summaries of any video or article — Sign up free
Managerial issues thumbnail

Managerial issues

6 min read

Based on Knowledge Management's video on YouTube. If you like this content, support the original creators by watching, liking and subscribing to their content.

TL;DR

Managers and knowledge leaders must proactively address ethical and legal risks alongside technical system design.

Briefing

Workplace knowledge management runs into a cluster of ethical, legal, and managerial problems that can’t be treated as afterthoughts. Managers and knowledge leaders are expected to anticipate friction points—ranging from basic access failures to privacy violations—and then set policies and controls that prevent repeat incidents. The central message is that knowledge systems succeed only when information access, human behavior, and compliance are managed together.

A first set of challenges centers on access and usability. Information often sits with people, but accessibility breaks down when systems are down, coding or technical components fail, or interfaces make work stressful. Ergonomics becomes part of knowledge management: computer and workstation design must reduce physical and mental strain so employees can work effectively. Operational decisions also shape adoption—whether to outsource parts of the system, whether employees can work from home, how customers and vendors are managed, and how IT resources are governed.

Ethics and legality then move to the foreground, especially around monitoring and acceptable use. Email and internet monitoring raises questions about whether private communications should be watched, and what rules should govern access during working hours. Research cited from the US highlights that employees commonly visit sites like ESPN and Playboy at work when internet access exists, forcing managers to decide what restrictions are ethical and what policies should be written. Companies often respond with email, internet, and software policies, plus technical controls that block certain websites; violating those rules can trigger employer action.

Legal exposure extends beyond workplace browsing. Sexual harassment policies—linked to government acts—must be communicated so employees understand what counts as harassment and what consequences follow. Copyright and licensing issues also matter, particularly when employees download or share music and other media through the internet. Managers are warned that enforcement mechanisms (including blocking) and legal actions can reach individuals even when the behavior is framed as “not getting caught.”

Computing introduces additional risk: employees may bring laptops and smartphones into classrooms or workplaces, record lectures, or use messaging and social platforms during work hours, all of which can undermine productivity and raise intellectual property concerns. Cybercrime—viruses, hacking, and data theft—adds a security layer. Organizations are urged to use antivirus tools, harden systems against intrusion, and carefully consider whether “ethical hackers” should be allowed to test knowledge management systems, since even sanctioned access can collide with intellectual property and confidentiality.

The discussion then narrows to intellectual property as a major organizational problem. Licensing, copyright, patents, trade secrets, and piracy are treated as practical governance issues, not abstract law. Examples include subscription-based use of copyrighted software such as SPSS (requiring renewal), and the legal risk of using pirated software or copying protected media. The transcript also raises the global nature of cyber disputes: multiple countries may be involved, so determining which law applies becomes a challenge.

Finally, leadership and HR practices determine whether knowledge management becomes a living culture. Roles such as chief knowledge officer, chief learning officer, and chief information officer are described as reporting to the CEO and focusing on technical/social knowledge management, learning and development, and intellectual capital. Incentives and performance appraisal must reward knowledge creation, sharing, and productive use. HR’s role is framed as building culture, facilitating access to knowledge, strengthening teams, and enabling collaboration. The overall takeaway: ethical compliance, security, and human motivation are inseparable from building an effective knowledge management system.

Cornell Notes

Knowledge management leadership has to manage more than databases and workflows; it must handle ethical and legal risks while keeping employees able and willing to use the system. Workplace challenges include information access failures, poor human-machine ergonomics, and operational decisions like outsourcing and remote work. Monitoring email and internet use, restricting websites, and enforcing sexual harassment rules create compliance and privacy dilemmas. Intellectual property issues—copyright, licensing, patents, trade secrets, and piracy—drive major legal exposure, especially with software like SPSS and media downloads. Effective leadership also depends on incentives, performance appraisal, and HR-supported culture so knowledge sharing and creation become part of employees’ jobs.

Why does “access to information” become a managerial issue in knowledge management systems?

Access fails in multiple ways: information may remain locked with individuals, systems may be unavailable or broken due to technical issues, and interfaces can make work stressful. The transcript links accessibility to both technology (system uptime, coding reliability) and human factors (ergonomics). Ergonomics is treated as essential because workstation design—such as chair and computer setup—should prevent physical and mental stress, otherwise employees won’t use knowledge systems effectively.

What ethical problem arises when organizations monitor employees’ email or internet use?

Monitoring private communications raises the question of whether employers should interfere with personal emails and what access is allowed during working time. The transcript notes that companies often respond by creating explicit policies (email/internet/software policies) and using technical restrictions to block certain websites. It also highlights a real-world workplace behavior example from the US: employees frequently watch ESPN and Playboy at work when internet access exists, which forces managers to decide what restrictions are ethical and what consequences follow policy violations.

How do copyright and licensing issues show up in everyday workplace behavior?

They appear through downloading and sharing media, copying protected content, and using software without proper permission. The transcript gives a concrete example: SPSS is copyrighted by IBM and requires licensing/subscription for a limited period with renewal. It also describes piracy as both unethical and illegal, including cases where pirated software is used to avoid costs. Beyond software, it warns that downloading music or copying graphics/text without permission can trigger legal cases, and that citing sources may be necessary when reuse is allowed.

What security and governance concerns come with cybercrime in knowledge management?

Cybercrime includes viruses, hacking, and theft of data. The transcript recommends antivirus systems and robust security so systems aren’t hacked. It also raises a governance dilemma around “ethical hackers”: even if testing is intended for public interest, allowing hacking of a knowledge management system can still be debatable because intellectual property and confidentiality may be compromised.

How should knowledge management leadership structure roles and incentives to make knowledge sharing stick?

The transcript describes a leadership chain where roles like chief knowledge officer, chief learning officer, and chief information officer report to the CEO. The chief knowledge officer focuses on technical and social aspects and manages intellectual capital; the chief learning officer emphasizes learning and development; and the chief information officer supports knowledge management with a social tilt. Incentives matter: rewards should cover knowledge creation, sharing, and productive use, and performance appraisal systems should include knowledge-sharing criteria so employees treat knowledge work as part of their job.

Why does the transcript treat “computer ethics” as tied to inequality and access?

It argues that unequal access to information—between rich and poor countries—pushes people toward unethical or illegal workarounds like using pirated software because they can’t afford legitimate tools. This framing connects computer ethics to fairness and “level playing field” concerns, while also raising the question of which law applies in cyberspace when multiple countries are involved.

Review Questions

  1. Which workplace monitoring decisions require both ethical judgment and written policy, and what kinds of technical controls are commonly used?
  2. Explain how intellectual property governance differs across licensing, copyright, patents, trade secrets, and piracy, using at least one example from the transcript.
  3. How do chief knowledge officer, chief learning officer, and HR roles differ in shaping a knowledge-sharing culture?

Key Points

  1. 1

    Managers and knowledge leaders must proactively address ethical and legal risks alongside technical system design.

  2. 2

    Information accessibility depends on both system reliability and human factors like ergonomics that reduce stress and enable effective use.

  3. 3

    Email/internet monitoring requires clear policies on privacy and acceptable use, plus consequences for policy violations.

  4. 4

    Knowledge management increases exposure to intellectual property issues through software licensing, media downloads, and unauthorized copying.

  5. 5

    Cybersecurity controls (antivirus, hardening, and careful governance of testing) are necessary to protect knowledge and data.

  6. 6

    Knowledge management leadership should align incentives and performance appraisal with knowledge creation, sharing, and productive use.

  7. 7

    HR and top management must build a collaborative learning culture so knowledge workers participate in knowledge sharing as part of their job.

Highlights

Ergonomics is treated as a knowledge management requirement: workstation design should prevent physical and mental stress so employees can use knowledge systems effectively.
Workplace monitoring (email and internet) becomes an ethical flashpoint, especially when employees access sites like ESPN and Playboy during working hours.
Intellectual property risk is practical and recurring—subscription software such as SPSS requires renewal, and piracy is framed as both illegal and unethical.
Cybercrime protection is positioned as essential to knowledge management, with antivirus and robust defenses against hacking and data theft.
Knowledge management leadership depends on incentives and performance appraisal that reward knowledge creation and sharing, not just system access.

Topics

  • Workplace Ethics
  • Knowledge Access
  • Monitoring Policies
  • Intellectual Property
  • Cybersecurity
  • Knowledge Management Leadership
  • HR and Incentives

Mentioned