Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.
Exploiting Tacit Knowledge Through
Knowledge Management Technologies


         Learning Forum London
             22-24 J...
PRESENTATION OUTLINE

 OBJECTIVES & METHODS
 KNOWLEDGE & KNOWLEDGE CLASSIFICATION
 COMMONALITY IN KNOWLEDGE TYPES
 KNO...
OBJECTIVES & METHOD

Objectives:

 To examine the contributions and suitability of the available KM
  technologies, inclu...
KNOWLEDGE
 Valuable information from human mind - reflection, synthesis and
  context (Davenport & Prusak, 1997)

 Facts...
KNOWLEDGE CLASSIFICATION

               2 Main Types                         Reference
       Tacit               Explici...
COMMONALITY IN KNOWLEDGE TYPES


                         Tacit                                  All
                     ...
KNOWLEDGE CONCERNS FOR ORGANISATIONS


 Early retirements & staff mobility can lead to loss of knowledge
  (March, 1991)
...
RELATIONSHIP BETWEEN OL & KM THEORIES

                                                                        AS
        ...
TECHNOLOGIES FOR TACIT KNOWLEDGE EXPLOITATION 1

Learning Laboratory:                                   Executive Cognitiv...
TECHNOLOGIES FOR TACIT KNOWLEDGE EXPLOITATION 2

Enterprise Knowledge Portal:                            Personal Informat...
KNOWLEDGE MANAGEMENT FAILURE
 Organisations sometimes fail to communicate KM strategies well with staff

 Best employees...
CAMTaKE




24 June 2009   Frank Nyame-Asiamah ©   12
CONCLUSION & IMPLICATIONS


 KM and Web 2.0 technologies have been beneficial for businesses
   and continue to support o...
FUTURE RESEARCH

 Future research should consider CAMTaKE for tacit knowledge
  exploitation and management for organisat...
Frank.Nyame-Asiamah@brunel.ac.uk




24 June 2009          Frank Nyame-Asiamah ©       15
Upcoming SlideShare
Loading in …5
×

16

Share

Download to read offline

Exploiting Tacit Knowledge Through Knowledge Management Technologies By Frank Nyame-Asiamah

Download to read offline

You may read the full paper at: http://bura.brunel.ac.uk/handle/2438/3613

This presentation examines the contribution and suitability of available KM technologies including the Web2.0 for tacit knowledge exploitation. The author proposes CAMTaKE (Complex Adaptive Model for Tacit Knowledge Exploitation) as a new integrated framework for extracting tacit knowledge in organisations.

Exploiting Tacit Knowledge Through Knowledge Management Technologies By Frank Nyame-Asiamah

  1. 1. Exploiting Tacit Knowledge Through Knowledge Management Technologies Learning Forum London 22-24 June 2009 By Frank Nyame-Asiamah Brunel University
  2. 2. PRESENTATION OUTLINE  OBJECTIVES & METHODS  KNOWLEDGE & KNOWLEDGE CLASSIFICATION  COMMONALITY IN KNOWLEDGE TYPES  KNOWLEDGE CONCERNS FOR ORGANISATIONS  RELATIONSHIP BETWEEN OL & KM THEORIES  TECHNOLOGIES FOR TACIT KNOWLEDGE EXPLOITATION  KNOWLEDGE MANAGEMENT FAILURE  CAMTaKE  CONCLUSION, IMPLICATIONS & FUTURE RESEARCH 24 June 2009 Frank Nyame-Asiamah © 2
  3. 3. OBJECTIVES & METHOD Objectives:  To examine the contributions and suitability of the available KM technologies, including the Web 2.0 in exploiting tacit knowledge  To propose an integrated framework for extracting tacit knowledge in organisations Method:  A comprehensive literature exploration covering knowledge management (KM), KM technologies and organisational learning (OL) 24 June 2009 Frank Nyame-Asiamah © 3
  4. 4. KNOWLEDGE  Valuable information from human mind - reflection, synthesis and context (Davenport & Prusak, 1997)  Facts and principles organised by mankind in the course of time” (Clarke, 1992)  “Information that is contextual, relevant and actionable ” (Turban et al, 2006, p.368).  An intellectual asset for organisations (Davenport & Prusak, 1997) 24 June 2009 Frank Nyame-Asiamah © 4
  5. 5. KNOWLEDGE CLASSIFICATION 2 Main Types Reference Tacit Explicit Mental models not Artefacts easily Polanyi 1966; Nonaka, 1991 easily conveyed accessed Informal Formal Conklin, 1996 Softer Harder Hildreth et al, 1999 Unstructured Structured Hahn & Subramani, 2000 Symbiotic Semiotic Sharif, 2008 24 June 2009 Frank Nyame-Asiamah © 5
  6. 6. COMMONALITY IN KNOWLEDGE TYPES Tacit All Knowledge Knowledge Externalisation Points of focus Forms Membership Documents Interacting Monuments Mutuality Instruments Acting Projections Living in a world NOTE: Knowledge is an asset, exists in different forms, mostly created by humankind and hidden parts difficult to exploit 24 June 2009 Frank Nyame-Asiamah © 6
  7. 7. KNOWLEDGE CONCERNS FOR ORGANISATIONS  Early retirements & staff mobility can lead to loss of knowledge (March, 1991)  It takes longer time to develop experience (Macintosh, 1999)  Lack of time & reward preclude people from sharing knowledge (Turban et al, 2006)  Death ceases human consciousness  Question 1: How do we exploit tacit knowledge? 24 June 2009 Frank Nyame-Asiamah © 7
  8. 8. RELATIONSHIP BETWEEN OL & KM THEORIES AS Tacit a L and C Know nd Explic KM, O odel , ledge it M Elroy (McA Mode & Mc dam l tone e t al , 2 ( F i r es ) 007) 2004 g St in or rn (D y Mo telli Lea l ) en nin del g n ual ode 1991 g,2 ut M ch, 00 M ar 0) (M Fi ve Mo e, 19 M oP ) l Di de 90 88 ge de (S C 19 sc l ) en o r, g ip Kn lin CT en dI ow e (W n led L a el g , O od b li n, Mo e Sp KM M Tom (N o na del ira l t& k a, 1 ne 006) n 2 991 (Be ) 24 June 2009 8 Frank Nyame-Asiamah ©
  9. 9. TECHNOLOGIES FOR TACIT KNOWLEDGE EXPLOITATION 1 Learning Laboratory: Executive Cognitive Support or ESS: A neutral and non-threatening ‘virtual collaborated Information systems at the organisation’s strategic environment’ where individuals develop deeper level designed to address unstructured decision understanding of their beliefs and exploit tacit making through advanced graphics and knowledge (Pourdehnad et al, 2002) communications (Laudon & Laudon, 2003) UPS used Integrad Learning Laboratory It helps higher level learning, knowledge creation, comprising online learning, three dimensional and provides opportunity for executives to identify models, podcasts, videos, etc to exploit new drivers tacit knowledge (Chen et al, 2003) and trainees skills on safety performance (Ketter, 2008) Collective Cognitive Mapping System: Knowledge Management Suites: An episodic memory representing a container of individual cognitive maps Complete and unified KM solutions consisting An organisational memory representing a reservoir communication, collaboration and storage of collective cognitive maps technologies (Dotsika & Patrick, 2006) A local cognitive map generator which translates They help employees to learn business processes, individual mental models into graphical unlock their tacit knowledge and share them among representations their peers A central collective cognitive map generator which Commerce Bank, Wow Answer Guide deployment exploit cognitive maps of all members for collective saved Commercial Bank a weekly cost of $20,000.00 problem solving (Chen et al, 2003) (Turban et al, 2006, p. 385) 24 June 2009 Frank Nyame-Asiamah © 9
  10. 10. TECHNOLOGIES FOR TACIT KNOWLEDGE EXPLOITATION 2 Enterprise Knowledge Portal: Personal Information Portal: Information gateways including internet, intranet and extranet sites of organisations (Dfouni & Croteau, 2004) They include social network sites, wikis and audio podcasting, video sharing and collaborative tools for learning and knowledge creation Institutions are using web-based CPD (e.g. REfLECT) and VLE to enhance the transfer of tacit knowledge into explicit knowledge (Harris, 2008) E-Discussion Boards: Email: Effective and most important method of knowledge conversion from one person to another - CPD support within the University of Wolverhampton (Harris, 2008) Topmost socialisation tool for extracting and sharing unstructured knowledge (Dfouni and Croteau, 2004) BP exploited knowledge stored in the minds of its employees through the use of email technology (Brooks, 2000) 24 June 2009 Frank Nyame-Asiamah © 10
  11. 11. KNOWLEDGE MANAGEMENT FAILURE  Organisations sometimes fail to communicate KM strategies well with staff  Best employees refuse to publish their good ideas on KM platform  Staff show lack of interest when KM systems become fully implemented  Poor content management techniques and lack of incentives for KM system users (Turban et al, 2005; Barth 2000)  Web 2.0 and social software developers usually base their design approaches on ‘technology to the user’ (Dotsika & Patrick, 2006)  So what do we do with design? - Theory of Deferred Action recommends that KM systems should be designed in the context of organised action 24 June 2009 Frank Nyame-Asiamah © 11
  12. 12. CAMTaKE 24 June 2009 Frank Nyame-Asiamah © 12
  13. 13. CONCLUSION & IMPLICATIONS  KM and Web 2.0 technologies have been beneficial for businesses and continue to support organisational transformation  Technologies for extracting tacit knowledge should be designed around individuals’ cognitive behaviour and natural processes of human techniques  Organisations should persuade each employee to share his/her ideas on the Web 2.0 platforms with ‘X’ number of staff  No idea should be taken for granted in a learning community where an organisation wants to exploit tacit knowledge for transformation 24 June 2009 Frank Nyame-Asiamah © 13
  14. 14. FUTURE RESEARCH  Future research should consider CAMTaKE for tacit knowledge exploitation and management for organisational transformation  Design of KM and Web 2.0 technologies needs to consider the application of the Theory of Deferred Action (ToDA) 24 June 2009 Frank Nyame-Asiamah © 14
  15. 15. Frank.Nyame-Asiamah@brunel.ac.uk 24 June 2009 Frank Nyame-Asiamah © 15
  • priyankathakur71

    May. 11, 2018
  • RunganoKarimanzirame

    Feb. 16, 2018
  • TigistMulatBeyene

    Mar. 13, 2017
  • rhumpaikul

    Jun. 22, 2015
  • HagosAdhana

    Jun. 3, 2015
  • sibosol

    May. 30, 2015
  • lotfi_bijan

    Apr. 28, 2015
  • MichaelEnnemoser

    Jan. 2, 2015
  • bambangsybsy

    Dec. 2, 2014
  • rainianne

    Aug. 17, 2014
  • kkaw

    Jun. 5, 2013
  • arshoo76

    Jul. 12, 2010
  • nmovold

    Nov. 25, 2009
  • parraguezr

    Nov. 6, 2009
  • arasani

    Aug. 5, 2009
  • fnasiamah

    Jul. 7, 2009

You may read the full paper at: http://bura.brunel.ac.uk/handle/2438/3613 This presentation examines the contribution and suitability of available KM technologies including the Web2.0 for tacit knowledge exploitation. The author proposes CAMTaKE (Complex Adaptive Model for Tacit Knowledge Exploitation) as a new integrated framework for extracting tacit knowledge in organisations.

Views

Total views

15,787

On Slideshare

0

From embeds

0

Number of embeds

64

Actions

Downloads

318

Shares

0

Comments

0

Likes

16

×