How to Unite Knowledge and Workers: Closing the Information Access Gap - Page 6

Social knowledge networks use role-based security

SKNs use role-based security, so users can be granted access privileges based on factors such as seniority, expertise, functional role, location and more. Credentials are typically verified using single sign-on (SSO). This enables control over what, when and how contributions are made and avoids the information veracity problems that are typical in social media.


The fact of the matter is, one person does not have all of the knowledge. It exists in multiple places. By bringing together content, people and tools to support objectives within secure, virtual environments, SKNs allow organizations to supersede the siloed knowledge problem.

SKNs can bring it all together, creating a rich, relevant knowledge repository that organizations can use to rapidly solve problems and make better business decisions.

Phil Green is Chief Technology Office at Inmagic. Phil is responsible for the long-term technical and strategic direction of Inmagic's solutions. Prior to joining Inmagic in 1990 as president and CEO, Phil held a variety of management positions at Lotus Development Corporation, Communications Studies and Planning International, and was an independent consultant to Microsoft. Phil holds a Bachelor's degree in Economics from Harvard College and a Master's degree from Harvard Business School. He is a blogger at He can be e-mailed at