Nptel KM
Nptel KM
KNOWLEDGE
MANAGEMENT
KBL Srivastava
Knowledge Management
Volume Value
Less is
Completeness More Structure
Objectivity Wisdom Subjectivity
Knowledge
Intelligence
Information
Facts
Information, Knowledge and Wisdom
Types of Knowledge
• Shallow (readily recalled) and deep
(acquired through years of experience)
• Explicit (codified) and tacit (embedded in the
mind)
• Procedural (psychomotor skills) versus
episodical (chunked by episodes;
autobiographical)
• Chunking knowledge
• Shallow Procedural Knowledge
• Knowledge FROM PROCEDURAL TO EPISODIC KNOWLEDGE
• Knowledge of how to do a task that is essentially motor in
• nature; the same knowledge is used over and over again.
• _______________________________________________
• Declarative Knowledge
• Surface-type information that is available in short-term
• memory and easily verbalized; useful in early stages
• of knowledge capture but less so in later stages.
• _______________________________________________
• Semantic Knowledge
• Hierarchically organized knowledge of concepts, facts,
• and relationships among facts.
• _______________________________________________
• Episodic Knowledge
• Knowledge that is organized by temporal spatial means,
• not by concepts or relations; experiential information that
• is chunked by episodes. This knowledge is highly compiled
• Deep and autobiographical and is not easy to extract or capture.
• Knowledge
Source: Awad, E.M (2007). Knowledge Management
0-8
Tacit knowledge
Unstructured knowledge – in the domain of subjective,
cognitive, and experiential learning
Highly personal, hard to formalize and document
Cumulative store of the experiences, mental maps,
insights, expertise, know-how, trade secrets, skills set,
understanding, etc.
Involves a lot of human interpretation
A few Foundation Principles and
Building Concepts
• Knowledge Influences Success
• Knowledge Resides in the Heads of People
• Two Types of Knowledge
• Codified (explicit)
• Personalized (tacit)
• Knowledge Sharing Requires a Conduit to Happen Systemically
• Technology is the conduit
• Knowledge Sharing Requires Trust
• KM embraces both the Knowledge Based organization and the
Learning Organization
• KM has planned architectural frameworks
Reservoirs of Knowledge
Knowledge Reservoirs
Inter-organizational
Groups
Networks
• Working Solutions
• Web of Relationships
• Communities of Practice
• Experience
• Expertise and Theoretical Knowledge
• Database
From
Tacit Explicit
To
Four Modes of Knowledge Conversion
• Socialization:
• A process of sharing experiences
• Apprenticeship through observation, imitation, and practice
• Externalization:
• A process of articulating tacit knowledge into explicit concepts
• A quintessential knowledge-creation process involving the creation of metaphors,
concepts, analogies, hypothesis, or models
• Created through dialogue or collective reflection
• Internalization:
• A process of embodying explicit knowledge into tacit knowledge
• Learning by doing
• Shared mental models or technical know-how
• Documents help individual internalize what they experience
• Combination:
• A process of systemizing concepts into a knowledge system
• Reconfiguration of existing information and knowledge
The knowledge creation process
15
Source: The knowledge creating company, I. Nonaka and H. Takeuchi
Knowledge Requires Capture, Organization, Access
and Leverage
OLD WAY NEW WAY
Capture form is written, Capture from is digits in
auditory or graphical cyberspace
representations
Organization via software
Organization is via tables of programs designed upon
content, indexes, engineering principles,
classification systems used mathematical equations,
by publishers, libraries, etc word associations in
Access when physical body cyberspace 24/7/365
goes to where the Access wherever the
knowledge is located…a physical bodies link via
library, a company, a computers
research laboratory, a
school Tacit knowledge tapped
using many different
Tacit knowledge rarely technological tools
tapped
Leverage is exponential,
Leverage is a sum game multiples upon multiples
Knowledge Work Activities
Ac q u i r e
An a l yz e
O r g a n i ze
C o d i fy
Co m m u n i
c aUttei l i z e
Re sult
KM in Practice
• Knowledge Teams - multi-disciplinary, cross-
functional
• Knowledge (Data)bases - experts, best practice
• Knowledge Centres - hubs of knowledge
• Learning Organization - personal/team/org
development
• Communities of Practice - peers in execution of
work
• Technology Infrastructure - Intranets, Domino, doc
mgt
• Corporate Initiatives - CKOs, IAM, IC accounting
Seven Levers of KM
• Customer Knowledge - the most vital knowledge
• Knowledge in Products - ‘smarts’ add value
• Knowledge in People - but people ‘walk’
• Knowledge in Processes - know-how when needed
• Organizational Memory - do we know what we know?
• Knowledge in Relationships - richness and depth
• Knowledge Assets - intellectual capital
Some Cases
• Create/discover - 3M, Glaxo Wellcome
• Codify - BHA, Standard Life, PwC
• Diffuse - H-P, Thos. Miller, Rover, BP
• Use - Buckman, Steelcase, PwC, Andersen etc.
• Process/culture - Cigna, Analog
• Conversion - Monsanto
• Measure/exploit - Skandia, Dow Chemicals
Knowledge to Knowledge Management
• Process of capturing and making use of a firm’s
collective expertise anywhere in the business
• Doing the right thing, NOT doing things right
• Viewing company processes as knowledge
processes
• Knowledge creation, dissemination, upgrade, and
application toward organizational survival
• Part science, part art, part luck
Defining KM
• Knowledge management (KM) is managing the
organization’s knowledge (both explicit and tacit) through
the process of creating, structuring, disseminating and
applying knowledge to enhance organizational
performance and create value
• KM requires a major transformation in organizational
culture to create a desire to share
• Structuring enables problem-solving, dynamic learning,
strategic planning, decision-making
• Leverage value of intellectual capital through reuse
Roots of Knowledge Managment
Business
Transformation
Learning (BPR, TQM, culture)
Organization Innovation
Knowledge
Management
Intellectual Information
Assets/Capital Management
Knowledge-based
Systems
Need for Knowledge Management
• Knowledge has become the key resource, for a
nation’s military strength as well as for its
economic strength.
• It is fundamentally different from the traditional
key resources of the economist – land, labor, and
even capital
• The performance capacity, if not the survival, of
any organization in the knowledge society will
come increasingly to depend on those two factors
(Drucker,1994).
Forces Driving Knowledge Management
• Increasing Domain Complexity: Intricacy of internal
and external processes, the rapid advancement of
technology.
• Accelerating Market Volatility: The pace of change, or
volatility, within each market domain has increased
rapidly in the past decade.
• Intensified Speed of Responsiveness: The time
required to take action based upon subtle changes
within and across domains is decreasing.
• Diminishing Individual Experience: High employee
turnover rates have resulted in individuals with decision-
making authority having less tenure within their
organizations than ever before.
Benefits of KM
• People don’t have to spend as much time looking for
answers
• People can move quickly on their problem-solving
anywhere and anytime
• People can work more effectively and more efficiently
• Share best practices
• Competitive advantage
• Expertise can be leveraged
• Better decision-making
• Reduced costs, therefore increased profits
• Retain key talent and expertise
• Improve customer retention and/or satisfaction
THE KNOWLEDGE ORGANIZATION
Indicators of knowledge: thinking actively and ahead, not passively and
behind Using technology to facilitate knowledge sharing and innovation
Culture
Competition
Collect
Create
Organize
Techno- Intelligence
logy Maintain Knowledge
Organization
Refine
Disseminate
Knowledge
Management
Leadership
Process
KM Drivers
The middle layer
addresses the KM A knowledge organization derives knowledge
life cycle from customer, product, and financial
knowledge. Also from financial practices
Source: Awad, E.M (2007). Knowledge Management
THE KM CYCLE AND THE
ORGANIZATION
Knowledge management cycle
• Creates knowledge through
new ways of doing things
• Identifies and captures new
knowledge
• Places knowledge into context
so it is usable
• Stores knowledge in
repository
• Reviews for accuracy and
relevance
• Makes knowledge available at
all times to anyone
WHAT KM IS NOT ABOUT
• Reengineering
• Discipline or philosophic calling
• Intellectual capital, per se
• Based on information or about data
• Information value chain or knowledge capture
• Limited to gathering information from the
company’s domain experts or retiring employees
and creating databases accessible by intranets
• Digital networks
1-30
KM System Justification
• Is current knowledge going to be lost?
• Is proposed system needed in several
locations?
• Are experts available/willing?
• Can experts articulate how problem will be
solved?
• Is there a champion in the house?
Critical Success Factors
• Strong link to business imperative
• Compelling vision and architecture
• Knowledge leadership
• Knowledge creating and sharing culture
• Continuous Learning
• Well developed ICT infrastructure
• Systematic knowledge processes
Soft Infrastructure
Provide Infrastructure
Organization - Culture - Technology - Public Relations
Source: Ernst & Young, and “A Note on Knowledge Management,” Harvard Business School
9-398-031, 1997
Organizational Impacts of Knowledge Management
Module 2
Knowledge Management
KBL Srivastava
Topics
• KM Cycle: Process, Models of KM
cycle
•Knowledge creation and knowledge
architecture
•capturing tacit Knowledge
KM Cycle
• Effective knowledge management requires an
organization to identify, generate, acquire,
diffuse, and capture the benefits of knowledge
that provide a strategic advantage to that
organization.
• A knowledge management cycle can be perceived
as the route information follows in order to
become transformed into a valuable strategic
asset for the organization via a knowledge
management cycle.
KM Cycle Processes
• Knowledge Capture
• Knowledge Creation
• Knowledge Codification
• Knowledge Sharing
• Knowledge Access
• Knowledge Application
• Knowledge Re-Use
4
Meyer and Zack KM Cycle
• KM cycle processes are composed of technologies,
facilities and processes of manufacturing products and
services.
• Information products are repositories comprising
information content and structure, which is unique for
each organization.
• Information Content is the data held in the repository
that provides the building blocks for the resulting
information products such as Banks have content relating
to Personal and commercial accounts
• The major developmental stages of a knowledge
repository and mapped these stages onto a KM cycle.
Meyer and Zack KM Cycle
Meyer and Zack KM Cycle (1)
• Acquisition deals with issues regarding origin
of raw materials such as scope, breadth,
depth, credibility, accuracy, timeliness,
relevance, cost, control, and exclusivity.
• The guiding principle is that, highest quality
source data is required, else the intellectual
products produced downstream will be lower.
Stage 2
• Refinement may be physical (like migrating from
one medium to another) or logical (like
restructuring, relabeling, indexing, and integrating).
• Refining includes cleaning up (like sanitizing content
so as to ensure complete anonymity of sources and
key players involved) or standardizing (like
conforming to templates of a best practice or
lessons learned as used within that particular
organization.
• This stage also adds up to the value by creating
more readily usable knowledge objects and by
storing the content more flexibly for future use.
Stage 3 and 4
• Storage or Retrieval forms a bridge between the
upstream addition and refinement stages that feed
the repository and downstream stages of product
generation. Storage can be physical (file folders,
printed information) as well as digital (database,
knowledge management software).
• Distribution defines how the product is to be
delivered to the end-user (like fax, print, email) and
encloses not only the medium of delivery but also its
timing, frequency, form, language, and so on.
Stage 5: Presentation
• Context plays an important role in Presentation or Application
stage. The performance of each of the preceding value-added
steps is evaluated here – for example, does the user have
enough context to be able to make use of this content?
• If not, the KM cycle has failed to deliver value to the individual
and ultimately to the company.
• Example: A Basic Database may represent an example of
Knowledge that has been created. Value can then be added by
extracting Trends from this data.
• The original information has been repackaged to provide Trend
analyses that can serve as the basis for Decision Making within
an organization
Bukowitz & Williams Model
ASSESS
GET
BUILD/SUSTAIN
USE Knowledge
12
Bukowitz and Williams /2
• Get: seeking out information
– Tacit and explicit
– Being selective when faced with information
overload
• Use: combine content in new and interesting
ways to foster innovation in the organization
• Learn: learning from experiences
– Creation of an organizational memory
13
Bukowitz and Williams/3
• Contribute: motivate employees to post what
they have learned to a knowledge base
– Link individual learning and knowledge to
organizational memory
• Assess: evaluation of knowledge capital:
Identify assets, metrics to assess them and
link these directly to business objectives
14
Bukowitz and Williams/4
• Build and Sustain: allocate resources to
maintain knowledge base
– Contribute to viability, competitiveness
• Divest: should not keep assets that are no
longer of any business value
– Transfer outside the organization e.g. outsourcing
– Patent, spin off companies etc.
15
Wiig KM Cycle
• Processes by which we build and use knowledge
– As individuals
– As teams (communities)
– As organizations
• How we:
– Build knowledge
– Hold knowledge
– Pool knowledge
– Apply knowledge
• Discrete tasks yet often interdependent & parallel
16
Wiig KM Cycle/2
•Personal experience
•Formal education and training
Build Knowledge
•Intelligence sources
•Media, books, peers
18
Holding Knowledge
• In people’s minds, books, computerized knowledge
bases, etc.
– Remember knowledge – internalize it
– Cumulate knowledge in repositories (encode it)
– Embed knowledge in repositories (within procedures)
– Archive knowledge
• Create scientific library, subscriptions
• Retire older knowledge from active status in repository (e.g. store
in another medium for potential future retrieval – cd roms, etc.)
19
Pooling Knowledge
• Can take many forms such as discussions, expert networks
and formal work teams
• Pooling knowledge consists of:
– Coordinating knowledge of collaborative teams
– Creating expert networks to identify who knows what
– Assembling knowledge – background references from
libraries and other knowledge sources
– Accessing and retrieving knowledge
• Consult with knowledgeable people about a difficult problem,
peer reviews, second opinions
• Obtain knowledge directly from a repository – advice, explanations
20
Pooling Knowledge - Examples
• An employee realizes he or she does not have the
necessary knowledge and know-how to solve a
particular problem
• (S)he contact others in the company who have had
similar problems to solve, consults the knowledge
repository and makes use of an expert advisory
system to help her out
• She organizes all this information and has subject
matter experts validate the content
21
Using Knowledge (con’t)
• Synthesize alternative solutions, identify options, create new
solutions
• Evaluate potential alternatives, appraise advantages and
disadvantages of each, determine risks and benefits of each
• Use knowledge to decide what to do, which alternative to
select
– Rank alternatives & test the extent of feasiblity, and
acceptablity
• Implement selected alternative
– Choose and assemble tools needed
– Prepare implementation plan, distribute it, authorize
team to proceed with this solution
22
Using Knowledge - Examples
• Expert mechanic encounters a new problem
• Gathers info to diagnose and analyze
• Synthesizes a list of possible solutions with the tools
he knows are available to him
• Decides on the best option and uses it to fix the part
• Non-routine tasks are approached in a different way
than familiar, standard ones
23
Five Critical Knowledge Functions for
each KM Cycle Step
• Type of knowledge or skill involved
– Securities trading expertise
• Business use of that knowledge
– Increase the value of a retirement fund portfolio
• Constraint that prevents knowledge from being fully
utilized
– Expert will retire at the end of the year with no successor
• Opportunities, alternatives to manage that knowledge
– Elicit and codify knowledge before person retires
• Expected value-added of improving the situation
– Valuable knowledge is not lost to organization
24
Integrated KM Cycle
Assess
Knowledge Knowledge
Capture Sharing and
and/or Creation Dissemination
Knowledge
Acquisition and
Update Application Contextualize
28
Source: Awad, E.M (2007). Knowledge Management
KNOWLEDGE ARCHITECTURE
• People core: Evaluate current documents
people use
• Identify knowledge centers
• The technical core: The total technology
required to operate the knowledge
environment
People Content
Technology
29
Identifying Knowledge Content
Centers . Competition
. Job data
openings . Sales volume
. Benefits . Leader sales
information
Human
Resource
s Sales
Customer
. Strategies Service
. Tools
.R&D Marketing
. Advertising . Complaint
rate
. Satisfaction
information
30
Source: Awad, E.M (2007). Knowledge Management
Technical layer of the KM system
User Interface
1
(Web browser software installed on each user’s PC)
Transport
5 (e-mail, Internet/Web site, TCP/IP protocol to manage traffic flow)
Middleware
6 (specialized software for network management, security, etc.)
32
Technical Access Layer
• Intranet: The internal network of
communication systems modified around the
Internet
• Extranet: An intranet with extensions that
allow clearly identified customers or suppliers
to reach company-related technical
educational information.
33
Technical Access Layer
Internet Intranet
Extranet
Cloud Company employees
•Suppliers
•Vendors
PUBLIC •Partners
AT LARGE •Customers
36
Criteria for an Effective
Collaborative Layer
• Security—very critical
• Portability across platforms
• Integration with existing systems
• Scalability, flexibility, and ease of use
37
Expert Systems
• Emulate the reasoning of a human expert in a
problem domain
• Can help a person become wiser, not just better
informed
Components include:
• Justifier: explains how and why an answer is given
• Inference engine: problem-solving mechanism for
reasoning and inferencing
• Scheduler: coordinates and controls rule processing
38
Knowledge-Enabling Application
Layer
• Often referred to as value-added layer
• Creates a competitive edge for the learning
organization
• Provides knowledge bases, discussion databases,
sales force automation tools, imaging tools, etc.
• Ultimate goal: show how knowledge sharing
could improve the lot of employees
39
Transport Layer
• Most technical layer to implement
• Ensures that the company will become a
network of relationships
• Includes LANs, WANs, intranets, extranets,
and the Internet
• Considers multimedia, URLs, graphics,
connectivity speeds, and bandwidths
40
Middleware Layer
• Focus on interfacing with legacy systems and
programs residing on other platforms
• Designer should address databases and applications
with which KM system interfaces
• Contains a cluster of programs to provide
connections between legacy applications and
existing systems
• Makes it possible to connect between old and new
data formats
41
Repositories Layer
• Bottom layer in the KM architecture
• Represents the physical layer where
repositories are installed
• Includes intelligent data warehouses, legacy
applications, operational databases, and
special applications for security and traffic
management
42
Build In-House, Buy, or
Outsource?
• Trend is toward ready-to-use, generalized
software packages
• Outsourcing is also a trend, releasing
technological design to outsiders
• Regardless of choice, it is important to set
criteria for the selection
• Question of who owns the KM system should be
seriously considered
43
CAPTURING TACIT KNOWLEDGE
VARIOUS TECHNIQUES
Knowledge Codification in the KM System Life Cycle
Capture Tools Intelligence
Programs, gathering
books, articles, Shells, tables,
experts tools, frames
maps, rules
KNOWLEDGE
CAPTURE
KNOWLEDGE
(Creation) CODIFICATION
• Logical testing
• User Acceptance
• Testing, Training
Data Bases
TESTING AND
DEPLOYMENT
Explicit Knowledge
GOAL
KNOWLEDGE
INNOVATION
KNOWLEDGE
SHARING
KNOWLEDGE
TRANSFER
DATABASE Collaborative
tools,
Web browser, networks,
Web pages Intranets
KNOWLEDGE
BASE Distributed
Insight systems
45
Source: Awad, E.M (2007). Knowledge Management
What Is Knowledge Capture ?
• Transfer of problem-solving expertise from some
knowledge source to a repository or a program
• A process by which the expert’s thoughts and
experiences are captured- mind automation
• Includes capturing knowledge from other sources
such as books, technical manuscripts, etc.
• A knowledge developer collaborates with an
expert to convert expertise into a coded program
• Knowing how experts know what they know
46
Steps involved
• Knowledge capturing is a demanding process
in which knowledge developer collaborates
with the experts to convert expertise into a
coded program. It include three steps-
1. Use of appropriate tools to get information
from the expert
2. Interpreting the information and inferring the
experts knowledge and reasoning process
3. Using the interpretation to build the rules
that represent the expert’s though process or
solution
Improving the Knowledge
Capture Process
• Knowledge developers should focus on how
experts approach a problem. They must Look
beyond the facts or the heuristics
• Re-evaluate how well knowledge developers
understand the problem domain and how
accurately they are modeling it.
• Elicit the expert knowledge through case situation
and scenarios.
48
Indicators of Expertise
• Experts are distinguished by the quantity and
quality of knowledge they possess.
• They know more and what they know makes them
more efficient and effective.
• Peers regard expert’s decisions good decisions
• Every time there is a problem, the expert is
consulted
• Expert sticks to the facts and works with a focus
• Expert has a knack for explaining things
• Expert exhibits an exceptional quality in
explanations
49
Expert’s Qualifications
• Knows when to follow hunches and when to make exceptions
• Sees big picture
• Possesses good communication skills
• Tolerates stress
• Thinks creatively
• Exhibits self-confidence
• Maintains credibility
• Operates within a schema-driven orientation
• Uses chunked knowledge
• Generates motivation and enthusiasm
• Shares expertise willingly
• Emulates a good teacher’s habits
50
Pros and Cons of Using a Single
Expert
Advantages:
• Ideal when building a simple KM system
• A problem in a restricted domain
• Facilitates the logistics aspect of coordinating
arrangements for knowledge capture
• Problem-related or personal conflicts are easier to
resolve
• Shares more confidentiality with project-related
information than does multiple expert
51
Pros and Cons of Using a Single
Expert (cont’d)
Drawbacks:
• The expert’s knowledge is not easy to capture
• Single experts provide a single line of reasoning,
which makes it difficult to evoke in-depth
discussion of the domain
• Single experts more likely to change scheduled
meetings than experts who are part of a team
• Expert knowledge is sometimes dispersed
52
Pros and Cons of Using Multiple
Experts
Advantages
• Complex problem domains benefit from the
expertise of more than one expert
• Working with multiple experts stimulates
interaction
• Listening to a variety of views allows knowledge
developer to consider alternative ways of
representing knowledge
• Formal meetings frequently a better environment
for generating thoughtful contributions
53
Pros and Cons of Using Multiple
Experts
Advantages
• Complex problem domains benefit from the
expertise of more than one expert
• Working with multiple experts stimulates
interaction
• Listening to a variety of views allows knowledge
developer to consider alternative ways of
representing knowledge
• Formal meetings frequently a better environment
for generating thoughtful contributions
54
Pros and Cons of Using Multiple
Experts (cont’d)
Drawbacks:
• Scheduling difficulties
• Disagreements frequently occur among experts
• Confidentiality issues
• Requires more than one knowledge developer
• Process loss in determining a solution
55
Developing a Relationship With
Experts
• Create the right impression- Knowledge developer
must learn quickly and se behavioral ad technical skills to
gain experts attention and respect.
• Do not underestimate the expert’s experience-
understand the experts style: procedure type, storyteller
type, godfather type or salesperson type
• Prepare well for the session- Knowledge developer
should know about the background of experts
• Decide where to hold the session- location and
meeting places should be quiet and interruption free
56
Styles of expert’s expressions
• Procedure type—methodical approach to the
solution
60
Variations of Structured
Questions
• Multiple-choice questions offer specific choices,
faster tabulation, and less bias by the way
answers are ordered
• Dichotomous (yes/no) questions are a special
type of multiple-choice question
• Ranking scale questions ask expert to arrange
items in a list in order of their important or
preference
61
Things to Avoid
• Taping a session without advance permission from
the expert
• Converting the interview into an interrogation
• Interrupting the expert
• Asking questions that put the domain expert on the
defensive
• Losing control of the session
• Pretending to understand an explanation when you
actually don’t
• Promising something that cannot be delivered
• Bring items not on the agenda
62
Sources of Error that Reduce
Information Reliability
• Expert’s perceptual slant
• Expert’s failure to remember just what happened
• Expert’s fear of the unknown
• Communication problems
• Role bias
Errors made by Knowledge developer- Age, Race,
Gender
63
Problems Encountered During
the Interview
• Response bias
• Inconsistency
• Communication difficulties
• Hostile attitude
• Standardized questions
• Lengthy questions
• Long interview
64
Issues to Assess
• How would one elicit knowledge from experts who cannot say
what they mean or mean what they say?
• What does one say or do when the expert says, “Look, I work
with shades of gray reasoning. I simply look at the problem
and decide. Don’t ask me why or how.”
• How does one set up the problem domain when one has only
a general idea of what it should be?
• What does one do if the relationship with the domain expert
turns out to be difficult?
• What happens if the expert dislikes the knowledge developer?
65
On-Site Observation
• Process of observing, interpreting, and recording
problem-solving behavior while it takes place
• More listening than talking
• Some experts do not like to be observed
• Fear of ‘giving away’ expertise is a concern by the
one observed
• Process can be distracting to others in the setting
• Continuous shuttle process important
66
Brainstorming
• Unstructured approach to generating ideas
about a problem
• All possible solutions considered equally
• Emphasis is on frequency of responses during
the session
• Idea generation, followed by idea evaluation
• Computer-aided approach to dealing with
multiple experts
67
Protocol Analysis(Cases or
Scenarios)
• Think-aloud method
• Expert keeps talking, speaking out loud while solving
a problem
• Effective source of information on cognitive
processes
• Makes expert cognizant of the processes being
described
• Provides wealth of information toward knowledge
representation
68
Consensus Decision Making
• Clear agreement regarding the best solution to a
problem
• As a tool, it follows brainstorming
• Procedure ensures fairness and standardization in
the way experts arrive at a consensus
• A bit tedious and can take hours
• The rigidity of the consensus method can be a
problem for many experts
69
The Repertory Grid
• Domain expert viewed as a scientist who categorizes
a problem domain using his or her own model
• Grid used to capture and evaluate the expert’s model
• Experts see problems based on reasoning that has
stood test of time
• A representation of the experts’ way of looking at a
particular problem
• A grid is a scale or a bipolar construct on which
elements are placed within gradations
• Novice Expert
70
The Repertory Grid (cont’d)
• Benefit: May prompt the expert to think more
seriously about the problem and how to solve it.
• Drawback: Difficult to manage when large grids are
accompanied by complex details
• Because of difficulty in simplicity and manageability,
the tool is normally used in the early stages of
knowledge capture
71
Nominal Group Technique (NGT)
• Mitigates the process losses associated with
multiple experts
• An alternative to the consensus technique
• Provides an interface between consensus and
brainstorming
• Panel of experts becomes a “nominal” group
whose meetings structured in order to effectively
pool individual judgment
• An idea writing or idea generation technique
72
NGT (cont’d)
• Effective in multiple expert knowledge capture,
especially when minimizing differences in status
among experts is important
• In NGT, each expert has an equal chance to express
ideas in parallel with other experts in the group
• With discussion accommodated in sequential order,
NGT can be a more efficient and productive
approach than brainstorming
73
Delphi Method (cont’d)
• Controlled feedback
• Statistical group response
• Experts often lack necessary knowledge on
which to base final judgment
• Poorly designed questionnaire could cause all
kinds of problems
74
Concept Mapping
• A network of concepts, consisting of nodes
and links
• A node represents a concept and a link
represents the relationship between concepts.
An effective way for a group to function
without losing their individuality
75
Figure: Conceptual Map
Example-
White
horse Bear
d At
chimneys On roofs
Birthday
has
rides
Spain listens
has climbs
lives
in lives in
SAINT helper of BLACK
NICOLAS
PETER
Santa
Clause Presents
2
Idea
Generation
6 STEPS (focus for
Utilization brainstorming)
IN
CONCEPT
MAPPING
3
Idea
Structuring
(sorting/rating
4 statements)
5 Statement
Interpretation Representation
(cluster analysis)
79
Module 3
Knowledge Management
KBL Srivastava
Topics
• Knowledge codification
• system development: system
testing and deployment
• knowledge transfer and
knowledge sharing
What Is Knowledge Codification?
• Organizing and representing knowledge
before it is accessed by authorized personnel
• The organizing part is usually in the form of a
decision tree, a decision table, or a frame
• Converting tacit knowledge to explicit
knowledge in a usable form
• Converting undocumented to documented
information
• Making corporate-specific knowledge visible,
accessible, and usable for decision making
Knowledge Codification in the KM System Life Cycle
Capture Tools Intelligence
Programs, gathering
books, articles, Shells, tables,
experts tools, frames
maps, rules
KNOWLEDGE
CAPTURE
(Creation) KNOWLEDGE
CODIFICATION
• Logical testing
• User Acceptance
• Testing, Training
Data Bases
TESTING AND
DEPLOYMENT
Explicit Knowledge
GOAL
KNOWLEDGE
INNOVATION
KNOWLEDGE
SHARING
KNOWLEDGE
TRANSFER
DATABASE Collaborative
tools,
Web browser, networks,
Web pages Intranets
KNOWLEDGE
BASE Distributed
Insight systems
4
Source: Awad, E.M (2007). Knowledge Management
Why Codify Knowledge?
• Diagnosis—KM system is given identifiable information
through the users observation or experience. Addressing
identifiable symptoms of specific causal factors
• Instruction/training: promote training among junior staff
based on captured knowledge of senior staff
• Interpretation— Interpretive codified knowledge system
compare aspects of an operation to present standards.
• Planning/scheduling—mapping out an entire course of action
before any steps are taken
• Prediction—inferring the likely outcome of a given situation
and flashing a proper warning or suggestion for corrective
action
Knowledge Dimensions and Bottlenecks
New Knowledge
Diffusion Too Slow
Knowledg Location
e is Not People
Form Time
Shared Do Not
KNOWLEDGE Know
Knowled
DIMENSION Where
ge Not
Shared Knowle
Recorded dge
Difficult
Knowledge Knowled Resides
to Know
Difficult to ge
Who Has
Access Difficult
Knowledg
to
e
Access
(Content)
6
Source: Awad, E.M (2007). Knowledge Management
Modes of Conversion
• Tacit to tacit knowledge—produces socialization.
Observation and practice are two knowledge capture
tools
• Tacit to explicit knowledge— externalizing via
analogies or metaphors. Resulting explicit
knowledge can then be stored in repositories
• Explicit to tacit knowledge—internalizing explicit
knowledge into tacit knowledge
• Explicit to explicit knowledge—combining or sorting
different bodies of explicit knowledge to lead to
knew knowledge
7
Things To Consider
• What organizational goals will codified
knowledge serve?
• What knowledge exists in the organization
that addresses these goals?
• How useful is existing knowledge for
codification?
• How would one codify knowledge?
8
Problems With Codifying Tacit
Knowledge
• Distinctive style of the expert
• Special knowledge capture skills to codify tacit
knowledge effectively
• Certain knowledge is more of an art than a
science and art is difficult to codify into rules
• Dealing with experts is not easy
• Many firms lack the transparency of company-
wide knowledge
• Critical knowledge is often available, but no one
knows where to find it
9
Tools and Procedures—
Knowledge Maps
• A guiding function
• Identify strengths to exploit and missing knowledge
gaps to fill
• Visual representation of knowledge, not a repository
• A straightforward directory that points to people,
documents, and repositories
• Direct people where to go when they need certain
expertise
• Recognize explicit and tacit knowledge captured in
documents and in experts’ heads
10
How Knowledge Maps Work
• The map depicts visually the business issue or
problem at hand
• Pace of the group’s collaborative discussions guided
by questions to create shared knowledge
• Facts presented to the group to focus on realities of
the problem
• Nature of the collaborative discussion among peers
should be an open environment, facilitated by a
coach
• Post session follow-up activities are reviewed, and
conclusions are drawn
11
The Building Cycle
• Once you know where knowledge resides, you
simply point to it and add instructions on how
to get there
• A company’s intranet is a common medium
for publishing knowledge maps
• Building criteria: clarity of purpose, ease of
use, accuracy of content
12
Building Cycle (cont’d)
• First building step: Develop a structure of the
knowledge requirements
• Second building step: Define the knowledge
required of specific jobs
• Third building step: Rate employee performance by
knowledge competency
• Fourth building step: Link knowledge map to a
training program for career development and job
advancement
13
Decision Tables
• More like a spreadsheet—divided into a list of
conditions and their respective values and a
list of conclusions
• Conditions are matched against conclusions
14
Table: Decision Table
Condition Stub Condition Entry
1 2 3 4 5 6
Customer is bookstore Y Y N N N N
15
Source: Awad, E.M (2007). Knowledge Management
Decision Trees
• A hierarchically arranged semantic network
• Composed of nodes representing goals and links
representing decisions or outcomes.
• Read from left to right, with the root being on the
left
• All nodes except the root node are instances of the
primary goal. See Figure 7.7 next
• First step before actual codification
• Ability to verify logic graphically in problems
involving complex situations that result in a limited
number of actions
16
Decision Tree
Order Discount
6 or Discoun
size ? ?
Customer is more t is 25%
Bookstore copies Discount
Less Discoun
? t is NIL
than 6
Bookstore copies
Discount Discount
50 or Discount
Policy ?
more is 15%
Not a copies
Order 20-49 Discount
bookstore Discount
size ? copies ?
Customer is is 10%
library or Discount
individual 6-19 Discount
?
copies is 5%
Discount
Less ?
Discount
than 6 is NIL
Source: Awad, E.Mcopies
(2007). Knowledge Management 17
Frames
• Represent knowledge about a particular idea in one
place
• Handle a combination of declarative and operational
knowledge, which make it easier to understand the
problem domain
• Have a slot (a specific object or an attribute of an
entity) and a facet (the value of an object or a slot)
• When all the slots are filled with values, the frame is
considered instantiated
18
Production Rules
• Form of tacit knowledge codification in the form of
premise-action pairs
• Rules are conditional statement that specify an
action to be taken if a certain condition is true
• The form is IF… THEN, or IF…THEN…ELSE
• Premise: A Boolean expression that must be
evaluated as true for the rule to be applied
• Action: Second component, separated from the
premise by THEN; executed if the premise is true
19
Role of Planning (cont’d)
• Arranging for the verification and validation of
the system
• Developing user interface and consultation
facilities
• Promoting clarity and flexibility
• Reducing unnecessary risks
• Making rules easier to review and understand
20
Inferencing and Reasoning
• Inferencing is deriving a conclusion based on
statements that only imply that conclusion
• Reasoning is applying knowledge to arrive at
solutions
• To reason is to think clearly and logically, to draw
reasonable inferences or conclusions from known or
assumed facts
21
Case-Based Reasoning (CBR)
• CBR is reasoning from relevant past cases in a
manner similar to humans’ use of past
experiences to arrive at conclusions
• Goal is to bring up the most similar historical
cases that match the current case
• More time savings than rule-based systems
• Requires rigorous initial planning of all possible
variables
22
Requirements for Knowledge
Development Work
• Computer technology
• Domain-specific knowledge
• Knowledge repositories and data mining
• Cognitive psychology
23
Skills Requirements of
Knowledge Development
• Interpersonal communication
• Ability to articulate project’s rationale
• Rapid prototyping skills
• Personality attributes such as intelligence,
creativity, persistence, and a good sense of
humor
24
System development: System
testing and deployment
Figure : Knowledge Testing and Deployment
Capture Tools Intelligence
(programs, books, gathering Shells, Tables, Tools,
articles, experts) Frames,
Maps, Rules
KNOWLEDGE
CAPTURE
(Creation) KNOWLEDGE Logical testing,
CODIFICATION user
acceptance
testing, training
DATABASES
TESTING AND
DEPLOYMENT
Explicit
Knowledge
KNOWLEDGE
INNOVATION
KNOWLEDGE
SHARING
KNOWLEDGE
TRANSFER
DATABASE
Collaborative
tools, networks,
intranets
Web browser,
KNOWLEDGE Web pages,
BASE Distributed
systems 26
Insight
Source: Awad, E.M (2007). Knowledge Management
Key Definitions
• building the system right?”
• User acceptance testing checks the system’s
behavior in a realistic environment. Answers
the question, “Have we built the right
system?”
• Deployment refers to the physical transfer of
the technology to the organization’s operating
unit
Issues to Consider in Testing
• Subjective nature of tacit knowledge.
Intelligence difficult to measure
• Lack of reliable specifications make
knowledge-based testing arbitrary
• Problem of establishing consistency and
correctness
• Negligence in testing
• Lack of time for system testing
• Complexity of user interfaces
Attributes in Logical Testing
• Circular
• Completeness
• Confidence
• Correctness
• Consistency/inconsistency
• Redundancy
• Reliability
• Subsumption error
29
Approaches to Logical Testing
Verify Knowledge Base Formation
Structural Verification Anomalies
Circular Rules
Unusable Rules
Verification Redundancy
Duplicate
Redundant Subsumed
Verification of
Rules
Content
•Completeness
•Consistency
•Correctness
Verify Knowledge Base Functionality
Confidence
Reliability
31
Steps in User Acceptance Testing
• Select a person or a team for testing
• Decide on user acceptance test criteria
• Develop a set of test cases unique to the
system
• Maintain a log on various versions of the
tests and test results
• Field-test the system
32
Select Criteria for User
Acceptance Testing
• Accuracy and correctness of outcome
• Adaptability to changing situations
• Adequacy of the solutions
• Appeal and usability of the system
• Ease of use
• Face validity or credibility
• Performance based on expectations
• Robustness
• Technical/operational test
33
Managing the Testing Phase
• Decide when, what, how, and where to evaluate the
knowledge base
• Decide who should do the logical and user
acceptance testing
• Draft a set of evaluation criteria in advance
• Decide what should be recorded during the test
• Review training cases, whether they are provided by
the expert, the knowledge developer, or the user
• Test all rules for Type I and Type II errors
34
Issues Related to Deployment
• Selection of the knowledge base problem
• Ease of understanding the KM System
• Knowledge transfer
• Integration alternatives
• The issue of maintenance
• Organizational factors
35
Selection of the Knowledge Base
Problem
System success may be assured if:
• User has prior experience with computer
applications
• User has been involved in the building of the KM
system
• Payoff from the KM system is high and
measurable
• KM system can be implemented without much
difficulty
• Champion has been supporting the system all
along 36
Success Factors in KM System
Development
Organizational Trainer skills
Positive user attitude
and motivation Payoff
38
Organizational Factors
• Top management support
• Support of the work of the champion
• Ensure a clean and supportive organizational
climate
• De-emphasize role of politics
• Knowledge developer should remain neutral
within the political arena
• Return on investment
39
User Training and Deployment
• Preparing for KM system training via advance
demos and easy to follow training
• Combating resistance to change
• Watch for knowledge hoarders
• Watch for troublemakers and narrow-minded
“superstars”
• Look for resistance via projection, avoidance,
and aggression
40
Post-implementation Review
• Watch for quality of decision making
• Reassess attitude of end users
• Review cost of knowledge processing
• Revisit change in accuracy and timeliness
of decision making
41
Internal and External Factors Affecting
Knowledge-Based System Quality
Framework
People
Domain
PEOPLE TECHNOLOGY
expert
KM
System
Quality
Use
r Knowl
edge
develo
per
ORGANIZATIONAL
CLIMATE
42
Source: Awad, E.M (2007). Knowledge Management
knowledge transfer and knowledge
sharing
Factors In Knowledge Transfer
• Where knowledge is transferred from
• Media used in knowledge transfer
• Where knowledge is transferred to
Remember:
• Only a limited amount of expertise can be
captured as explicit knowledge
• Knowledge transfer facilitates knowledge
sharing
44
Fig :A partial View of a KM System For Knowledge
Transfer
Knowledge Transfer Knowledge Application
Applications KB Customer
Services
Expert Knowledge
Repositories Workers
Trainers Knowledge
Applications
Products
Computerized
Educational Patents
Systems Technology
46
Prerequisites for Transfer (cont’d)
• Instill an atmosphere of trust in the
organization
• Fix culture to accommodate change
• Push reasoning before process
• Doing is far better than talking
• Know how the firm handles mistakes
47
Dimensions of Values and Beliefs
• Authority Fairness
• Collaboration Motivation
• Commitment Mistake tolerance
• Compensation Participation
• Competence Partnering
• Conflict resolution Teams
• Consistency Truth, openness
• Cooperation Self-management
• Creativity Risk tolerance
• Empowerment Change
• Innovation Focus 48
Leadership
• Understanding company mission
• Culturally internalized management practices
• Culturally internalized operational practices
• Culturally driven forces
49
Factors That Retard Cultural
Values
• Culturally driven forces
• Understanding company priorities
• Questionable values
• Questionable beliefs
• Lack of trust in the approach or process
50
Employee Job Satisfaction and
Stability of Workplace
• Job satisfaction determined by the match
between an employee’s vocational needs
and job requirements
• Success of knowledge transfer and sharing
depends on how satisfied employees are on
the job
51
Major Known Vocational Needs
• Ability utilization Recognition
• Achievement Responsibility
• Activity Security
• Advancement Status
• Authority Supervision—human
relations
• Compensation Supervision--technical
• Creativity Variety
• Independence Working conditions
• Moral values
52
A Conceptual Job Adjustment
Model
What the job
offers JOB
employee Yes SATISFACTION
Match ?
No
VOLUNTARY
Employee RESIGNATION
vocational
needs met by
the job
54
Converting Experience Into
Knowledge
55
Source: Awad, E.M (2007). Knowledge Management
Transfer Strategies
• Devoting specialized focus on on-site learning
• Absorbing the heuristics as they occur
• Adopting the organization’s culture to
facilitate knowledge transfer and knowledge
sharing
56
Inhibitors of Knowledge Transfer
• Lack of trust
• Lack of time and conference places
• Status of the knower
• Quality and speed of transfer
57
How Knowledge Is Transferred
• Collective sequential transfer—specialized
team performs same function in other sites
Team
commits to
a project
Feedb
ack
Evaluate
knowledge Revise/redesig
gained n each
member’s Perform
assignment to new project
Evaluate each
member’s action reflect
before the next job knowledge
gained from
previous job 58
Source: Awad, E.M (2007). Knowledge Management
How Knowledge Is Transferred
(cont’d)
Unique features of collaborate sequential
knowledge transfer:
• Team meetings are usually brief, but held
regularly as time permits
• Meetings held with all participants being equal
• What takes place in meetings kept within the
team
• Focus on the project, not the person or
personality
59
Meetings in Collective Sequential
Transfer
• Set agenda
• Keep it small
• Invite the right people
• Facilitate the process
• Take breaks
• Socialize
• Show accomplishments
60
How Knowledge Is Transferred
(cont’d)
Tacit knowledge transfer—unique in complex,
nonalgorithmic projects, where knowledge
is mentally stored
TEAM A TEAM B
Tacit
E.g., US team of 11 knowle E.g., Indian team of 18
specialists dge specialists
transfer
LOCATION: LOCATION:
USA INDIA
61
Source: Awad, E.M (2007). Knowledge Management
Role of Internet in Knowledge
Transfer
• Accommodates knowledge exchange and
communication
• Allows sending messages to multiple persons
simultaneously
• Offers a variety of services
• Integrates systems and networks
62
Benefits of the Internet
• Doing business fast
• Gathering opinions and trying out new ideas
• Leveling the playing field
• Providing a superior customer service and
support resource
• Supporting managerial functions, spreading
ideas
63
Limitations of the Internet
• Security and privacy vulnerability
• Exposure to fakes and forgeries
• Hackers threatening the integrity of files and
transactions
64
Module 4:
Knowledge Management
KBL Srivastava
Topics
KM system : Analysis design, and
development:
Knowledge infrastructure,
Knowledge audit, and knowledge
team
Knowledge Infrastructure
• Seven-layer knowledge management
architecture and its underlying infrastructural
elements.
• Examine the Technology that make up these
layers and analyze various components that
can be deployed to transform existing
infrastructure into one that supports KM.
The seven layers of the knowledge management system
architecture (Source: Tiwana, A.: Knowledge Management Toolkit,
2002)
The seven layers of the knowledge
management system architecture (Continued)
KM processes and Technology enablers
• Select the technology components with the objectives
clearly defined beforehand.
• A technology selection map to guide the technology
selection process while keeping the actual need of the
organization in focus.
• The focus of technology is to enhance two areas-
Storage and retrieval and communication.
• Technology helps in capturing and distributing
knowledge, and communication networks help in
transfer and collaboration in KM system.
6
Knowledge process and technology enablers (Source:
Tiwana, A.: Knowledge Management Toolkit, 2002)
Interface Layer
• The interface layer is the topmost layer in the
KM system architecture.
• This is the only layer with which end users
directly interact with the system.
• The effectiveness of this layer is a main
determinant of the usability of a KM system.
8
Selection Criteria for the Collaborative Platform
1. Efficient protocols: The network protocols used should not clog
up bandwidth of the network and should allow secure and fast
sharing of content across far-flung locations, including mobile
clients and traveling machines.
2. Portable operation: Companies often have various platforms and
operating system environments in use by different departments.
The collaborative platform must be able to operate in portable
manner across all these platform.
3. Consistent & easy-to-use client interfaces: Do not assume that
the users are technology experts; many of them might come
from nontechnical domains, departments, and backgrounds.
4. Scalability: As the number of users grows, the collaborative
platform should be able to scale up without degradation in
performance
5. Legacy integration: The collaborative platform must be able to
integrate this data into the final interface.
6. Security: Security becomes an important aspect of design with
enterprise being increasingly distributed
7. Flexibility and customizability: The choice of platform should
allow for a reasonable degree of customization and flexibility-9
what the user can see and needs to see
The Web or Lotus notes as platforms?
• It is easier for raw inputs such as spreadsheets,
meeting notes, design documents, etc., to be
converted into a storage-friendly format, but another
problem arises
• Companies need to standardize on specific
platforms and operating systems in a perfect
manner.- Web based or Lotus notes for knowledge
sharing
10
(Source: Tiwana, A.: Knowledge Management Toolkit, 2002)
Packaging of Knowledge
• Filtering, editing, searching and organizing pieces of
knowledge, collectively called packaging, are essential
though frequently overlooked components of
successful KM.
• To capitalize on the wealth of intelligence available in
an organization, knowledge must be packaged in such
a way that it’s insightful, relevant, and useful.
• To make content useful, package should include:
Identification, Segmenting, Mass customization,
Format, Tests
12
Issues of Knowledge Delivery
• Another issue is how much information should
be delivered: all or in parts (selectively).
• One can also consider when to deliver
knowledge: when needed (“just-in-time”) or
when created or acquired (“just-in-case”).
13
Collaborative Intelligence and data
warehouse
• It is important to understand the role of
technology in the context of KM like which of
these technologies fit with the KM system and
how integrated will take place.
• A data warehouse is not very useful
unless the data is organized in to
meaningful information and applied
whenever required.
14
Source: Tiwana, A.: Knowledge Management Toolkit, 2002)
Genetic Algorithm Tools
• In order to solve a problem or make a decision where
standard rules of thumb fail to work or are
impossible to use, one can try genetic-algorithm-
based solutions, which is a good choice.
• GAs help a decision maker to state that I do not
know how to build a good solution, but I will know it
when I see it!”
16
Source: Tiwana, A.: Knowledge Management Toolkit, 2002)
Neural Networks
• A neural network is a networked computing
architecture in which a number of processors are
interconnected like the neurons in a human brain
that can learn through trial and error.
• A neural network can identify patterns within such
data without the need for a specialist or expert.
• Although theories on which neural networks are built
might suggest that such nets can deal with “dirty”
data, reality is quite different.
18
Source: Tiwana, A.: Knowledge Management Toolkit, 2002)
Expert Reasoning & Rule-Based
Systems
• Rule-based systems are diametric opposites of
generic algorithm systems
– In generic algorithm, you can specify universal
conditions under which solutions are considered
good, but you cannot apply expert knowledge on
how to solve the problem.
– In rule-based systems, you can bring in expert
knowledge, but you cannot specify any universal
conditions that denote a good solution.
20
Source: Tiwana, A.: Knowledge Management Toolkit, 2002)
Granularity in Knowledge Objects
• Because a KM system is intended as a
mechanism for securing corporate knowledge,
it needs to be populated with knowledge
objects.
• A key failure point in the design of a KM
system is not deciding on the right level of
detail at the start.
22
Granularity in Knowledge Objects
23
Granularity in Knowledge Objects
• Too high a level of granularity will result in the loss
of knowledge richness and context; too low a level
will cause unnecessary drain on network, storage,
and human resources, raise the cost, and reduce
the value of the object.
• The key lies in selecting the right level of
molecularity of knowledge that will be stored in
your KM system: the level that strikes an optimum
balance between the two opposite extremes of too
much details and too little detail, both of which can
render knowledge only marginally useful.
24
Example of Customer support and
Knowledge levels
26
Meta searching and Hierarchical
Searching
• The main purpose of a meta search function is to
minimize the time spent in locating a general
category for a piece of potential knowledge within
a repository.
• A hierarchical search strategy organizes knowledge
items in a fixed hierarchy.
• The user can follow or traverse links within such a
structure to efficiently locate the right knowledge
element in a timely manner.
• This method is therefore apt for use in intranets,
since they support hyperlinking by defualt.
27
Attribute Searching
• Searching by attributes use a value input by the
user.
• The attribute value is matched against closely
related values attached to the documents and
pointers such as skills databases.
• Those that closely match are returned as the final
search results.
• The limits of Attribute Searching
– Excessive query matches
– Breadth tradeoffs
– Failure to understand meanings of words and exact
context of use
28
Content Searching
• Content searching is the least efficient of the search strategies
discussed here.
• The user enters an arbitrary search term, keyword, or text
string. All items that match are returned with a relevance
score.
• Score assignment is based on the frequency of matches within
each knowledge element such as a document or Website.
Strategies-
• To enable effective searching, use all or several of these
search and retrieval strategies in parallel.
• Using a single search technique can pose sever limitations on
the quality of the search
29
Tagging Knowledge Elements with
Attributes
• Because searching works primarily on the
basis of textual string matching, it is important
that content – both formal and informal – be
tagged with a proper set of attributes.
• A company must define its own set of
attributes to tag knowledge content with.
30
Tagging attribute for knowledge
elements in a KM system
32
Domain Attribute
• The domain attribute tags the knowledge item to its
subject matter.
• This attribute is the primary attribute that drives the
meta search process.
• Principles of KE cannot be applied here because
those are more concerned with modeling knowledge
at the level of concepts and relations, which is too
micro for our purpose here.
33
Type attribute
◼ The type attribute is more relevant to formalized
knowledge that is captured in electronic or
textual form such as a document or a report.
35
Time Attribute
• The time attribute is useful for time-stamping events
and knowledge elements.
• Consequently, creation or use of an explicated
knowledge object must be specified.
• Not all knowledge objects can be assigned a value for
this attribute, so assign a value to this attribute
where possible.
36
Location Attribute
• Use the location attribute to specify the location of
pointers that track people within and outside the
company.
• Not all knowledge elements will have a value assign
to this attribute, but it can be used to narrow search
by location.
• Make sure that the attribute usage and its values are
actually significantly relevant.
37
Differences between a KM system and a
data warehouse
• Types of information managed
– A data warehouse focuses more on highly structured content, whereas
a KM system needs to support both informal and formal content and
everything in between.
– A data warehouse can be a part of a KM system, only as a source of
structured data that is input to the complex collaborative filtering
mechanisms of the KM system
• Context
– A data warehouse is arguably a resource of unquestionable value
when you need mine factual data.
– When such data is mined and interpreted, it provides value.
– But the need for interpretation is a fuzzy idea; data warehouses, by
themselves, are devoid of context.
• Size
– Since a data warehouse primarily focus on clean, structured, and
organized data, the size of a data warehouse is always large.
– A KM system might have storage system sizes ranging from very small
to extremely large.
Differences between a KM system and
a data warehouse
• Content focus
– The content focus of a KM system is on highly filtered information and on
knowledge, whereas that of a data warehouse is on scrubbed, raw, clean,
and organized data
• Performance
– Because of the complex nature of retrieval and classification requests
that a KM system must be able to handle, performance requirements
and computing power needed for a KM system are much higher than
those of a data warehouse
• Networks
– A data warehouse does not need to be on a live network to
function properly; however, this live network is imperative for a
KM system that is trying to draw from resources available
throughout the entire enterprise and beyond it – from the
Internet and collaborative, extended enterprise.
The application layer
• Tools that enable integration of information
across tacit (such as people) and explicit (such
as databases, transaction-processing
repositories, and data warehouse) sources
help create and share context (the process
itself is called contextualization), and facilitate
sense making.
40
Source: Tiwana, A.: Knowledge Management Toolkit, 2002)
41
Intranets and Extranets
• One of the most important aspects of information
access is that of being able to view content of
documents regardless of file formats, operating
system, or communications protocol.
• Intranets, owing to their consistent, platform-
independent access formats, such as rich HTML, and
a common, consistent protocol (HTTP), make this
possible.
42
Pointers to expertise
• Electronic yellow pages
• When a key resource person is needed or
when a person with specific skill sets or
expertise is required, keyword and attribute
tag searching can pull up pointers with contact
information about persons who qualify, both
inside and outside the organization.
43
Document management
• A lot of crucial information often exists primarily on
paper. Companies try to convert this information
into a more easily transferable and searchable
electronic format by scanning these documents.
• Document management fosters the ability to develop
a database of documents and classify them
automatically.
44
Project management tools
• Although the role of PM tools in the actual creation
of knowledge is limited, these tools can provide a
good basis for organizing and storing documents,
records, notes, etc., coming out of a single project
engagement.
• Many companies populate these tools in a post
project phase, leaving the accuracy of project history
traceability open to questions.
45
Video Conferencing and Multimedia
• Video conferencing enables people to exchange both
full-motion video and audio across a distributed
network.
• In a KM system, multimedia allows the system to
capture information content that would otherwise
be lost forever.
• Multimedia, especially video content, bypass
limitations of languages – an occasional barrier to
knowledge sharing when you are working in
transational project.
46
Transparent capture enablers
• Digital whiteboards
• Tools such as this are indispensable in moving
a company from a structured, information-
based focus to a formal and informal,
knowledge-centric focus.
47
Virtual share spaces
• There must be a way to encourage and enable
informal chat and conversations (even office
gossip) that are a part of work life in most
office settings.
• Virtual meetings
• Document collaboration
• Informal communication
48
Mind mapping
• Mind maps, very similar to concept maps, can
be used to organize individual or collective
thought and represent it visually.
• Mind mapping can be an excellent knowledge
creation and organization tool, especially with
the advent of excellent software supporting it.
49
Intelligent decision support systems
• Decision support systems, case-based reasoning
system, and contextual information retrieval systems
provide the needed historical base from past
experience that help make both minor and major
decisions fast and accurately.
• Data mining tools help extract trends and patterns
from transactional repositories, such as data
warehouses.
50
The promise of peer-to-peer
knowledge networks
• Peer-to-peer networking naturally extends to
support KM because it closely mirrors face-to-
face human communication.
• Peer-to-peer networking is defined as sharing
of resources by direct exchange between
individual systems in a digital network.
51
Affinity to infinity
• Individuals initially begin to share information,
expertise, best practices, and content in peer
networks because of the affinity that networks
create.
• Each additional member increase the potential value
of the network manifold or, in economic term, create
increasing value.
• Intricate webs of affiliations open multitudinous
possibilities for collaborative knowledge integration
in autonomous groups that can be spontaneously
assembled and disassembled.
52
Other benefits of Peer-to-Peer
knowledge platforms
• First, decentralization eliminates the overhead of
maintaining resource and expertise profiles for
individuals in corporate yellow pages.
• Second, knowledge sharing relies heavily on rich
media, such as voice, video, and multimedia, to
overcome the limitations of text to share tacit
knowledge.
• Third, their explicit knowledge and profiles of mobile
users can be redundantly replicated across nodes to
ensure ubiquitous availability.
53
Technological solutions for
motivational issues
• Understanding what motivates people to apply
their expertise is key to avoiding the trap of
building technology marvels that no one uses.
– First, users will contribute and share their insight only
when they value their digital community.
– Second, shred contest is essential to contribute
meaningful to collective task.
– Third, peer-to-peer environments must emphasize
knowledge integration over acquisition or learning.
– Finally, such environments must provide reputation-
building mechanisms to foster a pervasive thread of trust
on which any community stands.
54
2. Knowledge audit
Why Audit Knowledge?
• Devising a knowledge-based strategy
• Architecting a KM blueprint
• Seeking to leverage its “people assets”
• Trying to figure a way out of corporate ebbing
• Striving to strengthen its own competitive
weaknesses
• Facing competition from knowledge-intensive
competitors that are far ahead on the learning curve
Measuring knowledge growth
• Very often, companies do not know where
they stand in terms of the knowledge that
they possess.
• Bohn’s framework provides an excellent
starting point for figuring out where you stand,
relatively, in terms of your firm’s knowledge.
Measuring Knowledge Growth
(Bohn Stages)
85
The KM team : The right balance
Local Experts and Intradepartmental
Experts
• Experts within the company, people who come in early
or stay late to play with new tools that become
available. More adoptable to technology
• Many of these experts maybe non-technologists, but
they can gauge the possible usefulness of each feature
of the current system.
• Local experts very often are the first ones to notice the
limitations of current and existing systems and think of
how to upgrades and make changes to meet the
evolving needs of the group.
87
Internal IT Departments
• It is IT staff who will bring in knowledge of:
– Infrastructural capabilities and limitations
– Connectivity and compatibility among the team based
systems and the overall organizational technology
infrastructure
– Standardization issues across different platforms,
applications and tools
– Technicalities underlying the adaptation of these tools
by various knowledge worker groups within the
organization
– It is critical to select personnel with credibility in the
eventual user group.
– Example- Platinum technology KM system
88
• Act as a bridge and as interpreters between
people from different backgrounds, skill areas,
and specializations.
• Learn faster than the average person.
• Bring value to the overall team synergy.
• Learn the basic lingo and understand the
frameworks.
• Have the ability to deal creatively and
rationally with the problems
Laterality
• Laterality refers to the ability to cut across
functional boundaries and relate to people
from different areas. (capability to think
divergently)
90
Laterality
• Groups of such people have also been referred to as
communities of practice; they are characterized by:
– Multifunctional groups that incorporate diverse viewpoints,
training, ages and roles
– Enacting a common purpose by engaging in real work,
building things, solving problems, delivering service, and
using real tools
– Developing intellectual property, knowledge, firm culture,
internal language, and new skills
– Making lasting changes in the people and the competency
that they embody
91
Role of Consultants
• Selection a consultant should, therefore, be
based on the extent to which the person is willing
to transfer existing skill to company’s employees.
• Some of the other issues that must be considered while
selecting a consultant include:
– The consultant’s reputation for integrity.
– The consultant’s history that demonstrates the ability to
maintain confidentiality about past project.
– Whether the consultant has worked successfully for your own
company on earlier projects.
– Weather the consultant (or consulting company) is working on a
similar project for a competitor.
– Weather your internal team trusts and has confidence in the
consulting company
92
KM Team Structure
97
Designing the KM Project team
.
100
Team Life Span & Sizing Issues
• There are two schools of thought on the
future of KM.
– KM will continue to depend on people to manage
knowledge throughout the lifetime of the
organization
– KM is a self-eliminating field
• Team members on the KM team should be
promised strong rewards and promotions if
the KM initiative truly succeeds.
101
The Project Leader
• The KM project leader may or may not be the same
person as the CKO.
• KM projects need leadership that helps create a
supportive, unobtrusive, and focused environment
• The project leader must track progress, budgets,
workloads and schedules
• The KM project leader serves as the visionary
• A project leader must resolve internal dynamics,
serve as a translator, and take charge of task
delegation
102
Internal Dynamics
• The project leader plays an essential part here by
helping team members understand why even trivially
straightforward issues and differences seem to be so
difficult to resolve.
• In their facilitating role, project leaders can pose the
key questions, clarify differences and their
underlying assumptions, then give members of the
KM team sufficient room to actually resolve these
differences.
103
Translation and Delegation
• The project leader also needs to be able to act as
translator in the startup stages of the project when
the user teams and the IT participants fail to
understand each other’s viewpoints because of
vocabulary differences.
• To determine the actual issues of concern and to
identify the actual knowledge flow problems that
exist within the company, the project leader should
encourage participants to actually collect relevant
data from their own department through meetings,
surveys, interviews and focus groups.
104
User Participation
• It is the project manager’s role to ensure that
the KM project is going in a direction that
builds toward a system that users actually
need.
• One of the most effective ways of verifying
this linkage is to show a preliminary version of
the KM system to actual users.
105
Prototypes
• A prototype provides both the developers – in this
case, the KM team – and the users with an idea of
how the system in its final form will function.
• By using such a prototype, even if it is incomplete,
users can see the possibilities of the KM system
understanding of the final product can lead to or
trigger highly desirable refinement of its features,
interface, functionality, and design.
106
(Source: Tiwana, A.: Knowledge Management Toolkit,
2002)
107
The KM Team’s Project Space
• Members of KM team should be able to
provide adequate answers to these
questions collectively:
1. What is the company’s envisioned strategic
and performance goal?
2. Where does the KM team fit in the
organizational hierarchy?
3. Does the KM project fit vertically or
horizontally in the value chain?
4. What are the financial and time constraints
for the project?
108
The KM Team’s Project Space
• Members of KM team should be able to
provide adequate answers:
8. What level of commitment does the team have
from the senior management and from the users?
9. Where are the cultural blockades that should be
expected?
10. Has any competitor or noncompeting firm
implemented a project like this?
109
Managing Stakeholder Expectations
• Formally present this work to various
stakeholder groups
• Such an interaction can help the team
compare the project’s objective with
stakeholder expectations and perceptions
110
Highways to Failures
• A survey of 8000 software projects in 400 U.S. firms
found that only one in six was successful. Of the
remaining, about one third were never complete, and
over half were over budget, did not finish on time, or
failed to deliver the promised functionality.
• Such failures annually cost U.S. business about $78 billion
in development cost, and another $22 billion in cost
overrun.
• Lack of an active role of the top management has been
identified as the primary reason that many projects fail.
• The second reason is failure of the users to buy in to the
project
111
Categorizing Risks in building KM system
113
Solving User Buy-In Problems
• To ensure that senior managers actually buy
into the project.
• To ensure that the “bigger-picture” that the
management has in mind is well
accommodated and incorporated
114
Lessons Learned
• Identify a few key core stakeholders
• Identify sources of requisite expertise
• Select a visionary and experienced project
leader
• Identify critical failure points
• Avoid external consultants if possible
• Balance the knowledge management team's
managerial and technological structure
Module 5
Knowledge Management
KM system : Analysis, design, and
development
KBL Srivastava
Topics Covered
• Develop the knowledge management architecture.
• Understand and select the architectural components.
• Design for high levels of interoperability.
• Optimize for performance and scalability.
• Understand repository life-cycle management.
• Understand and incorporate requisite user interface
considerations.
• Position and scope of the knowledge management
system.
• Build-or-buy decision and understand the tradeoffs.
• Future-proof the knowledge management system.
KM Blueprint
• knowledge management blueprint provides a
roadmap for building and incrementally
improving a knowledge management system
Analyzing Lost Opportunities
• How companies lose potential opportunities by trying to explicate the wrong
types of knowledge while failing to explicate the right types
Knowledge that could have been explicated, shared, distributed, and applied, but was
never articulated, represents a lost opportunity due to the failure to leverage this asset
The shaded box indicates the correct positioning of a knowledge management system and
knowledge management strategy.
The KM Architecture
5
(Source: Designing the KM Blueprint form
Tiwana, A.: Knowledge Management Toolkit,
2002)
6
Components of A KM System
• A KM system, in it’s initial stages, can be broken
into several subcomponents:
1. Repositories: Hold explicated formal and informal knowledge and the
rules associated with them for accumulation, refining, managing, validating,
maintaining, annotating (adding context), and distributing content.
7
The Knowledge Repository
• An information repository differs from a knowledge
repository in the sense that the context of the
knowledge object needs to be stored, along with
the content itself.
• A knowledge platform may consist of several
repositories, each with a structure that is
appropriate for the particular type of knowledge or
content that is stored.
8
The Knowledge Repositories
9
Elements of knowledge content recorded by the
Repositories
11
Content Centers
• When one is trying to integrate multiple function- or
department- specific repositories into one central
repository, one should pay close attention to content
centers that are typically good candidates for integration.
• Examples of content centers include
• Production department
• Customer services
• Market intelligence and competitive planning
• Employee resources and the human resources department
• Administrative department
• Sales and marketing
• Finance
• Business partners and suppliers
12
A sample checklist for competitive knowledge
1. What others are talking about your competition?
– Public
• Case studies, articles, newspapers, consultants, employee search
firms and consumer groups.
– Trade and professional organizations
• trade publications, industry news, customers, users, venders,
suppliers, and professional ORG.
– Investors and government agencies
• Securities analysts, industry data, government agencies and
litigation information source.
2.What your competition is talking about themselves?
– Public
• Advertising, promotional material, articles, employment
advertisements and press release.
– Trade and professional organizations
• Licenses, manuals, patents, and trade shows.
– Investors and government agencies
• Annual reports, stock issues, and annual meetings
13
Open and Distributed Systems
• The use of open systems ensures that employees can
obtain information they need from any place and at any
time.
• Adherence to industry standards ranging from HTML,
XML, TCP/IP protocols, and ODBC may help you to
implement the KM system quickly, and easily extend and
customize it in the future.
• Content might be distributed across multiple platforms,
devices, servers, and locations, the ability of the
knowledge management system to build upon this
characteristic is crucial.
14
Knowledge Aggregation and Mining
• Anyone who has used a search engine on the
Internet can tell you, simple keyword searches often
result in a meaninglessly large number of hits.
• To save users from this, a well-designed KM system
should include a mechanism to cluster search results
appropriately in different prespecified content
categories.
15
From Skills Databases to Knowledge
Directories
• Skills databases Help to locate subject mater experts
both within and outside their organizational bounds.
While such a mechanism is useful, it needs to be kept
up to date. Example- Microsoft
• A knowledge directory takes the concept underlying
skills databases one step further by linking people to
their skills, experiences, know-how, insights, and
contributions to discussions and debates within the
knowledge management system.
16
Automated Categorization
• Categorization need not be a manual procedure
and often can be accomplished, in part, by
knowing the nature of the contribution, such as
its context, source, and originator.
• GrapeVine (www.grapevine.com) is an excellent
commercial tool that can help with such
categorization.
• With the availability of context, some meta data
can be tagged automatically
17
Personalized Content Filtering and
Push Delivery
• Personalized content filtering refers to the process of
categorizing items by their content:
– Images.
– Video.
– Sound.
– Text and etc.
• A user profile defines the content types that are
relevant to each user.
18
The Collaborative Platform
• Provides the pipeline to enable the flow of explicated
knowledge, its context, and the medium for
conversations
• Provides a surrogate channel for defining , storing,
moving and linking digital objects, such as conversation
threads that correspond to knowledge units
• Enables the content of the KM system with a high
degree of flexibility to make it meaningful, useful, and
applicable across the many possible contexts of use
(and abuse).
• Empowers the users.
• The user can either search for content or subscribe to
content
19
Collaborative Filtering
1. Active filtering:
– Users manually define filters and pointers to interesting
content and share them across their work group.
2. Automated filtering:
– Statistical algorithms make recommendations based on
correlations between the user’s personal preferences
and content ratings.
• Firefly, GroupLens, GrapeVine, and Tapestry are some
better-known examples of such collaborative filtering
tools.
20
Community-Centered Collaborative
Filtering
• The network of existing social relationships
between employees can be a valuable basis
for improving the collaborative filtering
process.
• Reputation, trust and reciprocity come into
the picture of collaborative process enhancers
when contributions are (optionally) signed.
21
Meta Knowledge
• Meta knowledge implies knowing what you
know.
• Creation of meta knowledge is often
extremely context dependent and requires the
use of pattern recognition or analogical
reasoning.
• In order to extract meta knowledge from
knowledge having a KM system is a necessary
condition.
22
Accommodating Multiple Degrees of
Context
• The significance of rich communications
channels and a high degree of interactivity
cannot be overemphasized.
• If loose social bonding exists between
potential users of the system, ensure that rich
communications are built into your KM system
as an integrated feature, not as a separate
add-on component.
23
Technology Choices
• It is vital to consider whether that technology or that
vendor will be around for the entire life of the system.
• Will the vendor’s technology capture enough of the
market to ensure the ancillary products and services
remain available?
• Can the technology deliver the consistency that the
application requires?
• Can the technology provide the quality that the market
and your customs demand?
24
Integrative and Interactive Knowledge
Applications
• The integrative ability supports the collation
of distributed knowledge repositories
containing explicated or explicitly captured
content.
• Support for interactivity is required to allow
the integration and possible capture, analysis
or even explication of tactic knowledge of the
system’s users.
25
Integrative and Interactive Knowledge Applications
28
(Based on Nonaka and Takeuchi.: Knowledge creating Companies, 1995)
(Source: Tiwana, A.: Knowledge Management Toolkit, 2002)
30
(Source: Tiwana, A.: Knowledge Management Toolkit, 2002)
(Source: Tiwana, A.: Knowledge Management Toolkit, 2002) 32
Build or Buy?
• When you begin development, your choices are:
– To build a system in-house, using team members from
the internal IT department and the end-user
community of knowledge workers form whom the
system is being built.
– To add external consultants to strengthen the weaker
expertise areas for the option described above.
– To develop the system from scratch (not
recommended).
33
Build or Buy?
– To buy an off-the-shelf, shrink-wrapped solution
such as Lotus Notes and customize its installation.
– To buy an off-the-shelf solution sold by a
consulting group and modify it to meet your
needs.
– To buy and combine an off-the-shelf set of
application and customize it to fit your needs.
– To build in part, and buy in part
– To combination of the above approaches.
34
Making a build or buy decisions
37
User Interface Design Considerations
• Functionality, Consistency, Visual clarity,
Navigation and control, Relevancy, Feedback.
38
A Network View of The KM
Architecture
• The team network should not be confused with
idiosyncratic communications network in generic
sense.
• The network constitutes both the technological
network and underlying social and organizational
network in which the technology operates.
• KM system should broadly fall under the category of
shared IT applications and services within the
hierarchy of the IT infrastructure.
39
A network oriented view of KM system
41
2. Developing the KM System
Topics Covered
How a knowledge management system can be
actually built along each layer.
Building Blocks: 7 Layers
1. Interface layer
2. Access and authentication layer
3. Collaborative filtering and intelligence layer
4. Application layer
5. Transport layer
6. Middleware and legacy integration layer
7. Repository layer
The Interface Layer
• The primary point of contact between the users and
KM system content.
• The interface layer must provide a channel for tacit
as well as explicit knowledge flow.
• The essential step in tacit knowledge transfer
between people is the conversion of tacit knowledge
to information and back to tacit knowledge
44
(Source: Tiwana, A.: Knowledge Management Toolkit, 2002)
Platform Independence
• The use of a Web browser as a client also enables
universal access the relevant portion of the KM
system from any location or computer terminal
connected to the Web.
• Content can further be optimized to move through
low-bandwidth networks with the use of cache
memory on the client and server side, by minimizing
the depth/resolution of graphics, and by using
mobile applications written in Java.
45
Learning From Intranets
• An intranet site must organize information
and assemble it in a consistent, logical, and
systematic manner to make it useful and
successful.
• An intranet front end must allow users to get
to the information that they need in painless
and fast manner with respect to a KM system,.
46
Optimizing Video Content
• The essential point to keep in mind while configuring
a server for video delivery is to optimize the video
clip file itself for existing network bandwidth.
• A safe assumption to make as starting point would
be to optimize content for 60 percent of the available
bandwidth, then realign it based on actual usage
pattern.
47
Universal Authorship
• Users working on different platforms can add content
to the overall repository, irrespective of their platforms
• Another benefit of using a Web-based front end is that
users working on different platforms can add content
to the overall repository in HTML (Hyper Text Markup
Language, most widely used language on Web format),
which is the same across all platforms.
• Therefore, a report created and posted in HTML format
by a salesperson using an Apple computer can be read
by someone using a Windows PC.
The Access and Authentication Layer
• Some of the issues that must be addressed are:
• Access privileges: Assign rights to permit
different levels of access to data such as read-
only, write, edit, and delete capabilities
• Firewalls: Construct a firewall between the
extranet and Internet. Thoroughly test the
firewall by mock attacks
• Backups: Create backups, staging areas, and
mirror sites
49
Virtual Private Networks
50
Standards and Protocols for Expensive
Networks
• Some of the standards that have been put forth and
endorsed by some companies include the following:
• LDAP: Lightweight directory access protocol
• PPTP: Point-to-point tunneling protocol
• S/MIME. Secure Mime is a standard that lets users send
secure e-mail messages by using certificate-based
encryption and authentication
• Vcard: Virtual Card is a format for storing and presenting
contact or registration information.
• Signed Objects: Signed Objects is a format for automating
trusted software and document distribution defined by
the JavaSoft Java Archive specification.
51
Biometrics and Other Forms of
Authentication
• Biometrics, voice recognition, and fingerprint
recognition are promising technologies that
will allow users for a company or enterprise-
wide network to get into the system in a
rather transparent manner.
52
The Collaborative Filtering and
Intelligence Layer
• The collaborative filtering and intelligence
layer is the one that constitutes in
intelligence with in a KM system.
– The process of adding tags and meta tags to
knowledge elements, either through automated
mechanisms or manual procedures, is done at
this level.
– Intelligent agents are perhaps the best thing to
happen to A.I. In terms of viable applications to
the Web
53
From Static to Dynamic Structures
• Each document is connected to other
documents through hyperlinks.
• The links are statically contained in each
document and refer to other documents,
video files, sound files, etc., by URLs.
• Activating a hyperlink means jumping from
one document to another.
54
(Source: Tiwana, A.: Knowledge Management Toolkit, 2002)
55
From Static to Dynamic Structures
• This approach has created other
problems:
– Navigational encumbrances:
– Extensive collaborative authoring:
– Orphan links:
– Difficult in generating complex views:
56
Virtual Folders
• Using such a mechanism, users can reach
the same information element in
multiple ways:
– By navigating:
– By searching meta data:
– By searching content:
– By subscription:
57
Virtual Folders
• This concept is also based on the presumption that
will not add content to the corporate repositories if it
is too complex for them to do so.
• The goal is to make it possible to add the repository
with little or no effort on the part of the user.
• Without such functionality, this work runs the risk of
being perceived as useless at code check-in/check-
out procedures that most programmers have to
unwilling follow.
58
Automatic Full Text Indexing
• The collaborative filtering layer is
responsible for indexing content in a
manner the permits fast retrieval
through multiple search mechanisms.
59
Automatic Meta tagging
• Meta tags can be automatically added to
documents and other content, using software
tools that are readily available.
• Such meta tags include information such as:
– Who published the document?
– When was it last modified?
– Who reviewed it?
– Who approved it?
– What is the size of document?
60
From Client/Server to
Agent/Computing
• In the client/server setup, the network load primarily
exists between the client and the server (indicated
by more interaction lines between the client and the
server).
• On the other hand, in the agent/computing model ,
this load is shifted to the space between the agent
server.
• The overall load on the network, therefore, is
dramatically reduced.
61
62
(Source: Tiwana, A.: Knowledge Management Toolkit, 2002)
Benefits of agent mobility
• A mobile agent is not bound to the system on
which it is executed.
• Such and agent is free to move around the
network across multiple hosts.
• Even though it is created in one execution
environment, it can transport its state j and
code with it to the next host within the
network where it continues code execution.
63
Mobile agent for KM
1. Mobile agents reduce network load:
2. Real-time operations:
3. Protocol encapsulation:
4. Asynchronous and autonomous execution:
5. Seamless integration and heterogeneity:
6. Mobil agents are fault tolerant:
64
Agents and push models for
knowledge delivery
• Mobile agents embody the Internet push
model.
• Agents can disseminate news, bulletins,
warnings, notifications, and automatic
software and content updates.
• The strength that mobile agents bring to such
knowledge-centered applications lies in their
asynchrony.
65
The Application Layer
• Application such as skills directories, yellow
pages, collaborative tools, video conferencing
software and hardware, and conventional
decision support tools are placed at his level.
66
The Transport Layer
• TCP/IP connectivity throughout the organization.
• An up-and-running Web server.
• A POP3/SMTP or MAIL server.
• A VPN to support remote communication, access,
and connectivity.
• Support for steaming audio and video on the central
server(s).
67
The Middleware and Legacy
Integration Layer
• The legacy integration layer provides such
connections between legacy data and existing
and new systems.
• The middleware layer provides connectivity
between old and new data formats, often
through a Web front end.
68
The Repositories Layer
• The bottom layer in the KM system
architecture .
• Consists of operational databases, discussion
databases, Web forum archives, legacy data
digital or digitized document archives, and
object repositories.
69
3. Prototyping and Deployment
Topics Covered
– Moving From Firefighting to Systems Deployment
– Prototyping
– Pre-RDI Deployment Methods
– The Results Driven Incremental Methodology
3. Prototyping and Deployment
• Systems Deployment
- Besides training costs, companies almost
never budget for nontechnology costs related
to deployment and implementation of KM
systems.
- Deploying any new system is usually a learning
experience.
Prototyping
• Prototypes are the most underused form of
rejection insurance that a development team
can ever purchase.
• Iteratively improving a system with incremental
prototypes lets the users see, touch, and feel a
system even before it is completed.
Pilot Deployments (pilot testing)
• A pilot implementation of the KM system on a
small scale can lead to insight that might
prove to be invaluable before the full-blown
system is implemented at an enterprise-wide
level.
• A pilot test reveals significant and often
fundamental design flaws early on in the
deployment process
Selection of a Pilot Project
• The following tips help to evaluate potential
projects and their viability as pilot projects are :
– Avoid trivial projects.
– Stay away from your company’s lifeblood.
– Favor projects with widespread visibility and
noticeable effects.
– Select a problem that the chosen piece of technology
fits well.
– Set tangible deadlines and metrics for success.
– Select a process-intensive project that can be highly
impacted by the user of a KM system
Lessons to be learned From Data
Warehouses
• Most companies pursued investments in data
warehouses to improve the quality if information
within the organization and to improve access to
it.
• Many companies start with small versions of a
data warehouse (akin to pilot projects), usually
centered on an application or a data set.
• The danger of implementing and experimenting
with such a pilot is that its success can lead to
rapid proliferation of data marts that are
independent of one another
Legacy Deployment Methods
• The incremental approach to systems
development and deployment assumes that
functions required of a system, such as a KM
system, cannot be known completely in the initial
stages.
• This approach suggests that developers
implement a part of the system and increment it
rapidly, as new requirement surface.
• This way, the entire system can be implemented
in increments, and changes can be made along
the way.
(Source: Tiwana, A.: Knowledge Management Toolkit, 2002)
77
Legacy Deployment Methods
• The waterfall model, the parent of the incremental
model for systems development, was the mainstay of
the system development methodologies for years
but has recently fallen out of favor.
• The waterfall model is a bad approach to take for
implementing complex systems.
• If the feedback and learning loop are incorporated
into this model and the project is broken down into
discrete phases that build on another, it give us the
incremental approach model shown in Figure 12-2.
78
Incremental approach model
80
Fig: Information packaging technology
89
(Source: Tiwana, A.: Knowledge Management Toolkit, 2002)
(Source: Tiwana, A.: Knowledge Management Toolkit, 2002)
The Traps in Selecting the Release
Sequence
• Expected success.
• Cumulative.
• Highest payoff.
• Balance of the above.
92
Process divisibility and RDI releases
• Divide the technology in such a manner that
successive increments involve the same software
modules but at a deeper level of detail
• Break the technology deployment into pieces, each
of which is implemented at the deepest level of
detail in the first round.
• The RDI methodology provides a technique that
allows for refinement of the current stock of
deployment and process knowledge in ongoing
releases.
93
RDI’s Role in Tools and Task
Reinvention
• Reinvention of the tools, interfaces, and task
environments, such as the design or aesthetic
fit of the KM system, often goes hand in hand
with reinvention of the job itself.
• It would be ideal if the design of the KM
system were such that the interface was very
similar to the one that existed earily and the
whole process of using the KM system was
almost transparent to the user. However, this
is rarely possible.
94
Cross-Functional Synergy
• Synergy refers to the ability of the
knowledge management system to allow
different groups of users, representing
different functional departments, to produce
results exceeding those that they would
produce working without the support of
such a system.
95
The complexities of collaboration
• The various levels of complexity that
must be figured into the design of a KM
system include:
– Logistical complexity:
– Technological complexity:
– Organizational complexity:
– Environmental complexity:
96
Avoiding Overengineering
• Overengineering refers to the act of implementing
system functions that may never be used or adding
details that are unnecessary for deriving the desired
business results.
• Although many managers may preach incrementalism
in system deployment, they rarely practice it.
– Incrementalism and structured methodologies are viewed
as being noncomplementary
– The benefits of incrementalism are perceived to be
marginal that it seems like it is not worth the effort
97
Developing Clear Communication
Processes
• Explains the expectations and reasoning
behind the introduction and integration of
the KM system with business process.
• This communication leaves no surprises for
the users and makes it easier for them to
accept a culture where continuous is a normal
part of work life.
98
Human Barriers in Technology
Design
• A combination of appropriate design of
technology and complementary incentives
• An immediate reward for an employee can
compensate for an immediate effort that can
result in long term reward for the firm.
• Linking long-term goals to long-term rewards
rarely works.
99
One Infinite Loop
• To keep a KM system kicking and alive, it
needs iterative improvements as the business
environment and accompanying processes
evolve over time.
100
Module 6:
Knowledge Management
Inferences from data,
Data mining
Knowledge portals
KBL Srivastava
1-Topics on learning from data
• Understand the “Learning” Concept
• How to go for data visualization
• Data Neural Networks as learning models
The Basics
Supervised and Unsupervised Learning
Business Applications
Relative fit with KM
• Association Rules- Market bases analysis, PETCO
• Classification Trees
• Implications for Knowledge Management
Importance of learning
• Learning is an iterative process where the final
model results from the combination of prior
knowledge and newly discovered information
• Learning tools are critical for development of a
knowledge management environment.
• Data driven tools create the model based on
patterns inferred from the data.
• Thus it is important to understand the concept of
learning from data.
• The goal is to improve the quality of the
communication and decision making in the firm.
The concept of learning and Goals of
learning
• Learning is a process of filtering ideas and transforming
them into valid knowledge having the force to guide
decisions.
– The unifying concept of learning is the specific mechanism
that helps companies determine the kind of knowledge
required for decision making.
• Goals of the learning process- knowledge that
can be used in business decision making
1. Discovering new patterns in the data
2. Verifying hypothesis formed from previously accumulated
al-world knowledge
3. Predicting future values, trends, and behavior
The Concept of learning and
Knowledge validation
Knowledge validation is a two step process- Model validation
and consensual approval.
• Model validation involves testing the logical structure of a
conceptual or operational model for internal consistency
and assessing the results for external consistency with
the observable facts of the real world.
• Consensual approval means approval of a special
reference group or the user of the results
Two approaches to learning models-
Top down- one starts with the hypothesis derived from
observation, intuition or prior knowledge- generate ideas, develop
models and evaluate them for validation
Bottom up- no hypothesis testing, learning techniques are used
to discover new patterns by findings key relationship in the data
Data Visualization
• Exploring the data means looking visually for groups or
trends that are meaningful and useful for the decision
maker
It includes:
• Distribution of key attributes (e.g., target attribute of a
prediction task)
• Identification of outlier points that are significantly
outside expected range of the results
• Identification of initial hypothesis and predictive
measures
• Extraction of interesting grouping data subsets for
further investigation
Neural networks as learning models
• Modeled after the human brain network
• The technology attempt to simulate biological information
processing via massive networks of processing elements
called neurons.
• Neural nets and computers are different.
• Neural nets are neither digital nor serial, they are analog or
parallel. They learn by examples not by programmed rules
or instructions. Digital computers do not evolve.
• Neurons evaluates inputs, performs a weighted sum,
and compares result to a threshold (transfer function)
level. If sum is greater than threshold, the neuron fires.
• Interconnecting or combining neurons with other
neurons form a layer of nodes or a neural network.
A Neuron Model
(source: Awad and Ghaziri: Knowledge Management, 2007)
Supervised and unsupervised learning
• Supervised learning process requires a teacher
represented by a training set of examples.
• Each element in a training set is a pair of input
and desirable output.
• Network makes successive passes through the
examples and the weights adjust toward the goal
state. The network has learned to associate a set
of input patterns with a specific output.
A Supervised Neural Network Model
Example: Neural network models predicting a firm’s bankruptcy
Splitting Attributes
Tid Refund Marital Taxable
Status Income Cheat
MarSt Single,
Married Divorced
Tid Refund Marital Taxable
Status Income Cheat
NO Refund
1 Yes Single 125K No
Yes No
2 No Married 100K No
3 No Single 70K No NO TaxInc
4 Yes Married 120K No < 80K > 80K
5 No Divorced 95K Yes
NO YES
6 No Married 60K No
7 Yes Divorced 220K No
8 No Single 85K Yes
9 No Married 75K No There could be more than one tree that fits
10 No Single 90K Yes the same data!
10
Decision Tree Classification Task
Tid Attrib1 Attrib2 Attrib3 Class
Tree
1 Yes Large 125K No Induction
2 No Medium 100K No algorithm
3 No Small 70K No
6 No Medium 60K No
Training Set
Apply Decision Tree
Tid Attrib1 Attrib2 Attrib3 Class
Model
11 No Small 55K ?
15 No Large 67K ?
10
Test Set
Apply Model to Test Data
Test Data
Start from the root of tree. Refund Marital Taxable
Status Income Cheat
No Married 80K ?
Refund 10
Yes No
NO MarSt
Single, Divorced Married
TaxInc NO
< 80K > 80K
NO YES
Decision Tree Classification Task
Tid Attrib1 Attrib2 Attrib3 Class
Tree
1 Yes Large 125K No Induction
2 No Medium 100K No algorithm
3 No Small 70K No
6 No Medium 60K No
Training Set
Apply Decision Tree
Tid Attrib1 Attrib2 Attrib3 Class
Model
11 No Small 55K ?
15 No Large 67K ?
10
Test Set
2- Data Mining
• Topics covered
- Defining data mining
- Data mining and business intelligence
- Business drivers
- Technical drivers- Role of statistics, machine learning, data
warehouses, OLAP (on line analytical processing), DM architecture
- DM virtual cycle – business understanding and developing DM
application
- Data management- sources, taxonomy, preparation, model
building, parameter setting, tuning, deployment and post
deployment phase action
- DM in practice
- Role of DM in customer relationship management
- Application for KM
Data Mining
• A body of scientific knowledge accumulated
through decades of forming well-established
disciplines, such as statistics, machine learning,
and artificial intelligence
• A technology evolving from high volume
transaction systems, data warehouses, and the
Internet
• A business community forced by an intensive
competitive environment to innovate and
integrate new ideas, concepts, and tools to
improve operations and DM quality
Data mining
• Data mining (knowledge discovery in databases):
– Extraction of interesting (non-trivial, implicit, previously unknown and
potentially useful) information or patterns from data in large
databases
• Databases to be mined
– Relational, transactional, object-oriented, object-relational, active,
spatial, time-series, text, multi-media, heterogeneous, legacy, WWW,
etc.
• Knowledge to be mined
– Characterization, discrimination, association, classification, clustering,
trend, deviation and outlier analysis, etc.
– Multiple/integrated functions and mining at multiple levels
• Techniques utilized
– Database-oriented, data warehouse (OLAP), machine learning,
statistics, visualization, neural network, etc.
• Applications adapted
– Retail, telecommunication, banking, fraud analysis, DNA mining, stock market
analysis, Web mining, Weblog analysis, etc.
Data Mining Tasks
• Prediction Tasks
– Use some variables to predict unknown or future values of other
variables
• Description Tasks
– Find human-interpretable patterns that describe the data.
Business
Scientific Commu Information
Knowledge nity Technology
• MACHINE LEARNING
A scientific discipline considered a sub-field of artificial
intelligence. In contrast, data mining is a business process
concerned with finding understandable knowledge from
very large real-world databases
• DATA WAREHOUSES
Extracting and transforming operational data into
informational or analytical data and loading it into a
central data warehouse
• Major features of DW:
– Subject oriented- Organized around subjects such as customers
vendor’s products compared to operational systems organized
around business functions
– Integration- data are loaded from different operation system
may be inconsistent, and integration help in brining consistency
in naming and measuring the variables
– Time variant- data may be collected from different time period
– Nonvolatile- no redundancy between operational data houses
and data warehouses
OLAP (Online Analytical Processing)
• Uses computing power and graphical
interfaces to manipulate data easily and
quickly at user’s convenience
• Focus is showing data along several
dimensions. Manager should be able to drill
down into the ultimate detail of a transaction
and zoom up for a general view
• Strengths- Visualization, easy to use
interactive tool, helps to understand the data
• Limitations- does not find pattern
automatically, not a powerful analytical tool.
Data Warehouse and DM Technological
Framework:
• Capabilities:
Response to extracted patterns
Selection of the right action
Learning from past actions
Turning action into business valu
DM Virtuous Cycle
Affinity grouping
A descriptive approach to exploring data that
can help identify relationships among values in
a database. The two most common approaches
are:
• Association discovery
• Sequence discovery
Different Industries and the DM Goals
DM application in Customer services
Business Challenge--understanding that individual
preferences of customers is the key to satisfying them
DM Goals
• Customer acquisition profile • Customer retention profiling
• Customer-centric selling • Inquiry routing
• Online shopping • Scenario notification
• Staffing level prediction • Web mining for prospects
• Targeting market
DM application in Financial services
industry
Business Challenge--Retaining customer loyalty
is of the utmost importance to this industry
DM Goals
• Focused statistical and DM applications are
prevalent
• Risk management for all types of credit
and fraud detection
DM application in Health-care business
Business Challenge
• Keeping pace with rate of technological and
medical advancement
• Cost is a constant issue in ever-changing market
DM Goals
• Early DM activities have focused on financially
oriented applications
• Predictive models have been applied to predict
length of stay, total charges, and even mortality
DM application in Telecommunications industry
Business Challenge
• Keeping pace with rate of technological change
• Deregulation is changing business landscape, resulting
in competition from a wide range of service providers
• Finding and retaining customers
DM Goals
• Customer profiling
• Subscription fraud and credit applications are utilized
throughout the industry
• Concerns about privacy and security are likely to result
in DM applications targeted to these areas
Data Management
• The most challenging part of a DM project is the data
management stage
• At least 40 percent of a DM project is spent on this
stage
Sources of data:
➢ Flat files
➢ Relational databases
➢ Data warehouses
➢ Geographical databases
➢ Time series databases
➢ World Wide Web
TAXONOMY OF DATA
Data can be found in several forms:
➢Business transactions
➢Scientific data
➢Medical data
➢Personal data
➢Text and documents
➢Web repositories
DATA PREPARATION
➢Evaluating data quality
➢ Handling missing data
➢ Processing outliers
➢ Normalizing data
➢ Quantifying data
MODEL BUILDING
The first step is to select the modeling
technique.
The most popular techniques:
• Association rules
• Classification trees
• Neural networks
PARAMETER SETTINGS AND TUNING
➢The set of initial and intermediate parameters
must be recorded for eventual use and
comparison
➢The selection of parameters must also be
explained
➢The process of reaching the final values must
be documented
➢Testing and validating samples are used for
this task
MODEL TESTING AND ANALYSIS OF
RESULTS
➢Reviewing business objectives and success
criteria
➢Assessing success of the DM project to ensure
all business objectives have been incorporated
➢identifying factors that have been overlooked
➢Understanding data-mining results
➢Interpreting the results
➢Comparing results with common sense and
knowledge base to detect any worthwhile
discoveries
TAKING ACTION AND DEPLOYMENT
➢Summarizing deployable results
➢Identifying users of the discovered knowledge
and finding out how to deliver and propagate
it
➢Defining a performance measure to monitor
obtained benefits by implementation of DM
results
DM Applications
• Market management applications
• Sales applications
• Risk management applications
• Web applications
• Text mining
DM as a Required Component for Various Applications in Different
Departments
Another distinction:
Push technology places information in a place where it is
difficult to avoid seeing it.
Pull technologies require you to take specific actions to
retrieve information
Layers of The Portal Architecture
16
Source: Tiwana, A.: Knowledge Management Toolkit (2002)
KM investment as portfolio of options
• A series of investment in a KM initiative can be
though of as a series of options that build
toward a portfolio.
• Each investment might have a different level
of risk, strategic intent, and time to fruition.
• The goal is to nurture and manage a KM
initiative as portfolio of well-balanced
investments.
• Real-options analysis can allow manager to
think several moves ahead of their present
investments.
Impact of risk, strategic intent, and time to fruition
Innovation Capital
renewal and development value Process Capital
Intellectual Property
Intangible Assets
Edvinsson’s Navigator
HISTORY
FINANCIAL CAPITAL
CUSTOMER PROCESS
HUMAN CAPITAL TODAY
CAPITAL CAPITAL
IC
Uniform commercial code liability limit For liability law of state applies rather
allowable via disclaimer of warranty UCC
– Different jurisdiction
– Consumers’ reaction
Legal disputes in knowledge based
system
• In KM several disputes issues may arise having
legal implications
• An expert owns the knowledge of the work if
there is no prior agreement.
• If a knowledge developer builds the system
and a problem arises, he is subject to charges
of personal liability under the doctrine of
respondent superior.
Legal disputes in knowledge based
system
• If the developer is a company employee, the
organization is also involved in the negligence
action.
• If a knowledge based system is a product, proving
negligence is unnecessary to hold the developer
liability
• If a knowledge based system is a service contract
law of the state will apply.
• Case involving warranties require the uses to
show who is at fault.
Web linking domain name issues
• In E- commerce unique knowledge about a product , a
company or service resides in websites.
• Hyperlinks- infrastructure of the internet is designed
around to link text or images addresses automatically
• This jumping from one page to another raises some
legal issues-
- Referencing a linked site without permission from the
site owner
- retrieving or downloading information without
referencing or permission
- Unauthorized use of company’s trademark
- Adding a web programme to a comany’s website
without permission
Domain name issues
• It represents a company’s intellectual capital.
• There could be dispute as who is the owner of the domain
name.
• InterntNic (Internet network information centre) manages
the domain names on a first come first serve basis,
• Idea about the use of domain mane and trade marks-
- Make sure that domain name does not infringes any trade
mark
- Secure registration for the domain name
- Register your domain name with Internet Nic.
- Get permission before linking to other websites to avoid
liability issues
The malpractice factor
• Malpractice in KM is negligence applied to
knowledge developers for design defects in
KM system for professional use.
• Knowledge developers must be professionals
to be held liable for malpractice.
• There is no standardization or certification for
knowledge developers
The Ethical Factor-
• Ethics –Fairness, justice, equity, honesty,
trustworthiness & equality Subjective
• Stealing, cheating, lying or backing out on one’s word
are descriptions of lack of ethics.
Legal
Example
Example
Restricting immigration
Donation a charity
B C
Immoral Moral
A D
Example Example
Robbing a bank Rescuing hostage from a
Falsely reporting foreign country
charitable donations
Illegal 72
Ethical Decision cycle
• Knowledgeable people are expected to follow
Ethical behaviour and consider a number of
elements to make ethical decisions-
1. The nature and essence of the act- Is it fair reasonable or
conscionable
2. The consequences of the action or inaction on the parties
involved
3. The far reaching consequences of action or inaction on the
organization or society.
Ethical Decision Cycle
Organizational and
societal feedback
( human Filter
Major threats to Ethics
• Faster computers & networks
• Sophisticated telecommunications & routers
• Massive distributed databases
• Eases of access to information & knowledge
base
• Transparency of software
Improving the ethical climates
• Top management support
• Code of ethics
• Strong Ethics training program
• Motivation to focus on honesty & integrity
• Prompt dealing of unethical behaviour
WHERE TO START
• Bottom-up
– Inculcates ethics behavior at the employee level with full
support of top management
• Top-down
– The actions of the company start with the CEO
– Extend to a variety of stakeholders
Code of ethics
• A declaration of principles and beliefs that govern
how employees of a corporation are to behave
• Inspirational & disciplinary
• All-compassing & stable over time
• Self- Assessment- A question-and-answer
procedure
• Allows individuals to appraise & understand their
personal knowledge about a particular topic
• An educational experience
Privacy factor
• Notice
– Right to be told in advance
– Choice
– Final say regarding the use of personal info
• Access
– Access & correct any personal info
• Security/integrity
• Enforcement
– Backed by the courts if any principles are violated
New technology related ethical
problems
• Traditional rules of conduct are not always
applicable to a new medium
• Monitoring
– Should your employer have the right to monitor private email
messages?
– What are the two most popular Web sites for American
workers? Playboy and ESPN
Workplace Challenges
• Employers monitoring employees' email and Internet
use cite legal liability as the primary reason to monitor.
• Some companies that monitor have a written email
Policy, an Internet Policy, and a Software Policy.
• Some employers have disciplined or terminated
employees for violating ePolicy.
• Some organizations having email retention & deletion
policies in place.
• Some companies have been ordered by courts to turn
over employee email related to workplace lawsuits.
• Many organizations have battled sexual harassment
and/or sexual discrimination claims stemming from
employee e-mail and/or Internet use.
•
Music Downloads
• Risk of getting caught
– Studies have shown that a majority of the people who
share music on the Internet are aware that their actions
are illegal,
– But they also know that the chances of getting caught are
pretty remote''
– Why is “getting caught remote”?
• There are peer-to-peer network subscribers in the US
with tens of millions more in other countries
• What happened? Where did our knowing right from wrong go too?
– Are we missing an opportunity to introduce ethics at an early age in
children by not integrating these thoughts and practices in video games?
– Should more controls and regulations be introduced into the system? Will
they actually help to improve our moral and ethical behavior?
Satwana Choudhury:2011 3rd International Conference on Information and Financial Engineering, IPEDR
vol.12 (2011) © (2011) IACSIT Press, Singapore
Task ahead for KM in IT Companies
• Knowledge Management systems, to be
effective should have easy-to-use interface,
solid reliability, accessibility throughout the
target segment and utilities to mine relevant
information.
• The target segment (like employees,
customers, investors) needs to be taken into
account before creating KM systems. The full
commitment to KM from the top management
is very critical in its implementation
Issues: Managing knowledge workers
in a Knowledge Economy
• Embodies experience, innovation, creativity,
and transformation of experience into
knowledge for leveraging products or services
• Transforms business and personal experience
into knowledge through capturing, assessing,
applying, sharing, and disseminating it within
the organization to solve specific problems or
to create value
1.Understanding Personality and
Professional Attributes of Knowledge
Workers
• Holding unique values
• Aligning personal and professional growth with
corporate vision
• Adopting an attitude of collaboration and sharing
• Innovative capacity and a creative mind
• Clear understanding of the business he is a part
• Willing to learn, unlearn, and adopt new ways
that result in better ways of doing a job
• In command of self-control and self-learning
• Willing to grow with the company
2. Developing the core competencies
of knowledge workers
• Thinking skills—having a vision how the
product or the company can be better
• Continuous learning—unlearning and
relearning in tune with fast-changing
conditions
• Innovative teams and teamwork—via
collaboration, cooperation, and coordination
• Innovation and creativity—”dreaming” new
ways to advance the firm
Developing the core competencies of
knowledge workers
• Risk taking and potential success—making
joint decisions with calculated risk
• Decision action taking—be willing to embrace
professional discipline, patience, and
determination
• Culture of responsibility toward knowledge—
loyalty and commitment to one’s manager or
leader
3. Facilitating a culture.
• Those in charge of KM initiatives need to
create a culture of knowledge sharing to
implement KM.
• The time tested and effective way to transfer
knowledge is for people to find others who
have it and talk to them
• Employee attitude towards radical change in
the ongoing system
4. Having a KM Strategy
• Actively Managing Knowledge
• Expert Individuals Provide Insights
• Development of Critical Capabilities
• Ease of Availability of Information
• Sensing and Understanding meaning and values
• Structure the Institutionalized Goals
• Link individual learning with organizational
learning by creating processes and system
• Identify Knowledge Assets and easy to use
interface
Current issues of Knowledge
management in Indian Companies
• Cultural diversity and wide disparities in the
extent of up-to-date infrastructure make
managing knowledge challenging in developing
countries like India.
• Cultural diversity and infrastructural gap issues
are also related to a variety of government,
educational, political, social, and economic
factors.
Current issues of Knowledge
management in Indian Companies
• Environmental factors interact with
organizational variables and information
technology to enable or constrain knowledge
management processes in the creation and
protection of knowledge resources.
• Leadership, structure, and culture that are
contextual to each organization and the
environment in which they operate.
• Firms should align information technology,
people, structure, and organizational influences
to make knowledge processes and socio-cultural
management sustainable.
Most admired knowledge economy
( MAKE) Award
• The Global MAKE study is a measure of the rate
at which an organization is transforming its tacit
and explicit corporate knowledge into new
enterprise intellectual capital and increased
shareholder value (or in the case of non-profit
and public organizations, stakeholder capital).
• Accenture and Microsoft are the only
organizations which have been recognized as
Global MAKE Winners every year since the MAKE
research studies began in 1998
Most admired knowledge economy (MAKE)
Award
Knowledge performance dimensions which form the MAKE framework
• developing knowledge workers through senior management
leadership.
• developing and delivering knowledge-based
products/services/solutions.
• maximizing enterprise intellectual capital.
• creating an environment for collaborative enterprise knowledge
sharing.
• creating a learning organization.
• delivering value based on stakeholder knowledge.
• transforming enterprise knowledge into shareholder/stakeholder
value.
Tata Steel has been conferred the prestigious Indian ‘Most Admired
Knowledge Enterprises’ (MAKE) Award many times
Future of KM at TATA Steel
KM at Infosys
• In 1999, Infosys introduced a formal KM system In order to
maintain uniformity in knowledge dissemination,
• Kshop, a knowledge portal was launched in year 2000.
• KM group introduced KCU’s (knowledge currency units) in
2001 to encourage employees to use and contribute to Kshop
• KCU scheme was modified and emphasized on knowledge
sharing and visibility rather than monetary rewards in April
2002.
• After these changes the quality contributions to Kshop
increased. By 2005, Infosys had highly sophisticated KM
system in place.
• Nov 2005, “Infosys inducted into Global MAKE Hall of Fame”.
(3 consecutive years)
The KMM - Knowledge Management Maturity
Model
• The 3 prongs- People, Process, and Technology
-Each level has a set of prerequisites the organization
is required to meet.
Create
Capture
Tacit Knowledge
Explicit Knowledge - Discussion
- Doc Repositories
Knowledge
- Reusable Comp. Use Groups
Organize -Yellow Pages
-Chat Rooms
Access
Bus. Processes
Infrastructure
KM Team
KM
Measure
-ments
Key
Business KM Vision & Strategy
Drivers
Organizational Values & Culture
KM initiative dedicated team
• Structure- KM head directly reporting to CEO
Wipro’s My Workmate™
• solution on cloud can help organizations
• delivering services in support of the full lifecycle of end-to-end
• integrated Knowledge Management program – from Knowledge
assessments, Strategy, Processes, KM, Technology Roadmap to
Implementation, Roll-out, Sustenance, and Enhancement.
Benefits of KM programme at WIPRO
KM at BHEL
• The KM process at BHEL- robust and flexible document
management system which provides role-based access to
documents
• Leadership in KM-Top management has given it utmost importance
by creating team for the implementation of the KM framework
• Building a collaborative learning environment and culture for KM.
facilitating, a culture of information sharing, relationship building
and trust.
• Has created a knowledge bank through its efficient
• document management system
• Infrastructure for KM - A web portal for document and data, user
interface through a single window
• Developing metrics for measurement of continuous improvement -
- internal metric to track how its central repository is being used by
individuals and teams across departments.
KM at ONGC
• ONGC created an independent platform for
KM resulting in launch of a KM portal
• People share their knowledge through
informal interactions
• Launch of Gyanodayan to share experiential
knowledge of individuals and teams and strive
to increase it tacit and explicit knowledge base
• Developing a comprehensive KM system and
plans to set up a virtual knowledge park
Objective of KM programme at ONGC
• Skills knowledge gap identification
• Communities of practice- Drilling the limit to
achieve the reduction in drilling time and squeeze
the last bit info from seismic for maximizing the
information value of seismic data
• Best practice and lessons learned on offshore
structures and well stimulation services
• Leveraging the vast knowledge of its workers in
the field of exploration and petroleum
technology for increased productivity, cost , time
and effort reduction, improved quality
Major KM initiative from ONGC
• Introduction of company wide e learning
system
• Knowledge up gradation programme- Unnati
prayas, superunnati prayas, sangsaptak
• Formalization of roles, positions and
responsibility
• Formalization of industry – academia
programme
Dimensions of Organizational Impacts
of KM
Organizational
People Processes Products
Performance
Knowledge Management
• Patents
• Copyrights
• Trade Secrets
KM: A new Paradigm for Decision-
Making
• The development of MIS, Decision Support
Systems, and KMS has been influenced by the
works of five influential philosophers, namely,
Leibniz, Locke, Kant, Hegel, and Singer.
• Recent developments in KMS have also enabled
to extend the reach of those involved in the
solution, through group support systems.
• As globalization expands, the number of
stakeholders affected by the organization
increases
Decision making based on multiple
perspectives
• Technical perspective
• Personal and individual perspective
• Decision making based on multiple
perspectives
• Organizational and social perspective
• Ethics and aesthetics perspective
Emerging KM Practices
• Knowledge management practices that enable
knowledge sharing and collaboration include-
• Web 2.0’s role in KM
• Social networks
• Wikis and Blogs
• Open source development community
• Virtual worlds
• The three worlds of IT `
Emergence of Web 2.0
• Coined by Tim O’Reilly in 2004 to describe
development and evolution of Web-based
communities and hosted services such as
social- networking sites, video sharing sites,
wikis, blogs, and folksonomies
• AJAX- Asynchronous JavaScript and X ML
allows web applications to perform more like
a desktop application
Emergence of Web 2.0
• Collective Intelligence- The content from Web 2.0
comes from users, e.g. product reviews
• Web 2.0 is of strategic value
• Will maintain or increase investment in: social
networking, P2P networking, Web services
• Enterprise 1.0 vs 2.0- 1.0 - IT = channel for
distribution and platform for viewing 2.0 - IT
provides tools search, links, authoring, tagging,
signals, and extensions
Social Networking
• Friendster (2002) Allowed users to share photos,
videos, comments and messages among friends
• “Who’s viewed me?” Grew (based on user
relationships not via traditional marketing
• MySpace (2003) “A place for friends” —
included features of Friendster Added music
(knowledge) discovery
• Aligned itself as channel for music distribution
among indie and major recording label artists
Highest visited domain in the USA in 2006
Social Networking (continued)
• Linked In (2003) Professional social network
• Orkut (2005) Google owned used mostly to
India and Brazil
• YouTube (2005) Google owned Allows users to
upload, share and comment on videos
Enabled proliferation of video authoring and
sharing for the masses
Social Networking (continued-)
• Facebook (2004) Designed as replacement )for
photo directories (facebooks) given to freshmen
• Exclusivity — must join as part of a network
• Added security Initially comprised (only of
students from elite Universities
• Now includes most schools, geographies, and
workplaces
• News feed — supports stickiness. Many repeat
visits throughout the day
Social Networking (continued)
• Knowledge sharing research
• Knowledge held by Entities –people, organizations
or information systems
• Relationships characterized by-
• Type — friendship, advice or professional
• Strength — intensity or reciprocity
• Density — ratio of actual to possible ties in a
network
• Position of the individual in the network-Central or
peripheral
Social Networking (continued)
• Enterprise uses of social networking
• Contact management
• Marketing
• Knowledge sharing
• Talent management
• Advantages - Self-organizing
• Leverages real-world connections
Wikis
• Collections of web pages editable by anyone
• User generated content
• Usually a volunteer effort
• Collaborative
• No formal/professional review
• Approval stems from collective wisdom
• Most famous example — Wikipedia -Largest
online encyclopedia — 3 million English articles
Web Logs (Blogs)
• Web diary / journal Posts in reverse
chronological order
• Used by people / organizations to
communicate with public, to mainstream
media for breaking news, Chronicle of events
• Army of Dude Twitter — a microblogging
service
• Facilitates online presence for maintaining
weak ties
Open Source Development
• Originated after the development of ARPA net
• Free exchange of code for researchers
• Open source
- Coined by Tom O’reilly
- Collaborative
- Development of software
- Exchange done through internet
- Free software foundation- A legal entity under
which the open source movement operates
Open source development
• Open source initiatives- Principles
-Free distribution
- Source Code
- Derived works
- Integrity of Author’s work
- Nondiscrimination for persons/groups
- Nondiscrimination on field
- Distribution of license
- License Must Not Be Specific to a Product
- License Must Not Restrict Other Software
- License Must Be Technology-Neutral
Open Source Development
• Successful Open Source Projects:
Linux — x86 porting of Unix
Apache — world’s most used web server
BIND — underpinning of Domain Name system
MySQL — relation database management system
Bugs found and fixed more quickly
New versions are more rapidly deployed
Motives for participation:
Need for product
Enjoyment, desire to create and improve
Reputation and status within the community
Affiliation Identity Values and ideology
Training, learning, reputation outside the community and
career concerns
Virtual Worlds
Metaverse
• parallel online abstraction of the offline world
• Interaction via avatars Second Life and Developed by Linden Labs
• Highly interactive 3D, real-time, social network
• Virtual economy with currency — Linden Dollars
• Used for recreation, marketing, political campaigning, socializing,
entertainment, and commerce
• Avatars interact in a 3D world known as the Grid
Project Wonderland