Knowledge Management Compress
Knowledge Management Compress
El ia s M. A w a d & Ha ssa n Gh a z ir i
Hassan M. Ghaziri
Associate Professor
School o f Business
American University o f Beirut
PEARSON
Credits borrowed from other sources and reproduced, with permission, in this textbook
appear on appropriate page within text.
No part of this eBook may be used or reproduced in any manner whatsoever without the
publisher’s prior written consent.
This eBook may or may not include all assets that were part of the print version. The publisher
reserves the right to remove any material present in this eBook at any time.
ISBN 9788131714034
eISBN 9789332506190
Head Office: A-8(A), Sector 62, Knowledge Boulevard, 7th Floor, NOIDA 201 309, India
Registered Office: 11 Local Shopping Centre, Panchsheel Park, New Delhi 110 017, India
“The great end of life is not know ledge but action.”
—Thomas H enry Huxley
To my wife Blandine,
who showed me that seeking the truth entails
sharpening the taste of beauty, and
who constantly rem inds me that technology
w ithout hum anity leads to chaos.
—H assan G haziri
This page is intentionally left blank.
I I I I I I I I I I I I I I
Contents
Preface 17
About the Authors 23
7
Contents
Summary 175
Terms to Know 176
Test Your Understanding 176
Knowledge Exercises 177
References 179
E-Business 313
The Value Chain 315
Supply Chain Management (SCM) and Knowledge
Exchange 315
Implications for Knowledge Management 322
Summary 324
Terms to Know 325
Test Your Understanding 326
Knowledge Exercises 326
References 327
Index 473
■
Preface
We live in a world that changes by the minute. Change often moves organizations and
advances p eo p le’s intellect. For change to be effective, organizations as well as people
m ust change. H ow ever, even the most intelligent individuals can becom e handicapped
in ineffective organizations. People, being creatures of habit, are so busy working the
job that they fail to see change around them. They get carried away with behavior that
did well in the past, not realizing that it no longer produces effective results in a fast-
changing business.
The key to change and growth is awareness, sharing ideas, and coming up with new
and innovative ways of staying ahead of the com petition. It involves learning, innovat-
ing, and adopting behavior designed to improve quality and perform ance. As M cLuhan
said, “ E verybody ex periences far m ore than he understands. Yet, it is experience,
rath er than understanding, that influences behavior.”
So, sm art people need sm art organizations. The nam e of the game is integration
and co o p eratio n for com petitive advantage. For com panies to m ake use of hum an
ex p erience and intelligence, they m ust provide a sharing environm ent, em pow er
people with tools, and create a climate for learning and testing new ways of doing busi-
ness. As Philip Kotler, professor of m arketing. N orthw estern University, wrote, “Every
com pany should work hard to obsolete its own line .. . before its com petitors do.”
17
18 a a i i Preface
and explicit know ledge. C on sid er the follow ing questions regarding one aspect of
knowledge and com puters:
• D o you know a m ore effective way to preserve the knowledge of an expert who
might be retiring soon than by preserving it through a com puter?
• How could tod ay ’s corporations afford brain drain and loss of knowledge and
expertise w ithout a way to capture it so that less-experienced employees could
use it to advantage?
• If knowledge is to d ay ’s best corporate asset, would it not m ake sense to find a
way to preserve, nurture, share, and protect such capital?
The actual carrier of the knowledge, w hether it is e-mail, groupw are, or peer-to-
peer meetings, will involve people with an attitude of sharing com m on knowledge in
the interest of the project or the organization. Technology is only a tool em ployed to
expedite processes.
A no th er reason for writing this book is dissatisfaction with existing books for the
academ ic sector. T here are many good books on the m arket w here each book gives a
specialized picture of know ledge rath er than a com prehensive view of what know l-
edge is and how it is em bedded in today’s organization. For example, one book focuses
on com m on know ledge based on studying a n um ber of established enterprises.
A n o th er book brings up the concept of learning in action as a guide to putting the
learning org an izatio n to w ork. A n o th e r know n book discusses how organizations
m anage what they know. O th er books are either extrem ely behavioral focused or lean
heavily tow ard know ledge autom ation. This text is neither. It is process oriented. It
strikes a balance betw een the behavioral aspects of knowledge and knowledge m an-
agem ent and refers to technology as a m edium for knowledge transfer, especially in
the e-world.
Parti
P art V brings up the ethical, legal, and managerial issues in know ledge m anage-
m ent. The question is who owns know ledge —the know ledge w orker or the firm? In
C h ap ter 14, we discuss the liability of the know ledge developer, the expert, and the
user. We also highlight the m eaning of copyrights, tradem arks, and trade names. M ajor
threats, to ethics in know ledge sharing are also covered. C hapter 15 concludes the text
w ith a focus on th e know ledge w o rk er and how to m anage know ledge work.
Specifically, we elaborate on the skills set of the knowledge w orker and how technol-
ogy can be a critical tool for advancing knowledge work. The Epilogue is a futuristic
view of know ledge m anagem ent and the likely direction it will take to help the learn-
ing organization succeed in an increasingly com petitive global environm ent.
■■«■ Supplements
COMPANION WEBSITE (www.prenhall.com/awad)
The te x t’s C om panion W ebsite includes the In stru c to r’s M anual, Test Item File, and
M icrosoft Pow erPoint slides.
A ccess to the in stru cto r’s section of the site, w here the In stru cto r’s M anual and
Test Item File are housed, requires a valid user ID and password to enter. You simply
need to register yourself as the instructor of the course by going to the Web site and
com pleting the initial instructor registration process. U pon com pletion of the process,
your registration request will be forw arded to your sales representative for validation.
Preface ■aa■ 21
If you have any problem with your authorization, please contact your Prentice Hall
sales representative.
INSTRUCTOR’S MANUAL
A specially p rep ared m anual is available for the instructor. The m anual provides the
following support m aterial:
• A syllabus based on a q u arter or a sem ester plan as a guide to teaching the course
• L ecture assistance , including the objectives of each chapter, teaching notes, and
chapter summ ary
• Solutions to know led g e exercises at the end of each chapter
POWERPOINT PRESENTATIONS
The slides illum inate and build upon key concepts in the text. They are available for
both students and instructors for dow nload from www.prenhall.com /awad.
Acknowledgments
In a nutshell, every effort has been m ade to m ake K n o w led g e M a n a g em en t truly
understandable, high on lucidity, and practicable. In preparing the m anuscript, we kept
in mind people, not com puters, as the final decision makers. A lthough the underlying
technology in autom ating know ledge work ensures the availability of tacit knowledge
in knowledge bases and other repositories, hum ans have the final say in the way orga-
nizations and society m ust perform .
B efore the m anuscript found its way to the publisher, various versions were tested
in the classroom over a 2-year period in the U nited States and abroad. T here were
successive revisions and updates resulting from student feedback and feedback from
professional review ers and attendees to our m any sem inars on the subject. We would
specifically like to thank the following people:
23
This page is intentionally left blank.
PARTI: T H E BASICS
TER I I I I I I I
Working Smarter,
Not Harder
Contents
In a Nutshell
W hat Is Knowledge M anagem ent?
The K nowledge O rganization
W hat KM Is N ot A bout
Why Knowledge M anagem ent?
The D rivers
H ow It Cam e A bout
Key Challenges
H istoric Overview
KM Myths
KM Life Cycle
Role of Trust in the KM Life Cycle
Im plications for K nowledge M anagem ent
Sum mary
Terms to Know
Test Your U nderstanding
Knowledge Exercises
R eferences
K n o w in g ignorance is strength
Ignoring kn ow ledge is sickness
—L a o T s u
In a Nutshell
Welcome to the twenty-first century and the knowledge society. The business landscape
is changing rapidly. The com petitive environm ent is no longer linear or predictable.
Survival and success depend entirely on the organization’s ability to adjust to the dy-
namics of the business environm ent. Changes in inform ation technology (IT) have gen-
erated gaps in access and control of inform ation and knowledge. Even when these gaps
are bridged, several fundam ental challenges rem ain. H ow do we apply knowledge for
26 ■ ■ ■ ■ PART I The Basics
value-added and competitive advantage? How do we convert inform ation into knowl-
edge? How do we use technology to convert challenges into opportunities? Knowledge
m anagem ent is the solution for realigning the firm ’s technical capabilities to create the
knowledge that drives the firm forward.
There is obvious room for change in the way we work and communicate and in rela-
tionships and processes am ong people within and across organizations. To be em pow -
ered to face these challenges m eans not only accessing technology, but also developing
the ability to m anage knowledge. In the final analysis, the key questions an organization
m ust consider are “D oes your com pany know w hat you know ?” “D o you know what
you know ?” “H ow do you m ake best use of the knowledge you have?” It also means
thinking “out-of-the-box,” where “the box” is what represents all the tried-and-true pro-
cedures that have w orked in the past. There is less room for “packaged solutions” to
solve m ost of a firm ’s problems. Knowledge m anagem ent m eans thinking outside the
b ou n d aries of cu rren t practices, products, services, and organizations. The new and
unpredictable business environm ent puts a prem ium on innovation and creativity much
m ore so than it has in the past. This explains our chapter title —working sm arter, not
harder. It is “obsoleting what you know before others obsolete it and profit by creating
the challenges and opportunities others haven’t even thought ab o u t” (M alhotra 2000).
We have progressed from the data processing age of the 1960s to the information
age of the 1980s to the knowledge age of the 1990s. The latest transform ation represents
the most fundam ental change since the introduction of the digital com puter 4 decades
ago. Knowledge and intellectual capital (viewed here as accrued knowledge) represent
our corporate and national wealth. Knowledge w orkers are found in every organiza-
tion, and they are the backbone of every successful business. Knowledge w orkers use
technology to reason through problem s and reach successful solutions. Com puter-aided
software gives them an edge over w orkers using conventional methods. In this chapter,
we discuss know ledge m anagem ent, the general concepts and m yths surrounding
knowledge m anagem ent, the relationship betw een knowledge m anagem ent and m an-
agem ent inform ation systems, and how an innovative organization looks at knowledge.
In the past decade, th ere has been m uch discussion ab o u t the im portance of
know ledge and know ledge m anagem ent. Roy Vagelos, the chief executive officer of
M erck & Co., told Fortune magazine that devoting time and resources to the proper
m anagem ent of knowledge is slowly, but surely, gaining support in many organizations.
For a com pany to m anage knowledge, it must first inventory its people, systems, and
decisions. Professional knowledge w orkers within the com pany must be identified, and
th eir functions m ust be defined. K now ledge technologies m ust be in co rp o rated to
reen g in eer the en tire business process. M ajor decisions should be review ed, and a
know ledge system for m aking each decision should be developed. The com pany’s
inform ation system should also be exam ined to determ ine how to benefit from em erg-
ing knowledge technologies. This self-assessment makes a com pany m ore cognizant of
its strengths and weaknesses. It should also lead to changes that are m ore in tune with
the com petitive nature of the business environm ent.
As can be deduced from the select definitions in Table 1.1, researchers as well as prac-
titioners have yet to agree on a definition. How ever, each definition of KM contains
several integral parts:
• U sing accessible know ledge from outside sources
• E m bedding and storing knowledge in business processes, products, and services
• R epresenting know ledge in databases and docum ents
• Prom oting know ledge grow th through the organization’s culture and incentives
• Transferring and sharing know ledge throughout the organization
• Assessing the value of know ledge assets and im pact on a regular basis
In some ways, KM is about survival in a new business w orld—a world of competition
that increases in complexity and uncertainly each day (see Box 1.1). It is a world that
challenges the traditional ways of doing things. The focus is not only on finding the right
answers, but also on asking the right questions. W hat w orked yesterday may or may not
work tomorrow. The focus is on “doing the right thing” rather than “doing things right”
so that core com petencies do not becom e core rigidities in the future (M alhotra 2000).
KM is the process of capturing and m aking use of a firm ’s collective expertise any-
w here in the business —on paper, in docum ents, in databases (called explicit kn o w l-
edge), or in p eo p le’s heads (called tacit knowledge). Figure 1.2 implies that up to 95 per-
cent of inform ation is preserved as tacit knowledge. It is the fuel or raw m aterial for
in n o v atio n —the only com petitive advantage that can sustain a com pany in an unpre-
dictable business environm ent. It is not intended to favor expert systems of the early
1990s, w hen co m p u ters w ere pro g ram m ed to em u late hum an e x p e rts’ th ought
processes. The goal is to present a balanced view of how com puter technology captures,
distributes, and shares know ledge in the organization by linking hum an experts and
docum ented know ledge in an integrated KM system.
The goal is for an organization to view all its processes as know ledge processes.
This includes know ledge creatio n , dissem ination, upgrade, and application tow ard
organizational survival. Today’s know ledge organization has a renew ed responsibility
to hire know ledgeable em ployees and specialists to m anage know ledge as an intangi-
ble asset in the sam e way th at one calls on an investor to m anage a financial portfolio.
A firm seeks to add value by identifying, applying, and in teg ratin g know ledge in
u n p re c e d e n ted ways, m uch like an in v estor adds value by unique com binations of
stocks and bonds. The process is p art science, part art, and part luck.
1 1 ■ 1 ■ ■ BOX 1.1 1 1 ■ i 1 1
SOURCE: Excerpted from Anthes, Gary H. “Charting a Knowledge Management Course,” Computerworld, August 21,2000, p. 38ff.
I I fl I I I
The final step is the m aintenance phase, which ensures th at the know ledge dissem i-
nated is accurate, reliable, and based on com pany standards set in advance. The outer
layer is the im m ediate environm ent of the organization—technology, culture, supplier
and custom er intelligence, com petition, and leadership. Such an environm ent has a lot
to do with how well an organization goes about developing and im plem enting its KM
life cycle —also called the KM process.
The ideal know ledge o rg an izatio n is one w here peo p le exchange know ledge
across the functional areas of the business by using technology and established p ro -
cesses. A s depicted in Figure 1.4, people exchange ideas and knowledge for policy for-
m ulation and strategy. K now ledge is also internalized and adopted within the culture
30 ■ a■a PART I The Basics
of the organization. All know ledge w orkers (people) are in an environm ent w here they
can freely exchange and produce know ledge assets by using various technologies. This
process influences the com pany as a whole in a positive way.
A know ledge organization derives knowledge from several sources:
• C ustom er know ledge—their needs, who to contact, custom er buying power, etc.
• Product know ledge—the products in the m arket place, who is buying them , what
prices they are selling at, and how much m oney is spent on such products
• Financial know ledge—capital resources, w here to acquire capital and at what
cost, and the integrating in financial practices
• Personnel practices know ledge—the expertise available, the quality service they
provide, and how to go about finding experts, especially in custom er service
SOURCE: Gravallese, Julie. “Knowledge Management,” The MITRE Advanced Technology Newsletter,
April 2000, vol. 4, no. 1. www.mitre.org/pubs/edge/april_00/4, Date accessed August 2002.
The idea of “m anaging” know ledge is abstract. K now ledge is not som ething we
typically th in k of as being m anaged, b u t ra th e r som ething th a t is individually con-
trolled, personal, and autonom ous. To be able to m anage knowledge, one m ust first be
able to elicit an individual’s know ledge from th at individual. The hum an aspect of both
know ledge and m anaging are integral. T here is also the issue of m easuring knowledge:
If you cannot m easure it, you cannot m anage it.
O n e u n iq u e in d ic a to r of KM in action is seeing peo p le think actively, n o t
passively—thinking ahead, not behind. It is an environm ent w here custom er service
is im proved through b etter problem -solving, w here new products are available to the
m ark et m o re quickly, and w here the o rganizational processes th a t deliver the new
products continue to im prove through innovation and creativity of the people behind
the product and the production process. This is w here technology, netw orking, and data
com m unication infrastructure play an im portant role. Technology has m ade knowledge
sharing and innovation m ore feasible (see Figure 1.5).
• New products
• New markets
• Smarter problem-solving
• Value-added innovation
• Better customer service
• More efficient processes
• More experienced staff
Organizational Benefits
Codified Technology
• K nowledge m anagem ent is not intellectual capital, per se. Intellectual capital (IC)
represents the value of a com pany’s tradem arks, patents, or brand names.
Intellectual capital is a com pany’s collective brainpow er, or a com posite of expe-
rience, knowledge, inform ation, and intellectual p ro p e rty —all the property of the
organization. A lthough treated in the literature the sam e as knowledge, know l-
edge, p er se, is the consequence of actions and interactions of people with infor-
m ation and know ledge exchange based on experience over tim e (see Box 1.2).
• Knowledge m anagem ent is not based on information. Inform ation can becom e
know ledge after people use it in ways that create value. Knowledge has been
viewed as inform ation in action. A s we shall explain in C hapter 2, inform ation is
context-sensitive; know ledge is consensus-oriented.
• K nowledge m anagem ent is not about data. D ata (facts w ithout context) or infor-
m ation (interp retatio n or p atterns of data) is not knowledge. As we shall find in
C hapter 2, data by itself is not actionable knowledge (O ’D ell et al. 1998,17).
• Knowledge value chain is not inform ation value chain. In inform ation value
chains, the key com ponent is a technological system guiding the com pany’s busi-
ness processes, viewing hum ans as passive processors. In contrast, knowledge
value chains view hum ans as the key com ponents assessing and reassessing infor-
m ation stored in a technological system. Best practices into organizational busi-
ness processes are carried out after active hum an inquiry, and such processes are
continuously upd ated in line with the changing external environm ent.
• K nowledge m anagem ent is not limited to gathering inform ation fro m the com -
pany's dom ain experts or retiring employees and creating databases accessible by
intranets. KM is a collective concept of the organization’s entire core knowledge.
• K now ledge m anagem ent is not digital networks. KM is about im proving business
processes with people and technology in mind. Effective technology is the
enabler of KM , and people m ust be in the equation from the start to use technol-
ogy effectively.
CHAPTER 1 Working Smarter, Not Harder i aa a 33
■ ■ i 1 ■ i BOX 1.2 I a I « a ■
INTELLECTUAL CAPITAL
Tracking a com pany’s physical assets is straig h t- N ader, senior vice president and chief operating
forw ard enough, as long as y ou’re counting com - officer at the Pittsburgh-based bank.
puters, adding salaries, and estim ating h eatin g R on Griffin, C IO at The H om e D epot, Inc.,
bills. But m anaging intellectual capital is a differ- says th at A tlan ta-b a sed hom e im provem ent re -
ent ball game, and one in which few com panies tailer has tried -an d -tru e stru ctu res in place for
consistently hit hom e runs. m easuring, m aintaining, and growing intellectual
Intellectual capital involves a com pany’s em - capital. The com pany uses a nine-box grid system
ployee expertise, unique organizational systems, and to m easure each e m p lo y ee ’s p erform ance and
intellectual property. For example, if a com pany’s potential, and it offers developm ental courses to
book value is $10 per share and its stock is selling for b ring em ployees up to speed on certain issues.
$40 per share, the difference is often attributed to The categories m easured include leadership abil-
intellectual capital. “When you subtract book value ity, how an em ployee fits into the H om e D epot
from m arket value, the remaining is all the intellec- culture, financial acum en, and project m an ag e-
tual and knowledge and m arket capital. It includes m ent capabilities
all the patents they might have and all other intangi- For its part, H om e D epot posts a bulletin on
bles,” says Vish Krishna, associate professor of m an- its intranet with quick references on topics such as
agement at the McCombs School of Business at the how to repair a leaky toilet or build a deck. That
University of Texas at Austin. way, know ledge is available for em ployees to
O nce a com pany identifies its intellectu al rem ain up to speed and to pass such inform ation
capital, the next step is to m aintain it. O ne of the along to custom ers. “ I t’s not just about selling
techniques th at D ollar B ank uses to m anage product in our business; it's a lot of the knowledge,
intellectual capital is to keep em ployees involved and we train on that extensively,” Griffin says.
in decision m aking and planning, says A braham
SOURCE: Excerpted from Taylor, Christie. “Intellectual Capital” Com puters orld, March 12,2001, p. 51.
1 I I I I 1
• Knowledge m anagem ent is not about “knowledge capture, ” per se. Knowledge can-
not be captured in its entirety. Problem s involving collaboration, cooperation, and
organizational culture must be addressed before one can be sure of reliable
knowledge capture.
R egardless of the business, a com pany com petes based on the know ledge of its
employees. A com pany also has a m anagem ent m ind-set that relies on past experience
(such as sm art people, docum ents, or databases) and creates a new way for exchanging
knowledge by using intranets, the Internet, local area networks, and the like. C onsider
the case of a British superm arket chain that used a custom er data-m ining application
to assess buying behavior. A fter running correlation analyses am ong several variables,
it quickly discovered a clear association betw een the purchases of diapers and beer by
m ale custom ers on Friday afternoons. A rm ed with this knowledge, the store began to
stack diapers and beer together.
It should be clear by now that people are the determ inants of KM success. The best
softw are is insufficient if you do not have people willing and ready to cooperate and
m a PART I The Basics
collaborate. Sharing knowledge based on m utual trust is the critical com ponent in the
entire KM process. To illustrate, Lotus describes its R aven as resem bling the “collabo-
rative capabilities of N otes” but going further by “defining the relationships betw een
people and content.” Raven is a key elem ent of L otus’ overall knowledge m anagem ent
strategy, which includes services, methodologies, and solutions from Lotus and IBM, all
captured under the unifying them e of “people, places, and things.” The com pany can
create an em ployee profile detailing the em ployee’s specialty and his or her projects,
and then store the profile in a database that can be edited and accessed by users and
cow orkers via e-m ail, instant messaging, and conferencing setups. The req uirem ent
with R aven is for em ployees to update their respective profiles (databases) consis-
tently and regularly to m aintain the “knowledge portal.” If knowledge is not reinvested
in this m anner, it cannot be reliably created at a later time. Software update alone is
not the answer.
Raven provides a single portal that will allow end users and communities to find
and discover useful inform ation and applications on a given subject, m ake the user
aware of other know ledgeable people in the company, and organize all related tasks,
teams, and projects. With its unique architecture, it is capable of generating a content
map, creating expertise profiles, creating and hosting com m unities, clustering docu-
m ents, m ining skills, locating experts, and searching and browsing in a user-friendly
m anner. Such a KM tool can satisfy many of the user’s needs that might not be fulfilled
currently in the firm. O ne can plan to use such a product for the KM im plem entation.
H ow ever, to fit a firm ’s needs perfectly, an inform ation technology consultant should
be contacted for p roper fit.
benefits are endless. A com pany can leverage and m ore fully utilize intellectual assets.
It can also position itself in responding quickly to custom ers, creating new m arkets,
rapidly developing new products, and dom inating em ergent technologies.
A n o th er benefit of KM is the intangible return on knowledge sharing rather than
k now ledge h oarding. Too often, em ployees in one p a rt of a business start from
“sc ra tc h ” on a p ro je c t because the know ledge n e ed e d is som ew here else but not
know n to them . To illustrate one docum ented case, a departm ent of A T& T spent close
to $80,000 for inform ation that was available in a technical inform ation docum ent from
its associate company, Bell R esearch C orporation, for $13 (Skyrm e 1999,2).
As a result of KM, systems have been developed to gather, organize, refine, and
distribute know ledge throughout the business. In his study of Sm art Business, B otkin
(1999) suggests six top attributes of know ledge products and services:
• Learn.The m ore you use them , the sm arter they get and the sm arter you get, too.
• Im prove with use.These products and services are enhanced rather than depleted
when used, and they grow up instead of being used up.
• A nticipate.Knowing w hat you want, they recom m end w hat you might want next.
• Interactive.T here is two-way com m unication betw een you and them.
• Remember. They record and recall past actions to develop a profile.
• C ustom ize.They offer unique configuration to your individual specifications in
real tim e at no additional cost.
D uring the 1960s and 1970s, technology was focused on autom ating high-volume
static processes such as claims processing, m ortgage loan updating, airline reservation
systems, and the like. The em ergence of e-com m erce in the late 1980s and 1990s showed
how inform ation technology could im plem ent a new way of doing business effectively.
Ever-increasing processing power, high bandw idth data transm ission, and netw orking
m ade it possible to reenvision how business gets done. It has also changed the business
environm ent and introduced new com petitive imperatives. A m ong them are:
• Reacting instantly to new business opportunities, which led to decentralized deci-
sion m aking (and com petency) at the fro n t lines, where the action is. W ith that
cam e the desire to build m utual trust betw een know ledge w orkers and m anage-
m ent and to cooperate in handling tim e-sensitive tasks.
• B uilding better sensitivity to ubrain drain. ” It has been said that “expertise gravi-
tates tow ard the highest b id d er” (A pplehans et al. 1999,17). M ore and m ore com -
panies realize the im portance of m anaging and preserving expertise turnover. For
the hum an resources d epartm ent, the key question is “H ow does the firm replace
expertise w hen it retires, resigns, or simply leaves?”
• Ensuring successful partnering and core competencies with suppliers, vendors, cus-
tomers, and other constituents. Today’s technology has enabled com panies to
reengineer the ways to do business. G etting partners up to your speed requires
m ore than fast technology. K nowledge w orkers and others within the com pany
should ensure th at cooperation and coordination of workfare practiced for the
good of the firm.
W ith the expected depletion of highly know ledgeable w orkers due to the retire-
m ent of baby boom ers, KM will be im portant in the upcom ing years. It is essential that
organizations capture and preserve the know ledge of senior colleagues so that younger
em ployees can m ake im m ediate use of it and im prove upon it to m ake the business run
even m ore sm oothly and m ore efficiently. M errill Lynch has w orked to incorporate KM
to sh o rten the learning curve of its 18,000 brokers worldwide. The newly developed
36 • ■ ■ ■ PART I The Basics
know ledge-based system facilitates sharing of know ledge and quickly enables less-
trained brokers to achieve perform ance levels ordinarily associated with m uch m ore
experienced professionals. The system captures and disperses know ledge about trans-
actions, trading rules, yields, securities features, availability, tax considerations, and new
offerings. Sharing of this know ledge allows brokers to serve millions of clients w orld-
wide with sophisticated investm ent advice and detailed, up-to-date inform ation and
data. It acts as an instant training vehicle.
A ndersen Consulting (now Accenture) provides another example of a well-developed
know ledge-sharing system , called A N et. This electronic system connects em ployees
and encourages the sharing of knowledge. A N et allows an em ployee to use the total
know ledge of A ccenture (form erly A rth u r A ndersen) to solve a custom er problem
anyw here in the world through electronic bulletin boards and to follow up with visual
and data contacts. In theory, A N et expands the capabilities and knowledge available
to any custom er to th at of the entire organization. It further enhances em ployee p ro b -
lem-solving capacity by providing access to com piled subject, custom er-reference, and
resource files available either directly through the system or from C D -R O M s avail-
able to all offices. B ased on experience, A cc en tu re re p o rte d th a t technological
changes alone could not m ake A N et successfully used by employees. M ajor changes
w ithin the organization, such as changes in incentives and culture, w ere needed to cre-
ate participation. A sum m ary of KM justification is shown in Table 1.2.
Com panies that fail to em bed a viable KM operation probably suffer from several
oversights or pitfalls:
• Failing to m odify the com pensation system to reward people w orking as a team.
The traditional m ethod of com pensating people based on the old-fashioned
“inform ation-hoarding” practice does not work in a know ledge-sharing environ-
m ent. M erit increases and bonuses should be based on team contribution and
team perform ance rath er than quantity or volume.
• Building a huge database that is supposed to cater to the entire company.
G eneralized systems do not usually work well, because inform ation and know l-
edge are not stratified to address specialized areas of expertise. Ideally, the
hum an resources d epartm ent should first determ ine who works' best with whom
based on com m onality of job type or job experience and then discover the knowl-
edge th at can be shared for each em ployee to be m ore successful.
• Viewing K M as a technology or a hum an resources area. This oversight relates to
the earlier o n e —w here hum an resources and inform ation technology efforts are
poorly c o o rd in ated —and defeats the purpose behind em bedding KM into the
fabric of the organization. The two departm ents should w ork jointly at introduc-
ing KM as p art of the organizational processes.
• Placing too m uch emphasis on technology. A lthough intranets, know ledge-based
tools, data warehouses, and other com puter-based softw are are part of the way
to d ay ’s organization m ust adopt, technology is only the enabler of knowledge
m anagem ent. The know ledge it m akes available m ust be organized and dissemi-
n ated to hum an decision m akers to be of any use.
• Introducing K M into the organization via a sim ple project to m inim ize possible
losses. This is the wrong way to start KM. A com pany should start with a strategy
and a cham pion, with a focus on a worthwhile, high profile project that can set the
tone for the rest of the organization. It is a high risk approach, but one that is
m ost likely to pay dividends in the long run.
• Pursuing K M without being ready. Spurred by the paradigm shift in our economy,
many corporations pursue KM without evaluating w hether they are organizationally
ready (Stewart et al. 2000,45). In other words, corporations that have been operating
under classical managem ent principles cannot be successful in adopting KM without
m ajor changes in culture, m anagem ent attitudes, and communication skills.
• H aving p oor leadership. Like any high priority project, KM is best implemented with
determ ined cham pions and top m anagem ent com m itm ent. For example, G eneral
E lectric (G E ) recognizes an organizational culture open to ideas from all levels of
the company. By encouraging best-practice sharing, the com pany can grasp the
know ledge within the em ployees and innovate the organization’s processes. Jack
Welch, form er CEO , has established a knowledge m anagem ent university and fre-
quently teaches the classes himself. Only 10 percent of the 96 com panies surveyed
by the C onference B oard sponsored by Pricew aterhouseC oopers identified the
C E O as a com ponent of a KM initiative. By integrating the C E O of the company
into the KM system, KM acquires a level of im portance and respect that would
otherw ise be lacking. G E has incorporated all levels of the business and is well
designed to share knowledge. The com pany is successfully able to use em ployee
input and know ledge to produce a strategic advantage (Jones 1999,3-18).
The Drivers
W ith these ju stifications to consider, several key KM drivers are w orth noting.
Each driver m akes a com pelling case for KM.
decisions. Tomorrow’s successful companies are ones that use information technology to
leverage their employees’ knowledge in ways that make knowledge immediately available
and useful. It also implies quality maximization and cost minimization over the long term.
Process Drivers. O ne of the m ost critical sets of KM drivers is designed to improve
work processes. Im plied in this area is the elim ination of duplicate mistakes by learning
from the past and by transferring the best experiential knowledge from one location or
project in the firm to another. Starting from scratch with each project m akes no sense
in term s of efficiency, productivity, and value-added contribution to the com pany’s b o t-
tom line. The value of knowledge sharing is shown in Box 1.3.
A nother area w here KM can im prove process is the way com panies react to m ar-
ket changes. “Just in tim e” is one approach to minimizing investm ent in inventory and
m ore expeditiously m eeting the dem ands of the consum er. R esponsiveness th at
exceeds the com petition becom es the key co n trib u to r to differentiation. It requires
know ledge of co n tro l processes. KM m eans allow ing com panies to apply unique
know ledge that m akes them m ore responsive to m arket changes by the hour.
Personnel-Specific Drivers. This area of KM drivers focuses on the need to create
cross-functional team s of know ledge w orkers to serve anyw here in the organization
and minimize personnel turnover as a threat to collective knowledge. M ore and m ore of
what was once viewed as independent firms are now closely coupled. Products and ser-
vices are jointly handled from diverse disciplinary areas (such as packaging, m anufac-
turing, engineering, and technical skills), w here creative cooperation is essential for
innovation. B rainstorm ing, co m petitive response, and proactive p o sitio n in g —all
require collaboration and coordination of various tasks within and am ong corporations.
A n o th er personnel-specific driver is minimizing knowledge walkouts. Highly m ar-
k etab le em ployees with unique know ledge can spell d isaster for th eir em ployer.
C om petence drain that goes to the com petition is probably the worst that can happen
to a com pany struggling through the new knowledge economy.
K now ledge-R elated Drivers. Several KM drivers relate to the very concept of
know ledge sharing and know ledge transfer within the firm. They include revisiting
overlooked em ployee knowledge, making critical knowledge available at the time it is
needed, and finding a m echanism to expedite available knowledge for im m ediate use.
C om panies often know what they know but have difficulty locating it. Take the case of
a custom er who w anted to return a product that was initially purchased from the same
outfit in a different city to a local chain store. A code had to be entered into the com -
puter to debit the initial store by the price of the product and then credit the local store
by the same am ount. There was only one em ployee in the local store who knew the
code. She happened to be on vacation. The custom er service em ployee could not find
critical existing know ledge in time. So, she had to contact the other store for instruc-
tions on how to handle the returned item. Counting wait time and learning the proce-
dure took close to 1 hour, while the custom er was waiting.
F inancial D in e r s . As an asset, knowledge defies econom ic theory, where assets are
subject to diminishing returns over the long run. Knowledge assets increase in value as
m ore and m ore people use them . W ith this in m ind, know ledge follows the law of
increasing returns —the m ore knowledge is used, the m ore value it provides. KM pro -
vides a w orthw hile opportunity to integrate knowledge in a way that enriches the qual-
ity of decision m aking throughout the organization.
In the final analysis, the goal of KM is to produce a positive return on investm ent
in people, processes, and technology. It m eans m easurable efficiencies in production,
CHAPTER 1 Working Smarter; Not Harder ■■■i 39
SOURCE: Excerpted from Barth, Steve. “Learning from Mistakes,” Knowledge Management, April 2001, pp. 41-47.
sales, and services on a daily basis; im proving the quality of decision m aking at the
front lines; bringing your business partners up to speed; improving em ployee m orale to
ensure low turnover and effective decision making; and im proving custom er-em ployee
relations through b etter trust in know ledge w orkers’ expertise.
which to operate, because the business environm ent is constantly evolving at an alarm -
ing speed. To be successful, business firms must redefine and question their current
knowledge stored in corporate databases, while creating new practices to fit the busi-
ness environm ent. As a reaction to the questionable benefits from downsizing, business
process reengineering, and oth er cost-cutting m easures in the 1980s and 1990s, knowl-
edge m anagem ent surfaced as the best next step to addressing the com petition in a
hard-to-predict environm ent.
The inform ation rev o lu tio n has placed em phasis on sharing huge am ounts of
inform ation that is now accessible on the Internet. In a time of “e-everything,” infor-
m ation is accessible from business-to-business, business-to-consum er, and consumer-
to-consum er (M alhotra 2000). C orporate A m erica has begun to use this inform ation
availability to their advantage. E xternal relationships such as supply chain m anage-
m ent have been successfully used to im prove productivity and flexibility based on
sharing betw een suppliers and customers. C om panies have taken this idea of inform a-
tion sharing through KM to work within the firm. A ided by technology, employees now
can share knowledge internally, in an effort to m ake the corporation a m ore productive
enterprise.
KM is slowly gaining acceptance across industries. Several factors triggered inter-
est in KM:
• The pace o f change has accelerated dramatically during the past decade. C om pa-
nies are looking at innovative ways of taking on the com petition. Innovation is
the one core com petency needed by all organizations (D rucker 1969).
• Globalization and geographic dispersion changed the organization’s scope. M ore
and m ore organizations are trying to lean on years of experience to m anage their
global com m itm ent in a timely and profitable fashion.
• D ownsizing and reengineering resulted in sta ff attrition and knowledge drain. This
prom pted organizations to assess their knowledge core and m ake m ore effective
use of it. R eengineering assumed a one-tim e fix to a situation. This created a
vicious cycle, where solutions becam e new problems. It failed to recognize rapid
changes in tod ay ’s m arket.
• Netw orking and data com m unications m ade it easier and faster to share know l-
edge. Knowledge sharing is becoming the best way to distribute expertise across
and around the firm via technology. Technology alone is insufficient.
• The increasing dom inance o f knowledge as a basis fo r im proving efficiency and
effectiveness triggered m any companies to fin d the means fo r utilizing the know l-
edge they have gained fro m previous experience.
With these factors, it is easy to see how knowledge m anagem ent works for the sur-
vival of the firm. Knowledge is the key. It is the core com petence of any business. It is
a function that can and should be em bedded into every business process —new pro d -
ucts and services, new channels of distribution, new m arketing strategies, and new
industry definitions. Technology is the backbone, and hum an com ponents are neces-
sary to utilize it.
In a 2000 survey of 243 dom estic and international organizations by a leading con-
sulting firm, the goal was to assess the current status of KM in business. O ver two-
thirds of the respondents claimed they had a KM strategy in place. A m ong the high-
lights of the report are the following:
SOURCE: Excerpted from Robb, Drew. “Weaving Two into One,” Knowledge Management, April 2001, pp. 33-38.
looking back at the classical ways of doing business. A sum m ary of the key challenges
is shown in Table 1.3.
A final challenge is how to deal w ith tacit know ledge. A s we shall discuss in
C hapter 2, organizational learning helps us deal with tacit knowledge. U nfortunately,
m ost of the tim e is spent dealing with explicit knowledge. Tacit know ledge is difficult to
express and, therefore, difficult to codify, transfer, or share.
Like any other initiative, with challenges come KM tools or m ethods that take vari-
ous forms. The m ost com m on tools include the Internet and intranets, data warehousing,
docum ent repositories, best-p ractice repositories, datab ase m ining tools, work-flow
tools, work-flow applications, and online application-processing tools (Taft 2000,14).
T hese tools connect people to people and people to in form ation on a global basis.
Briefly, two key technologies are of special im portance:
• Installing an intranet is the first K M tool that allows com pany employees to access
a wealth o f inform ation fro m anywhere at anytim e to conduct business. Active
know ledge m anagem ent assures accuracy, currency, reliability, and integrity of
stored know ledge round the clock.
• D eveloping a videoconferencing system m akes it practicable fo r remote knowledge
workers to initiate a face-to-face discussion over a telecommunication netw ork
Such a setup is ideal for sales staff in the field or w orkers encountering problem s
on an offshore oil rig. L ater in the text, we discuss the kind of technology
required to m ake this interface possible.
A n im portant question that is often asked is “How would one know that KM ini-
tiatives are taking p lace?” Several indicators are w orth watching in a business:
• Em ployees throughout the organization sharing the best practices—through data-
bases as well as through personal interactions
• A know ledge center th at prom otes know ledge skills and facilitates knowledge
flow for all em ployees to use in know ledge sharing
• A fine-tuned intran et and groupw are facilities to expedite inform ation and
know ledge flow at all times, regardless of time, distance, or location.
• W orking know ledge team s from all departm ents or divisions, whose focus is iden-
tifying, developing, and prom oting ways to apply KM throughout the organization
R elated to KM initiatives are KM user issues w orth considering. W ith the user in
m ind, we need to question the processes required for KM success, organizationally and
technologically, and how a KM system is m easured to transform individual and team
know -how into w hat the firm should “know ” O ne solution is to develop taxonom ies of
organizational know ledge for easy knowledge transfer and distribution. Success can be
assured with a proven im plem entation plan based on experience.
Historical Overview
K now ledge has been the staple source of com petitive advantage for m any com pa-
nies for hundreds of years. For example, the idea of passing knowledge to an apprentice
from a m aster was used extensively during m edieval times. Passing the “family recipe”
th at m akes a certain product unique from one generation to another also attests to the
no tio n of know ledge tra n sfe r and know ledge sharing. A lth o u g h such tra n sfe r was
extrem ely slow, it opened the door to m odern m ethods of knowledge m anagem ent that
can exploit faster m edia of know ledge exchange, such as the Internet.
The recorded history of knowledge dates back to Plato and Aristotle, but its m odern-
day u n d erstan d in g is cred ited to scholars like D aniel Bell (1973), M ichael Polanyi
(1958,1974), Alvin Toffler (1980), and the Japanese guru, Ikujiro N onaka (1995). O ther
writers like Sveiby (1997) and Stew art (2000) prom oted the concept knowledge as the
core asset of an organization. A s we shall find in C hapter 2, Polyani and N onaka iden-
tify two kinds of knowledge: Tacit know ledge is highly experiential and is found in the
heads of em ployees, customers, and vendors; explicit knowledge can be found in books,
docum ents, d ata banks, co rp o rate policy m anuals, and the like. The learning process
involves the in tersectio n of b o th kinds of know ledge and the resulting know ledge
transform ation process.
In the 1960s, D ru c k e r coined the term s “know ledge w o rk ” and “know ledge
w o rk er” w hen he was discussing the role of know ledge in organizations. H e was the
first to suggest that the U.S. econom y has shifted from an econom y of production to a
know ledge economy, w here the basic resource is knowledge, not capital. This m eans a
shift to m arket-driven as opposed to product-driven orientation (D rucker 1969).
In the early 1970s, researchers at M IT and Stanford were analyzing ways in which
com panies produced, used, and diffused knowledge. This was the first essential step in
the evolution of know ledge m anagem ent, as we know it today. The idea of knowledge
being a corporate asset had not yet caught on, and it was not until the 1980s that com -
panies truly began to value knowledge. They also began to find ways to m anage know l-
edge through such technologies as artificial intelligence and expert systems. E xpert sys-
tem s had their heyday in the 1980s and early 1990s, w hen developers focused on trying
to develop “thinking m achines” to em ulate hum an experts rath er than using m achines
to im prove hum an thin k in g —the essence of KM.
D uring the 1990s, the onset of the Internet, the inform ation superhighway, allowed
KM to take off. The In tern et facilitated access to publications about the concept of KM
and how to im plem ent it. W ith the help of the Internet, KM becam e a feasible concept
for m any com panies. It p ro v id ed m ore o p p o rtu n itie s for know ledge sharing and
know ledge transfer than there had been in the past. In term s of methodology, KM was
briefly presented in total quality m anagem ent (TQ M ) and team w ork. Business process
reengineering (B PR ), downsizing, and outsourcing w ere also attem pts to im prove the
perform ance of the firm, although they had lim ited success. They resolved the produc-
tivity factor, but drained know ledge from the organization.
These attem pts w ere m ore like round one, w here com panies m anaged their know l-
edge assets in the sam e way they m anaged physical assets. Physical goods were stored
in the w arehouse, but for the intellectual equivalent, it was in the know ledge reposi-
tory. W hen d atab ases and “w areh o u ses” w ere full (to o m any physical assets), they
began thinking about supply chain m anagem ent (SCM ), trying to m atch the supply of
goods with dem and and reduce inventories to w hat was actually ordered for produc-
CHAPTER 1 Working Smarter; Not Harder a a 1 i 45
tion. It was m ore like rew arding the efficiency-driven prediction of the future based on
past tre n d s—doing things right. In contrast, in round two of KM, com panies began to
realize th at to fit the supply of knowledge to the dem and for it in products and services,
they needed to toy with how knowledge w orkers did their jobs. To be effective, KM has
to be “baked in to ” the job and be part of the fabric of the work to bring in knowledge
w hen n ee d e d and ex p o rt it anyw here in the o rg anization w hen it is acquired
(D avenport 1999,2). This is w here we began to see a shift from “doing things right” to
“doing the right thing” —working sm arter, not harder.
G iven the progress m ade in autom ating procedures in the 1970s and com m unica-
tions and netw orking (mostly through e-mail) in the 1980s, the focus of technology in
the 1990s was on cognitive com puting to augm ent the knowledge work of humans. O f
these, the In tern et and intranets have had the most profound im pact on spreading the
know-how. From a know ledge perspective, the Internet and accom panying technolo-
gies have dem onstrated several characteristics in knowledge m anagem ent:
• The Internet is an incredible in fo rm a tio n source. Internet access is available
worldwide. It m eans a com pany’s know ledge w orkers can access inform ation and
share know ledge anywhere, anyplace, anytime, w ithout delay
• W ith the W orld W ide Web, every user can share a n d update in fo rm a tio n at will. This
is especially attractive with the decreasing cost of com munications.
• The Internet uses a universal co m m u n ica tio n standard protocol. This protocol,
TCP/IP, m akes inform ation access and exchange accessible from anywhere there
is a com puter and an In tern et service provider.
• T he Internet p ro v id es qu icker interaction a n d co m m u n ica tio n with fe llo w k n o w l-
edge workers. This interaction can be one-on-one or as a group.
■■■« KM Myths
In contrast to what KM is, we have tried to clarify w hat KM is not. KM is not a separate
area or function in a business, represented by a KM departm ent or a KM process. KM
is interw oven into all of an organization’s processes. A lthough effective utilization of
technology is essential, KM is not constrained by collecting know ledge from dom ain
experts and building netw orked databases or databases supported by the com pany’s
intranet. Finally, KM is not defined in term s of the specific knowledge needs of every
employee, the relevant know ledge needed, or the knowledge to be shared.
There are several myths as well:
Myth 1: Knowledge m anagem ent is a fad. As m entioned earlier, there are m any pes-
simists in industry who doubt the “good fit” potential of KM. Being at a crossroads,
vendors push older softw are products under the KM label. B PR and artificial intelli-
gence had their positive turn, although they suffered from raised expectations. Unlike
earlier trends, however, true KM becom es em bedded in the way people work in busi-
ness. So, knowing w hat you know or w hat you need to know cannot be a fad.
Myth 2: Knowledge m anagem ent and data w arehousing are essentially the sam e.The
term data w arehousing implies a repository of data, not knowledge. Knowledge, p er se,
is how you take inform ation and transform it into action. D ata w arehousing is critical
for KM. It is w here data, critical docum ents, e-mail, and other forms of inform ation are
available for eliciting know ledge at the tim e w hen it is needed. For exam ple, Sears,
R oebuck & Co. has a custom er data w arehouse with dem ographic inform ation on over
100 million households to help the sales force im prove m arketing and sales quality. For
46 ■ a ■ a PART I The Basics
Myth 5: Technology can store and distribute human intelligence. D ata may be stored in a
centralized database for employee access, but that does not ensure that employees will use
the information. In a turbulent competitive environment, one cannot assume that compa-
nies can predict the right information for the right employee. So, it is hardly the case that
technology distributes human intelligence. It is impossible to build a KM system that pre-
dicts who the right person is and at what time he or she needs specific information for deci-
sion making. Tacit knowledge exists within a person’s brain; information or “knowledge”
stored within the database can be viewed as a valuable exchange between people to make
sense of a situation but should not be interpreted as human intelligence. In other words,
knowledge repositories stored in computers do not allow for renewal of existing knowl-
edge and creation of new knowledge. KM should be considered as a system to be used with
concentration on the human aspect aided by technology for decision making.
Myth 7: Company employees have difficulty sharing knowledge. The answer is yes and
no, depending on a num ber of factors: attitude of the knower, who the requester is, com-
pany culture, sensitivity of the knowledge requested, availability of attractive motivators,
and trust level among company personnel. U nder the traditional business model, employ-
ees with unique knowledge accumulated over years of experience tended to protect “tu r f ’
CHAPTER 1 Working Smarter; N ot Hardei 47
by not sharing such knowledge. In a KM environm ent, where knowledge sharing means
great potential for everyone including the organization, knowledge workers need to be
sold on how knowledge sharing will bring them m utual benefits. The term sharing means
“willingly giving away a p a rt” and “holding in common.” It is a “give to get” attitude, and
because “knowing” is personal, asking som eone to share is to ask him or her to give some-
thing of themselves. M ature or secure people in a stable work environm ent tend to share
knowledge m ore than others whose experience is to the contrary. Also, knowledge sharing
can improve bonds between people, provided the act of sharing is reciprocal.
Myth 8: K now ledge m anagem ent works only within an organization. O n the surface,
this may be true, but some of the m ost valuable know ledge comes from the outside —
suppliers, brokers, governm ent agencies, and customers. The problem with extending
KM initiatives to outside sources is incom patible technology, security issues, and com -
plexity of the design.
Myth 9: Technology is a b etter alternative than face-to-face. We have seen over the
years that when it comes to real-life experience and use of hum an knowledge, technol-
ogy does not hold all the answers. The emerging mind-set within today’s forward-looking,
creative organizations is th at KM m ust entail cultural and organizational change as
well as technology-based innovations. D ata w arehousing and data mining are all con-
trib u to rs to ex tractin g and sharing know ledge, b u t the best know ledge resides in
h um an minds. This m akes a face-to-face ap p ro ach to know ledge acquisition and
know ledge sharing a b etter alternative.
Myth 10: It is a “no brainer” to share what you know. In general, secure and m ature peo-
ple are less reluctant to share what they know with others. U nfortunately in traditional
business, people with years of experience tended to hoard knowledge rather than share it,
because it gave them leverage, control, and assurance of a job. Furtherm ore, “knowing” is
personal. To ask people to share know ledge is tan tam o u n t to expecting them to give
something of themselves. Sharing knowledge often depends on who the requester is* how
sensitive is the knowledge requested, the attitude of the “knower,” and the motivational
forces at play. To share knowledge, the business has to undergo special employee training,
instill trust within the business, and give employees and m anagem ent a chance to cement
relationships based on trust. A summary of the KM myths is shown in Table 1.4.
■« » « KM Life Cycle
KM goes th ro u g h a series of steps, m aking up an ongoing life cycle. The four-step
process, sum m arized in Table 1.5, includes gathering, organizing, refining, and dissem -
inating. These and alternative approaches to the KM life cycle are explained in detail
in C hapter 3.
The capturing phase deals with knowledge capture and includes e-mail, audio files,
digital files, and the like. In this phase, it is im portant to go to all the sources available
and never judge the usefulness of the captured know ledge until after it is subjected to
exhaustive testing. In this phase, KM systems are an ideal approach to eliciting and rep -
resen tin g know ledge in to a form th a t can be available to m any users —a key KM
process. This process is discussed in detail in later chapters.
A fter the capturing phase, captured data or inform ation should be organized in a
way that can be retrieved and used to generate useful knowledge. O ne can use index-
ing, clustering, cataloging, filtering, codifying, and other m ethods to do the organizing.
Speed, user-friendliness, efficiency of access, and accuracy are im portant elem ents to
consider throughout the organizing phase.
A fter organizing the inform ation, it should be refined. D ata m ining can be applied
in this phase. D ata m ining takes explicit know ledge found in databases and transform s
it into tacit knowledge. D ata-m ining software is used to find patterns in data, predict
behavior, and w arn against future problem s based on the data supplied in data w are-
houses. For exam ple, the sales records for a particular brand of tennis racket might, if
sufficiently analyzed and related to o th er m arket data, reveal a seasonal correlation
with the purchase by the sam e parties of golf equipm ent.
A fter the refining phase, know ledge should be dissem inated or transferred. This
includes m aking know ledge available to em ployees via tutorials or guidelines for effec-
tive use. Predictive m odels can be designed to alert users to consequences of certain
projects or hum an resource activities. The key point is not to let stored or available
know ledge sit idle in a repository like a database. It should be available to authorized
users to contribute to the corporate com petitive advantage.
Figure 1.6 shows the relationship betw een the KM life cycle and four key areas in
th e org an izatio n . T aken to g e th e r, one can u n d e rsta n d a viable set of relationships
betw een KM and m anagem ent decision making, organizational culture, organizational
personnel, and inform ation technology. A s we shall see in C hapter 3, each area could
have an im pact on the way KM is installed and m aintained in the organization.
To p rom ote a know ledge m anagem ent environm ent, com panies m ust consider cul-
tural, social, and organizational changes as well as technological support. They m ust
also add systems and applications in their IT infrastructure in the interest of integra-
tion and know ledge sharing. For this reason, m ore and m ore com panies are beginning
to recognize the im portance of know ledge m anagem ent systems. This area is covered
later in the text.
O ne area th at a com pany m ust address is how to m anage its intellectual capital—
the sum of know ledge of the hum an resources of the organization. As we shall find in
C hapter 2, the know ledge found in policy m anuals, case histories, training m aterials,
and em ployees’ heads is the m ost valuable asset of the com pany in term s of replace-
m en t costs. To d evelop and m ain tain this know ledge is extrem ely costly. U nless a
com pany review s its core know ledge and takes steps to m anage it, it is subject to
p o ten tial disaster resulting from resignations, turnover, loss of its com petitive edge,
and the like.
Finally, in the grand schem e of things, the trend tow ard know ledge sharing is good
for cow orkers, for the com pany, and for society as a whole. The key converter from
hoarding know ledge to sharing know ledge is trust. To gain a com petitive advantage in
an unpredictable environm ent, we m ust learn to m aster the art of knowledge sharing
and know ledge m anagem ent. E fforts can be realized only if there is follow-through.
C o rp o rate culture m ust change first. K now ledge is not a technology, but an activity
enabled by inform ation technology and produced by people. Com panies must commit
to changing their corporate structure by assigning know ledge workers, whose responsi-
bilities include m otivating and organizing the corporate, to adapt to a new way of busi-
ness that transcends the entire landscape.
Summary 1 1 1 1
• Today’s know ledge age brings with it an increasingly complex business environ-
m ent worldwide. C om panies need to address know ledge sharing, knowledge
collaboration, and know ledge dissem ination to be able to com pete in an un-
predictable m arketplace.
• KM is the process of gathering and m aking use of a firm ’s collective expertise
anyw here in the business. A firm seeks to add value by creatively identifying,
applying, and integrating know ledge in unprecedented ways.
• KM is not about reengineering, discipline, or one based on inform ation only. It is
not a fad or a way of appeasing em ployees around an em ployee-oriented concept.
It is about change, and tom orrow ’s business is the nam e of the game. People are
the determ inants of KM success.
• T here is plenty of justification for KM. K now ledge sharing m eans faster process-
ing, no duplication of effort, and reacting m ore responsively to new business
opportunities. It also m eans ensuring successful partnering and core com petencies
with suppliers, vendors, custom ers, and other constituents.
• Com panies that fail to install a KM environm ent could be guilty of using the old
rew ard system, having a database that lacks focus, having poor coordination of
the IT or hum an resources effort, choosing the w rong project, and having poor
leadership.
• There are several drivers that provide a com pelling case for adopting KM: tech-
nology, process, personnel-specific, know ledge-related, and financial drivers. In
the final analysis, the goal of KM is to produce a positive return on investm ent in
people, processes, and technology.
52 m i PART I The Basics
• Several factors triggered interest in KM: need for innovation, globalization, easier
navigation with telecom m unications, and the increasing dom inance of knowledge
as a way of im proving efficiency and effectiveness of the firm.
• KM dates back to Plato and A ristotle, although its m odern-day understanding
began in the 1960s. D uring the 1990s, the onset of the Internet, the inform ation
superhighway, allowed KM to take off. Q uicker interaction and com m unications
with fellow know ledge workers, w hether one-on-one or as a group, m ade it all
possible.
• Several KM m yths have been cited in an effort to clarify what KM is not. Once
the concept becom es widely accepted and the KM process becom es standardized,
m ost of these myths should disappear.
• The KM cycle essentially begins with knowledge gathering, followed by know l-
edge organization, know ledge refinem ent, and know ledge transfer. The role of
trust is critical throughout the entire life cycle. In C hapter 3, the KM life cycle,
including know ledge m aintenance and update, will be discussed in detail.
Terms t o K n o w 1 1 1 1
Downsizing: Reducing the physical, personnel, and func- knowledge workers to serve anywhere in the organiza-
tional processes of an organization in an effort to tion and minimize personnel turnover as a threat to
improve its efficiency through reduced costs and collective knowledge.
improved performance. Process driver: A driver or a motivator designed to
Financial driver: A driver or a motivator that views improve work processes through KM.
knowledge assets as something increasing in value as Reengineering: One-shot drastic “electrical shock”
more and more people make use of it. change in organizational processes to improve effi-
Intellectual capital: The value of a company’s trademarks, ciency; a mechanical shift from one stage of operation
patents, brand names, and the like; a company’s collec- to a more efficient stage.
tive brainpower or a composite of experience, knowl- Supply chain management: The integration of all activi-
edge, information, and intellectual property. ties associated with the flow and transformation of
Internet: A system of interconnected data communication goods from the raw materials to the customer as well as
or computer networks on a global basis. the related information flows.
Knowledge management: The process of gathering and Technology driver: A driver or a motivator designed to
making use of a firm’s collective expertise wherever it use technology for storing and transferring knowledge
resides—on paper, in databases, or in people’s heads. throughout the organization.
Knowledge-related driver: A driver or a motivator that Trust: A feeling of confidence in another person;
relates to the concept of knowledge sharing and knowl- having confidence or faith in another person or in
edge transfer within the firm. a relationship.
Knowledge-sharing: A process of transferring human Videoconferencing: A computer-based system designed
knowledge about a process or a procedure to others in to simulate face-to-face meetings with two-way full-
the organization; ability and willingness of people to motion video along with two-way audio. Participants
exchange specialized experience with others for the can view one another during long-distance conferences
common good of the organization. or meetings.
Personnel-specific driver: A driver or a motivator that
focuses on the need to create cross-functional teams of
Test Y o u r U n d e rsta n d in g * * 1 1
1. Select one definition of KM in Figure 1.2 and explain the reason(s) for your
choice.
2. KM involves people, technology, and processes in overlapping parts. Explain
the KM concept.
3. O ne u n iq u e in d icato r of KM in action is seeing peo p le think ahead, not
behind. D o you agree with this statem ent? Explain why you agree or disagree.
CH A PTER 1 Working Smarter, Not Harder a a a ■ 53
K n ow led ge Exercises * a 1 *
1. Suppose you w ere asked to do a 15-minute presentation before the m anagers
of a small retailer about the pros and cons of knowledge m anagem ent. W hat
would you say? O utline the content of your talk.
2. H ow easy do you think it is to understand know ledge m anagem ent? Why?
3. S earch th e In te rn e t and c u rren t jo u rn a ls for surveys th a t show how well
com panies are adopting (or struggling w ith) KM. R ep o rt your findings in
class.
4. H ow should a com pany assess its know ledge core? D etail a procedure that
can be sold to top m anagem ent.
5. W hat do you think distinguishes to d a y ’s know ledge age from th a t of the
inform ation age of the 1980s and 1990s?
6. Search the literature, including the Internet, and prepare a three-page report
on som e of the problem s in developing and im plem enting a know ledge m an-
agem ent system.
7. In your own words, describe the im plications th at a know ledge m anagem ent
system has on an industry of your choice.
8. W orking w ith a classm ate, conduct an interview or a telep h o n e survey
regarding a local business’s
a. fam iliarity with KM
b. level of literacy in KM
9. A business m anager, a program m er, and a psychologist all w ant to becom e
KM designers. W hich do you feel will have the least difficulty? Why?
10. A car dealer who has just learned about know ledge m anagem ent thinks it
could be ideal for separating “tire-kickers” from serious buyers. W ould this
be a typical KM application? W hy?
11. V isit a sm all business (such as a h ard w are sto re or a bak ery ) and stay
long enough to get a feel for the info rm atio n exchanged, custom er q u es-
tions, and the way the business is run. W rite a short rep o rt about the core
know ledge of th e business. A re th e re know ledge w orkers th ere or just
clerks?
54 aaaa PART I The Basics
12. Find cases or current inform ation on trends in KM by searching the Internet.
Locate a com pany that is reported to have succeeded (or failed) in going the
KM route. W rite a three-page report sum m arizing your findings.
13. Visit a local bank (not a branch) and identify know ledge workers. W hat is
unique about know ledge w orkers? H ow do you distinguish them from regu-
lar em ployees?
R ef er en c es a a a a
Applehans, Wayne, Globe, Alden, and Laugero, Graig. Man- Newman, B. “Managing Knowledge: The HR Role,” HR
aging Knowledge. Boston, MA: Addison-Wesley, 1999. Executive Review, vol. 6, no. 4,1999, pp. 3-18.
Bair, Jim. “Knowledge Management Technology: Beyond Nonaka, Ikujiro. The Knowledge-Creating Company.
Document Management,” www.strategy-partners.com/ London: Oxford University Press, 1995.
spweb/pages.nsf/all+pages/White %20Paper%20% O ’Dell, Carla S., Essaides, Nilly, Ostro Nilly (contributor),
20Knowledge%20Management%20Technology: C. Grayson (preface). I f Only We Knew What We
% Beyone% 20Document%20M anagement?open Know: The Transfer o f Internal Knowledge and Best
document, Date accessed August 2002. Practice. New York: Free Press, 1998.
Barth, Steve. “Learning from Mistakes,” Knowledge Man- Polanyi, Michael. Knowing and Being. Chicago: The
agement, April 2001, pp. 41^17. University of Chicago Press, 1974.
Bell, Daniel. The Coming o f Post Industrial Society. Polanyi, Michael. Personal Knowledge: Toward a Post-
London: Oxford University Press, 1995. Critical Philosophy. Chicago: The University of
Bexar County. “Information Technology Industry Trend,” Chicago Press, 1958.
www.co.bexar.tx.us/bcis/Documentation/DOC_It_ Robb, Drew. “Weaving Two into One,” Knowledge
Industry_Trends/doc_it_industry_trends.htm, Date Management, April 2001, pp. 33-38.
accessed August 2002. Skyrme, David J. “Knowledge Networking,” The
Botkin, James. Smart Business: How Knowledge Intelligent Enterprise, November 1999, pp. 9-15.
Communities Can Revolutionize Your Company. Skyrme, David. “Knowledge Management: Making It
New York: Free Press, 1999. Work,” www.skyrme.com/pubs/lawlib99.htm, Date
Brooking, A. Intellectual Capital. London: Thompson accessed August 2002.
Press, 1996. Stewart, Kathy, et al. “Confronting the Assumptions
Craig, Robert. “Knowledge Management Comes of Age.” Underlying the Management of Knowledge: An
ENT, vol. 5, April 2000, pp. 36-37. Agenda for Understanding and Investigating
Davenport, Tom. “Knowledge Management, Round Two,” Knowledge Management,” The Data Base for Advances
CIO Magazine, November 1,1999, pp. 1-4. in Information Systems, Fall 2000, pp. 41-45.
Deveau, Denise. “Knowledge Is Business Power,” Com- Stewart, Thomas A. Intellectual Capital: The New Wealth
puting Canada, vol. 26, no. 8, April 14,2000, p. 14. o f Organizations. New York: Doubleday Press, 1997.
Drucker, P. F. The Age o f Discontinuity. New York: Sveiby, Karl-Erik. “Intellectual Capital and Knowledge
H arper Publishing, 1969. Management,” www.sveiby.com/articles/Intellectual
Glasser, Perry. “The Knowledge Factor,” CIO Magazine, Capital.html, Date accessed August 2002.
January 1999, pp. 12-18. Sveiby, Karl-Erik. The New Organizational Wealth:
Gravallese, Julie. “Knowledge Management,” The M IT R E Managing and Measuring Knowledge-Based Assets.
Advanced Technology Newsletter, vol. 4, no. 1, April New York: Berrett-Kohler, 1997.
2000, pp. 1-3. www.mitre.org/pubs/edge/april_00, Date Taft, Darryl. “Stopping Knowledge Overflow —
accessed August 2002. Knowledge Management Tools Still in Developmental
Hersey, Ian. “Need: Net-Speed Knowledge Tools,” Phase,” Computer Reseller News, February 2000, p. 14.
Electronic Engineering Times, September 4,2000, p. 90. Taylor, Christie. “Intellectual Capital,” Computerworld,
Hibbard, Justin. “Knowing What We Know,” March 12,2001, p. 51.
InformationW eek, O ctober 20,1997, p. 46. Toffler, Alvin. The Third Wave. New York: Bantam
Johnson, Cindy. Director of Collaboration and Knowledge Books, 1980.
Sharing at Texas Instruments. Interview February 2,2002. Trepper, Charles. “Keep Your Knowledge In-House,”
KPMG Consulting. Knowledge Report 2000, November 1999. InformationW eek, September 4,2000, p. 55.
Malhotra, Yogesh. “Knowledge M anagement for the New Whiting, Rick. “Myths and Realities,” InformationW eek,
World of Business,” www.brint.com/km/whatis.htm, November 22,1999, p. 42ff.
D ate accessed August 2002.
Understanding
Knowledge
Contents
In a N utshell
D efinitions
Knowledge
Intelligence
E xperience
C om m on Sense
C ognition and Know ledge M anagem ent
D ata, Inform ation, and K now ledge
D ata
Inform ation
K nowledge
Types of Knowledge
Shallow and D eep Knowledge
Know ledge as K now -H ow
Reasoning and H euristics
C om m on Sense as K now ledge
From Procedural to Episodic K nowledge
Explicit and Tacit Know ledge
E xpert Knowledge
C hunking Knowledge
K now ledge as an A ttrib u te of Expertise
H um an Thinking and L earning
H um an L earning
L earning by E xperience
Learning by Exam ple
Learning by D iscovery
Im plications for K now ledge M anagem ent
Sum m ary
Terms to Know
Test Your U nderstanding
55
i ■ PART I The Basics
Knowledge Exercises
R eferences
In a Nutshell
The most critical w ord in the KM area is knowledge. U nfortunately, there is a continu-
ing m yth that know ledge resides only in books, reports, or documents. This cannot be
true, any m ore than viewing musical notes on a page constitutes music. W hat we have
h ere are rep resen tatio n s of inform ation and music, respectively. W hat do we m ean
when we talk about know ledge? Two key issues are distinguishing betw een knowledge
and inform ation and determ ining how they are interrelated. Knowledge is neither data
nor inform ation, although it is related to both. The term s are not interchangeable, and
knowing w hat is needed often determ ines organizational success or failure.
This chapter exam ines the concept of knowledge as the heart of an organization’s
p roductivity and grow th and discusses the classifications of know ledge. In tellig en t
behavior implies the ability to u nderstand and use language and to store and access
relevant experience at will. H um ans acquire expertise—that is, they learn via experi-
ence. E x p ertise in c o rp o ra te s the ability to reaso n and to m ake deductions; it also
includes the concept of com m on sense. This m akes hum an intelligence and the know l-
edge that hum ans amass over time the prim ary organizational asset. A n organization’s
technology or telecom m unications netw ork is only a vehicle for know ledge transfer
and know ledge exchange; it cannot replace hum an knowledge.
A n essential criterion of knowledge and learning is memory. Learning by discov-
ery is less understood than learning by experience or by example. Several approaches
to learning are covered later in the chapter. A knowledge base is a critical com ponent
of know ledge m anagem ent. K nowledge developers need 10 understand the theory and
m eaning of know ledge early in the knowledge capture phase and becom e fam iliar with
the unique kinds of know ledge available in the corporation under study. It should be
pointed out th at an ex p ert’s know ledge is not lim ited to inform ation or complex pro -
cedures. K now ledge em braces a w ider sphere than inform ation. Likewise, a knowledge
base is not the sam e as a database. A database has a predeterm ined structure; a know l-
edge base is a set of facts and inference rules for determ ining new inform ation and
“sm arter” know ledge for decision making.
K now ledge as know -how may be either shallow or deep knowledge. It may also be
p rocedural, declarative, sem antic, or episodic know ledge. M ore recently, know ledge
has been classified as explicit or tacit knowledge. All these classifications are covered
in the chapter.
A n o th e r goal of this ch ap ter is to show th at hum an know ledge and logical p ro -
cesses can be captured and rep resented in a valid way to solve certain kinds of p ro b -
lems. (The w ords valid and validity as used in the text do not have the same m eaning
as truth. A conclusion, for exam ple, follows logically from facts and rules using infer-
ence procedures; it can be a false, or not correct, conclusion, even though it may still be
a valid one.)
C HAPTER 2 Understanding Knowledge a i i ■ 57
m i Definitions
B efo re discussing know ledge and its m any ram ifications, kn o w le d g e needs to be
defined in relation to intelligence, experience, and c o m m o n sense.
KNOW LEDGE
We define k n o w le d g e as “u n d erstan d in g gained th ro u g h experience or study.” It is
“know -how ” or a fam iliarity with how to do som ething th at enables a person to p er-
form a specialized task. It may also be an accum ulation of facts, procedural rules, or
heuristics. These elem ents are defined as follows:
• A fact is a statem ent of some elem ent of truth about a subject m atter or a domain.
For example, milk is white and the sun rises in the east and sets in the west are facts.
• A procedural rule is a rule th at describes a sequence of relations relative to the
main. For exam ple, always check the traffic when entering a freeway; if the gas
gauge indicates less than a q u arter of a tank of gas, look for a gasoline station.
• A heuristic is a rule of thum b based on years of experience. For example, if a p er-
son drives no m ore than 5 miles above the speed limit, then that person is not
likely to be stopped for speeding.
A beneficial aspect of knowledge is that it can com pensate for some search time. A
hum an expert who knows a set of solutions can get a job done without much searching for
information. Conversely, a hum an novice in a video game searches a vast num ber of alter-
native moves at each juncture because he lacks experiential knowledge. Unfortunately,
without the aid of knowledge that allows the novice to immediately eliminate inappropri-
ate approaches, this m ethod encompasses too many approaches to evaluate.
A n o th er aspect of know ledge is specificity; it cannot be transferred from one pro b -
lem dom ain to another. Therefore, one m ust have the surgeon’s know -how to repair a
heart valve, the auto transm ission specialist’s know -how to replace a reverse gear, and
the p a in te r’s know -how to create an accom plished portrait. These kinds of extensive
know ledge are referred to as tacit kn o w le d g e and often take m any years to acquire.
Finally, values, beliefs, and integrity are related to knowledge. This has a lot to do
with w hat the know er perceives, accepts, and concludes from the environm ent. People
g enerally o rganize and synthesize th e ir know ledge by th e ir values. N o n ak a and
Takeuchi suggest th at “know ledge, unlike inform ation, is about beliefs and com m it-
m e n t” (N onaka and Takeuchi 1995). M ore recently, we began to attach integrity to the
w hole process of know ledge capture, know ledge sharing, and know ledge m aintenance.
Integrity m eans reliability, trustw orthiness, privacy, and confidentiality. Integrity cuts
across the discipline, regardless of com pany size or resources.
INTELLIGENCE
Intelligence refers to the capacity to acquire and apply knowledge. It is the ability to build
or improve upon knowledge, to transform as much of on e’s knowledge as possible into
knowledge that can be used to m ake good decisions. A n intelligent person is one who has
the ability to think and reason. This distinction separates the novice from the m aster in a
game like chess. Knowledge conversion is directly responsible for much of the expert’s
efficiency in applying knowledge and for the difficulty of m aking it explicit.
C onsider this exam ple: R ecent research into the true m eaning of intelligence illus-
trates very well the difficulty of defining the term . The organization doing this research
decided to get to the bottom of the question once and for all and, given its im portance,
58 a a a i PART I The Basics
assigned its m ost senior scientist to it. The esteem ed scholar spent several m onths con-
ducting this research. A t the end of that period, the scientist gathered a num ber of col-
leagues together, held up in front of them the artificially intelligent artifact chosen as
the subject of the research, and said, “Ladies and gentlem en, this is a therm os bottle. It
keeps hot stuff hot, and it keeps cold stuff cold. My question is, how does it know ?”
A bility to u n d e rsta n d and use language is a n o th e r a ttrib u te of intelligence.
Language understanding is not easy to acquire, especially for the existing technology.
For exam ple, consider the statem ent, T h e city o f F a irm o u n t is u n d er 6 fe e t o f water:
D oes this m ean th at the city is com pletely underw ater, with the tallest building below
the w ater level? A n o th er exam ple is the statem ent, T he su n b ro k e through the clouds.
H ow literally should one in terp ret this statem ent? O f course, both the m eaning of the
words and the context of the statem ents determ ine how a read er should understand
the messages. Prior know ledge and com m on sense also en ter the picture.
Memory, or the ability to store and retrieve relevant experience at will, is part of
intelligence. H ow th e b rain sto res and retriev es in fo rm atio n or know ledge is still
unclear. Later, the text includes a discussion of knowledge organization and how it is
exploited in the KM building life cycle.
Learning is know ledge or skill th at is acquired by instruction or study. It is the
inevitable consequence of intelligent problem -solving. Intelligent people learn quickly
and m ake effective use of w hat they learn. Inasm uch as problem -solving and knowl-
edge organization have been successfully dem onstrated in the business enterprise, the
sam e success has yet to be shown in technology or com puter programs. People learn
from experience; to date, com puters have not.
EXPERIENCE
Experience relates to w hat we have done and what has historically happened in a spe-
cific area of work. In Latin, the w ord experience m eans “to put to the test.” People with
deep know ledge in a given subject have been tested by experience. Experience also
leads to expertise. Think of Sherlock H olm es investigating a m urder. The goal is to find
the m u rderer. H o lm es’s reasoning and deductions rely on all evidence collected; he
w orks backw ard from the goal until the suspect is caught. E xpertise is also intuition
and the ability to access o n e ’s knowledge rapidly to achieve an efficient and successful
outcom e.
E x p erien ce is closely re la te d to know ledge. K now ledge develops over tim e
through successful experience, and experience leads to expertise. A n expert is som eone
who knows w hat he or she does not know and is the first one to tell you so. Firms hire
experts to benefit from th eir experience and proven know ledge in solving com plex
problem s. P eo p le use ex p erien ce to change facts into know ledge, which se p arates
novices from experts. E xceptions do occur, how ever. Bach, for exam ple, was expert
m usician at 5 years of age. In general, w ithout experience, one would hardly be consid-
ered an expert. E xperience in using know ledge allows people to refine their reasoning
processes in a know ledge m anagem ent environm ent.
CO M M O N SENSE
Common sense refers to the unreflective opinions of ordinary humans, which comes
naturally to a child as young as 3 or 4 years old. For example, m ost youngsters know
th at if they touch a hot stove, they will get burned. In contrast, a com puter could be
told all kinds of things about hot stoves and the effect of heat on the hum an skin, and it
still would not perceive w hat would happen if it “to uched” a hot stove: M achines lack
com m on sense. C om m on sense is not easily learned or acquired
C H A PTER 2 Understanding Knowledge ■■■i 59
Lack of com m on sense m akes technology “b rittle ”; th at is, com puters rarely go
beyond the scope of their data w arehouse or know ledge base. M any im portant projects
assum ed by hum ans in business today require com m on sense, which is only partially
understood by to d ay ’s com puter. Table 2.1 sum m arizes these concepts.
take knowledge elicitation (also called knowledge capture) seriously, they should have
a strong educational and practical background in cognitive psychology and cognitive
processes. Knowledge capture techniques are covered in Chapter 4.
DATA
D ata are unorganized and unprocessed facts. They are static; they just sit there. For
example, John is 6 feet ta ll This is data; it does not necessarily lead one anywhere..
However, the meaning one brings to the evaluation of this data could be important.
Such an evaluation may indicate that John’s height would make him an asset to the
basketball team. This becomes information.
D ata is a set of discrete facts about events —structured records of transactions.
When a customer goes to the store and buys merchandise, the number of socks and the
price he or she paid are all data. The data tells nothing about the motivation behind the
purchase, the quality of the socks, or the reputation of the store. Quantitatively, stores
evaluate patterns of purchases, num ber of customers purchasing specific items, and
other items those custom ers purchased. Evaluations such as these can be used to
derive information about customer behavior, the price-sensitivity of certain merchan-
dise, and the like. This means that data is a prerequisite to information.
All organizations need data, and some companies depend more heavily on data
than others. For example, insurance companies, banks, the internal revenue service, and
the social security administration are heavy number crunchers. Millions of transactions
are processed daily. The problem with too much data is that it offers no judgment and
no basis for action. This means that an organization must decide on the nature and vol-
ume of data needed to create information.
INFORMATION
The word information is derived from the word inform , which means “to give shape to”;
information means shaping the data to arrive at a meaning in the eyes of the perceiver.
Information is an aggregation of data that makes decision making easier. It is also facts and
figures based on reformatted or processed data. For example, a profit and loss statement
provides information. It is an assembling of facts into a form that shows an organization’s
state of health over a specific time period. Here is another example of information:
Five farmers o f northern Beirut, who had switched crops from watermelon to
sugarcane with the high hope o f a quick profit , could not bear the anguish o f
crop failures fo r two consecutive seasons. They committed suicide after having
to sell the farm to pay the bank loan.
CHAPTER 2 Understanding Knowledge aaaa 61
KNOWLEDGE
Knowledge has always been an essential component of all human progress. Our ances-
tors must have em ployed an enorm ous am ount of knowledge to form an axe-like
object. From know-how to use seeds for planting to the invention of machinery, to
travel to the m oon—all required an accumulation of special knowledge to achieve the
task. When it comes to basics, people use their intelligence and creativity to come up
with the value-added products and services that take on the competition. Knowledge
capital is essentially a reflection of how well an organization leverages the knowledge
of its workforce, the needs of its customers, and the knowledge of the suppliers to
ensure value-added outcome. Knowledge capital is the way an organization derives
wealth from its information resources on a regular basis.
Knowledge is the most cherished remedy for complexity and uncertainty. It is a
higher level of abstraction that resides in people’s minds. It is broader, richer, and much
harder to capture than data or information. People seek knowledge, because it helps
them succeed in their work.Tiwana views knowledge as actionable (relevant) informa-
tion available in the right format, at the right time, and at the right place for decision
making (Tiwana 2000).
Knowledge has different meanings, depending on the discipline where it is used. In
this text, knowledge is “human understanding of a specialized field of interest that has
been acquired through study and experience.” It is based on learning, thinking, and
familiarity with the problem area in a departm ent, a division, or in the company as a
whole. The focus is on sustainable competitive advantage. Knowledge is not informa-
tion, and information is not data. Davenport and Prusak (2000) define knowledge as “a
fluid mix of framed experience, values, contextual information, and expert insight that
provides a framework for evaluating and incorporating new experiences and informa-
tion.” See Figure 2.1 for alternative definitions of knowledge, data, and information.
O ther characteristics of knowledge are summarized in Box 2.1.
Knowledge is derived from information in the same way information is derived
from data. It may be viewed as an understanding of information based on its perceived
im portance or relevance to a problem area. It can also be thought of as a person’s
range of information. Embracing a wider sphere than information, knowledge includes
perception, skills, training, common sense, and experience. It is the sum total of our per-
ceptive processes that helps us to draw m eaningful conclusions. For example, an
investor requires knowledge to evaluate two companies’ profit and loss statements in
order to determine which one is the healthier company.
PART I The Basics
a ■ i i v ■ b o x 2.1 a a a i i i
SOURCE: Excerpted from Acharya, Jagabandhu. “What Is Knowledge?” kmx.totalkm.com/whatisk.html, April 27,2001, pp. 2-5,
Date accessed August 2002.
purpose but drawing on experience from other times and domains. Cooperation and pro-
ductivity are expected as people work to achieve, not to control.Teamwork is a prerequisite
for people to talk, compare, and exchange thoughts, leading to a culture that makes it clear
that “What is my job?” is less important than “What is the purpose of what I am doing?”
Knowledge, not information, can lead to a competitive advantage in business.
Information is thus closer to the decision-making process than is data. For example,
64 a ■ ■ ■ PART I The Basics
Nonalgorithmic Nonprogrammable
(heuristic)
Wisdom
Knowledge
(actionable information)
Algorithmic Programmable
SOURCE: Anonymous.
a i i i PART I The Basics
Types of Knowledge
K n o w led g e is cla ssified in to a variety o f types. W h en co n sid erin g k n o w led g e m a n a g e -
m en t, the k n o w le d g e d e v e lo p e r sh o u ld be fam iliar w ith each ty p e and k n ow h o w to tap
into it during k n o w le d g e capture.
Deduction makes use of major and minor premises. Almost any argument
can be formed using this type of reasoning process. Here are two examples:
a. Major premise: Each titanium coil leaving the mill must be 100 percent
quality tested.
M inor premise: One part of the coil has not passed the test.
Conclusion: The entire coil should be rejected.
b. M ajor premise: In Turkey, all citizens get a pension from age 60 on.
M inor prem ise: Kamal Elberlik, age 60, is a citizen of Turkey.
Conclusion: Elberlik is receiving a pension.
As is evident from the examples, the idea behind deductive reasoning is to
generate new knowledge from previously specified knowledge. If the original
rule is true, then the deduction will be valid. If a knowledge base, for example,
uses only deductive inference and the information assimilated is true, then one
can depend on all the inferred conclusions to be valid. Unfortunately, much of
common-sense reasoning (explained later) is nondeductive by nature.
In terms of inductive reasoning, it works the other way around. Inductive rea-
soning is reasoning from a set of facts or individual cases to a general conclusion—
from specific examples to general rules. Inductive reasoning is the basis of scien-
tific discovery. Consider the following examples:
a. Premise: Chronic unemployment causes social problems.
Premise: Illiteracy causes social problems.
Premise: Recession causes social problems.
Premise: Drug trafficking causes social problems.
Conclusion: Chronic unemployment, illiteracy, recession, and drug traffick-
ing cause social problems.
b. Premise: He is an avid fisherman.
Premise: He is an avid hunter.
Premise: He is an avid mountain climber.
Conclusion: He likes outdoor sports
c. Premise: Admission depends on status.
Premise: Admission depends on race.
Premise: Admission depends on appearance.
Premise: Admission depends on financial wealth.
Conclusion: Admission is subjective.
In each example, the inference is an induction: It goes from a finite number
of instances to a conclusion about every member of a class.
3. Case-based reasoning (CBR). Suppose a person was diagnosed with a condition
that required major surgery. How would that person choose a surgeon? People
tend to prefer an older surgeon with years of practical experience over someone
fresh out of residency. The younger surgeon might be well versed in book
knowledge, but experience is a better predictor of success among surgeons.
Their experience is judged based on the number of cases they handled and the
success of each case.
The idea of reasoning from relevant past cases is attractive because it is so similar
to the process human experts often use to solve problems successfully. The process of
choosing a surgeon indicates the perceived importance of case experience in expert
problem-solving. Manipulating past problem-solving examples is critical in problem
areas such as law, medical diagnosis, prediction, design, and process control. Because
68 i a « a PART I The Basics
experts tend to forget over time, capturing these cases in a knowledge base means
reaping future benefits from past successes (and failures) of experts’ work.
For years, knowledge developers have claimed that human experts reason about a
problem by recalling similar cases encountered in the past. In fact, they reason by anal-
ogy: The expert tries to figure out how one case is similar (or dissimilar) to other cases
solved in the past. A case is knowledge at an operational level. It is an episodic descrip-
tion of a problem and its associated solution. Box 2.3 illustrates an instance of human
CBR, in which the reasoner (the father, who is also an attorney) uses previous cases
similar to the current case as precedent to get the judge to dismiss the case.
1 I 1 i I 1 BOX 2.3 i ■ ■ 1 1 i
find this type of knowledge useful in the early phase of knowledge capture, because it
promotes familiarity with the type of expertise of the human expert. The best way to
acquire declarative knowledge is with a structured interview.
Semantic knowledge is a deeper kind of knowledge. It is highly organized, “chun-
ked’' knowledge that resides in long-term memory. Such knowledge may have been
there for years and may have been used so often that the information seems like sec-
ond nature. Semantic knowledge includes major concepts, vocabulary, facts, and relation-
ships. Returning to the headlight and battery example, semantic knowledge about the
system would consist of understandings about the battery, battery cables, lights, the
ignition system, and so forth, and their interrelationships. On the basis of this knowl-
edge, one can build rules about causal relationships among those things. In the case of
the headlights, one might know that dim headlights can be caused by a loose battery
cable, a bad alternator, or a drain on the electrical system. At this point, a real expert
(in this case, a certified mechanic) enters the picture (see Figure 2.4).
a a a a PART I The Basics
Declarative Knowledge
Surface-type information that is available in short-term
memory and easily verbalized; useful in early stages of
knowledge capture but less so in later stages.
Semantic Knowledge
Hierarchically organized knowledge of concepts, facts, and
relationships among facts.
Episodic Knowledge
Knowledge that is organized by temporal spatial means,
not by concepts of relations; experiential information that
Deep is chunked by episodes. This knowledge is highly compiled
Knowledge and autobiographical and is not easy to extract or capture.
Declarative Knowledge
Therefore
Headlights Battery
Are Dim Is Faulty
Semantic Knowledge
CHAPTER 2 Understanding Knowledge i aaa 71
m i Expert Knowledge
Most people realize that knowledge cannot be directly observed. What can be
observed is the expertise that relies on knowledge to produce solutions. A person with
expert knowledge can solve a complex problem more quickly and more effectively
than someone else can. When the expert’s advanced skills and years of experience are
enhanced by attention to detail, quality results. Not surprisingly, most experts are per-
fectionists. They want the solution to be exactly what is called for by the problem.'
Expert knowledge is not just a head full of facts or a repository of information for
the intellect. It is information woven into the mind of the expert for solving complex
problems quickly and accurately. Take the case of chess experts. They not merely rec-
ognize thousands of chessboard moves, but they consider them in ways relevant to
playing the game. These are all finely tuned to the requirements of the game. The pat-
terns experts learn to recognize are also unique, and the possibilities they consider all
tend to be good ones. It is obvious that a good problem-solving strategy depends on
how much you know.
CHUNKING KNOWLEDGE
Knowledge is stored in an expert’s long-range memory as chunks. Knowledge compila
tion, or chunking, enables experts to optimize their memory capacity and process
information quickly. Chunks are groups of ideas or details that are stored and recalled
together as a unit. For example, an auto mechanic who had been rebuilding Porsche
transmissions for 18 years was able to rem em ber 140 different steps flawlessly.
Although the sequences and combinations were difficult for him to describe, he consis-
tently completed each job according to specifications.
Chunking prom otes expert performance. The more chunking a person does, the
more efficient is his or her recall. The drawback is that chunking makes it difficult for
experts to be aware of their own knowledge so that they can describe it to others. For this
reason, decompiling chunked knowledge and putting it into words is not an easy task.
are more selective in the information they acquire, are better able to acquire infor-
mation in a less-structured situation, and agree more than novices regarding the in-
form ation they consider im portant for decision making or problem-solving (Shan-
teau 1988).
Aside from quantifying soft information, knowledgeable experts tend to catego-
rize problems on the basis of solution procedures (as opposed to surface procedures),
embedded over time in the expert’s long-range memory and readily available on recall.
Because of this strategy, experts tend to use knowledge-based decision strategies, start-
ing with known quantities to deduce unknowns. Should a first-cut solution path fail, the
expert can trace back a few steps and then proceed again —a valuable process in decid-
ing on the appropriate action(s).
In contrast, nonexperts use means-end decision strategies to approach the same
problem situation. They focus on goals instead of essential features of the task, making
the job laborious and unreliable (Sweller, et al., 1983). The net effect is that experts
seem to demonstrate better-developed procedural knowledge for problem-solving. If
procedural knowledge is appropriate for the problem, experts proceed to encode and
finalize a decision more quickly and effectively than nonexperts. As a result, experts
reason differently and solve problems more quickly than nonexperts. Experienced cab
drivers, for example, will recognize a shorter route while traveling to their destinations
and tend to take that route even though the rider m isinterprets such a m aneuver
(Awad 1999).
Taken at face value, experts are the beneficiaries of the information or knowledge
that comes inevitably from experience rather than innate talent bestowed upon the
select few who eventually become experts in their specialty. Experts work harder, rely
less fully on routines, and seem to be engaged in extending their knowledge rather than
merely exploiting it. With knowledge as an attribute of expertise, the focus is not only
on what it includes but also on how it is acquired and how it works. Within the hidden
knowledge of experts are declarative, procedural (skill), and episodic (heuristic)
knowledge (Awad 1999). Procedural knowledge manifests itself in perform ance;
episodic knowledge is the invisible knowledge lying in long-range memory. It repre-
sents years of proven experience in a domain.
In a nutshell, certain individuals consistently perform at higher levels than others
and are labeled experts. They possess attributes that account for their outstanding per-
formance. W hether these attributes are innate talent or w hether they are acquired
through knowledge, practice, and experience, there is reason to believe that experts
succeed primarily because of their proven knowledge and how well they apply and
upgrade it on a daily basis. The conceptual model in Figure 2.5 essentially suggests that
academic knowledge contributes to conceptual knowledge, which is a prerequisite for
practical (in the field) knowledge. Practical knowledge is a contributor to experience
that over time leads to expertise. Expertise means minimum or no errors in decision
making or problem-solving.
The main conclusion regarding corporate experts is for the company to find ways
to retain them by various means, such as recognition, bonuses, and giving an opportu-
nity for mentorship, knowledge sharing, creativity, independence, ability utilization,
and the like (see Box 2.4). The key phrase is knowledge sharing. Mechanisms must be
installed to encourage the sharing of expertise throughout the organization, and there
must be strong support from upper m anagem ent. W ithout such effort, brain drain
could be devastating for a forward-looking organization operating in an uncertain
environment.
74 ■ ■ ■ ■ PART I The Basics
I I I ■ I ■ BOX 2.4 ■ ■ ■ ■ ■ ■
SOURCE: Excerpted from Cuthbertson, Bruce. “Prospective for Experts,” Knowledge Management, June 2001, p. 30.
a a ■ a ■ ■
CHAPTER 2 Understanding Knowledge aai « 75
HUMAN LEARNING
Memory is an essential component of learning, because it accommodates learning. One
interesting aspect of healthy human memory is that it never seems to run out of space.
Also, as humans acquire more and more knowledge, they generally experience little
interference with the recall ability or the quality of the inform ation in memory. In
other words, as people learn new facts, they integrate them in some way with what they
think is relevant and organize the resulting mix to produce valuable decisions, solu-
tions, or advice. Such learning ability is the basis of accumulating knowledge, experi-
ence, and expertise.
For humans, learning occurs in one of three ways: learning by experience, learning
by example, and learning by discovery. The next section explores these types in an
effort to see how they contribute to human knowledge.
LEARNING BY EXPERIENCE
The ability to learn by experience is a mark of intelligence. When an expert is selected
whose knowledge someone wants to acquire, the expert is expected to have years of
experience reworking problems and looking into different angles for solving difficult
■ ■ ■ a PART I The Basics
problems. One way of testing potential experts is to observe their recall ability.
Experts, who know a lot about a particular problem, have been found to remember
facts in that problem area much more easily and more quickly than nonexperts, who
presumably have fewer facts to recall. This type of information would be important for
the knowledge developer to keep in mind when understanding a human expert’s range
of knowledge.
LEARNING BY EXAMPLE
Like learning by experience, learning by example is a good contributor to accumulating
knowledge over time. In learning by example, specially constructed examples are used
instead of a broad range of experience. Much classroom instruction is composed of
teaching by example—providing examples, cases, or scenarios that develop the concepts
students are expected to learn. Because this method allows students to learn without
requiring them to accumulate experience, it is more efficient than learning by experience.
LEARNING BY DISCOVERY
Learning by discovery is less understood than learning by example or by experience. It
is an undirected approach in which humans explore a problem area without advance
knowledge of the objective. No one understands why humans are so good at this. It is
difficult to teach, and it will be years before we can benefit from this approach com-
mercially. Table 2.3 summarizes the three types of learning.
tion, recommending ways to preserve this critical core, and building a robust, long-
range plan to ensure top-quality operation. Without such preparation, corporate talent
could potentially erode through a brain drain that spells disaster for any business. At
the same time, professionals with expertise are naturally drawn to organizations that
recognize and reward expertise, especially when that expertise directly contributes to
the firm’s productivity. Such matches explain the stability and growth of many success-
ful “learning” companies.
Based on the discussion in the chapter, several ideas should be considered for
how a com pany should perform in order to create and m aintain sustainable com-
petitive advantage. First, there should be more emphasis on tapping, sharing, and pre-
serving tacit knowledge and the total knowledge base of the company. A com-
pany’s knowledge base includes explicit and tacit knowledge and exists internally in
the business as well as within the firm ’s external connections. Second, companies
should focus on innovation and the processes that convert innovation to new products
and services. Knowledge sharing and an emphasis on the total knowledge base pro-
mote innovation.
Finally, it is important to consider a renewed focus on organizational learning sys-
tems and systemic thinking throughout the organization. This is a realistic expectation,
because knowledge is closely related to learning, which is the outcome of regular and
continuous interactive learning. Systems thinking means understanding how the vari-
ous parts of the company work. This includes learning behavioral patterns in the sys-
tem and the culture or system environm ent in which employees and administrators
operate. In other words, systemic thinking is expected to support innovation and con-
tinuous im provem ent processes, social competence, and interactions, as well as the
total knowledge base.
What good is knowledge if it cannot be shared? If knowledge is power, sharing
it will multiply power across the business. Unfortunately, sharing knowledge is an un-
natural thing. One person’s knowledge is an added value to that person’s career path.
Knowledge management is designed to solve the problem of unrecycled knowledge.
Systems have been developed to gather, organize, refine, and distribute knowledge
throughout the business. Virtually all such systems should have six key attributes:
learning capability, improving with use, knowing what you want, two-way communica-
tion between the system and you, recalling past actions to develop a profile, and unique
configuration to your individual specifications in real time.
In the final analysis, communication and connection make knowledge sharing an
ongoing activity. Technology can only do so much to create a formal system. Success
with KM exists when the culture is ready to communicate and connect. The end result
is “community,” built around knowledge and based on vision.
S u m m a ry 1 1 , 1
• Intelligent behavior has several attributes:
• The ability to understand and use language
• The ability to store and retrieve relevant experience at will
• Learning by example, from experience, or by discovery
• Several key terms are worth noting:
• K now ledge —understanding gained through experience
• Intelligence—the capacity to apply knowledge
78 i a i a PART I The Basics
T er ms to Kn o w ■■■■
Case: Knowledge at an operational level; episodic Inferencing: Deriving a conclusion based on statements
description of a problem and its associated that only imply that conclusion.
solution. Intelligence: The capacity to acquire and apply knowl-
Case-based reasoning: A methodology that records and edge through the ability to think and reason.
documents previous cases and then searches the rele- Knowledge: Understanding, awareness, or familiarity
vant case(s) to determine their usefulness in solving a acquired through education or experience.
current problem; problem-solving a case by analogy Learning: Knowledge or skill acquired by instruction
with old ones. or study.
Chunking: Grouping ideas or details that are stored and Learning by discovery: Acquiring new ideas by exploring
recalled together as a unit. a problem area with no advance knowledge of what is
Common sense: Possessing common knowledge about being sought.
the world and making obvious inferences from this Learning by example: Acquiring new ideas based on spe-
knowledge. cially constructed examples or scenarios.
Compilation: The way a human translates instructions Learning by experience: Acquiring new ideas based on
into meaning language or response. hundreds of previously stored concepts.
Decision support systems (DSS): Computer-based infor- Logic: The scientific study of the process of reasoning
mation systems that combine m odels and data for solv- and the set of rules and procedures used in the reason-
ing complex problems with extensive user involvement. ing process.
Declarative knowledge: Surface information that experts Memory: The ability to store and retrieve relevant experi-
verbalize easily. ence at will.
Deductive reasoning: A lso called exact reasoning; takes Premise: Provides the evidence from which the conclu-
known principles (exact facts) and applies them to sion must necessarily follow; evaluates the truth or
instances to infer an exact conclusion. falsehood with some degree of certainty.
Deep knowledge: Knowledge based on the fundamental Procedural rule: A rule that describes a sequence of rela-
structure, function, and behavior of objects. tions relative to the problem area.
Episodic knowledge: Knowledge based on experiential Reasoning: The process of applying knowledge to arrive
information chunked as an entity and retrieved from at solutions based on the interactions between rules
long-term memory on recall. and data.
Experience: The factor that changes unrelated facts into Scenario: The formal description of how a problem situa-
expert knowledge. tion operates.
Expert: A person whose knowledge and skills are based Semantic knowledge: Highly organized, “chunked”
on years of specialized experience. knowledge that resides in the expert’s long-term mem-
Expertise: The skill and knowledge possessed by some ory and represents concepts, facts, and relationships
humans that result in performance that is far above among facts.
the norm. Shallow knowledge: Readily recalled knowledge that
Explicit knowledge: Knowledge codified in documents, resides in short-term memory.
books, or other repositories. Short-term memory: The part of the human brain that
Fact: A statement of a certain elem ent of truth about a retains information for a short period of time.
subject matter or a problem area. Tacit knowledge: Knowledge used to create explicit
Heuristic: A rule of thumb based on years of experience. knowledge; the mind-set of individuals that
Inductive reasoning: Reasoning from a given set of facts includes intuitions, values, and beliefs that stem
or specific examples to general principles or rules. from experience.
Test Y o u r U n d e r s ta n d in g 1 1 , 1
1. If intelligence is the capacity to acquire and apply knowledge, what is
knowledge?
2. Briefly explain the key attributes of intelligent behavior.
3. Distinguish between:
a. fact and rule
b. knowledge and common sense
c. experience and heuristics
d. learning by example and learning by discovery
80 ■* i « PART I The Basics
K n o w le d g e E xercises « • • 1
1. “People do not think in the same way as machines, because people are bio-
logical.” Do you agree?
2. What type of knowledge is used in each of the following activities:
a. tying a shoelace
b. debugging a computer program
c. baking a pie
d. replacing a car’s flat tire
e. negotiating peace with a hostile country
f. driving in congested traffic
Explain each classification.
3. List five heuristics that you employ in everyday life. By what kind of learning
have you arrived at these rules of thumb?
4. Determine the type of reasoning in each of the following cases:
a. Liz did not deposit money in her checking account.
Liz is a customer of the bank.
Liz’s check bounced (insufficient funds).
Conclusion: Checks drawn against a negative account balance will bounce.
b. Drivers who exceed the speed limit get speeding tickets.
Donna is a licensed driver.
Donna drove her car 20 miles over speed limit.
Conclusion: Donna will get a speeding ticket.
(What is wrong with this reasoning?)
c. A customer whose account balance drops below $100 during the month
is subject to a $5 charge.
Bob is a bank customer.
Bob has a checking account.
Bob’s checking account balance dropped to $98.
Conclusion: Bob’s account will be charged $5.
R e fe re n c es 1 1 1 1
Applehans, Wayne, Globe, Alden, and Laugero, Graig. Awad, Elias M. Selected Attributes o f the Domain Expert.
Managing Knowledge. Boston, MA: Addison- Unpublished manuscript 1999, pp. 1-13.
Wesley, 1999. Chiem, Phat. “Trust Matters," K nowledge Management,
Acharya, Jagabandhu. “What Is Knowledge?’' May 2001, pp. 50-52.
kmx.totalkm.com/whatisk.html, April 27,2001, pp. 2-5, Cuthbertson, Bruce. “Prospective for Experts," K nowl-
D ate accessed August 2002. edge Management, June 2001, p. 30.
CHAPTER 2 Understanding Knowledge ■a a a 81
Davenport,Thomas H., and Prusak, Laurence. Working July/August 1998, pp. 58-60, www.brint.com/km/
Knowledge. Boston, MA: Harvard Business School whatis.htm, Date accessed August 2002.
Press, 2000, pp. 1-24. Minsky, Marvin. “Conscious Machines." In Machinery o f
Dixon, Nancy M. Com m on Knowledge. Boston, MA: Consciousness Proceedings, National Research Council
Harvard Business School Press, 2000, pp. 12-13, of Canada, 75th Anniversary Symposium on Science in
17-32. Society, June 1991.
Foster, Allan. “Grasping the Tacit Knowledge Nettle." Nonaka, Ikujiro, and Takeuchi, Hiro. The Knowledge-
Knowledge M anagement, April 1998, p. 32. Creating Company: How Japanese Companies Create
Garvin, David A. Learning in Action. Boston, MA: the Dynam ics o f Innovation, New York: Oxford
Harvard Business School Press, 1999, pp. 47-90. University Press, 1995.
Hayes, J. R. The Complete Problem Solver. Philadelphia, Pfeffer, Jeffrey, and Sutton, Robert. The K nowing-D oing
PA: Franklin Institute Press, 1981. Gap. Boston, MA: Harvard Business School Press,
Holsapple, C. W., and Whinston, A. B. Decision Support 2000, pp. 5,12,181.
Systems. Minneapolis, MN: West Publishing Co., 1996. Roberts-Witt, Sarah. “Knowledge Everywhere,"
pp. 11-124. K nowledge M anagement, June 2001, pp. 36-41.
Horibe, Frances. Managing K nowledge Workers. New Shanteau, James, “Psychological Characteristics and
York: John Wiley & Sons, Inc., 1999, pp. 1-18. Strategies of Expert D ecision Makers.” Acta
Housel,Thomas, and Bell, Arthur. Measuring and Man- Psychologica, vol. 68,1988, pp. 203-15.
aging Knowledge. New York: McGraw-Hill, Inc., 2001. Simon, H. A., and Chase, W. G. “Skill in Chess," American
Johannessen, J. A., 01ais£n>Johan, and Olsen, B. Scientist, vol. 61,1973, pp. 3 9 4 ^ 0 3 .
Mismanagement o f Tacit K now ledge, www.program. Sveiby, Karl-Erik. “Tacit Knowledge." D ecem ber 31,1997.
forskningsradet.no/skikt/johannessen.php3, www.sveiby.com/articles/polanyi.html, Date accessed
Date accessed August 2002. August 2002.
Koulopoulos,T. M., and Frappaolo, Carl. Smart Things to Sweller, John, Mawyer, R. F., and Ward, M. R.
Know A bout Knowledge Management. Milford, CT: “D evelopm ent of Expertise in Mathematical Problem
Capstone Publishing, 2000, pp. 37-66. Solving," Journal o f Experimental Psychology: General,
Lenat, Douglas B. K nowledge-Based Systems in Artificial D ecem ber 1983, pp. 639-61.
Intelligence. New York: McGraw-Hill Book Co., 1982. Tiwana, Amrit. The K nowledge Management Toolkit.
Liebeskind, J. P. “Knowledge, Strategy, and the Theory of Upper Saddle River, NJ: Prentice Hall, 2000, pp. 55-98.
the Firm," Strategic Management Journal, Winter 1996, Witt, Roberts. “Knowledge Management: Know What
pp. 93-107. You Know," PC M agazine, July 1,2000, p. 165.
Malhotra, Yogesh. “Knowledge Management for the New
World of Business." Journal fo r Quality & Participation ,
Knowledge
Management
Systems Life Cycle
Contents
In a Nutshell
Challenges in Building KM Systems
Conventional Versus KM System Life Cycle
Knowledge Management System Life Cycle (KMSLC)
System Justification
Role of Rapid Prototyping
Selecting An Expert
Role of the Knowledge Developer
Role of Quality Assurance
User Training
Implications for Knowledge Management
Summary
Terms to Know
Test Your Understanding
Knowledge Exercises
References
The building of knowledge management can be viewed as a life cycle that begins with
a master plan and justification and ends with a system structured to meet KM require-
ments for the entire company. A knowledge team representing the thinking of the firm
and a knowledge developer with expertise in knowledge capture, knowledge design,
and knowledge implementation ensure a successful system. Lack of planning, struc-
ture, and order can invite disaster.
The most critical phase of the KM systems life cycle is identifying the immediate,
intermediate, and long-term needs for the prospective system. This means reviewing
the knowledge core of existing employees; conducting a cost/benefit analysis to deter-
mine the justification for and potential benefits of the candidate system; and determ in-
ing the tools and the procedures to ensure completeness, accuracy, integrity, and opera-
tional success of the installation.
The knowledge m anagem ent systems life cycle (KMSLC) centers around three
questions:
1. What is the problem that warrants a solution by the KM system? How important
is the problem? What clues indicate that the system should be built? What will
the user and the company as a whole gain from the system?
2. W hat developm en t strategy should be considered? Who is going to build the
system?
3. What process will be used to build the system?
These questions are interrelated, and they lead to other questions when the knowl-
edge developer gets involved in the system development process. In deciding on a KM
system, it is im portant to consider top m anagem ent support early in the planning
phase. Employee support and participation through the knowledge capture phase also
make it easier to navigate through the development process. This chapter focuses on
the strategic planning and the justification for KM system developm ent and the
process of building it.
The concept of “life cycle” is not new. It can be applied to virtually every endeavor,
personal and business. Here are some examples:
College: Admission, education, graduation
Term paper: Introduction, body, conclusion, references
Air flight: Boarding, takeoff, cruising, landing, disembarking
Faculty: Assistant professor, associate professor, professor
Information system
development: Problem definition, analysis, design, implementation
These life cycles have some characteristics in common:
• Discipline, order, or segmentation into manageable activities or phases
• Good documentation for possible changes or modifications of the system in the
future
• Coordination of the project to ensure the cycle is completed on time
• Regular management review at each phase of the cycle
Structure and order are to KMSLC what chapters and paragraphs are to a book.
Can you imagine trying to read this book if the paragraphs occurred in random order?
You would be exposed to the same material, but it would lack order and, therefore,
84 a a ■ a PART I The Basics
meaning. In the same way, a well-defined life cycle is essential for successful develop-
ment and maintenance of knowledge management in a business environment.
BOX 3.1 a 1 I I fl 1
SOURCE: Excerpted from Glasser, Perry. “The Knowledge Factor,” CIO Magazine, December 1 5 ,1998-January 1,1999. pp. 1-9.
a a a a a a
CHAPTER 3 Knowledge Management Systems Life Cycle aaaa 85
i a a i i a bo x 3.2 a a a a a a
SOURCE: Excerpted from Glasser, Perry. “Knowledge Factors,” CIO Magazine, December 15,1998-January 1,1999, p. 3.
a a a a a a
a a a a a a bo x 3.3
SOURCE: Excerpted from Glasser, Perry. “The Knowledge Factor,” CIO Magazine, December 15,1998-January 1,1999, pp. 6-7.
Key Differences
Some striking differences distinguish conventional systems development from KM
system development:
1. The systems analyst deals with data and information obtained from the user. The
user is highly dependent on the analyst for the solution (a conventional infor-
mation system). The knowledge developer deals with knowledge captured from
people with known knowledge in the firm. The developer is highly dependent on
them for the solution.
2. The main interface for the systems analyst is with the novice user, who knows the
problem but not the solution. In contrast, the main interface for the knowledge
developer is the knowledgeable person who knows the problem and the solution.
There is no comparable expert in a conventional information system process.
3. Conventional system development is primarily sequential; that is, particular steps are
carried out in a particular order. Design cannot be initiated without analysis, testing
cannot be done without a design, and so on. In contrast, KMSLC is incremental and
interactive. A KM system is not built in a few large steps; rather, it evolves toward a
final form. Rapid prototyping as a knowledge capture tool plays a major role in KM
system evolution. The flowcharts in Figure 3.1 illustrate these differences.
4. In the development of conventional information systems, testing occurs toward
the end of the cycle after the system has been built. In KMSLC, the knowledge
CHAPTER 3 Knowledge Management Systems Life Cycle a ■■■ 87
FIGURE 3.1 1 Comparison of the Development Life Cycles of a Conventional Information System Life
Cycle and a KM System Life Cycle
developer tests (verifies and validates) the evolving system from the beginning
of the cycle.
5. The discipline of system developm ent and system m aintenance is much more
extensive for conventional information systems than it is for KMSLC. KM system
maintenance is delegated to knowledge editors, whose job is to ensure a reliable
system and to upgrade the system to standards.
6. The conventional system life cycle is process-driven and documentation-oriented,
with emphasis on the flow of the data and the resulting system. It fosters the
“specify then build” approach. The KMSLC is result-oriented. The emphasis is on
a “start slow and grow” incremental process.
7. Conventional system development does not support tools like rapid prototyping
because it follows a set sequence of steps. KMSLC utilizes rapid prototyping (to
be explain later in the text), incorporating changes on the spot, which augments
and refines the KM system until it is ready for use. Thus, the prototype evolves
I The Basics
Repeated
Cycle(s)
Repeated fl fl fl i fl fl
Cycle(s) ■— “ ™1
into the final KM system. As shown in Figure 3.2, in knowledge capture, tasks are
structured, and the knowledge sought is reform ulated until the knowledge
worker or the resident expert judges that it is right. This process promotes verifi-
cation of the KM system. Verification answers the question, Is the system built
right? The final test is validation, which ensures that authorized users are satisfied
with what the KM system offers.
Key Similarities
Although obvious differences exist between the conventional information system
development life cycle and KMSLC, so, too, do certain similarities:
1. Both cycles begin with a problem and end with a solution. The problem solution
is pitched to benefit the company user and the organization as a whole.
2. After setting up the strategic plan, the early phase of the conventional system life
cycle begins with information gathering to ensure a clear understanding of the
problem and the user’s requirem ents. In KMSLC, the early phase requires
knowledge capture, which later becomes the foundation of the knowledge base.
Both information and knowledge must be represented in order for a system to
produce results.
3. Verification and validation of a KM system resemble conventional system test-
ing. Verification ensures that the KM system is clear of errors. This is similar to
alpha testing or debugging a conventional system program(s). In contrast, KM
system validation and conventional system beta (user acceptance) testing ensure
that the system meets the user’s requirements prior to deployment.
4. B oth the knowledge developer and the systems analyst need to choose the
appropriate tools for designing their respective systems. Choice of tools and
methodologies will be covered in Chapter 4.
1. Analyze existing infrastructure Team performs a task Acquiring Build knowledge Acquisition
knowledge
2. Align knowledge management Team explores the re- Interpreting Organize and hold Dedicated
and business strategy lationship between knowledge resources
action and outcome
3. D esign the knowledge infra- Common knowledge Applying Distribute and Fusion
structure gained knowledge pool
4. Audit existing knowledge Knowledge transfer Apply knowledge Adaptation
assets and systems system selected to work object
5. Design the KM team Knowledge translated Knowledge
into a form usable networking
by others
6. Create the KM blueprint Receiving team adapts
knowledge for its
own use
7. D evelop the KM system
8. Deploy, using the results-driven
incremental m ethodology
9. Manage change, culture, and
reward structures
10. Evaluate performance, measure
ROI, and incrementally refine
the KMS
90 ■ ■ ■ ■ PART I The Basics
Form the KM team Who should be on the team? Standardized procedure for
How will the team function? system development
Test the KM system How reliable is the system? Peer reviews, walkthroughs
Manage change and reward D oes the system provide the Satisfied users
structure intended solutions?
1 1 1 « ■ 1 BOX 3.4
■ ■ ■ a a i
92 ■ ■ ■ ■ PART I The Basics
SYSTEM JUSTIFICATION
The goal of this step is for the knowledge developer to justify whether it is worth
undergoing the kinds of changes and investment that ensure top management support.
KM system justification involves answers to specific questions:
be small enough for the knowledge developer’s capabilities, especially if it is the orga-
nization’s first attempt at developing a KM system. It must also be completed quickly
enough for the users to foresee its benefits. A complex, drawn-out project whose devel-
opment takes months and years is likely to falter on the way to completion or cause the
user to lose patience and interest, which makes training and successful use difficult.
As part of the scoping factor, several areas must be included:
• Readiness of the company’s current technology. This includes intranet, local area
networks, extranet (a company’s extended network connecting suppliers, cus-
tomers, and salespersons), decision support tools, and other information technol-
ogy tools.
• Identification of gaps and areas needing improvement in current technology to
see how well such technology will match the technical requirements of the pro-
posed KM system.
• General review and understanding of the benefits and limitations of KM tools
and components that become part of the feasibility study.
BOX 3.5
In summary, the first step in the KMSLC is to decide what is wanted, identify the
goals of the proposed system, assess feasibility, plan how to begin, locate a champion,
inform users and their m anagers of the project, and gain their support within the
scope of the project. Above all, every KM system must begin with ready knowledge,
knowledgeable experts ready to work with a knowledge developer in building the
infrastructure.
CHAPTER 3 Knowledge M anagement Systems Life Cycle u mmm 97
Costs
Payback 2 3 06 4 08
System developm ent 4 4 16 3 12
System operation 3 4 12 3 09
User training 5 5 25 3 15
99 78
Business Strategic
Environment Plan
Knowledge Capture
In the third step in the KMSLC, knowledge capture takes on several directions and
meanings. Briefly, explicit knowledge is captured in repositories from documentation,
files, and other media. In contrast, tacit knowledge is captured from company experts
and from knowledge stored in databases for all authorized employees. D ata mining
also enters the picture in terms of using intelligent agents that analyze the data ware-
house and come up with new findings that could lead to new products or services.
The focus of Chapter 5 is on capturing tacit knowledge by using various tools and
methodologies. Knowledge capture involves eliciting, analyzing, and interpreting the
knowledge that a human expert uses to solve a particular problem. It corresponds to
systems analysis in conventional system development. In both cases, interviews with
knowledgeable people are used to capture information and knowledge. Sometimes,
interviewing the ultimate user of the knowledge management system is just as impor-
tant as interviewing the expert whose knowledge you are trying to capture.
In KM system development, the knowledge developer acquires heuristic knowl-
edge from the expert(s) in order to build the knowledge base. In Chapter 4, we discuss
problems and procedures in the knowledge capture process. For example, the user has
more to gain from the knowledge base than the expert who is helping to build it. The
expert hands over years of knowledge for a system that someone else will use. The bene-
fits are not the same, which explains some experts’ lack of cooperation and motivation
throughout the system development life cycle.
Knowledge capture and transfer are often carried out through teams, not just
through individuals. As shown in Figure 3.6, common knowledge is created by asking a
100 ■ i ■ a PART I The Basics
team to perform a task. A fter the outcom e is achieved, the knowledge developer
explores with the team the relationship between team action and outcome. If the team
agrees that common knowledge has been gained, it becomes available in a knowledge
base by translating it into a form usable by others in the organization. It can be in the
form of a document, a case with rules and parameters, or a scenario.
Knowledge capture plays a unique role in various phases of the KMSLC. As shown
in Table 3.4, knowledge capture includes determining feasibility, choosing the expert,
tapping the expert’s knowledge, and retapping knowledge to plug gaps in the system
and to verify and validate the knowledge base after the system is in operation. So, in
KMSLC, knowledge capture is an evolving step, not a one-time, front-end step as it is
in conventional information system development.
4. Verify and validate the KM system • Correct for knowledge integrity and
work closely with expert through rapid
prototyping
6. Manage change and reward structure • Reinforce change and reward compliance
through human resources
SELECTING AN EXPERT
In expressing their differing views about the nature of expertise, some argue that the
entire breadth of human expertise must be studied before attempting to capture the
knowledge necessary to build a knowledge base. Others support a narrower focus that
limits the role of the expert to knowledge capture activities. In either case, the goal is a
knowledge base that represents expertise, rather than the expert.
In working with the expert, the knowledge developer will occasionally run into
vague expressions of thought or reasoning processes that must either be clarified by
the expert or factored into the system. For example, “fuzzy” expressions can be as-
signed certainty factors to reflect the extent of “fuzziness” of the expression. Certainty
102 i fl a i PART I The Basics
factors require careful analysis to assure proper representation in the knowledge base.
In fact, much of the knowledge that the expert provides is based on heuristics, which
tend to be qualitative, rather than quantitative.
Finally, a competent and cooperative expert is essential to the success of knowledge
capture. The expert must be able to communicate information understandably and in
sufficient detail. The questions that face every knowledge base project are as follows:
• How can one know that the so-called expert is in fact an expert? In the example
of BANKOR, the examiners were certified and each had more than 10 years’
experience.
• Will the expert stay with the project to the end?
• What backup is available in case the expert loses interest, decides to leave, or sim-
ply is no longer available?
• How is the knowledge developer to know what is and what is not within the
expert’s area of expertise?
Sometimes, either because of the nature of the problem or its importance to the
organization, more than one expert should be involved in addressing the problem
domain. Dealing with several experts is not an easy task. The knowledge developer
may have to use different tools in different ways to access the experts’ knowledge and
promote agreement among them before the captured knowledge becomes part of the
knowledge base. Dealing with single and multiple experts is discussed in Chapter 5.
4. Develop the key layers of the KM architecture to meet your company’s require-
ments. As shown in Figure 3.8, the key layers are as follows:
a. The user interface is what the user sees and works with in terms of accessing
and working with the knowledge base and other repositories. Without an
effective user interface, even the best KM system is bound to fail. A browser
is used to link the user to the Internet.
b. The authentication/security layer screens incoming requests for security pur-
poses. For example, firewalls are installed by the company’s IT departm ent
to ensure that certain files do not leave company premises or certain incom-
ing information does not contaminate existing repositories. Passwords and
other authorization protocols are used to ensure integrity of the knowledge
base and reliability of the overall systems at all times.
c. Collaborative agents and filtering are designed to provide a near-personal-
ized presentation of knowledge or information to m eet the user’s require-
ments. Intelligent agents (specialized software) are employed to do “intelli-
gent” searches in a database, knowledge base, or other repositories to
expedite user requests and display the right information.
d. The application layer is used to communicate with the actual application in
use. This is where the user begins to do som ething useful with the n et-
works—browsing a Web site, sending e-mail, or transferring a file between
file servers and client computers. It answers the question “What informa-
tion do I send to my partner?” It is simply two useful programs talking to
each other. It also defines request and response formats. For example, an
e-mail client browser program talks to the e-mail server program, saying
som ething like “Deliver this message to [email protected].” Rem em -
ber that each type of program (e-mail, file transfer, and so forth) has its
own protocol. The application layer protocol assumes that the next layer
down (transport layer) will take care of passing the message along to the
destination.
104 ■ ■ ■ ■ PART I The Basics
Authentication/Security Layer
(includes access identification, firewalls, and user recognition)
Internal Layer That
the Company’s IT
Infrastructure Controls
Application Layer
(collaborative work tools, videoconferencing, decision support tools,
group decision support tools, yellow pages, and so forth)
Upper Part of the Data
Communication Network Layer
Transport/Internet Layer
[transmission control protocol/Internet protocol (TCP/IP), e-mail, document exchange,
simple mail transport protocol (SMTP), and so forth]
Manages Transmission
of Data Between Computers
Physical Layer
(cables, physical wires, modems for transmission)
Repositories
SOURCE: Adapted from Tiwana, Amrit. The Knowledge Management Toolkit. Upper Saddle River, NJ:
Prentice Hall, 2000, p. 309.
Rem em ber that there are standards that specify how two application
programs should communicate at the application layer. For example, in Web
service, there is a program called “browser” that resides on the client PC and
a Web server application program on the Web server. The standard on the
application layer is the hypertext transport protocol, or HTTP. Its function is
to govern requests and responses between the browser and the Web server
application program. It is usually the beginning of a Web address in the form
CHAPTER 3 Knowledge Management Systems Life Cycle i ■■« 105
of http://. E-mail uses other applications that use different application layer-
standards such as SMTP (simple mail transfer protocol) and POP (point of
presence) application layer standards to send and receive e-rpail, respectively.
e. The transport Internet layer is the most critical part of the KM network sys-
tem. The function of the transport layer is to manage the transmission or
the flow control of data between two com puters or across a network. It
also allows two com puters to communicate, even if the com puters were
made by different vendors. The standard for the transport layer is transmis
sion control protocol (TC P ), which specifies how two host computers will
work together.
In contrast, the Internet layer routes messages across multiple nodes of
networks for delivery. It also handles network congestion to minimize per-
formance problems. A typical message is “Send this packet to com puter
number 190.172.63.08 via computer number 123.32.12.14, which is on a net-
work one hop away.” The standard for routing messages is Internet protocol
(IP ). TCP and IP work together, and that is the reason that in the literature
you always see them as TCP/IP.
f. The physical layer is the lowest layer in the journey of a message from source
to destination. It converts bits into signals for outgoing messages and signals
into bits for incoming messages. It answers the question “How do I use the
medium (cable, physical wiring) for transmission?” The physical layer also
uses modems (telephone network standards) to transmit the message as raw
data to the destination. Modems are used only to link a user host to the first
router (a box with intelligent software that routes messages to other routers).
g. Repositories are hard disks or storage devices that hold explicit and tacit
knowledge and the rules associated with them. O ther repositories include
legacy (old or traditional applications like accounts receivable) databases,
Web databases, e-mail databases, and UNIX databases.
USER TRAINING
A major part of the implementation phase is training company employees on the new
KM system. The level and duration of training depend on the user’s knowledge level
and the system’s attributes. Users range from novices to experts. A novice is generally a
casual user with limited knowledge of IT. An expert is someone with prior IT experi-
ence and who keeps abreast of the technology. Users are also classified as tutor, pupil,
or customer.
CHAPTER 3 Knowledge Management Systems Life Cycle aaaa 107
• Experts. Some domain experts have anxiety about the potential impact of sharing
knowledge of their jobs in the organization. Experts on the way to retirement
worry less, but they may still lack motivation unless they are properly compen-
sated for their efforts.
• Regular employees (users). Participants in general resent lack of recognition
(sometimes compensation), especially when they have put time in building the
KM system.
• Troublemakers. Those left out of building the KM system or chronic complainers
tend to obstruct the installation, cause delays, and may even prompt cancellation
of the installation.
• N arrow-minded “superstars. ” Technical people in the organization’s IT depart-
ment sometimes resist any change that they did not initiate or approve in
advance. Others veto a project not in their area of interest. Without management
support, such resistance can spell doom for a new installation.
108 • a « i PART I The Basics
A psychological element that explains resistance to change is the value that users
place on knowledge and decision making. In most organizations, knowledge means
power. While knowledge developers build KM systems that promote knowledge shar-
ing through knowledge bases, domain experts who stand to lose monopoly on knowl-
edge may resist a new system installation. Most resistance relates to the perceived
impact of the system on one’s job or status in the organization. Of course, a few people
resist change of any kind.
Resistance also has much to do with the individual personality, the organizational
structure, and the group relations within the area where the KM system will be
installed. User education, training, and participation in the building process can help
reduce resistance to change.
Because a m ajor user concern in KM system im plem entation is how to work
the system, users frequently ask such questions as W hat functions are available?
How do I access each function? How do I know if the system has answered my
questions correctly? How current is the knowledge base? A nother user concern is how
the KM system reaches conclusions or lines up with the real-world problem as seen
by the user. The knowledge developer must dem onstrate the system and provide
detailed training.
Postsystem Evaluation
A fter the KM system has been deployed and the operation is “up and run-
ning,” the effect of the new system on the organization should be carefully evaluated.
System impact must be assessed in terms of its effects on the people, procedures, and
performance of the business. More specifically, the main areas of concern are quality
of decision making, attitude of end users, and costs of knowledge processing and
update.
Several key questions are asked in the postimplementation stage:
• How has the KM system changed the accuracy and timeliness of decision making?
• Has the new system caused organizational changes? How constructive have the
changes been?
• How has the new KM system affected the attitude of the end users? In what way?
Was it worth it?
• How has the new KM system changed the cost of operating the business? How
significant was it?
• In what way has the new system affected relationships between end users in the
organization?
• Do the solutions derived from the new system justify the cost of investment?
The objective is to evaluate the KM system against standards and determine how
well it meets the goals set in advance. This process is actually related to validation. The
user initiates the review, which prompts a procedure for maintenance or enhancement.
Enhancement means upgrading the system to meet a new set of requirements; mainte-
nance means making corrections to meet the initial system requirements.
CHAPTER 3 Knowledge Management Systems Life Cycle i ■ a ■ 109
One of the critical issues raised during implementation is knowledge system main-
tenance. Maintenance of KM systems continues to be a nebulous area. Some of the
questions to be addressed by management include the following:
Su m m a r y a a a a
• Building a KM system can be viewed as a life cycle. The life cycle begins when a
knowledge management system is determined to be doable, affordable, and prac-
ticable, with value added for company profitability and growth. Knowledge devel-
opers interview users and work with experts to develop a system. Discipline, good
documentation, coordination, and regular management review characterize the
development of KM system life cycle.
• Conventional and KM systems’ development life cycles differ.
• A systems analyst deals with data and information obtained from the user;
the knowledge developer deals with tacit knowledge acquired from
human experts.
• The main interface for the systems analyst is the user, who knows the
problem but not the solution. The main interface with the knowledge
developer is the human expert, who knows the problem and the solution.
• Conventional system developm ent is primarily sequential; KMSLC is
incremental and interactive.
• Testing is done at the end of conventional information system develop-
ment; verification and validation are perform ed throughout the KM
development life cycle.
• Conventional and KM systems’ development life cycles are also similar.
• Both begin with a problem and end with a solution.
• Both begin with information gathering to ensure a clear understanding of
the users’ requirements or the problem at hand.
• Both involve testing the system and ensuring that the system is satisfactory.
• Particular development tools are used to build each system.
• The first step in building a KM system is identifying the problem domain, fol-
lowed by a feasibility study for evaluating the problem in detail. This includes
weighing the total costs against the potential tangible and intangible benefits.
Early scoping is important. The project should be of a manageable size, and the
organization should be able to foresee its benefits.
• Knowledge capture involves elicitation, analysis, and interpretation of the knowl-
edge that a human expert uses to solve a particular problem.
• Most KM systems begin as small-scale prototypes based on the limited knowl-
edge acquired during the first few sessions with the human expert. The system
grows gradually as the knowledge developer gains new insights from the expert
and adds them to the prototype.
• Once the KM blueprint is made final, verification and validation ensure that the
system is right and that we have the right system, respectively.
• System implementation is the process of organizing the knowledge and integrat-
ing it with the testing strategy of verification and validation. A system must be
modified or updated as new knowledge is captured.
CHAPTER 3 Knowledge Management Systems Life Cycle i i i ■ 111
Terms t o K n o w 11,1
Aggression: Resistance to KM systems through em ployee Projection: Resistance to expert systems through
sabotage of the system. em ployee display of hostility toward peers.
Avoidance: Resistance to KM systems through em ployee Pupil user: An unskilled em ployee trying to learn or gain
withdrawal from the job or scene. some understanding of the captured knowledge.
Champion: Individual within the organization who Rapid prototyping: Spontaneous, on-the-spot, iterative
believes the project will benefit the company and is approach to building KM systems; an iterative process
willing to take risks in supporting its development; has by which the knowledge developer shows the domain
credibility with management, experts, and users; and expert what the KM system looks like based on the
has access to key persons in the business. knowledge captured to date.
Customer user: A user interested in knowing how to use Systems analyst: A specialist who gathers information
the system for problem solving on a regular basis. from the user or the user’s staff in order to define a
Deployment: Physical transfer of the technology to the problem and determine alternative solutions and their
organization's operating unit. consequences within conventional information system
Enhancement: Upgrading the system to meet a new set of developm ent processes.
requirements. Tutor user: A user with a working knowledge of the KM
Implementation: The process of organizing the knowl- system or knowledge base and the responsibility for
edge and integrating it with the processing strategy for system maintenance.
final deployment. Validation: A system test to ensure the right system from
KM system life cycle (KMSLC): The steps through which a technical view; a system that meets the expert’s
a knowledge management system project goes before it expectations.
becomes operational. Verification: A system test to ensure the proper function-
Maintenance: Making necessary corrections so that the ing of the system; addresses the intrinsic properties o f
KM system continues to meet the initial system the KM system.
requirements.
Test Y o u r U n d e r s ta n d in g a 1 a a
1. Why is it helpful to view the building of a KM system as a life cycle?
2. In what ways do conventional and KM systems’ development life cycles dif-
fer? How are they similar?
3. Distinguish between:
a. verification and validation
b. knowledge developer and systems analyst
c. pupil user and tutor user
d. projection and avoidance
4. Successful KM system implementation depends on several factors. Briefly
explain each factor.
5. How important are organizational factors in system implementation?
112 * « i • PART I Tlw Basics
K n o w l e d g e Exercises 1 1 1 1
1. Crozet Country Club's use of a knowledge management system can be justi-
fied on several fronts. The system captures the human resources manager’s
knowledge of how she makes her hiring decisions. If she leaves the club, the
system will help to ensure that her expertise and know-how are not lost.
The “ Hiring KM System” saves the club time and money by making
accurate decisions more rapidly than the normal way of deciding on an appli-
cant. Because the club receives a large number of applications to fill a rela-
tively small number of positions, efficient applicant evaluation is of critical
importance. However, handling and sorting the plethora of applications was
formerly time-consuming and haphazard. This system reduces the time taken
to fill vacant positions. More importantly, it helps to ensure that employees
have the necessary qualifications.
The hiring KM system promotes a higher level of consistency and quality
in hiring decisions. Prior to implementing the system, the manager did not
have a “wage matrix" to use in determining appropriate wages for employ-
ees, and the process was quite random. This led to some conflict within the
organization. Furtherm ore, the m anager hired some applicants without
focusing enough on their ability, and they turned out to be poor employees.
In essence, the KM system helps guarantee that all of the necessary variables
are fully considered in each decision.
a. Is this sufficient justification for the KM system? Why or why not?
b. Is the system likely to replace the human resources manager, who was
instrumental in sharing her knowledge, which is captured in the knowl-
edge base?
2. The goal of this project is to develop a consumer-lending knowledge base to
guide the junior bank officer through the decision of whether an auto loan
should be approved. In the loan departm ent, there are experienced senior
loan officers who are willing to share their knowledge with others.
You have been assigned the job of building a KM system for the bank.
Explain in detail the life cycle of this project.
3. A KM system for a large retailer was designed to help human resources
develop a qualified candidate pool from the many applications they receive
on a daily basis. The knowledge on hiring available in the KM knowledge
base suggests the wage each accepted applicant should receive, based on his
or her skills and relevant experience.
The three positions addressed are (a) floor salesperson, (b) customer
service representative, and (c) gift wrap employee. The system encodes the
CHAPTER 3 Knowledge Management Systems Life Cycle 113
knowledge of the expert in each area and the knowledge of the person who
makes the hiring decisions into rules that are used to perform the task. The
store’s human resources manager played a key role throughout knowledge
capture; her experience is stored in a specialized knowledge base. During her
absence, a junior human resources person can query the knowledge base for
information based on the expert’s (human resources manager) opinion in
various combinations of circumstances and constraints. This made certain
decisions easy to make, which made the hiring process faster and improved
the overall efficiency of the human resources department.
a. Is anything missing from the development life cycle? What made you
think so?
b. Do you think more than one person developed the KM system? Explain.
4. A high-tech firm designed a KM system for the student housing office of
a major university in March 2001 and made the system available through
the university’s intranet; three campuses were involved. A fter the sys-
tem passed verification and validation, the knowledge developer held
a wrap-up m eeting with representative end users from each branch. She
spent 2 hours going through the operations-manual and running examples
through the newly installed system to dem onstrate ease of use and ease
of access.
The attendees were quite impressed with the many features—a color
screen, easy-to-follow menu, and display of the reasons to justify all kinds of
answers. The system also links legacy databases such as tuition adjustment
and meal plans, depending on the housing arrangements.
One month after the 2-hour training session, the knowledge engineer
sent a questionnaire to all attendees, who, by then, were end users of the KM
system. Some of the questions were as follows:
• Did the operations manual help you understand the system?
• Did the knowledge developer give you a working understanding of the
system?
• Did you understand the questions asked by the system?
• Does the system meet your expectations? If not, please offer any sugges-
tions you might have.
• Did the system provide adequate and correct answers?
• Do you think that the system is usable in your environment with immedi-
ate change? Be specific.
a. Based on the information provided, evaluate the training approach fol-
lowed by the knowledge developer.
b. Could you deduce a training plan in this case? Explain.
c. Critique the questionnaire used to follow up on the installation.
R eferences 1 1 1 1
Angus, Jeff. “Harnessing Corporate Knowledge,” Delio, Michelle. “Stepping Up, Moving On, Getting Smarter,”
Inform ationweek, August 7,2000, pp. 1-3, www. Knowledge Management, June 2001, pp. 51-54.
informationweek.com/798/prknowledge.htm, Date Dixon, Nancy M. Com m on Knowledge. Boston, MA:
accessed August 2002. Harvard Business School Press, 2000.
Date, Shruti. “Agencies Create CKO Posts to Get in the Flash, Cynthia. “Who Is the CKO?” Knowledge
Know,” Governm ent Computer N ews, November 8, M anagement, May 2001, pp. 37-41.
1999, pp. 1-2. Foster, Allan. “Grasping the Tacit Knowledge Nettle,”
Davenport, Thomas H., and Prusak, Laurence. Working Knowledge M anagement, no. 1, April 1998, p. 32.
Knowledge. Boston, MA: Harvard Business School Frank, Diane. “Feds Ponder CKO R o)&?~Federal
Press, 2000, pp. 1-24. Com puter Week, June 28,1999, pp. 16-18.
114 i a a i PART I The Basics
Freeman, Miller. “Applying Knowledge to Profitability,” Skyrme, David. “D o You Need a CKO?” www.skyrme.com/
Intelligent Enterprise, March 1,2000, p. 15. insights/27cko.htm, Date accessed August 2002.
Garvin, James. A Guide to Project Management B ody o f Strassmann, Paul A. “Calculating Knowledge Capital,”
Knowledge. Newton Square, PA: Project Management files.strassmann.com/pubs/km/1999-10.php, October
Institute 2000. 1999, Date accessed August 2002.
Glasser, Perry. “The Knowledge Factor,” CIO M agazine, Tiwana, Amrit. The Knowledge Management Toolkit.
D ecem ber 1 5 ,1998-January 1,1999, pp. 1-9. Upper Saddle River, NJ: Prentice Hall, 2000.
Housel, Thomas, and Bell, Arthur. Measuring and M an- Trepper, Charles. “Keep Your Knowledge In-House,”
aging Knowledge. New York: McGraw-Hill, Inc., 2001. Informationweek, September 4,2000, pp. 1-3.
Liebowitz, Jay, and Wilcox, Lyle C. Knowledge Manage- www.informationweek.com/802/prknowledge.htm.
ment. Ft. Lauderdale, FL: CRC Press, 1997. D ate accessed November 22,2002.
Paquette, Pat. “CKO:Trendiest Job in Business,”
www.hightechcareers.com/doc498e/trendiest498e.html,
Date accessed August 2002.
PART II: K N O W L E D G E CREATION AND CAPTURE
a a a i i i E R a a a a a a a
Knowledge
Creation and
Knowledge
Architecture
Contents
In a Nutshell
Knowledge Creation
N onaka’s Model of Knowledge Creation and Transformation
Knowledge Architecture
The People Core
Identifying Knowledge Centers
The Technical Core
Build In-House, Buy, or Outsource?
Implications for Knowledge Management
Summary
Terms to Know
Test Your Understanding
Knowledge Exercises
References
115
116 7777 PART II Knowledge Creation and Capture
■ In a Nutshell
In the previous chapters, we discussed the concept of knowledge management, what
knowledge is, and the development process that deploys a KM system for a business
organization. In this chapter, the key questions are: Where does knowledge reside?
How would one create knowledge? What does it take to design a KM system? The lit-
erature differs on how to address these questions, because much depends on the type
of knowledge, the culture of the organization, and how one strategically makes use of
knowledge m anagem ent. For example, Churchm an interpreted the viewpoint of
philosophers Leibniz, Locke, and Kant by emphasizing that knowledge resides in the
user and not in the collection of information. “To conceive of knowledge as a collection
of information seems to rob the concept of all of its life. Knowledge resides in the user
and not in the collection. It is how the user reacts to a collection of information that
m atters” (Churchman 1971). He emphasizes the human nature of knowledge creation
in an environment characterized by discontinuous change. Malhotra also discusses the
nature of knowledge creation (M alhotra 2001).
The focus on tacit knowledge being the primary type of knowledge to tap is re-
inforced by Boland, who pointed out that by considering the meaning of knowledge as
“unproblematic, predefined, and prepackaged, they ignore the human dimension of
organizational knowledge creation” (Boland 1987). In 1995, Gill reinforced the view a
different way. He stated that “prepackaged interpretation of knowledge works against
the generation of multiple and contradictory viewpoints that are necessary for meeting
the challenge posed by wicked environments: This may even hamper the firm’s learn-
ing and adaptive capabilities.”
In this chapter, we also discuss knowledge architecture as a framework of the
p e o p le core. We explore the types of people making up the organization, the knowl-
edge they own, and where they use it. Under the k n o w le d g e sh a rin g c o re , the focus is
on deciding where knowledge resides and where it is used, and identify those responsi-
ble for knowledge sharing. Finally, the te c h n o lo g y co re illustrates how to leverage the
Internet and the technical layers for building a technology base for knowledge sharing.
With all these issues, the CKO plays a critical role in the KM process.
Team formation and teamwork begin with experienced individuals working jointly
on a project. In consulting assignments, for example, an experienced individual man-
ages a team of experienced and semiexperienced members (see Box 4.1). The manager
assigns tasks and decides how much knowledge sharing will occur. In a way, tacit
knowledge begins with the individual, not the team. Real knowledge continues to be
held by people (Berry 2000). In a team environment, shared exchange results in collabo-
rative decision making and problem-solving. So, when it comes to knowledge capture,
BOX 4.1
SOURCE: Excerpted from Robb, Drew. “Draft Your Dream Team,” Knowledge Management, August 2001, pp. 44-50.
fl a fl a a a
CHAPTER 4 Knowledge Creation and Knowledge Architecture m■ ■ ■ 119
Compensation
Recognition Personality
Ability Utilization
Creativity
G ood Wqrk Environment
Autonomy
Job Security
Moral Values
Vocational
Advancement
Reinforcers
Variety
Achievement
Independence 11
Social Status ________
Attitude
1[
Work Norms
the approach is to tap the individual’s tacit knowledge, which could be a single expert
or multiple experts, as the situation warrants.
With knowledge transfer and knowledge sharing, there are impediments to con-
sider. W hether it is the individual expert or the “expert” team, knowledge sharing is not
that straightforward. As shown in Figure 4.2, there are factors that encourage or retard
knowledge transfer—from personality and attitude to vocational reinforcers. Whether
knowledge sharing causes change in the organizational culture or the other way
around continues to be a hotly debated area. In either case, a review of the motiva-
tional factors that encourage people to share is im portant if the KM process has a
chance of succeeding.
As shown in the conceptual model in Figure 4.2, personality is one factor in knowl-
edge sharing. For example, people who are extroverts, display self-confidence, and feel
secure tend to share experiences more readily than those who are introspective, self-
centered, or security conscious. A ttitude and work norms are additional considera-
tions. People with a positive attitude, who trust others, and who work in an environ-
ment conducive to knowledge sharing tend to be better at sharing than those working
in a “cutthroat” environment.
Finally, vocational reinforcers are key to knowledge sharing. Based on the authors’
vocational psychology research, people whose vocational needs are met by job reinforcers
are more likely to favor knowledge sharing than those who are deprived of one or more
reinforcers. One may conclude that the totality of attitude, personality, work norms, and
vocational reinforcers determines how likely people are to view knowledge sharing and
knowledge transfer in a positive light.
valuable knowledge. The key to knowledge creation lies in the way it is mobilized and
converted through technology. C onversion of know ledge betw een tacit and explicit
know ledge is shown in Figure 4.3.
Tacit to tacit communication, re ferred to as so c ia liza tio n , takes place betw een
people in m eetings or in team discussions. Such knowledge sharing, transfer, or collabo-
ration often produces no explicit knowledge. E xperience am ong people in face-to-face
business situations is mostly shared, and technology plays a m inim al role. How ever,
th e re is an increasing tre n d for online groupw are tools be used in w ork groups or
teams. In such a synthetic atm osphere, especially in geographically dispersed settings,
team m em bers can conduct meetings, listen to presentations, or simply carry out dis-
cussions. L otus N otes is one exam ple of a softw are product that allows people to share
docum ents and discuss them via video and text-based chat.
Tacit to explicit communication, or ex tern a liza tio n , is essentially articulation
am ong people through dialogue. B rainstorm ing, w here a team carries out discussions
around a specific problem is one example. Com m ents and suggestions are entered into
a PC and displayed on a screen, but no one know s w ho m ade the com m eht.
B rainstorm ing is covered in detail in C hapter 6.
O nline discussions can capture tacit know ledge and apply it to an im m ediate prob-
lem (M arwick 2001). The database becom es a repository of useful knowledge. On the
surface, th e exchange gives th e im pression th at it is purely explicit knowledge.
How ever, the participant first has to decide on the nature of the problem before he or
she can give the best so lu tio n —both prom pting the use of tacit knowledge before such
know ledge becom es explicit. A fter the knowledge has been m ade explicit and has been
sto red in a repository, persons facing a sim ilar problem can consult the database at
their convenience.
Explicit to explicit communication (also re fe rred to as co m m u n ica tio n ) is one
transform ation phase th at is best supported by technology. Explicit know ledge can be
easily c a p tu red and tran sm itted to a w orldw ide audience. For exam ple, sending an
attached m em o or docum ent via e-m ail expedites know ledge sharing in an efficient
and effective way. In this respect, technology helps by m otivating people to capture
and share w hat they have or w hat they know.
Explicit to tacit communication (also re fe rre d to as in tern a liza tio n ) is taking
explicit know ledge such as a re p o rt and deducing new ideas or taking constructive
action. C reating technology to help users derive tacit know ledge from explicit knowl-
edge is an im portant goal of knowledge m anagem ent. By searching and finding associ-
ations, technology m akes inform ation m ore useful by m aking it easier to derive new
tacit know ledge from it. For example, superm arkets profiling custom ers when they use
Knowledge Architecture
Know ledge architecture is a prerequisite to knowledge sharing. We view the infrastruc-
ture as a com bination of people, content, and technology. As shown in Figure 4.4, these
com ponents are interd ep en d en t and inseparable. People with knowledge provide con-
tent, relying on technology to transfer and share knowledge. This com bination provides
the efficiency and perform ance to m anaging the know ledge core of the corporation.
■ ■ ■ ■ ■ ■
Profiling can be approached in several ways. The worst way is to send a survey or
questionnaire by e-mail. W hen it comes to knowledge capture, the most im portant p re-
requisite is selecting the em ployees and planning the questions. Planning whom to
elicit know ledge from m eans deciding w hether to talk with senior em ployees only,
younger or new er employees, or some mix based on criteria that m ake sense. The next
prerequisite is type of question to ask. Each question should be phrased and intended
to elicit inform ation accurately and completely.
Finally, the w hole idea b ehind assessing the people core is to do a good job in
assigning job content to the right person and to ensure that the flow of inform ation
th at once was o b structed by departm ents now flows to the right people at the right
time. For exam ple, custom er service need no longer have an exclusive on troubleshoot-
ing inform ation, any m ore than the legal departm ent should have an exclusive on set-
tling custom er litigation. To expedite knowledge sharing, a knowledge netw ork should
be m apped in such a way as to assign people authority and responsibilities for specific
kinds of know ledge content. It means:
1. Identifying know ledge centers (for example, sales, products, or m arketing).
2. A ctivating know ledge co n ten t satellites —low er level know ledge centers that
hierarchically fall under higher level centers (for example, custom er support or
product docum entation in repositories).
3. Properly staffing experts over each knowledge center. The outcom e is a corpora-
tion-wide know ledge structure that blends the best of existing organization struc-
ture and the best of technology—e-mail, intranets, extranets, and netw orking—to
ensure a sm ooth, 24-hour knowledge sharing environm ent.
tu rf b attles occur regularly over b u dget size or control of sensitive processes. This
includes the kind of know ledge a d ep artm e n t owns. T hese reasons justify assigning
departm ent ow nership to know ledge content and knowledge process. In Figure 4.6, a
w ell-defined know ledge content ensures discipline and order to a com pany’s know l-
edge base. You can w ork your way from the m ajor departm ents down to lower levels in
each departm ent. For exam ple, “O p eratio n s” shows the m ain know ledge areas (teller
schedules, depo sits and w ithdraw als, and electro n ic balancing). Likew ise, “L o an s”
owns a variety of loans and loan processing (com m ercial, unsecured, personal, and
auto). For troubleshooting, “C ustom er Service” has an exclusive on issuing traveler’s
checks, settling custom er com plaints, ordering checkbooks, and opening new accounts.
From the departm ent level, we can m ap out each knowledge content in greater detail.
Such a step is carried out in knowledge capture.
A d jacen t or in te rd e p e n d e n t d ep artm e n ts are ex pected to be co o p erativ e and
read y can d id ates for know ledge sharing. For exam ple, the bank tellers th at accept
m ortgage paym ents are accom m odating the loan departm ent that issued the loan in
the first place. We need to first identify the com m onality of knowledge and then sell
the “goodness of fit” betw een departm ents for assuring sm ooth knowledge sharing and
know ledge transfer.
• Focus on real know ledge of people rather than artificial intelligence that was
once unique to expert systems but which has now becom e a flop.
• C oncentrate on a know ledge m anagem ent system that facilitates finding the
sources of know-how, not just the know-how. A user should be able to readily
locate people and their respective expertise and use available knowledge as he or
she sees fit.
• A successful know ledge m anagem ent system should be tagged to collaboration. It
w ould be superfluous to think of know ledge sharing, knowledge transfer, or con-
tinued creativity w ithout collaborative success.
• People are no longer expected to adapt to the requirem ents of the machine, but
the oth er way round. Today’s hum an intelligence should m ake use of the way the
m achine (com puters, networks, and the like) supports intelligent thinking, innova-
tions, and creativity.
• C oncentrate on realism, not perfection. A knowledge m anagem ent system should
begin with w hat you have and try to im prove it. Disposing of current infrastruc-
ture and replacing it with a new one invites a host of problem s that could backfire
on the organization fo ^a long time.
• Allow the user to decide on w hether the proposed knowledge m anagem ent sys-
tem m akes sense and how well inform ation is organized and ready for day-to-
day access.
The best way to visualize the technical architecture as the building block of KM is
in term s of a layer system, starting with the user interface (least technical) and going all
CH A PTER 4 Knowledge Creation and Knowledge Architecture aaaa 125
the way to the repositories th at form the m ost technical layer of the technical core.
They represent technologies of the com pany’s intranet and its interface with the W orld
W ide W eb, including the protocols, standards, brow sers, and servers. K now ledge
exchange and com m unications within the com pany and across organizations are m ade
possible via satellite com m unication, telecom m unication netw orks, and wireless n e t-
works. Satellite com panies are setting up new bro ad b an d netw orks to reach people
where telephone service is not available. Telecom m unication com panies are develop-
ing new technologies for higher-bandw idth com m unication across existing networks.
W ireless netw orks are also being converted for In ternet use. Providers for each tech-
nological area play a m ajor role in the expansion of the Internet.
The 7-tier technical layer, form ing the overall building blocks of the knowledge
m anagem ent architecture, is shown in Figure 4.7. Each layer is briefly covered in the
following sections.
• Consistency. Menus, icons, and buttons should have the same meaning or representa-
tion throughout the KM system, including those used in future upgrades. All infor-
mation should be consistent in layout and form at across all areas of the system.
• Relevancy. A ny inform ation displayed should be relevant to the user’s expecta-
tions. It m eans users should be able to custom ize inform ation in the way they
want. It also m eans personalization of the Web site.
• Visual clarity. Ideally, all inform ation should be presented in one screen, with
space-saving features such as pull-down m enus available as default. Proper use of
color, margins, and text density can add quality and clarity of the displayed infor-
m ation. In to d ay ’s digital age, people do not like to read text-heavy screens. In
designing Web pages, for example, there is an 8-second rule that m easures user
tolerance to reading a screen full of inform ation or to waiting for one.
126 7 7 7 7 PART II Knowledge Creation and Capture
Layer
1 User Interface
(Web browser software installed on each user’s PC)
Knowledge-Enabling Applications
(customized applications, yellow pages, skills directories, videoconferencing,
decision support systems, group decision support systems tools)
Transport
(e-mail, Internet/Web site, TCP/IP protocol to manage traffic flow)
Middleware
(specialized software for network management, security)
L - 1 fj
Legacy Applications
Databases (payroll) Groupware Data
(document Warehousing
exchange, (data cleansing,
collaboration) data mining)
Navigation. The term navigation means how easily a user moves through Web pages,
files, or records in a computer-based system. W hen dealing with different packages
or tools within the KM system, the user’s view should be a single mode of operation
or one where the system tells the user which packages he or she has in operation.
Usability. This feature addresses navigation in term s of how easy it is to use icons
and buttons and the speed of access to files or databases.
W ith this in m ind, it is critical th at talen ted user interface designers be hired to
build this layer, w hether the layer is brow ser-based or client/server-based. The com-
CHA PTER 4 Knowledge Creation and Knowledge Architecture ■■■■ 127
Inform al Tacit
K now ledge Transfer
pany’s IT departm ent can be instrum ental in the final version of the design, including
choice of colors, banners, icons, graphics, and so forth. U sability testing by com pany
users is the final test of the acceptability of the user interface.
/ Company Employees \
/ Suppliers \
I • Vendors J
\ • Partners /
Public • Customers
at Large
and m ultiple m edia can be supported as well. M anagers can share docum ents on inter-
departm ental and in trad ep artm ental levels. W ith various operating systems, netw ork
protocols, and application suites, trying to ensure hom ogeneity in m anaging docum ents
can be quite a challenge. In tranets can handle all these problem s with ease.
In contrast, an extranet is an intranet with extensions that allow clearly identified
custom ers or top suppliers to reach and access com pany-related technical educational
inform ation. For exam ple, in one electrical corporation the ex tran et is accessible to
950 electricians and small electrical outlet shops via the com pany’s special Web page.
A n electrician enters a specially assigned password to access inform ation about new
products and special deals that are available to high-volum e buyers. Based on 7 m onths
of practice, the com pany’s N et-based practice paid dividends. The com pany cut down
on phone calls and fax orders, and gave sales reps in the field online support when
needed. It even im proved shipm ent schedules and deliveries, regardless of distance.
It should be noted that in today’s In ternet economy, a com pany’s success depends
less on the resources within its walls and m ore on its relationships with suppliers, ven-
dors, and custom ers. Effective m anagem ent of the com pany’s product traffic is m ar-
shalling the resources of its em ployees in line with those of o th er companies. In this
respect, relationships becom e assets, just as the com pany’s buildings, inform ation, and
know ledge (Tapscott 2001).
In tranets and extranets have a lot in common. A s shown in Figure 4.10, intranets
are m ore localized within a firm and move data m ore quickly than the m ore distributed
extranets. The use of In tern et (prim arily W eb) protocols is m ore common to connect
business users and branches. O n the intranet, Web adm inistrators prescribe access and
policy for a defined group of users. To collaborate via extranet, the applications have to
perform consistently on all represented platforms. The same is true for trading partners
and suppliers, who may be totally unknow n to one another.
Firewall
Corporate
Intranet
Suppliers
Corporate
Firewall
Intranet
CH A PTER 4 Knowledge Creation and Knowledge Architecture aaaa 129
The access layer has taken on a special role in the technical core due to the vulner-
ability of intranets and heavy traffic on the Internet. The focus of today’s access layer is
on security, use of protocols like passwords, authentication to ensure users are au th o -
rized, and softw are tools like firewalls to block certain inform ation from leaving the
com pany's repositories or incom ing inform ation from contam inating com pany files.
Firewalls are hardw are and software tools that define, control, and limit access to n et-
works and com puters. They detect intruders, block them from entry, keep track of what
they do and where they originate, notify the system adm inistrator of mischievous acts,
and produce a report. Specifically, a firewall protects against the follow ing
• E-m ail services that are known to be problem s
• U nauthorized interactive log-ins from the outside world
• U ndesirable m aterial such as pornographic images, movies, or literature
• U nauthorized sensitive inform ation leaving the com pany
In contrast, a firewall cannot prevent:
• A ttacks that do not go through the firewall (such as taking data out of the com -
pany by tape or diskette)
• W eak security policies
• Viruses on floppy disks
• Traitors or disgruntled em ployees
There are two main issues related to the access layer: access privileges and back-
ups. In organizing access privileges, a netw ork adm inistrator has to authenticate each
com pany user and define the types of files he or she may access. In term s of backups, a
know ledge base requires a duplicate in case of fire, security violations, virus attack, or
hardw are breakdow n. A com pany whose lifeline depends on such repositories must
strategize a backup schem e and im plem ent it accordingly.
B iom etrics is an evolving technology that is slowly becom ing p art of the access
layer. Biom etrics is the autom atic identification of a person based on physiological or
behavioral characteristics. This science along with voice and fingerprint recognition
should add reliable muscle to the access layer.
could conceivably arrange meetings, pay bills, and even w ander through virtual shop-
ping malls, suggesting gifts, greeting cards, and so on.
Figure 4.11 illustrates the key differences betw een traditional client/server infra-
structure and th at of mobil agent/com puting. In client/server, there is direct but m ore
frequent interaction betw een the client and the netw ork server. This m eans heavy n e t-
w ork load and possible congestion. In m obil agent/com puting, the agent picks up the
slack; the in teractio n is b etw een the agent and th e server, leaving the overall load
vastly reduced.
Think of the m obil ag en t’s role as that of an agent for a professional athlete. A ny
requests or contract negotiations are handled by the agent, which reduces the direct
volum e of correspondence for the athlete. In agent/com puting, m obility is im portant. A
m obile agent roam s around the In tern et across m ultiple servers looking for the right
inform ation or synthesis. T here are other benefits as well:
• Fault-tolerance. W hen a server or a node in the netw ork fails, an agent is w arned
in advance; the agent can take special action to com plete an activity or relocate
on anoth er server to continue operation.
• R educed overall n etw ork load. As m entioned earlier, agents reduce the num ber of
interactions betw een clients and servers. In doing so, they reduce the load and
delay on the netw ork, releasing the savings to carrying bandw idth-intensive files
such as videoconferencing or sound in the same netw ork.
• H eterogeneous operation. W ith netw orks handling different hardw are and soft-
w are within the sam e netw ork, m obil agents operate seamlessly in the same h e t-
erogeneous environm ent; this saves time and effort.
PC Workstation
Client/Server
Activity
Network Environment
PC Workstation
□
Network Environment
CHA PTER 4 Knowledge Creation and Knowledge Architecture ■■«* 131
The key com ponents of the collaborative intelligence layer are (1) the registration
directory that develops tailored inform ation based on user profile, (2) mem bership in spe-
cialized services such as news service, sales prom otion, schedules, and custom er support,
and (3) the search facility such as a search engine to assist in finding information. Users
can search for words, subjects, or single queries for information, regardless of where it is
stored. The security feature is that users see only the results for which they have access.
In term s of the prerequisites for an effective collaborative layer, several criteria
are considered:
• Security. This is a critical feature, especially as an organization becom es increas-
ingly distributed worldwide.
• Portability. A collaborative platform must operate in a portable environm ent
across platform s. For exam ple, H T T P and the W eb allow different systems to com -
m unicate with each other, regardless of architecture, location, or language. The
Web brow ser is the m ost universal tool that users em ploy to access repositories.
• Integration with existing systems, including legacy applications. The Web is a good
example, w here a collaborative know ledge-sharing platform integrates with exist-
ing systems and m ainfram e databases.
• Scalability, flexibility, and ease o f use. These three criteria go together in em pha-
sizing the im portance of a know ledge-enabling, upgradable, flexible, and easy-to-
use (and to learn) collaborative platform . It boils down to the platform ’s ability to
filter out irrelevant content and display what the user needs to see.
For years, com panies have been trying to use com puters to capture and m anipulate
know ledge for pro d u ctiv ity and perform ance. The collaborative and filtering layer
relies on a com bination of technologies such as expert systems, case-based reasoning
(C B R ), neural netw orks, and intelligent agents.
Expert systems are a branch of artificial intelligence or AL Its main purpose is to
assist a p e rso n ’s thinking process, not m erely to provide inform ation for a person to
consider. W hen a com pany faces a critical decision —such as w h eth er to acquire
anoth er company, m arket a new product, or grant a hefty loan to a new custom er—it
turns to an expert for advice. These experts have years of experience in a particular
area and generally know the probability of success for a particular decision. A difficult
problem requires a seasoned professional, who is invariably an expensive commodity.
Expert systems are decision-making and problem-solving tools. They consist of com-
puter software program s that em ulate or clone the reasoning of a hum an expert in a
problem domain. As shown in Figure 4.12, the knowledge base is the repository of the
rules, facts, and knowledge acquired from the human expert. The knowledge is typically
represented in the form of IF . . . T H E N rules, facts, and assumptions about the problem
the system is designed to solve. The developm ental environm ent simply allows a human
knowledge engineer to acquire the knowledge from the hum an expert. Such knowledge
is entered into a knowledge base that represents the operational environment.
The user environm ent consists of a user friendly interface; a justifier that explains
to the user how and why an answ er is given; an inference engine that is the problem -
solving m echanism for reasoning and inferencing; and a scheduler that has the unique
jo b of c o o rd in atin g and co n trolling rule processing. A ll these co m ponents w ork
together to sim ulate a near-real environm ent of a client-expert relationship.
P roperly used, ex p ert system s can help a person becom e wiser, not just b e tter
informed. A l encom passes many aspects of hum an behavior (such as speech, language,
and m ovem ent); expert systems focus on the task of problem solving. E xpert systems
utilize the research discipline of A l to create a commercial reality that produces benefits
132 7777 PART II Knowledge Creation and Capture
each day. A n expert system is a branch or a commercial spin-off of AI. It contains practi-
cal knowledge obtained from a hum an expert. Its inform ation is explicit and com prehen-
sible, and the system is able to explain its reasoning on dem and. In this respect, it is
viewed as a problem-solving tool.
E xpert systems have not lived up to expectations and have not revolutionized the
business environm ent. The m ain reason is th at hum an know ledge is too com plex to
understand, capture, or m anipulate. Their applications are also rath er restricted. They
w ork best with two sim ultaneous conditions: express a problem variable in hard term s
(such as num bers or speed) and rules cannot overlap.
C ase-B ased Reasoning. In this particular area of reasoning, old solutions are adapted
to m eet new situations by using old cases to explain those new situations. For example,
attorneys use case precedents to justify or explain their argum ents in new court cases.
D octors often treat patients based on sym ptom s they have treated in previous patients.
E x p erien ce w ith old cases allows an a tto rn ey to decide on how to handle the case
easily and quickly (see Figure 4.13).
A case is a contextual pie^e of know ledge representing an experience. It is know l-
edge at an o p eratio n al level. C ase-based reasoning (C B R ) is useful to experts with
experience in their particular domains, because it helps them reuse the reasoning they
have done in the past. C B R also rem inds the expert to avoid repeating past mistakes.
Neural networks, or neural nets, are inform ation systems m odeled after the hum an
b ra in ’s netw ork of n e u ro n s—the basic processing elem ents of the brain. Each neuron
has a small am ount of local m em ory and is connected to o th er neurons to receive input
and produce output. C om m unications am ong neurons are carried out only through the
in put-output pathways. A n euron evaluates the inputs, determ ines their weights, sums
CH A PTER 4 Knowledge Creation and Knowledge Architecture aaaa 133
the w eighted inputs, and com pares the total to a threshold. If the sum is greater than
the threshold, the n euron fires. O therw ise, it generates no signal. This m eans it modifies
its activity in response to new input until it produces the right results.
As to w hat inform ation to tap, the same financial institution might consider the
following:
“A n yw h ere” Clients
□
Integrative Knowledge
System
Connectivity
Through the Internet ,
□
Application UNIX
Server Server
CT J}
Transaction Web Database
Server Server Server
roughly 10 percent to 20 percent of the cost of developing the same in-house. A reliable
KM softw are package offers several advantages:
• Short im plem entation tim e. Installation of a softw are package is com pleted in a
m atter of days rath er than the m onths necessary for “hom egrow n” packages. It also
contains fewer errors and is of higher overall quality than m ost in-house software.
• R educed need fo r resources. In-house software can be costly, and com pletion
dates are hard to predict. Incom plete software projects are not uncom m on
because of turnover am ong program m ing staff.
• L ow er developm en t cost. A package can take years to build, great expense to
com plete, and even m ore time to m aintain. U sers do not have the expertise to
cost-justify developing such packages.
• Greater flexibility. Users are not saddled with a software package, as they would be
with in-house programs. If the package fails the test, there is no obligation to acquire.
Software packages, on the other hand, are not w ithout drawbacks:
• Shorter track record. Many of the software houses have been in the knowledge m an-
agement business less than 5 years. It is difficult to predict how long they will continue.
• A pplication incom patibility. For a sophisticated user, extensive m odification of a
package can be costly. If the user modifies the software, the vendor may no longer
be responsible for any errors that occur.
• L ack o f com petition. Selecting a package is often not straightforw ard. In some
cases, a softw are package is one-of-a-kind. In other cases, it is the only available
softw are for the problem .
W hether the choice is build, buy, or outsource, it is im portant to set criteria for the
selection. In know ledge m anagem ent system developm ent, the following com ponents
are generally agreed to be crucial:
• R eliability has to do with how long software will operate w ithout a failure. It also
relates to how accurate and dependable the results are. Software does not fail. It
does not even w ear out. Invariably, reliability problem s are the result of errors
overlooked during the developm ent process. In contrast, hardw are fails because
of w ear and tear associated with continued use or inadequate m aintenance.
CHA PTER 4 Knowledge Creation and Knowledge Architecture i i i a 137
• M arket pressure to produce software has had an adverse impact on the reliability of
software in general. To make things worse, first-time users do not know much about
software testing. A dem onstration by a sales representative is often all it takes to pur-
chase the package. For this reason alone, inquiring about vendor support is crucial.
• M odu larity refers to the ease of m odifying the softw are across product lines.
Softw are with high m odularity operates in com puters across product lines. It
should be noted that m ost of to day’s softw are packages are seldom m odified by
the user. In contrast to m odularity, expan dability has to do with how well the soft-
ware can be m odified to m eet a user’s changing requirem ents. Some of the
expandability questions related to know ledge m anagem ent systems are:
• H ow easily can know ledge be changed or relocated?
• Will the know ledge m anagem ent system be unusable if a part of it fails?
• W hat are the recovery features of the know ledge m anagem ent softw are?
R elated to expandability are capacity and flexibility. C apacity refers to the
softw are’s capability for file size, volume of transactions, and additional reports.
Flexibility is the ease of m odifying or extending a softw are package to address
changing requirem ents.
• Usability ensures user friendly software. For exam ple, the popularity of dBase II in
the early 1980s was attrib u ted to the fact that a novice user could create and m ain-
tain a database file in less than 4 training hours. In this respect, it was highly usable.
• P ortability is a m easure of how well the softw are will run on different computers.
A softw are package rated high on portability would also be high on usability.
• Serviceability em phasizes the im portance of vendor services and support. A n
effective package m ust be well docum ented for m aintenance and future enhance-
ments. This includes a description of the system logic, input/output file descrip-
tions and layouts, and a readable user m anual. V endor support m eans technical
support, softw are m aintenance, and updates. O n-site training and conversion sup-
port are part of m ost com m ercial software installations.
• Perform ance is one of the m ost critical criteria of software selection. It is a m ea-
sure of the softw are’s capacity to m eet user requirem ents and perform under
peak loads. The program m ing language of the softw are may be a perform ance
factor. For exam ple, a know ledge m anagem ent package w ritten in C + + or Java
usually outperform s substantially a similar package w ritten in BASIC. However,
it is cheaper and easier to modify a package w ritten in BASIC.
Buying or even o u tso u rcin g a know ledge m an ag em en t system brings up the
im portant question of ownership. M ost license agreem ents lease (not sell) the software
for an indefinite time period. To protect proprietary rights, the vendor does not provide
the source code. H ow ever, the availability of the source code becom es crucial when
dealing with a softw are house that could fold w ithout notice. The questions to consider
on ow nership are as follows:
• W hat is the user paying for?
• W hat restrictions are there to copying the software for com pany branches or
oth er d epartm ents within the firm?
• W ho m odifies the softw are? W hat are the charges? How are m odifications m ade
if the vendor goes out of business?
R elated to the issue of buy versus outsource is evaluating the vendor’s services in
term s of conversion, backup, m aintenance, and upgrade. V endor-assisted conversion
provides prog ram m in g su p p o rt, file conversion, and user training. B acku p ensures
138 .«■. PART II Knowledge Creation and Capture
1 1 1 1 1 1 BOX 4. 2
DEVELOPING A KM TEAM
WHO IS IN CHARGE? m ust und erstan d the business requirem ents and
problem s the com pany m ust address and be able
W hen m any business units are involved in an
to articulate a broad vision that spans the unique
endeavor, project leadership can becom e a point
needs of the lines of business —and the business
of contention. A team leader m ust be able to bal-
processes and technical in frastru ctu re th a t can
ance the various, som etim es com peting, dem ands
m eet those needs.
on the group while keeping it focused on m eeting
the o rg an izatio n ’s know ledge needs. The lead er (con tin ued)
CH A PTER 4 Knowledge Creation and Knowledge Architecture aaaa 139
(con tin ued) willing to give it th eir all if they see the project
as a finite effort with a definite end, after which
A very large organization should hand the reins they can return to their norm al duties, observers
of team leadership to a chief know ledge officer say. For this reason, it may be a good idea to set
(CKO). You need someone with the influence and a life span for the team at the outset of the proj-
skills to take the enterprise in the right direction. In ect. The d u ra tio n can vary from a few m onths
any case, team leaders must comm and respect and for p ro jects th a t seek to plan t the seeds for a
trust within the company. This is especially true if m ore am bitious e n d ea v o r to several years for
team members come from different business units. com plex projects that involve reengineering busi-
Team m em bers who do not view a KM p ro - ness processes.
ject as a new p ath to career success will be m ore
SO U R C E : Excerpted from Robb, Drew. K now ledge M anagem ent , August 2001, pp. 44-50.
■ fl fl fl 1 fl
Sum m ary • • • •
• O ne way of creating know ledge is based on experience; the other way is through
team w ork. E ith er way, the outcom e is the same, because the focus is knowledge
sharing. Team form ation and team w ork begin with experienced individuals w ork-
ing jointly on a project.
• K now ledge sharing is influenced by personality, attitude, vocational reinforcers,
and w ork norms. The concept also considers organizational culture, com pany
strategies, and com pany policies. It is not so straightforw ard, because people are
m ore used to know ledge hoarding than know ledge sharing.
• K now ledge architecture is a com bination of people, content, and knowledge shar-
ing. They are in terd ep en d en t and inseparable. People with know ledge provide
content, relying on technology to transfer and share knowledge.
• P art of the people core is profiling. The goal of profiling is to get a handle on
existing know ledge exchanges that the organization relies on and ways to capture
them . The idea is to assign job content to the right person and to ensure that the
flow of inform ation that once was obstructed by departm ents now flows to the
right people at the tim e needed.
• O nce profiling is com pleted, the next step is to identify where knowledge re-
sides and how to capture it. These centers becom e the skeletal fram ew ork
for know ledge capture. A t the sam e time, experts are assigned to each knowl-
edge area to assure continuity and effective m anagem ent of the knowledge
sharing process.
• The goal of the technical core is to enhance com m unication and ensure effective
know ledge sharing. By technical core, we m ean the totality of hardw are and soft-
ware, and the specialized hum an resources required to enable knowledge capture.
O nce in place, a know ledge core becom es a netw ork of technologies designed to
work on top of the com pany’s existing netw ork.
• The best way to visualize the technical architecture as the building block of KM is
in term s of a layer system, starting with the user interface and going all the way to
the repositories that form the m ost technical layer of the technical core. In term s
140 7777 PART II Knowledge Creation and Capture
of the user interface layer, consistency, relevancy, visual clarity, navigation, and
usability are im portant design considerations.
The technical access layer involves the use of the Internet, intranet, and extranet
as p art of the technical infrastructure of the KM system. Each area has unique
contributions to make. Because of the vulnerability of the intranet and extranet,
firewalls and other security devices are installed.
The collaborative intelligence and filtering layer reduces search time for inform a-
tion by com bining the know ledge sought with the u ser’s profile. Intelligent agents
are used to assist in problem -solving by retrieving the right inform ation. For an
effective collaborative layer, security, portability, integration, scalability, flexibility,
and ease of use are im portant design criteria.
The collaborative layer relies on expert systems, CBR, and neural nets to do its
job. E xpert systems are a branch of A l, which assist a perso n ’s thinking process
based on years of captured hum an experience. C BR is based on real-life cases
that allow the decision m aker a chance to com pare his or her decisions to the
ones decided by older cases. N eural nets are inform ation systems m odeled after
the hum an b rain ’s netw ork of neurons. They can be trained to improve on the
quality and accuracy of decisions.
The rem aining layers are know ledge-enabling application* transport, and m iddle-
ware layers. E ach layer gives the user b etter ways to do the job. The transport
layer is the m ost technical layer to im plem ent in KM architecture.
The bottom layer is the one representing the repositories, including intelligent
data w arehouses, legacy applications, operational databases, and special applica-
tions for securing traffic m anagem ent and integrity assurance of the knowledge
architecture.
Building a KM system in-house provides the benefits of custom ization and p er-
sonalization, although at a high cost. The alternative is to outsource or buy an off-
the-shelf package. KM softw are packages usually m ean short im plem entation
time, lower developm ent cost, and greater flexibility. The main draw backs include
shorter track record, application incom patibility, and lack of com petition
Finally, the role of the CKO is crucial in developing KM architecture. The key
functions of such an officer are maximizing the returns on investm ent in knowl-
edge, sharing the best practices, prom oting and im proving com pany innovations,
and minimizing brain drain or knowledge loss at all levels of the organization.
Interpersonal and technical skills are also crucial.
Terms t o K n o w 1111
Artificial intelligence: The science of making machines relevant cases to determine their usefulness in solving a
do things that would require intelligence if done current problem; computer systems that solve new
by humans; the capacity to acquire and apply an problems by analogy with old ones.
understanding gained through experience or Collaborative intelligence: A knowledge management
study in order to imitate or emulate “natural technical layer that provides customized views based
intelligence.” on stored knowledge.
Authentication: Making sure that a cardholder is, in Data warehouse: A repository where relational data are
fact, the person authorized to use the card. specially organized to provide “cleaned” data in a for-
Browser: A program designed to search for and bring in mat understandable to the user.
Internet resources. Expert system: A sophisticated computer program that
CBR (case-based reasoning): A m ethodology that records applies human knowledge in a specific area of expertise
and documents previous cases and then searches the to create solutions to difficult problems.
CH A PTER 4 Knowledge Creation and Knowledge Architecture a a a a 141
Extranet: Network that connects separate companies with processing elements called neurons; a self-program-
a shared database. ming system that creates a model based on its inputs
Fault-tolerance: In hardware, having a specially designed and outputs.
operating system that keeps the Web site or any appli- People core: The human part of a knowledge manage-
cation running, even when the central processing unit ment environment and the way people creatively per-
goes down. form in that environment.
Firewall: A network node consisting of hardware and Performance: A measure of the software’s capacity to
software to protect or filter certain information enter- meet user requirements and perform under peak loads.
ing the company’s databases or keep select information POP: Point of presence; a physical location on the
from leaving the company. premises of a local exchange carrier at which messages
Inference engine: The “brain” of an expert system; a are transferred or linked to other carriers for routing to
cluster of computer programs that coordinates through their intended destinations.
a scheduler the reasoning and inferencing based on Portability: Ability of software to be used on different
the rules of the knowledge base to produce the solu- hardware and operating systems.
tion or advice. Profiling: In knowledge management systems, it is gener-
Inferencing: Deriving a conclusion based on statements ating a graphic or textual representation of people in
that only imply that conclusion. terms of criteria such as skills or personality traits.
Intelligent agent: A cluster of precanned bits of intelli- Reliability: Has to do with how long software will operate
gence that relate specific needs or attributes to other without a failure.
agents on a network. Repository: A subsystem such as a database used for
Internet: An infrastructure that links thousands of net- data, information, or knowledge storage.
works to one another; the information highway that Scalability: Ability of a computer system, a database infra-
makes the information stored on thousands of com- structure, or a network to be upgraded to new standards.
puters worldwide available to millions of people Serviceability: A criterion that emphasizes the impor-
everywhere. tance of vendor services and support.
Interoperability: Ability to move back and forth between SMTP: simple mail transfer protocol; a TCP/IP protocol
different systems. used on the Internet to deliver messages between elec-
Intranet: A network using TCP/IP to share information tronic mail hosts and to specify message structure.
within an organization. TCP/IP: Transmission control protocol/Internet protocol;
Justifier: Explains the action (line of reasoning) of the standards architecture used on the Internet and in
expert system to the user. many other networks.
Knowledge center: An area in the organization where Technical core: The aspect of the knowledge management
knowledge is available. system that represents the technology and technical
Knowledge creation: Generating experience via team- features that make the system operational.
work, repositories, or other interfaces. Transport layer: The layer that standardizes exchanges
Legacy application: An application that once ran on between the operating systems of the computers in the
mainframes or operated on traditional programming system.
languages such as Cobol. Usability: The degree to which a system is deemed useful
Middleware: A software layer in the technology core that by the end user; a criterion that ensures user friendly
makes connections between old and new data formats. software.
Modularity: Refers to the ease of modifying the software User interface: A layer that standardizes exchanges
across product lines. between the ultimate user and the system.
Navigation: In Web design, it refers to how easily a user Web: Also called World Wide Web; a service on the
moves through Web pages, files, or records in a com- Internet in which users working with browsers can
puter-based system. retrieve Web pages from any Web server around the
Neural net: An information system modeled after the world. Each page is in hypertext format and contains
human brain’s network of electrically interconnected links to other Web pages.
Test Y o u r U n d e r s t a n d in g 1111
1. W hat is know ledge creation?
2. A job is m ore than a task. D o you agree? Give an example.
3. H ow is know ledge created and transferred via team s?
4. Explain the m ain im pedim ents to know ledge sharing.
142 7 7 7 7 PART II Knowledge Creation and Capture
Knowledge Exercises • • * *
1. A rrange a visit to a m edium - or large-size firm in your area. In an interview
with a com pany representative, address the following:
a. Identify the satellite knowledge centers.
b. Identify m anagers for each know ledge center within departm ents or
divisions.
c. Identify the com pany’s KM strategies and specific projects that support
overall corporate goals.
d. W rite up strategic plans to higher levels of m anagem ent and get their
buy-in.
2. Access to know ledge is based on profiles derived from the knowledge base.
W hat technology would you recom m end to provide access? W ho will m an-
age such access?
T. Visit the In tern et and review the latest applications based on expert systems,
C BR, and neural nets. W rite a short report showing how these applications
relate to know ledge m anagem ent.
4. Visit the In tern et and look up two articles that explain the role of the CKO.
R ep o rt your findings to class.
CHA PTER 4 Knowledge Creation and Knowledge Architecture aaaa 143
Ref ere nc es , , im
Berry, John. Real Knowledge Is Held by People. New Malhotra, Yogesh. “Knowledge Management in Inquiring
York: CMP Media, Inc., 2000. Organizations,” 2001, www.brint.com/km, Date
Boland, R. J. “The In-Formation of Information Sys- accessed August 2002.
tems,” in R. J. Boland and R. Hirschhe (eds.), Critical Marwick, A. D. “Knowledge Management Technology,”
Issues in Information Systems Research. Chichester: IB M Systems Journal, vol. 40, no. 4,2001, pp. 814-830.
Wiley, 1987. Nonaka, I., and Takeuchi, H. The K nowledge Creating
Churchman, C. W. The Design o f Inquiring Systems. New Company. Oxford, UK: Oxford University Press, 1995.
York: Basic Books, 1971. Robb, Drew. “Draft Your Dream Team,” Knowledge
Davenport, T. H., and Prusak, Laurence. Working M anagement, August 2001, pp. 44-50.
Knowledge. Boston, MA: Harvard Business School Shruti, Date. “Agencies Create CKO Posts to Get in the
Press, 1998. Know,” G overnm ent Com puter N ew s , November 8,
Flash, Cynthia. “Who Is the CKO?” Knowledge 1999, pp. 1-2.
Management, May 2001, pp. 37-41. Tapscott, Don. G rowing Up Digital: The Rise o f the Net
Gill,T. G. “High-Tech Hidebound: Case Studies of Generation. Boston, MA: Harvard Business School
Information Technologies That Inhibit Organizational Press, 2001.
Learning,” Accounting, Management and Information Tiwana, Amrit. The Knowledge Management Toolkit.
Technologies , vol. 5, no. 1,1995, pp. 41-60. Upper Saddle River, NJ: Prentice Hall, 2000, p. 309.
Capturing Tacit
Knowledge
Contents
In a Nutshell
W hat Is Knowledge C apture?
Evaluating the E xpert
Levels of Expertise
C apturing Single Versus M ultiple E xperts’ Tacit Knowledge
A dvantages and D raw backs of Using a Single E xpert
Pros and Cons of M ultiple Experts
D eveloping a R elationship with Experts
C reating the Right Im pression
U nderstanding the E x p ert’s Style
Preparing for the Session
Deciding W here to Hold the Sessions
A pproaching M ultiple Experts
Fuzzy R easoning and the Q uality of Knowledge C apture
A nalogies and U ncertainties in Inform ation
U nderstanding Experience
The Language Problem
The Interview As a Tool
Types of Interviews
G uide to a Successful Interview
Setting the Stage and Establishing R apport
Phrasing the Q uestions
Q uestion C onstruction
Things to Avoid
Reliability of Inform ation from Experts
E rrors M ade by the K nowledge D eveloper
Problem s E ncountered D uring the Interview
Ending the Interview
Issues to Assess
R apid Prototyping in Interviews
Benefits and D raw backs
CH A PTER 5 Capturing Tacit Knowledge i «i i 145
Im plications for Knowledge M anagem ent
Sum m ary
Terms to Know
Test Your U nderstanding
K now ledge Exercises
R eferences
In a Nutshell
K now ledge m anagem ent system s derive their pow er from the know ledge they use.
W hen know ledge developers begin the building process, they are confronted with the
first ste p —capturing tacit know ledge (see Figure 5.1). As m entioned in earlier chap-
ters, tacit know ledge resides in the minds of people —the experts in the departm ent,
division, or the firm. A know ledge developer converts hum an know-how into machine-
ready “say-how ” by using an iterative process of articulation, a series of refinem ent
cycles, or rapid prototyping, in which the com puter’s perform ance is com pared to that
of the hum an expert.
C apturing tacit know ledge and converting it into rules that the com puter can use is
a costly business. It requires an extensive time com m itm ent from the dom ain expert
and the special skills of the know ledge developer. A t times, the expert m ight lose inter-
est in the project and even feel like quitting. Perhaps the knowledge developer and the
ex p ert ju st n ever seem to hit it off because of their interp erso n al chem istry, or the
knowledge developer may use the wrong tool or approach.
W orking with experts in capturing their tacit know ledge is not a straightforw ard
routine. For exam ple, the m ethods or tools chosen for know ledge capture depend on
the tem peram ent, personality, and attitude of the expert and w hether the knowledge
autom ation system is being built around a single expert or m ultiple experts. A nother
im portant factor is w hether one or m ore knowledge developers will be involved in the
building process.
B efore beginning the know ledge capture process, a knowledge developer needs to
have an understanding of the e x p ert’s level of expertise. The knowledge developer can
look at several indicators of expertise as well as specific qualifications to determ ine
w hether som eone is an expert. O ne of the most im portant indicators is the ex p ert’s
com m unication skills.
Using either a single or m ultiple experts each has advantages and limitations. For
sm aller know ledge m anagem ent systems, a single expert should suffice. In problem sit-
u ations with d ispersed know ledge, which req u ire synthesis of experience, m ultiple
experts are p referred. In either case, working with experts (and accom m odating the
146 7777 PART II Knowledge Creation and Capture
/
Knowledge
Knowledge
Innovation
Sharing
Goal
Knowledge
Transfer
ex p erts’ individual styles of expression) requires special skills. The location at which
know ledge cap tu re sessions are held adds a n o th e r dim ension th a t the know ledge
developer m ust consider.
■ ■ a a a a box 5.1
SO U RC E: Awad, E. M. Building Expert Systems. Minneapolis, MN: West Publishing, 1996, p. 144.
148 7777 PART II Knowledge Creation and Capture
questions lead the expert through scenarios, or case situations. Then, the knowledge
developer returns to specific points and questions the expert further until all angles of
the problem are explored. H ere is a partial session with a loan officer who is trying to
capture her experience on how she decides to approve or deny a loan:
S teve (know ledge developer): W hat is your m ain job as a loan officer?
S andra (loan officer): I review loan applications and recom m end which
ones qualify for a loan.
St eve: H ow long have you been on this job?
Sa n d r a : E ig h te en years w ith this bank and 7 years with
another bank before coming here.
St eve: The idea of lending and how loans are approved or
denied is intriguing. Suppose you receive a loan ap-
plication. Then what? I m ean, what do you do next?
Sa n d r a : Well, let me see. This is going to take time to explain.
The gist of the process I follow is to m entally plug
the inform ation that the applicant provides against
criteria I use that help me decide w hether to approve
or deny the loan.
St eve: W hat criteria do you use?
Sa n d r a : The m ain criteria are the ap p lic a n t’s em ploym ent
status and how long he or she has been on the job,
m arital status, annual salary and o th e r sources of
incom e, credit history, m onthly expenses, and the
like. There is really no set procedure, and nothing is
set in concrete. It all depends.
St eve: W hat do you m ean?
Sa n d r a : Well, I sort of size up the overall application against
criteria, strategies, potential, the interest of our bank
in the loan, the state of the com petition, and so on. I
tell you, I d o n ’t mind elaborating further, but maybe
we should allocate a n o th e r session or two for the
details. W hat do you think?
St eve: (sensing unease by Sandra) I agree. How about next
Tuesday, the same time, the same place?
Sa n d r a : Fine, unless you hear from me today or tom orrow ,
le t’s go ahead and m eet then.
St eve: Thanks. See you Tuesday. M eantim e, if you have any
set rules that I can work with regarding the criteria or
the decision process, I ’d app reciate your sending
them to me by e-mail at your convenience.
Sa n d r a : I’ll see what I can do.
To c a p tu re th e know ledge used in building com plex KM systems, know ledge
developers use flow charts, flow diagram s, decision trees, decision tables, and o th e r
graphic rep resen tatio n s. U sing the loan cap tu re scenario, a p artial decision tree is
shown in Figure 5.2. You can appreciate the logical flow of a decision tree and how
easy it is to codify tacit know ledge based on graphical flow.
K now ing how ex p erts know w hat they know is the b o tto m line in know ledge
cap tu re. E x p e rt know ledge is cognitively com plex and tacitly pragm atic. It is not
always easy to c a p tu re th ro u g h a tra d itio n a l interview process. In m any cases in
CHA PTER 5 Capturing Tacit Knowledge aaaa 149
w hich know ledge c a p tu re was unsuccessful, th e know ledge d ev elo p er did not
quite understand the pragm atic natu re of the expertise. Just as the knowledge devel-
o p er m ay n o t fully u n d erstan d the expert, the expert m ay be equally unclear about
th e know ledge d ev elo p er. E x p erts som etim es perceive know ledge developers as
dom ain novices, w ho re q u ire p atience and w ho m ust go through an apprenticeship
process th at takes them from novice to near-expert status during the building of the
know ledge m anagem ent system. This perception is even m ore reason for the know l-
edge d e v e lo p e r to d ev o te serio us efforts to w ard p re p a ra tio n and a fam iliarity in
the dom ain.
The following suggestions can be used to im prove the know ledge capture process:
1. K now ledge developers should focus on how experts approach a problem . They
m ust look beyond the facts or the heuristics.
2. Know ing th at tru e expertise takes the form of chunked knowledge, know ledge
developers should reevaluate how well they understand the problem dom ain and
how accu rately they are m odeling it. C an they see p a tte rn s and relationships
leading to a solution? T hat is, can the know ledge developer grasp the complexity
150 7777 PART II Knowledge Creation and Capture
of the dom ain? C onceptual tools (discussed in C hapter 6) provide the developer
with a concise, easy way to capture heuristics.
3. The quality of hum an em ulation is best captured through episodic knowledge or
know ledge b ased on p revious experience. T h erefo re, a know ledge developer
should elicit the ex p ert’s know ledge through concrete case situations or scenarios.
BOX 5.2
S O U R C E : Wakat, Heather. Interview by Mary Hill, knowledge developer of the aerobic fitness knowledge management system.
University of Virginia, Spring 2000.
CHA PTER 5 Capturing Tacit Knowledge a a a a 151
and build the episodic memory. U nlike sem antic memory, which is the knowledge
of facts, episodic m em ory is the know ledge of cases based on experience. Case-
based reasoning is effective in building com plex KM systems.
2. Sees the big picture. Experts can sift through information and readily determine which
factors are im portant and which are superfluous. In a study of radiologists reading X-
rays, novices searched for particular features in the X-ray, looking for each feature’s
underlying causes. As the radiologists gained more experience, they began to realize
that certain features were dependent on other features in the X-ray and learned that
the context offered them cues. This process illustrates the complexity of true expertise.
3. P ossesses g o o d com m u n ication skills. A know ledge developer cannot create a
reliable expert system if the expert cannot com m unicate his or her knowledge.
V erbal skills facilitate sm ooth tacit know ledge capture.
4. Tolerates stress. Building KM system s can test an ex p e rt’s patience, particularly
w hen the know ledge developer asks the wrong question, the interview simply stag-
nates, or the dom ain is too difficult for the know ledge developer to understand.
5. Thinks creatively. A n expert should d em onstrate a certain inventiveness w hen
solving a p ro b lem or explaining the reasoning b eh in d a solution. C reative
ap p ro ach es can clarify th e e x p e rt’s th o u g h t processes and ability to convey
know ledge to the know ledge developer.
6. E xhibits self-confidence. E xperts believe in their ability to deliver. A self-confident
expert can accept criticism and react w ithout feeling threaten ed w hen an answer is
not known. Self-confidence also boosts an e x p ert’s capacity to handle stress.
7. M aintains credibility. E xperts who dem onstrate com petency in the way they field
questions gain a rep u tatio n for believability based on the experience others have
had with them .
8. O perates within a sch em a-driven orientation. The expert does serious schem a-
driven or stru ctu red , thinking in an effort to com e up w ith realistic, w orkable
solutions. (Two exam ples are provided in Box 5.3.)
9. Uses ch u nked know ledge. C hunks are groups of item s stored and recalled as a
unit. Several studies have shown that an individual’s ability to recall inform ation
increases p roportionately with the am ount of chunking. For example, a study of
BOX 5.3
LEVELS OF EXPERTISE
The critical role of com m unication skills cannot be overem phasized. Various studies
have shown th at different levels of expertise influence com m unication quality. O ne can
arbitrarily classify experts into three levels: the highly expert person, the m oderately
expert person, and the new expert.
H ighly expert person s generally give concise explanations. They assume the listener
has enough know ledge about the problem ; therefore, they focus on the key steps, often
skipping vital details. Highly expert persons also tend to rate their own expertise highly.
M oderately expert p ro b le m solvers may be m ore tentative in their explanations, but
they tend to provide detailed explanations. They are quicker to give answers than the
highly expert person and m ore often adapt their description to the level of the know l-
edge developer.
N ew experts are m ore likely to offer answers that are brief and fragm ented, which
suggests shallow know ledge of the dom ain. (See Box 5.4 for a description of character-
istics and capabilities of an e x p ert’s knowledge.)
B ased on the generalizations about the levels of expertise, one can conclude that
th e m ore ex p ert th e p erso n is, the longer th a t person will tak e to com m unicate an
answer. A highly expert person stores years of experience in long-term memory, which
may take longer to recall and transform into a verbal response. The challenge for the
know ledge developer then is to help the expert “unpack” or “dechunk” the know ledge
a ccu rately and quickly. R echecking and cross-validating the e x p e rt’s opinions are
im portant steps to follow in the tacit know ledge capture process.
I fl 1 fl I 9 BOX 5.4 fl fl fl I fl fl
SO U RC E: Hayes-Roth, F., and Jacobstein, N. “The State of Knowledge-Based Systems,” Com m unications o f the A C M , March
1994. p. 28.
project to the organization, the types of experts available, and the funds allocated for
building the KM system. Each alternative has advantages and limitations.
1. A single expert is ideal when building a sim ple K M sy ste m —one with few rules.
A one-on-one interactive relationship betw een a single know ledge developer
and a single expert prom otes close ties quickly and speeds the knowledge cap-
ture process.
2. A p ro b le m in a restricted do m a in calls f o r a single expert. For exam ple, D avid
Smith, G eneral E lectric’s locom otive expert, knew the problem s of diesel engines
and how to best repair them . His expertise m ade him the best choice for solving a
particularly difficult problem in a restricted domain.
3. A single expert facilitates the logistics asp ect o f co o rd in a tin g arran gem en ts fo r
know ledge capture. O nce an expert agrees to do the work, one can m ore easily
arran g e m eetin g tim es and schedules th an if m ultiple ex perts are involved.
P ro to ty p in g also m oves quickly, because only one expert needs to review the
work and vouch for its readiness.
4. With a single expert, p ro b le m -rela ted o r p erso n a l conflicts are easier to resolve.
C om m unications are usually easier, and the approach to know ledge capture is
m ore consistent w hen only one expert is involved.
5. Single experts tend to share m ore confidentiality with project-related inform ation
than do m ultiple experts. P art of hum an nature is sharing inform ation: A s m ore
people are party to a session, m ore opportunities arise for th a t inform ation to
leak. O f course, m uch depends on both the n ature of the project and the stan-
dards and integrity of the experts.
II Knowledge Creation and Capture
As attractive as the single expert approach is, several draw backs are w orth keep-
ing in mind:
1. Som etim es the expert’s kn ow ledge is n ot easy to capture. If the expert has difficulty
explaining or com m unicating procedures, the project can die quickly, especially if
no backup expertise is available.
2. Single experts p ro v id e a single line o f reasoning, which m akes it difficult to evo k e
in-depth discussion o f the dom ain. If som eone sees a doctor and learns that he or
she has a serious disease, that person would certainly appreciate a second opin-
ion. M ultiple experts are m ore likely to provide a built-in system of checks and
balances (see Box 5.5).
3. Single experts are m ore likely to change scheduled m eetings than experts who are
p a rt o f a team. U nfortunately, people who m ake the best experts are often the
least accessible. O th er projects may limit an ex p ert’s com m itm ent to a new one.
As a result, a reasonable deadline for com pleting the project may be uncertain.
4. E xpert kn ow ledge is som etim es dispersed. Relying on a single expert, especially in
a com plex system, can either create blind spots or result in a system that will have
no users. C onsider, for exam ple, the area of m edicine, in which personnel are
trained separately for radiology, gynecology, and internal medicine. M ost medical
KM system s n eed to draw upon com m unity know ledge bases and in teg rate
expertise from different areas to be successful. No single expert can realistically
address m ore than one area.
fl fl 1 9 fl i BOX 5.5
a i 9 9 9 9
consensus, the success of the project could be in jeopardy. D isparity am ong the
experts can also cause the least-senior expert to stifle, edit, or com prom ise an
opinion. The know ledge developer must be sensitive to this issue (see Box 5.6).
3. The greater the num ber o f p eo p le in vo lved , the harder it m ay be to retain confiden-
tiality. As m entioned earlier, both the individuals involved and the nature of the
problem dom ain determ ine the level of confidentiality needed.
9 9 9 9 9 9 BOX 5.6
SO U RC E: Awad, E. M. Building Expert Systems. Minneapolis, MN: West Publishing, 1996, p. 168.
156 7777 PART II Knowledge Creation and Capture
TABLE 5.1 Advantages and Drawbacks of Using Single and Multiple Experts
_______________Single Expert_________________________________ M ultiple Experts
Advantages Advantages
1. Ideal for building a simple domain KM 1. Works best for complex problem domains
system 2. Stimulates interaction and synthesis of
2. Works well for problems in a restricted experience
domain 3. Presents a variety of views allowing
3. Simplifies logistical issues for alternative representations of tacit
4. Increases the probability of resolving knowledge
conflicts 4. Generates more thoughtful
5. Decreases risks to confidentiality contributions
Disadvantages Disadvantages
1. Not easy to capture an expert’s tacit 1. Creates scheduling difficulties
knowledge 2. Increases the probability of disagreement
2. Provides only a single line of reasoning 3. Raises confidentiality issues
3. Increases the chance of schedule 4. Requires more than one knowledge
changes developer
4. Does not accommodate dispersed 5. Leads to a “process loss” in determining
knowledge a solution
..................................................... .. .......... m m m m mi m
details the n atu re and m akeup of the dom ain. This type of research is also a way to
learn the ex p ert’s language. Can you imagine building a real estate KM system w ithout
know ing term s like p rim e rate, variable interest rate, or balloon m ortgage? A n early
grasp of the basics inspires confidence on the part of the expert and allows the know l-
edge developer and expert to be m ore productive.
A n im p o rtan t beginning step in the first session is personal introductions. The
expert is eager to know w hat type of person the know ledge developer is and what the
goals are for the project. The sooner rapport is established, the easier things will move.
H onesty is im portant. The expert and the know ledge developer need to understand
each o th e r’s experience related to the problem at hand. Hum ility avoids a situation in
which constant questions may appear arrogant.
A retirem ent benefit rule m ight be m ore complex, although still understandable.
For example:
Try pressing the surgeon to explain this sta te m e n t and see how far you get.
B ecause the English language does not always distinguish clearly betw een words or
the m eaning of certain words, the interpretation of words often depends on their con-
text. This fuzziness increases the difficulty of translating w hat the expert has said into
rules that m ake sense.
This p attern m atching is an o th er fuzzy com parison that m ust be clarified before
the inform ation acquired can be usable. A know ledge developer who runs into this line
of reasoning m ust learn m ore about the ex p ert’s exam ples and pay attention to how
the expert forms analogies, or p attern matching.
In addition to analogy problems, a knowledge developer may also encounter uncer-
tainties in information. A n expert’s knowledge or expertise is the ability to take uncertain
information and use a plausible line of reasoning to clarify the fuzzy details. O ne aspect of
uncertainty is belief. Belief describes the level of credibility. People generally use all kinds
of words to express belief; these words are usually paired with qualifiers such as very,
highly, or extremely. For example, words such as possible, likely, and definite show rela-
tionships between words that express belief. To handle uncertainty expressed in words, the
knowledge developer must draw out such relationships during tacit knowledge capture.
UNDERSTANDING EXPERIENCE
Knowledge developers can benefit imm ensely from an educational grounding in cog-
nitive psychology. The hum an expert usually follows the same basic reasoning princi-
ples as a com puting system. To solve a problem , the expert acquires inform ation from
the outside world and stores it in the brain. W hen a question is asked, the expert operates
on certain stored inform ation through inductive, deductive, or o ther problem -solving
m ethods. The resulting answ er is the culm ination of processing stored inform ation.
W hen know ledge developers ask an expert how he or she arrived at an answer,
they are asking the expert to relive an experience. The right question will evoke the
m em ory of ex periences th a t previously p ro d u ced good solutions. H ow quickly the
expert responds to a question depends on the clarity of the content, w hether the con-
tent was recently used, and how well the expert understood the question.
Visual im agery is often re p resen te d by phrases the expert uses in a descriptive
answer. For example, “som ething tells me,” “sounds O.K. to me,” “I heard that,” “hmm,
let me see —one m ore tim e,” and “the m anual illustrated” are phrases that show the
expert is m entally reacting to an image. W hen the expert uses this type of phrase, the
know ledge dev elo p er should ask, “W hen you say som ething tells you, w hat do you
m ean or w hat do you see?” or “W hy did you say it sounds O.K. to you?”
CHA PTER 5 Capturing Tacit Knowledge a a ■a 161
A t times, the e x p e rt’s em otions are involved in the problem -solving process. For
exam ple, phrases like “I have a feeling,” umy gut feeling is,” and “my sixth sense tells
m e” serve as the conscious representation of sensory m em ories that have gone dorm ant
for lack of use. The know ledge developer can clarify the content behind these phrases
by asking, “H ow would you describe this feeling?” or “W hat m akes you feel this w ay?”
P eople w ho have difficulty with visual im agery usually have tro u b le answ ering
questions. W hen the know ledge developer does not understand an explanation, he or
she should ask the expert to go through it again and pay closer attention to the content
of the answ er as well as any clues to visual imagery. A know ledge developer may need
to step back to b e tte r u n d e rsta n d how th e e x p ert thinks th ro u g h a problem . A s a
know ledge capture tool, interview ing allows rep eated questioning for knowledge cap-
ture and verification. Interview ing principles are explained later in the chapter.
The main goal of pointing out these am biguities is to w arn the knowledge devel-
o p er to be alert to m eanings as well as to verbal and nonverbal cues. The success of
the sub seq u en t steps in building a KM system is d ep en d en t on accurate know ledge
capture.
1. Its flexibility m akes it a superior tool for exploring areas about which not m uch is
know n concerning w hat questions to ask or how to form ulate questions.
2. It offers a b e tte r oppo rtu n ity than any o th er tool for evaluating the validity of
inform ation acquired. The know ledge developer cannot only hear w hat is said
but also how it is said.
3. It is an effective technique for eliciting inform ation about complex subjects and
for probing an individual’s sentim ents underlying expressed opinions.
4. M any p e o p le en joy being in tervie w e d , regardless of the subject. They usually
cooperate when all they have to do is talk.
The m ajor draw back to interview ing, how ever, is the cost involved in extensive
p rep aratio n time. Interview s also take a lot of time to conduct. W henever a m ore eco-
nom ical way of capturing the same knowledge is available, the interview is generally
not used.
E ven th ough interview ing experts is an art learn ed at school, m ost know ledge
developers develop expertise through experience. Knowledge developers need to pay
attention to the prim ary requirem ents for a successful interview: the developm ent of a
sound, structured strategy and the creation of a friendly, nonthreatening atm osphere
th at puts the expert at ease. A n experienced interview er elicits credible answers that
the expert can offer with no fear of criticism.
CH A PTER 5 Capturing Tacit Knowledge ■■« a 163
TYPES OF INTERVIEWS
Interview s vary widely in form and structure. From a know ledge capture perspective,
interview s range from the highly unstructured (neither the questions nor their responses
are specified in advance) to th e highly stru c tu re d (th e q u estions and responses are
definitive). O f course, a great deal of variation is possible within this range.
The u n stru c tu re d in terview is used w hen the know ledge d ev elo p er w ants to
explore an issue. It allows experts to answ er spontaneous questions openly (see Fig-
ure 5.3). U n structured techniques are not easy to conduct, and this kind of interview is
difficult to plan. A n expert may in terp ret the lack of structure as perm ission to avoid
preparing for an interview.
T he stru ctu red interview is used w hen the know ledge developer w ants specific
inform ation. It is goal-oriented. In m ultiple expert know ledge capture, the questions
should be p resented with the sam e wording and in the sam e order to each expert. For
exam ple, the question to one expert, “W ould you like to see a prototype of what you
gave m e during the last session?” will not elicit the same response as asking, “How do
you feel about showing the m aterial you gave me during the last session in the form at
of a p ro to ty p e ? ” Standardized questions can im prove the validity of the responses by
ensuring th at all experts are responding to the sam e question.
A stru ctu red question is expressed as a set of alternatives. Several variations of
structured questions can be used:
1. Multiple-choice questions offer specific choices, faster tabulation, and less bias
due to the way the answers are ordered. Because m ost people have a tendency
to favor the first choice item , alternating the o rder of the choices may reduce
bias; how ever, additional time is needed to pick the choice item question (see
Figure 5.4).
2. Dichotomous (yes/no) questions are a special type of m ultiple-choice question.
They offer two answers (see Figure 5.5). The sequence of questions and content is
also im portant.
3. Ranking scale questions ask the expert to arrange items in a list in order of their im-
portance or preference. In Figure 5.6, the question asks the expert to rank five state-
m ents on the basis of how descriptive the statem ent is of the expert’s current job.
Finally, with the sem istructured technique, the know ledge developer asks p red e-
fined questions but allows the expert some freedom in expressing the answers. H ere is
a dialogue from the D iabetic Foot KM System:
164
CH A PTER 5 Capturing Tacit Knowledge aaaa 165
K n ow ledge developer: W hat possible answers do you expect?
D iabetic specialist: A nkle, big toe, from kneecap to ankle, or “I ’m not sure.”
K n ow ledge developer: Suppose the answ er is “big toe.” W hat do you do next?
D iabetic specialist: I’d look for coloration, swelling, and possible curving of the toe.
K n ow ledge developer: W hat would be your next question?
The process continues until the know ledge developer has no m ore questions to
ask. The ad v antage over the u n stru ctu red technique is th a t the inform ation is well
structured and the inform ation solicited is reasonably clear. A disadvantage is that this
inform ation may not be com plete in other possible ways.
4. Efficiency: R espect the tim e schedule or com m itm en ts o f the expert. The session
should not be an extended social event. The expert may not com plain, but other
people who need the expert might.
5. P rofessionalism : P ro p er dress an d dem ean or are im portant. For example, a con-
servative gray suit is a p p ro p ria te a ttire w hen you are interview ing a banking
expert. A casual outfit may be passable when you are interview ing on the assem -
bly line. If the session takes place in the e x p e rt’s environm ent, the know ledge
developer should be a courteous guest.
6. Respect: B e courteous and a g o o d listener. M ore than any other advice, respect for
the ex p ert is a m ust. In te rru p tin g the ex pert can alter the th o ught process or
break the ex p ert’s train of thought.
QUESTION CONSTRUCTION
R eg ard less of q u estio n type, a qu estio n m ust be valid enough to elicit a reliable
response. The know ledge developer m ust focus on question content, wording, and for-
m at. H ere is a'sum m ary checklist:
1. Q uestion content
a. Is the question necessary? Is it a part of o th er questions?
b. D oes the question adequately cover the intended area?
c. D oes the expert(s) have p roper inform ation to answ er the question?
d. Is the question biased in a given direction?
e. Is the q u estio n likely to g en erate e m o tio n al feelings th a t m ight color
responses?
CHA PTER 5 Capturing Tacit Knowledge aaaa 167
(a) Open-to-Closed Question Approach
Begin
Open-Ended Questions
Secondary Questions
Closed Questions
Acquired
End
Knowledge
Open-Ended Questior
Secondary Questions
Closed Questions
Begin
(b) Closed-to-Open Question Approach
2. Q uestion wording
a. Is the question w orded to suit the e x p ert’s background and expertise?
b. C an the question be m isinterpreted? W hat else could it m ean?
c. Is the fram e of reference uniform for all experts?
d. Is the wording biased tow ard a specific answer?
e. H ow clear and direct is the question?
3. Q uestion form at
a. C an the question be fram ed in the form of m ultiple choices (answ ered by a
w ord or two or by a num ber) or with a follow-up free answer?
b. Is the response form easy to use and adequate for the job?
c. Is the answ er to the question likely to be influenced by the preceding ques-
tion? T hat is, is it subject to a contam ination effect ?
THINGS TO AVOID
O ne of the dangers of interview ing is generalizing conclusions on the basis of a few ses-
sions. Transcribing notes into rules often results in verification problem s th at arise later
d u rin g th e testin g of th e KM system . E x p e rts are often ann o y ed w hen they k eep
repeating the sam e rules or p ro cedure or keep repeating the sam e inform ation. The
alternative to n ote taking is taping the session. The m ain draw back of this technique is
the tim e it takes to play back the tape. V ideotaping is not recom m ended, because few
experts are com fortable in fro n t of a cam era. In either case, a know ledge developer
should practice with the equipm ent prior to the session to becom e fam iliar with it and
to m ake sure everything is w orking properly.
A n im portant guideline for a know ledge developer is not to aggressively debate
or in te rru p t th e e x p e rt’s discussions or convert the interview into an interrogation.
168 7777 PART II Knowledge Creation and Capture
elicit the inform ation th at the expert is qualified to provide. V erbalization conveys
the inform ation th at is available in working memory, also called spoken p ro to c o l
5. R ole bias. The risk of role bias increases when the expert is aware of his or her
im portance as the critical elem ent in building the KM system. The expert might
w onder, “W hat type of person should I be as I answ er this question?” and then
select a role to fit the expectations of the know ledge developer. R esearch has
shown that experts with limited formal schooling tend to exhibit “put o n ” behavior
and are m ore likely to distort the knowledge elicited than highly educated experts.
V arious validation and cross-validation m ethods should be applied before cap-
tu re d know ledge can be re p re sen ted . For exam ple, one way to cross-validate an
ex p ert’s opinions is to ask an o ther expert and check for sim ilarities betw een the two
opinions. A n o th er way to validate an opinion is to ask the question again at the next
session to see if the expert gives the sam e answer.
The know ledge developer m ust watch for biased responses from the expert early
in the capture process and find ways to correct the tendency.
Response Bias
A response bias occurs when experts answer questions on the basis of their inter-
pretation of the question and in response to certain constraints: lack of time, lack of m oti-
vation, perceived hostility, an attem pt to please the knowledge developer, and so on. A
com bination of wording and tone of voice can also prom ote response bias. For example:
The questioner coaxed an unintended “yes” answer by prefacing the question with
“Isn ’t it tru e ” or “D o n 't you think.”
A n o th er response bias stem s from the order of the questions asked, which is called
the contam ination effect. For example, a question that is asked following another ques-
tion is answ ered one way; if it were asked later or earlier in the questioning sequence,
the answer could be totally different.
O ne test to reveal bias is the circular triad. For example, when the expert for the
D iabetic Foot KM System says, “ I consider vascular disease m ore serious than neu -
ropathy,” and then says, “I consider neuropathy m ore serious than charcot,” and then
states, “ I consider charcot m ore serious than vascular disease,” it is called a circular
triad. This type of contam ination is usually the result of long interview sessions, loss of
m otivation or interest, fatigue, or faking, which provides even m ore reason for pretest-
ing the questions.
Inconsistency
The problem of inconsistency is most likely to occur when the knowledge devel-
oper interviews two dom ain experts and is inconsistent when asking the questions. For
the sake of validity, the questions and their order should be standardized. Validity is
related to reliability; they are two faces of the same coin. Validity is addressed when
one asks, “D oes the question m ean the sam e thing to all of the experts being in ter-
view ed?” If it m eans different things to different people, then the question is not valid.
No invalid questions obtain accurate responses. Reliability, on the other hand, occurs
w hen the question elicits the sam e response at different times. The reliability of an
ex p ert’s answ er can be revealed by answering the question, “H ow much credence can
we place in this answ er?” If the question is not valid, one can assume that the answer is
not reliable. Knowledge developers often rephrase questions and ask a variety of ques-
tions about the same process to ensure the reliability of the inform ation captured.
CH A PTER 5 Capturing Tacit Knowledge aaaa 171
Communication Difficulties
N ot everyone has a knack for explaining things. The know ledge developer may
need to resort to analogies or o ther tools to stim ulate the ex p ert’s thought process. For
example, the know ledge developer may say, “If I understand you correctly, you would
require the application to be a hom eow ner and have an average income of $50,000 to
qualify for a $30,000 car lo an ?” or simply ask the expert “I am not sure I follow what
you just explained. Can you go through it one m ore tim e?”
C om m u n icatio n p ro b lem s can also stem from the know ledge developer, who
may not have been listening or did not understand. H ow ever, when a knowledge devel-
o p er adm its to these lapses, m ost experts do not m ind rep eatin g or simplifying the
poin ts ju st explained. N ext tim e, the know ledge d ev elo p er had b e tte r get it right,
because pretending to u nderstand is a destructive habit. A sking the expert to repeat
the sam e thing three tim es could cause tem pers to flare and th reaten the end of the
whole process.
Hostile Attitude
N othing is m ore problem atic to an interview process than hostility. Various factors
cause hostility: bad chem istry betw een the expert and the know ledge developer, an
ex p ert’s “forced” participation, or time wasted on repeated deadends. Unfortunately,
no quick fixes work for reducing hostility.
Standardized Questions
O n the surface, the task of stan d ardizing q u estions does not a p p e a r difficult.
H ow ever, even if the wording is the same, the way the question is asked, the tone of
voice, and the facial expression can elicit a different response.
ISSUES TO ASSESS
D uring the interview, several issues may arise. To be prepared for the m ost im portant
issues, a know ledge developer should consider the following questions:
• H ow would one elicit knowledge from experts who cannot say what they mean or
mean what they say? Sometimes, the expert is know ledgeable but has difficulty
explaining things. W hether this difficulty stems from lack of know ledge usually
becom es apparen t during the first m eeting. Unless it is a one-tim e blunder on the
part of the expert, an alternative expert should be considered immediately.
• What does one say or do when the expert says, “Look, I work with shades o f gray
reasoning. I sim ply look at the problem and decide. D o n ’t ask me why or how. ”
U nless a know ledge developer is well prepared to handle unexpected situations,
this type of answ er could very well end the interview. The expert probably knows
the solution so well th at the details are an unconscious part of it. The knowledge
developer m ust w ork around this unconsciousness and look for ways to get at the
details indirectly.
• H ow does one set up the problem domain when one has only a general idea o f
what it should be? O ne rule of thum b is to ask the expert to illustrate or explain—
through scenarios—the general procedure of th.e domain. The knowledge devel-
■ a a a a fl b o x 5.7 fl a a fl a a
S O U R C E : Excerpted from Arthur, L. J. Im proving Software Quality: A n Insider's Guide to TQM . New York: John Wiley & Sons,
Inc., 1992.
problem , however, is lack of clear guidelines for rapid prototyping use. A nother draw -
back is th at the p ro to ty p e itself can create user expectations that, in turn, becom e
obstacles to further developm ent efforts. As a result, users refuse to buy into it, and the
transition to an operational KM system never materializes.
Su m m a r y 1 ■ 1 ■
• The goal of tacit know ledge capture is to extract problem -solving knowledge
from the hum an expert in o rder to build a KM system. The scope of the dom ain
should be well defined, the dom ain should contain com m on-sense knowledge,
and the resulting KM system must be a m anageable size.
• E xperts have definite qualifications. They include perceptual ability to discern
the relevant from the irrelevant, com m unication skills, creativity, self-confidence,
and credibility. M otivation, enthusiasm , and willingness to share the expertise
are also im portant. The right expert does not guarantee a successful expert sys-
tem , however.
• T hree levels of experts are emphasized: the highly expert person, the m oderately
expert problem solver, and the new expert. Each level carries its own contribu-
tions and constraints. The best situation occurs when the knowledge developer is
able to w ork with the m ost qualified expert available.
• Using a single expert or m ultiple experts both have pros and cons. Single experts
are ideal for simple and relatively quick KM systems; they entail fewer conflicts
to resolve and m ake logistical arrangem ents easier. The m ain risk is that the
credibility of the expert system depends entirely on the thought processes of one
expert. In contrast, m ultiple experts are typically used in problem dom ains with
diffused knowledge. They provide a synthesis of experience that is critical for the
reliability of the system ’s solutions. H ow ever, scheduling difficulties, process loss,
and the need to involve m ore than one knowledge developer can m ake the use of
m ultiple experts problem atic.
• A com m on problem encountered in interview ing is an expert who cannot easily
convey the know ledge even though he or she may be quite com petent at the spe-
cialty. To the nonexpert, an ex p ert’s p attern m atching or analogy can resem ble
fuzzy reasoning.
• A m biguities of language during interview ing or when interpreting the ex p ert’s
descriptions or explanations is a com m on problem a knowledge developer must
be aw are of and work to avoid.
• A structured interview has several variations: multiple-choice, dichotom ous, and
ranking-scale questions. Each variation has its own form at and goals.
• Interview ing should be approached logically, using stage setting, proper phrasing
of questions, good listening, and evaluating the session outcome. Q uestion
sequencing as well as probing the expert for details are also im portant.
176 iiaa PART II Knowledge Creation and Capture
T e r ms t o K n o w 1 , 1 1
Age effect: Bias against a person due to age. Ranking scale question: A question that asks the respon-
Analogies: Comparing a problem to a similar one dent to arrange items in a list according to preference
encountered previously. or importance.
Closed question: A question that asks for specific Reliability: Dependability; truthfulness of the response or
responses. answer to a given question; credibility; how well the
Dichotomous question: A question answerable by one of KM system delivers solutions with consistency, accu-
two answers, usually yes or no. racy, or integrity; detecting or removing anomaly.
Gender effect: Bias against a person based on gender. Response bias: Bias resulting from the subjective
Interview: A face-to-face interpersonal situation in which responses of the expert to any given question.
a person called the interviewer asks another person Role bias: An altered attitude resulting from the expert’s
questions designed to elicit certain responses about a awareness of his or her importance in the building of a
problem domain. KM system.
Multiple-choice question: A question that offers the Scribe: A person who takes notes during interviews and
expert specific answer choices. maintains all the documentation related to the project.
Novice: An individual with skills and solutions that work Secondary question: A question used to probe for further
some of the time but not all of the time. details or for follow-up on an area under discussion.
Open-ended question: A question that asks for general Uncertainty: Lack of adequate information to make a
rather than specific responses. decision.
Primary question: A question that elicits the most impor- Unstructured interview: An approach in which the ques-
tant information in one area during the interview; leads tions and the alternative responses are open-ended.
to further questions to obtain pertinent details. Validity: The logical correctness of a question, which is
Race effect: Bias against a person due to race. worded in order to elicit the information sought.
Test Y o u r U n d e r s t a n d in g 1 , 1 1
1. In your own words, define tacit knowledge capture. W hat m akes it unique?
2. A re there any particular steps involved in knowledge capture? Explain briefly.
3. “The problem solution should be based on symbolic know ledge rath er than
num erical com putation.” D o you agree? Explain.
4. How would one identify expertise?
5. W orking with experts requires certain skills and experience. W hat sugges-
tions or advice w ould you give to an inexperienced know ledge developer
concerning:
a. w orking with or approaching an expert
b. preparing for the first session
6. W orking with m ultiple experts has definite benefits and limitations. Cite an
exam ple in which the use of m ultiple experts is a must. Explain your choice.
CH A PTER 5 Capturing Tacit Knowledge i ■i ■ 177
7. U se an exam ple of your own to illustrate the conditions u n der which you
would be willing to build a KM system based on a single expert. Justify your
choice.
8. W hy should the know ledge developer understand the differences am ong the
levels of experts? Isn ’t an expert an expert regardless of level?
9. Explain the relationships betw een an e x p ert’s:
a. m otivation and willingness to share know ledge
b. credibility and perceptual ability
c. creativity and w ell-developed perceptual ability
10. H ow does p attern m atching adversely affect the quality of an interview?
11. In w hat ways is visual im agery helpful in recalling chunks of experience?
12. Distinguish betw een:
a. validity and reliability
b. m ultiple-choice and dichotom ous questions
c. question form at and question content
d. question w ording and question content
13. Briefly explain each of the uncontrolled sources of e rro r th at the know l-
edge developer needs to consider. W hich source do you consider most seri-
ous? Why?
14. W hat is the interview er effect? How likely is the occurrence of this problem ?
15. R eview briefly som e of the problem s e n c o u n te re d during an interview.
W hich problem do you consider m ost serious? W hy?
16. The chapter suggests a guide to a successful interview. D oes it allow enough
flexibility? T hat is, w hat d eterm in es how strictly one should follow the
guide?
17. E xperience teaches that how questions are phrased can determ ine the nature
of the answers. In know ledge capture, explain how the following are related:
a. question phrasing and question sequence
b. prim ary and secondary questions
c. open-ended and closed questions
18. In w hat way is rapid prototyping related to interview ing? Be specific.
K n o w l e d g e E x e r c is e s ' 1 11
1. W hat suggestions can you m ake for im proving know ledge capture?
2. W hich of the prerequisites for know ledge capture described in the chapter
do you think is the m ost crucial? Why?
3. D o you think know ledge capture can be fully or easily autom ated? Why or
why not?
4. “A n expert exhibits a certain depth of detail and exceptional quality in expla-
nations.” How im portant is the “exceptional quality” of an ex p ert’s explana-
tions in know ledge capture? Explain.
5. W hen the expert tells you what he or she does not know, does that indicate
expertise?
6. Why are good com m unications skills so im portant in knowledge capture? Is
this quality a prerequisite for experts only? For knowledge developers? Why?
7. If you were asked to select an expert, how would you proceed? W hat charac-
teristics would you look for? W hat other factors would you consider?
8. “Knowledge developers can benefit immensely from an educational ground-
ing in cognitive psychology.” Do you agree? Why or why not?
9. If you w ere building a KM system using a single e x p ert w ho had been
coaxed for weeks to participate, what things would you avoid in interviewing
such an expert?
178 7 7 7 7 PART II Knowledge Creation and Capture
10. Select two other people to form a group of three. O ne person will be A, the
second person will be B, and the third person will be C. Have A ask a question
of B. B will then ask a question of C. C will ask a question of A. Q uestions
may cover areas pertaining to the course m aterial or a KM system project
you would like to work on. Review the following questions:
a. H ow well have you learned about one another?
b. W hat were you doing when the other two people were talking to each
other?
c. W hat experience did you have when you asked one question at a time?
Be specific.
d. In general, how did you spend m ost of your time?
11. Interview ing is som etim es similar to conversation. G et into a conversation
with an o th er person for 15 minutes. Choose a topic in advance. How many
tim es did the topic change? W hat triggered the change in the topic?
12. W atch an interview on TV betw een a news rep o rter and an expert in the field
(such as a police or g o vernm ent official). R eco rd how the interview was
started. W hat types of questions were asked? D o you agree with the question
sequence and construction? Explain.
13. D eterm ine w hether the following questions are leading questions or neutral
questions:
a. You like to operate on patients, d o n ’t you?
b. W hen was the last time you had less than satisfactory surgery?
c. H ow does an auto loan differ from a com m ercial loan?
d. W ould you classify yourself as an orthopedic surgeon or a specialist in
hip replacem ent?
e. H ow do you feel about applicants lying on their application form?
14. W rite the nam e of one person you adm ire and one person you dislike or dis-
trust. The person could be som eone you know, a celebrity, or a national fig-
ure. M ake a list of traits each person possesses. W hich of these traits are criti-
cal aspects of credibility? H ow w ould the d istru sted person p roceed to
change his or her image in your eyes?
15. Publisher KM System:
The goal of the first session with the expert was to develop a m aster list of the
v ariables th a t the ex p ert con sid ered im p o rta n t in deciding on w hether
a m an u scrip t should be published. These variables w ere condensed into
20 possibilities and then ran k ed in o rd e r of im portance. The ranking was
p resen ted to the expert for verification. The variables w ere reduced to the
five m ost im portant:
a. m arketability of the work
b. review ers’ opinions of the m anuscript
c. au th o r’s prior publishing record
d. a u th o r’s requirem ents before signing a contract with the publisher
e. cost of m anufacturing the book
In p re p a ra tio n for the first interview , the know ledge d ev eloper review ed
published articles abo ut book publishing, w hat m anuscripts get published,
the criteria used in m aking favorable decisions, and the book production
process. This b ack g ro u n d p rovided a n u m b er of p refa to ry questions th a t
w ere included in the first session.
Assignm ent:
For this project, set up a list of questions to ask the expert (book editor)
during the first interview. Explain the reason(s) for choosing these ques-
tions. W hat variables or param eters have you been able to conclude from
the session?
C H A PTER 5 Capturing Tacit Knowledge i i i ■ 179
16. M ultiple experts w ere used to capture know ledge for the R esidential Real
E state KM System. The reasons are:
a. O ne objective of this KM system is to integrate the expertise in real
estate tax and finance, which requires two separate experts.
b. The procedure of m aking a buy-or-lease decision is a complex and intense
process for a single expert to provide all necessary inform ation to come
up with a decision. The nature of the problem also suggests that to m ake a
decision, one has to consider both tax and financial issues. Thus, multiple
experts are necessary to divide the scope into m anageable pieces.
c. M ultiple experts give the ability to com pare and contrast the knowledge
captured. The real estate finance expert has deep know ledge in the real
estate tax field as well. H e was particularly helpful in confirm ing the tax
inform ation captured from the tax expert. Confirm ing the validity of the
proposed recom m endation and solution is critical considering the contin-
uously changing tax law. O ne expert m ight not be aware of the change,
while the o th er is.
Q uestions:
a. In your opinion, is the use of a m ultiple expert approach justified for this
project? Explain.
b. Can the use of two know ledge developers to tackle the problem be justi-
fied? W hat are the conditions for a m ultiple knowledge developer
approach to building this system? Explain.
Re f e r e n c e s 1111
Arthur, L. J. Im proving Software Quality: An Insider’s Hill, Mary with Dr. Heather Wakat, University of
G uide to TQM . New York: John Wiley & Sons, Virginia, Spring 2000 (personal interview).
Inc., 1992. Johannessen, Jon-Arild, Olaisen, Johan, and Olsen, Bjorn.
Awad, Elias M. Building Expert Systems. Minneapolis, “M ismanagement of Tacit Knowledge,” www.program.
MN: West Publishing Co., 1996, pp. 134,168. forskningsradet.no/skikt/johannessen.php3, Date
Davenport,T. H., and Prusak, Laurence. Working accessed April 2002.
Knowledge. Boston, MA: Harvard Business School Pfeffer, Jeffrey, and Sutton, Robert I. The Knowing-D oing
Press, 2000, pp. 137-140. Gap. Boston, MA: Harvard Business School Press,
Eisenhart, Mary. “Gathering Knowledge While It’s Ripe,” 2000, pp. 1-28.
Knowledge Management, April 2001, pp. 49-54. Sherman, Lee. “Managing the Modern Docum ent,”
Gill, Philip J. “The Ancient Art of Storytelling Emerges Knowledge M anagement, September 2001, pp. 48-52.
A s a Tool for Knowledge M anagement,” K nowledge Stewart, Kathy A ., Storey, Veda C., and Robey, Daniel.
M anagement, May 2001, pp. 24-30. “Plugging the Knowledge Drain: Strategies and
Hayes-Roth, E, and Jacobstein, N. “The State of Technologies for Acquiring Knowledge in Lean
Knowledge-Based Systems,” Communications o f the Organizations,” Journal o f Information Technology
A C M , March 1994, p. 28. M anagement, vol. 10, no. 3-4,1999, pp. 59-67.
Other Knowledge
Capture
Techniques
Contents
In a Nutshell
Overview
On-Site Observation
Brainstorming
Electronic Brainstorming
Protocol Analysis
What Is a Scenario?
Protocol Procedure of the Diabetic Foot KM System
Consensus Decision Making
The Repertory Grid
Nominal Group Technique (NGT)
The Delphi Method
Concept Mapping
Procedure
Concept Mapping and Semantic Nets
Blackboarding
Implications for Knowledge Management
Summary
Terms to Know
Test Your Understanding
Knowledge Exercises
References
In a Nutshell
Like any other professional, the knowledge developer must be well versed in the use of
specialized knowledge capture tools. Each tool has a unique purpose, depending on
w hether the capture process revolves around a single expert or m ultiple experts.
Among the tools are computer-based tools designed to prom ote accuracy and integrity
of the knowledge capture process.
A knowledge developer might want to observe the problem-solving process in a
situation in which an on-site observation would be a proper tool. When dealing with
two or more experts, brainstorm ing followed by consensus decision making is pre-
ferred. Whatever tool is chosen, the knowledge developer must follow a preestablished
procedure for conducting the session.
A unique knowledge acquisition technique for single experts is protocol analy-
sis or the think-aloud method. In essence, it involves listening to the spoken protocol
of the expert. During the session, the expert speaks aloud whatever thoughts come
to mind while answering a question or solving a problem . In contrast, a repertory
grid uses a grid or a scale to represent the expert’s way of looking at a particular
problem. The number of gradations on a scale can be increased to reflect a more accu-
rate rating.
O ther techniques for multiple experts include the nom inal group and Delphi
methods. Each m ethod has unique features and a procedure to make its use opera-
tional. The nominal group method is an interface between consensus and brainstorm-
ing; the Delphi method is a polling of experts’ opinions via questionnaires.
An attractive computer-based method for multiple experts is the blackboard. Also
called groupware, this global memory structure promotes privacy and equality among
participating experts. It attempts to get the experts to agree on a solution, and it is ideal
for complex problem-solving involving several experts.
Overview
A knowledge developer must recognize that many complex problems cannot be solved
by single experts. For example, the prototype for the Diabetic Foot KM System
described in the preceding chapter will involve two other specialists in the field to
agree on medical and surgical treatm ent before the KM system can be medically certi-
fied. To be sure that knowledge is reliable, multiple experts are often required.
When dealing with multiple experts, the knowledge developer must be famil-
iar with the tools and techniques that are unique to the task. C hapter 5 focused on
ways to ensure a successful interview with a domain expert. The use of this tool re-
quires a customized approach to both the expert and the process. This chapter exam-
ines other tools used in knowledge capture: on-site observation, protocol analysis, and
consensus m ethodologies, including brainstorm ing, consensus decision making, the
repertory grid, nominal group technique, and the Delphi method for multiple experts.
A more recent knowledge capture tool, blackboarding, will be discussed at the end of
the chapter.
Acquiring knowledge from multiple experts requires experience and special-purpose
techniques. W ithout this combination, serious problems often arise, such as experts
walking out, faking solutions to end the session, and so on.
182 77 7 7 PART II Knowledge Creation and Capture
Brainstorming
Unlike on-site observation, which focuses on the work of a single expert, brainstorming—
an unstructured approach to generating ideas about a problem —invites two or more
experts into a session in which discussions are carried out and a variety of opinions are
tossed around. The primary goal of this process is to think up creative solutions to
problems. In brainstorming, all possible solutions are considered equally. The emphasis
is on the frequency of responses during the session. Anything related to the topic can
be brought up, and everything is valued. Questions can be raised for clarification, but
no evaluation is made at the moment.
In brainstorming, the first look is on idea generation, followed by idea evaluation.
Similarities begin to emerge across opinions, which are then grouped logically and
evaluated by asking several questions:
• If one followed up on this idea, what benefits would ensue? (All ideas are item-
ized or prioritized.)
• What problem(s) would a selected idea solve?
• What new problem(s) would arise?
In the evaluation phase, the knowledge developer explains each idea and treats
any comments or criticisms accordingly.
The general procedure for conducting a brainstorming session is as follows:
1. Introduce the brainstorming session. Explain what it is and what it is not designed
to accomplish, the role of each participant, the “rules of the game,” and the
expected outcomes. Starting with the wrong objective or the wrong step can
doom the entire process.
2. Give the experts a problem to consider. The problem approved by the organiza-
tion is in the experts’ domain of expertise. The knowledge developer must give
them time to think it through and then be a good listener and show enthusiasm c
but also set reasonable time limits.
3. Prom pt the experts to generate ideas. The experts can do this either by calling out
their ideas or by establishing some order in which each expert will have a turn to
speak. The knowledge developer must keep pace with the expert.
4. Watch fo r signs o f convergence. Ideas often trigger counteropinions or reinforce-
ments that should eventually coax the experts to converge onto the final four, the
final two, and the final solution. When experts begin to pass or the rate and qual-
ity of ideas presented declines, the process moves on to convergence.
If experts cannot agree on the final solution from two or three alternatives, the
knowledge developer may call for a vote or a consensus in order to reach agreement
on the best final solution; this does not guarantee success. The intensity of the discus-
sion just prior to such a vote, the tem peram ent of the experts, and how willing they are
to resolve conflicts all influence whether a consensus can be reached.
184 7 7 7 7 PART II Knowledge Creation and Capture
ELECTRONIC BRAINSTORMING
A relatively new development in brainstorming is a computer-aided approach to deal-
ing with multiple experts. Desks in a U-shaped layout hold PCs networked through a
software tool that serves as a catalyst in the meeting, promotes instant exchange of
ideas between experts, and sorts and condenses those ideas into an organized format.
Such a tool also allows experts to elaborate and vote on ideas (see Figure 6.1).
For example, an electronic brainstorm ing process begins with a presession
plan that identifies objectives and structures the agenda, which is presented to the
experts for approval. During the live session, each expert chooses a PC and engages in
a predefined approach to resolving a focused issue and then generates ideas or plans.
The experts gain leverage from anonymity, focus on content (not personalities), and
engage in parallel and simultaneous communication. This format allows two or more
experts to provide opinions through their PCs without having to wait their turn. The
software displays the comments or suggestions on a huge screen without identifying
the source.
This method protects the shy expert and prevents tagging comments to individuals.
The overall benefits include improved communication, effective discussion of sensitive
issues, shorter meetings, and closure of m eeting with concise recommendations for
action. The sequence of steps is summarized in Figure 6.2. The expert’s ideas are priori-
Printer
CHAPTER 6 Other Knowledge Capture Techniques ■■■■ 185
tized.This eventually leads to convergence and setting final specifications. The result is
joint ownership of the solution.
To illustrate the process used in electronic brainstorming, a group of graduate pro-
fessors met one day to discuss the field research topics for MIS graduate students. The
1-day session using IB M ’s Electronic B rainstorm er began with a focused topic:
G enerate a portfolio of field research projects for graduate MIS students. The facilita-
tor (the role taken by the knowledge developer) asked each professor to list as many
topics as desired through the PC. Each professor was assigned an ID that was not visi-
ble on the screen when the questions were entered or displayed.
Table 6.1 shows the resulting input of the seven participants.
After the questions had been listed on the screen, they were discussed, and redun-
dancies were removed. Afterwards, the key topics remained, as shown in Figure 6.3.
The questions listed were reviewed and arranged in order of priority. Then a vote was
taken. The resulting matrix shown in Table 6.2 provides the voting results.
■■ Protocol Analysis
Suppose you want to understand the diagnostic process of a medical expert; the knowl-
edge he or she uses; and the cognitive actions they take. How would you go about it?
One obvious approach is to ask the expert questions about diagnosis. Chances are the
expert will not find it easy to answer questions. One of the authors found out that his
orthopedic surgeon is more used to doing the job than explaining it. The surgeon tried to
explain diagnosing a diabetic foot in terms of the formal procedure he learned in medi-
cal school, which is not quite the diagnosis he follows with each patient. The alternative
is to observe an examination of a real patient and then listen to the spoken protocol.
186 7 7 7 7 PART II Knowledge Creation and Capture
Participant 2:
2.1 Work with physical plant on cost estimating system
2.2 Assist athletic department in establishing an injury database
2.3 Work with local IBM office to sell more PCs
2.4 D evelop database of nine in-class speakers from industry
Participant 3:
3.1 Work with medical imaging specialists on patient database
3.2 Explore use of COBOL to access distributed database
3.3 Establish a database of MIS internships
Participant 4:
4.1 Analyze communication media (e.g., electronic and/or voice mail), perhaps using the
Commerce School as a case study
4.2 Study the allocation o f computer resources in the University of the Comm School
4.3 D eterm ine the effect of various levels of DSS on player performance of a management
simulation game
4.4 R econcile use of university and Comm School e-mail
4.5 Evaluate the impact of G DSS on Comm student group productivity
Participant 5:
5.1 Study graphics applications in GDSS (Can we integrate graphics input?)
5.2 A nalyze issues of migration to graphic user interfaces for end users
5.3 Automate commerce student registration
Participant 6:
6.1 A nalyze new CASE tools
6.2 Examine use of simulation tools for dataflow modeling
6.3 Evaluate use of GDSS tools in an academic environment
Participant 7:
7.1 Explore implementation issues of electronic mail
7.2 Simulate knowledge acquisition session with multiple experts
7.3 Implement a neural network to evaluate mortgage applications
a ■ ■ a ■ a ---------------------------------------
CHAPTER 6 Other Knowledge Capture Techniques ■■■« 187
A nalyze group decision support systems (1.2)
D evelop executive information systems (1.4)
D o projects that add to technical capabilities o f our school
Simulate rapid prototyping through brainstorming with experts
Implement e-mail for graduate MIS students (4.4)
Simulate knowledge capture session for multiple experts (7.2)
Build interactive knowledge-based system to train med students (3.1)
D evelop electronic rosters and grad submissions (7.1)
Evaluate current case tool (6.1)
Rank
Sum
Analysis o f group decision 56
Executive information system 43
D o projects that add to 38
D oing rapid prototyping 36
Implement e-mail for 33
Knowledge acquisition session 33
Build interactive knowledge 29
D evelop electronic roster 22
188 . . . . PART II Knowledge Creation and Capture
■ ■ 1 1 1 1 BOX 6.1 i 1 I 1 i 1
a a i i fl a
analysis or think-aloud method shows clearly how the solvers approached the problem
one step at a time. It is a useful technique for knowledge capture.
WHAT IS A SCENARIO?
In protocol analysis, protocols (also known as cases or sc e n a rio s) are collected by ask-
ing experts to solve a problem and verbalize what goes through their heads, stating
directly what they think. In other words, the expert keeps talking, speaking out loud
whatever thoughts come to mind, while they answer a question or solve a problem.
Unlike their role in other techniques, knowledge developers do not interrupt or ask
questions in the interim. The solving process is carried out in an automatic fashion
while the expert talks. Structuring the inform ation elicited occurs later when the
knowledge developer analyzes the protocol.
The term scen a rio is used to refer to a detailed and sometimes complex sequence
of events. Mission scenarios, for example, are a detailed specification of a flight plan, a
CHAPTER 6 Other Knowledge Capture Techniques i ■« 1 189
series of aircraft maneuvers and pilot tasks. These can be used to train pilots or to con-
sider the performance requirements of an aircraft.
A scenario refers to a situation or, more precisely (because it has a temporal com-
ponent), an episode. A scenario involves individuals, objects, and courses of events.
O ne im portant characteristic of scenarios is that they describe particular states of
affairs and events. They can be used to describe possible worlds in which certain yet to
be considered actualities could occur. This is the case with mission scenarios, where a
pilot is being trained for certain anticipated events. It is also true of design scenarios, in
which a designer imagines what it would be like to interact with a system using a par-
ticular kind of device.
The purpose of a scenario is to provide an explicit concrete vision of how some
human activity could be supported by technology. Scenarios are one good reference
point for making design decisions. By showing the actual circumstances under which
people work, scenarios provide guidelines on how a technology should perform. The
very act of making things explicit and clear also helps in making design choices.
For a scenario to be good, it must realistically depict some actual human activity. It
must “bring to life” for its users the activity that is to be supported. Scenario develop-
ers need interviewing and writing skills as well as technical imagination and under-
standing. These skills could be distributed betw een two people; for example, one
researcher might be an especially good interviewer, while the other has strong writing
skills and technical depth.
5. Being diabetic, blisters take a long time to heal. It is not likely to get worse.
40. I don’t see skin broken or pus accumulating, which is a good sign.
41. I’m going to recommend NSD and soaking the foot in warm water before going
to bed and after getting up in the morning.
42. Her husband is going to have to help.
43. I’m going to recommend that patient wear wide-toed shoes.
64. So, for the moment, I am going to tell the patient to see me in 2 weeks.
65. Right now, I wouldn’t recommend any medical treatment. Surgery is the last
thing on my mind.
66. I’ll relay this diagnosis and decision to patient.
In summary, think-aloud or protocol analysis is a knowledge capture method that
consists of asking experts to think aloud while going through a problem solution and
analyzing the resulting verbal protocols. It is an effective source of information on cog-
nitive processes and for building knowledge management systems. In fact, think-aloud
makes the expert (in this example, the surgeon) cognizant of the process being
described, which is a contribution to the validity of the practice or procedure used in the
diagnosis. It also provides a wealth of information toward knowledge representation.
Novice Expert
Unsatisfactory Satisfactory
G radations break down the scale for more accurate ratings. In the following
unsatisfactory-satisfactory construct, a 1-5 point scale is used.
Unsatisfactory Satisfactory
1 2 3 4 5
Once a particular scale has been adopted, it should stay the same throughout the
grid, although the terms that describe the rating vary from construct to construct. The
rating is useful in comparing individual rankings. For example, if John is rated “1,” Ann
is rated “3,” and Bob is rated “4,” it does not mean that Bob is four times as satisfactory
192 7 7 7 7 PART II Knowledge Creation and Capture
as John. It only means that Bob is more satisfactory than either John or Ann. It is a
comparative subjective rating of elements along a scale.
One of the benefits of the repertory grid is that it may prompt the expert to think more
seriously about the problem and how to solve it. The main drawback is that it tends to be a
difficult tool to manage effectively when large grids are accompanied by complex details.
Large grids defeat the tool’s goals of clarity, simplicity, and manageability. For this reason,
knowledge developers normally use the grid in the early stages of knowledge capture.
The practical use of the repertory grid can be demonstrated by the following inter-
view, in which the human resources director compares bank tellers in order to decide
on potential promotions or transfers. The expert is the human resources director. The
comparative rating of the tellers is shown in Figure 6.4.
KD: As I understand it, we’re here to discuss the selection process and selec-
tion criteria for the bank’s tellers.
Ex pe r t : Yes, I’m interested in reviewing all of the tellers to get a better under-
standing of our selection procedure.
KD : Which tellers do you consider prime candidates for the purpose of the
selection procedure?
Ex pe r t : I have in mind Dixie, John, Barry, Curt, Lester, and Joanne.
KD: If you take the first three tellers (Dixie, John, and Barry), which two are
about the same but differ from the third?
Ex pe r t : I’d say Dixie and John are similar, but Barry is quite different.
KD: If experience is the similarity factor, what word would describe their
dissimilarity?
Ex pe r t : Inexperience
KD: Suppose we place “experience” and “inexperience” on a scale of 1 to 3,
where 1 represents “inexperienced” and 3 represents “experienced.”
How would you rate the tellers?
Ex pe r t : Dixie 3
John 3
Barry 1
Curt 1
Lester 1
Joanne 1
1 Inexperience 3 3 1 1 1 1 Experienced
2 Academically Ill- Academically Qualified
Qualified 2 1 2 1 1 3 Good Appearance
3 Poor Appearance 3 2 1 2 1 3 Punctual
4 Late 2 3 2 3 1 1 Extroverted
5 Introverted 2 3 3 2 1 1
T1 Dixie
T2 John
T3 Barry
T4 Curt
T5 Lester
T6 Joanne
CHAPTER 6 Other Knowledge Capture Techniques iiai 193
KD: Let us now take the last three tellers, Curt, Lester, and Joanne. How
would you compare them?
Ex pe r t : These tellers, I’d want to compare in terms of academic qualifications. I’d
say Joanne is better qualified than Curt or Lester. Using the 1 to 3 scale
you suggested earlier, I’d rate the six tellers as follows:
Dixie 2
John 1
Barry 2
Curt 1
Lester 1
Joanne 3
KD: Next, let’s take Joanne, Dixie, and Barry. How would you rate them?
Ex pe r t : I guess I’d want to rate them based on appearance —how well they look
in the eyes of the customers. Based on custom er feedback, I’d rate
Joanne and Dixie the same. Barry is not in the same league. I’d rate them
as follows:
Dixie 3
John 2
Barry 1
Curt 2
Lester 1
Joanne 3
KD: Let's take one more group—John, Curt, and Lester.
E x pe r t : These tellers remind me of attendance. John and Curt are hardly ever
late to work. Lester is often late. So, using the 1 to 3 scale (1 is tardy; 3 is
prompt). I’d rate them as follows:
Dixie 2
John 3
Barry 2
Curt 3
Lester 1
Joanne 1
KD: Do you have other ratings you want to include?
Ex pe r t : Just one dealing with John, Barry, and Lester. John and Barry are extro-
verts; Lester isn’t. I’d use the 1 to 3 scale (1 = introvert; 3 = extrovert)
and rate them as follows:
Dixie 2
John 3
Barry 3
Curt 2
Lester 1
Joanne 1
1. The knowledge developer explains the technique and provides to each expert
information about the problem or alternative solutions.
2. Instead of discussing the problem, the knowledge developer asks each expert to
list on paper the pros and cons of the problem or alternative solutions. This is
silent generation of ideas in writing.
3. The knowledge developer compiles a list of all pros and cons without making
comments regarding their merit. Any overlapping ideas are either reworded or
deleted.
4. Each expert is given a copy of the compiled pros and cons and asked to rank
them on the basis of their priorities.
5. The knowledge developer then leads a discussion of the pros and cons and their
respective ranks. The discussion focuses on the priorities placed on each item and
the reasoning behind them, which leads to a listing of possible solutions.
6. The knowledge engineer compiles the alternative solutions. This is followed by a
group discussion that should lead to agreement of the “best” solution.
Concept Mapping
A unique tool to represent knowledge in graphs is concept mapping. It is a network of con-
cepts that consists of nodes and links. A node represents a concept, and a link represents
the relationship between concepts (see Figure 6.5). Similar to a semantic network, concept
mapping can be done for several reasons: to design a complex structure (such as large Web
sites); to generate ideas ( for example, brainstorming); to communicate complex ideas
(such as finding petroleum); or to diagnose misunderstanding. Initially developed by J. D.
Novak at Cornell University in the 1960s, concept mapping is designed to transform new
concepts and propositions into existing cognitive structures related to knowledge capture.
As can be seen, concept mapping is a structured conceptualization, where a topic
of interest involving input from one or more experts produces a clear pictorial view of
their ideas, their concepts, and how they are interrelated. It is an effective way for a
group to function without losing their individuality. In contrast to concept mapping is
mind mapping, which consists of a key word or concept. The knowledge developer
draws around the central word several main ideas that relate to that word. From each
“child” word, several main related ideas are further drawn. A mind map has only one
main concept; a concept map may have several.
196 7 7 7 7 PART II Knowledge Creation and Capture
SOURCE: Adapted from Lanzing, Jan. “Concept Mapping.” Article posted on users.edte.utwente.nl/lanzing/
cm_home.htm, Date accessed October 18,2002.
PROCEDURE
Using a concept map as a tool involves a 6-step procedure. As shown in Figure 6.6,
these steps are as follows:
• Preparation, which centers around identifying the participants and developing a
focus for the knowledge capture project. For example, in the Diabetic Foot KM
System, the orthopedic surgeons decided to focus on defining gangrene before
discussing it. A schedule for the mapping is also agreed upon.
• Idea generation. In this step, the participants generate a series of statements that
address the focus and expected outcomes as a result of the participation. This is
where brainstorming and nominal group tools may be useful.
1
Preparation of Project
(participants, focus, schedule)
5
Interpretation 4
(cluster analysis) Statement
Representation
CHAPTER 6 Other Knowledge Capture Techniques aaa a 197
• Statement structuring. Once the statements are assembled, they are sorted into piles
of similar ones, with one statement on each standard-size card. Then, each pile is
given a unique descriptive label, and each participant rates each statement on an
agreed-upon scale, such as 1 to 5 (1 = unimportant and 5 = extremely important).
• Representation. This step represents idea analysis. It is where the sort and ratings
are represented in map form. One form of analysis, called cluster analysis, takes
the output of the point scaling and partitions the map into clusters. The state-
ments that are specific outcomes are viewed as outcome clusters.
• Interpretation. In this step, the knowledge developer or facilitator works with the
participants to arrive at their own labels and how each map is interpreted.
• Utilization. This is where the maps are actually made operational, and the results
are displayed.
characteristics of each element, and a way to link things together. For example, the
knowledge base would indicate that the insignia on O lesek’s shirtsleeve signifies a
flight instructor.
■ Blackboarding
Imagine bringing a group of experts together in a room with a large blackboard. The
experts work together to solve a problem, using the blackboard as their work space.
Initial data are written on the blackboard for all to see. Each expert has an equal
chance to contribute to the solution via the blackboard. The process of blackboarding
(also called groupware) continues until the problem has been solved.
One im portant assumption of a blackboard system is that all participants are
experts, but they have acquired their own expertise in situations different from those of
the other experts in the group. Because each expert’s experience is unique, no one
need feel either inferior or superior in offering a possible solution. The essence of this
technique is the independence of expertise in an atmosphere that discourages compli-
ance or intimidation.
There are several characteristics of blackboarding:
1. Diverse approaches to problem-solving. The fact that the experts have different
ways of thinking does not prevent them from solving the problem. Each expert
(called a knowledge source , or KS) in this technique is similar to a black box
whose internal thinking process is hidden from other KSs in the meeting. It does
not really matter how each KS thinks through a solution. Each KS can make con-
tributions within the framework of the blackboard.
2. Common language fo r interaction. The KSs participating in this technique should
share a common language (including use of diagrams and charts) so that they can
interact, interpret, and contribute to the final solution. Private jargon or abbrevi-
ated phrases should be discouraged, because they limit the involvement of other
KSs in the solution process.
3. Flexible representation o f information. An expert’s suggestion of an alternative or
a partial solution in graphics versus text is allowable by the software as long as it
can be understood by all experts concerned. No prior restrictions on the informa-
tion limit its content or how it should be represented on the blackboard.
4. Efficient storage and location o f information. Virtually all of the information con-
tributed by the KSs is stored somewhere in the blackboard. To ensure quick
access to an updated version of the blackboard, the blackboard is organized into
regions, each representing a specific type of information. Once the type of infor-
mation required is determined, the KS can go directly to the suitable blackboard
region and scan the information stored in it. Remember that experts do not inter-
act with one another directly. Each KS watches the blackboard, looking for the
right opportunity to contribute to the solution. KSs who see a new change on the
blackboard can decide whether they agree with it, and if not, they can go ahead
and contribute their opinion.
KSs are also motivated by events other than those displayed on the black-
board. For example, a KS might inform the blackboard about an event of per-
sonal interest, which is entered on the blackboard. The blackboard then directly
considers the KS owner whenever that type of event occurs.
CHAPTER 6 Other Knowledge Capture Techniques i aaa 199
5. O rganized participation. One benefit to blackboard technology is that two or
more experts cannot respond to an event simultaneously. Only one expert at a
time is allowed, which promotes control and gives each KS a chance to mull over
the changes before they decide to contribute. The knowledge developer can be
used to restore order by considering each KS’s request to approach the black-
board with the proposed change.
6. Iterative approach to problem -solving. The solution to the problem domain is
approached step by step, like building blocks from bottom up or from basic to
advanced. In this situation, no single KS has a full answer to the problem. Each
KS refines and adds something of value to someone else’s contribution, and the
whole group moves toward the solution incrementally. A summary of the charac-
teristics of blackboarding is provided in Figure 6.8.
A typical blackboard system consists of three parts: knowledge sources (KSs), the
blackboard, and a control mechanism. The inference engine and the knowledge base
are part of the blackboard system. A knowledge source is the expert—a unique module
that has the knowledge to solve the problem.
The blackboard is a global m emory structure, a database, or a repository that
stores all partial problem solutions and other data that are in various stages of comple-
tion. It serves as a communication medium and triggers a KS into action or controls the
necessary information for the blackboarding process.
B lackboard processing is based on the concept of independent cooperating
experts. Each KS is an independent expert who observes the status of the blackboard
and tries to contribute a higher level partial solution based on the knowledge it has and
how well such knowledge applies to the current blackboard state. In this respect, the
blackboard is useful for structuring complex problem-solving jobs that require multi-
ple experts.
The control mechanism coordinates the flow and pattern of the problem solution.
It monitors the changes on the blackboard and decides on the next action(s) to take.
The problem-solving behavior of the whole process is encoded in the control module
(see Figure 6.9).
The blackboard approach is useful in situations involving m ultiple expertise,
diverse knowledge representations, or uncertain knowledge. It can be particularly
valuable when working with complex applications or prototyping an application.
Unfortunately, blackboard systems have too short a history to provide a good rationale
for advocating their use. This is compounded by a lack of commercial software specifi-
cally designed for building blackboard applications and a shortage of developers expe-
rienced in this area.
Summary 1 1 1 1
• On-site observation is a process of observing, interpreting, and recording based
on observation of the expert’s problem-solving behavior while it takes place. The
technique carries with it a certain protocol. It requires more listening than talking
and enables the knowledge developer to seek knowledge within the working
world of the expert. The main problem is that some experts do not like to be
observed. Some question as to the accuracy of the captured knowledge may also
arise. The shuttle process allows room for possible errors.
CHAPTER 6 Other Knowledge Capture Techniques a«a 1 201
Brainstorming invites two or more experts into an idea generation session in
which discussions are carried out and a variety of opinions are tossed around. The
procedure includes introducing the brainstorming session, presenting a problem
for the experts to consider, prompting the experts to generate ideas, and watching
for signs of convergence. This technique dictates that the expert cannot be cut
short, yet some experts talk too long for comfort. Electronic brainstorming tends
to improve the efficiency with which brainstorming is conducted and evaluated.
Protocol analysis or think-aloud is a knowledge capture method that allows cases
and scenarios to be collected by asking experts to solve a problem while verbaliz-
ing what goes through their heads—stating directly what they think. The expert
speaks out loud whatever thoughts come to mind while answering a question or
solving a problem.
Consensus decision making is used to arrive at a clear agreement regarding the
best solution to a problem. As a tool, it follows brainstorming. Experts converge
toward one or two alternatives for a final consensus. This technique is quite effec-
tive and works well most of the time, but it is a bit tedious and can take hours to
conclude. One of the drawbacks is that options unfairly carry the same weight.
Some participants are uncomfortable with its rigidity.
The repertory grid is used to capture and evaluate the way the expert works
through a solution to a problem domain. The grid is a scale with elements
described by the gradations. Gradations break down the scale to allow for more
accurate rating. Once adopted, the scale should stay the same throughout the
grid, although the terms that describe the rating vary from construct to construct.
One of the benefits of the grid is that it may prompt the expert who sees it on
paper to think more seriously about the problem and how to solve it. On the
other hand, the grid can be difficult to manage.
An alternative to the consensus technique is the nominal group technique or
NGT. It is an ideawriting or idea generation technique used as an interface
between consensus and brainstorming. A panel of experts becomes a nominal
group. The idea is to structure small group meetings so that individual judgments
can be effectively pooled. NGT is time-consuming and tedious. One way to expe-
dite this procedure is to have the experts vote as a group on the set of possible
problems to work on, and later on which solution(s) to use. The tool is ideal in
situations of uncertainty regarding the nature of the problem domain.
The Delphi m ethod is a series of surveys that poll experts concerning a given
problem domain. Questionnaires pool the experts’ responses in order to solve a
difficult problem. The procedure begins by asking a panel of experts to prepare
individual anonymous opinions about a focused problem domain. For the second
round, each expert receives a summary of the results of the first round and is
asked to make a second estimate on the same issue based on the additional infor-
mation provided ir^ the summary. This second step is repeated two or more times,
and then a final surtimary is prepared. The main feature of this tool is anonymous
response, controlled feedback, and statistical group response. A poorly designed
questionnaire can be a serious constraint.
Blackboarding offers a diversity of approaches to problem-solving and a common
language for interaction. It also has the characteristics of flexible representation
of information, efficient storage and location of information, organized participa-
tion, and an iterative approach to problem-solving. The blackboard approach is
useful in situations involving multiple expertise, diverse knowledge representa-
tions, or uncertain knowledge.
202 7 7 7 7 PART II Knowledge Creation and Capture
Terms to K n o w 1 1 1 1
Active participant observation: Switching back and forth Ideawriting: A structured group approach used to
between asking questions and observing the domain develop ideas, explore their*meaning for clarity and
expert. specificity, and produce a written report.
Blackboard: A shared database in which various knowl- Knowledge source: A unique module that has the knowl-
edge sources work together to solve a problem. edge to solve the problem.
Blackboarding: Experts work together in a common work Nominal group technique (NGT): Small group meetings
area to come up with a solution. in which individual judgment can often be effectively
Brainstorming: A n unstructured approach to generating pooled; interface between consensus and brainstorming.
ideas by which two or more experts generate ideas On -site observation: Observing, interpreting, and record-
about a problem domain. ing an expert’s problem-solving behavior as it occurs in
Consensus: Finding a clear agreement on the best solu- the expert’s domain.
tion to a problem. Passive participant observation: Act of only observing the
Consensus decision making: A knowledge developer con- domain expert, in which the knowledge engineer
ducts the exercise after brainstorming to rally the refrains from asking questions as the situation arises
experts toward one or two alternatives and to convey during the observation.
the impression that all of them are part owners of the Protocol analysis: Systematic collection and analysis of
alternative(s). protocols; synonymous with think-aloud protocol.
Control mechanism: Coordinates the flow and pattern of Repertory grid: Knowledge capture tool by which the
the problem solution in a blackboard model. problem domain is classified and categorized around
Delphi method: A series of surveys that poll experts con- the domain expert's own model: a representation of the
cerning a given problem domain. expert’s way of looking at a particular problem.
Electronic brainstorming: A computer-aided approach to Shuttle process: The back and forth aspect of the knowl-
dealing with multiple experts through a network of edge developer’s recollection of an event as it was men-
PCs, which promotes live exchange of ideas between tally registered at the time of the retrospection.
experts; the ideas can be sorted and condensed into an Think-aloud: Knowledge capture method in which the
organized format. expert speaks out loud whatever thoughts come to
Grid: A scale or a bipolar construct on which elem ents mind while answering a question or solving a problem;
are placed within gradations. synonymous with protocol analysis.
Test Y o u r U nderstanding 1 , 1 1
1. Explain in your own words the distinctive features of on-site observation.
What kinds of problems does it pose?
2. Distinguish between:
a. brainstorming and consensus decision making
b. protocol analysis and Delphi method
c. repertory grid and nominal group technique
d. blackboarding and electronic brainstorming
3. How is brainstorming conducted? Provide an example.
4. If no interruptions are allowed or no questions asked while the expert is
answering a question or solving a problem, how does the facilitator control a
protocol analysis session?
5. In what way does consensus decision making follow brainstorming? Be specific.
6. Give an example of your own to illustrate the procedure followed in consen-
sus decision making.
7. “The grid is used to acquire and evaluate the expert’s model —the way the
expert works through the solution/’ Do you agree? What is unique about the
grid? What are some of its drawbacks?
8. In what way is the nominal group technique an alternative to the consensus
technique?
9. Illustrate by an example of your own the procedure followed in NGT.
CHAPTER 6 Other Knowledge Capture Technique: 203
10. If you were asked to apply the Delphi method involving four experts, what
procedure would you follow? W hat limitations would you expect in this
knowledge capture technique?
11. B lackboarding offers certain characteristics. Explain each briefly. What
makes up the basic model?
Knowledge Exercises 11 * »
1. Divide into small groups of five to seven people. Select a group discussion
leader and a person to record responses. Use the brainstorming guidelines to
conduct a 5-minute brainstorming session on the following topic. Your goal is
to identify creative solutions to the problem:
Employees in large companies often complain that personal worth per-
ception is low. They feel that the company does not overtly reward them for
their contributions or set procedures that allow them to be most productive
and creative.
2. Based on the situation presented in problem 1, complete the following tasks:
a. Brainstorm how the company can reward efforts and increase the percep-
tion of personal worth other than issuing pay increases.
b. Use nominal group technique to find the best solution to the employee
personal worth perception problem. Consider the solutions from the
brainstorming activity and select the “best” solution from that set.
c. Use consensus decision making with the goal of selecting a solution to the
employee personal worth perception problem to which all members of
the group can commit.
3. Publisher KM System:
Knowledge capture uses a variety of tools. In the Publisher KM System
(discussed in Chapter 5), several knowledge capture tools were used.
Knowledge was captured from a series of four interviews with the expert.
The first two interviews encompassed fairly broad questions about the expert’s
decision-making process. The last two interviews elicited more detailed infor-
mation about the expert’s decision process by discussing the outcome of spe-
cific sample case scenario decisions, to which confidence levels were assigned.
In one interview, an attem pt was made at rapid prototyping, but the for-
mat of the table used was difficult for the expert to understand. It was not
used as productively as expected.
An induction table (similar to a decision table) was developed, which
included possible combinations of the five variables and their outcom es—
accept, defer, or reject a book m anuscript (see Table 6.3). Evaluate the
approach taken in the knowledge capture process to determine the rationale
and reliability of the tools used.
4. A total of six knowledge capture sessions were conducted with the expert at
the expert’s location, except for the few occasions when the session required
use of the system.
In the first session, the knowledge developer became familiar with the
domain expert, elaborating on the admissions materials previously provided.
This overview made it possible to establish a basis of knowledge, which
evolved into the concept dictionary. In the second session, the interview was
used to extract basic param eters and then had the expert organize these
param eters according to her view of the domain. This organization was trans-
formed into a visual concept diagram of the domain. The concept diagram
was referred to and refined throughout the entire acquisition process. This
diagram provided a clear direction for the acquisition process. It also became
the foundation for the knowledge representation structure (see Figure 6.10).
204 7 7 7 7 PART II Knowledge Creation and Capture
O ther tools employed were process tracing and case scenarios. I used
process tracing by asking the domain expert to provide an example of a typical
admissions decision. From following her decision-making process, I began to
understand how the parameters interacted with one another. This helped me
assign parameters to groupings based on the domain concept diagram. This
also alerted me to the minimum and maximum values that could be assigned to
each parameter. In addition, I was able to derive the minimum requirements
for consideration in which the applicant would be immediately rejected. A list
of parameters is shown in Table 6.4.
In order to capture the expert’s heuristics, I devised a matrix of parameters
and their potential values. This allowed me to vary parameters in relation to
each other. This proved to be a formidable task. Ten multivalued parameters,
each with three or more permissible ranges, produced more scenarios than
could easily be generated via manual means. The difficulty of this task also had
implications for completeness of the rule base; therefore, scenarios could easily
be overlooked. To assist me in generating scenarios, I discovered Logic Gem, a
logic processor software that made life easier for the rest of the capture process.
Questions
a. Based on the nature of the problem domain, evaluate the tools used in
this project.
b. How im portant is listing param eters early in the knowledge capture
phase? Explain.
c. Convert the concept diagram to a concept diagram for Publisher Advisor.
Hint: Focus should be on the author’s past record, standing in the univer-
sity, motivation as reflected in the num ber of books he or she has pub-
lished, and so forth.
Re f e r e n c e s , i "
A iken, Milam, Krosp, Jay, Shirani, Ashraf, and Martin, Aouad, G. F., et al. “Knowledge Elicitations Using
Jeanette. “Electronic Brainstorming in Small and Large Protocol Analysis in a Workshop Environment,”
Groups,” In form ation an d M an agem en t , September C onstru ction s M an agem en t a n d E c o n o m ic s , May 1994,
1994, pp. 141-149. pp. 271-278.
206 7 7 7 7 PART II Knowledge Creation and Capture
In a Nutshell
What Is Knowledge Codification?
Why Codify?
Diagnosis
Instruction/Training
Interpretation
Planning/Scheduling
Prediction
Things to Remember
Role of Planning
Modes of Knowledge Conversion
How to Codify Knowledge
Codifying Tacit Knowledge
Codification Tools and Procedures
Knowledge Maps
Decision Tables
Decision Trees
Frames
Production Rules
Case-Based Reasoning
Knowledge-Based Agents
The Knowledge Developer’s Skill Set
Knowledge Requirements
Skills Requirements
Implications for Knowledge Management
Summary
Terms to Know
210 7 7 7 7 PART III Knowledge Codification and System Implementation
•••• In a Nutshell
In the previous chapter, we talked about knowledge capture and the tools that make
this initial KM system building process possible. The next step is to find a way to codify
and organize knowledge into a form for others to use when needed. Getting the right
knowledge to the right people at the right time is the whole idea behind knowledge
codification (see Figure 7.1).
Codification comes in many forms, depending on the type of knowledge and its
specificity. A common way of displaying knowledge processes is via knowledge maps.
Others refer to the process as storyboarding knowledge. Essentially, the goal is to link
KM projects to identifiable corporate objectives that add value to the company’s bot-
tom line. The overall emphasis is on intellectual capital, company users, and the con-
sumer. The knowledge map diagrams the relationships among people, processes, and
knowledge on a project basis, departm ent-specific or company-wide. This chapter
details the reasoning and mechanics of knowledge mapping, tacit and explicit knowl-
edge codification, and the tools of codification as a step for knowledge transfer.
Knowledge and skills requirements of the knowledge developer are also covered.
In addition to codification justification and process, the chapter highlights the knowl-
edge developer's skill set —the characteristics and criteria for codifying tacit knowledge —
because it originates with people and is interpreted by the people who explain it. The key
point is that it is one thing to know what to codify and how to codify, but it is another thing
to know how to deal with people’s attitudes and motivation during the knowledge capture
phase to ensure reliable knowledge for codification. Without the interpersonal skills, the
question of reliability of the knowledge capture would be severely questioned.
Shells, Tables,
Tools, Frames,
Maps, Rules
Knowledge
Capture Knowledge
(creation) / Logical Testing, \
Codification
( User Acceptance j
ble, accessible, and usable for value-added decision making, no m atter what form it
may take. This means that:
• Tacit knowledge such as human expertise is identified and leveraged through a
form that delivers the highest return to the business. It may be through knowl-
edge-sharing events, organized directories, yellow pages, or other means that will
connect the ones who need the expertise to the source of expertise.
• Explicit knowledge should be organized, categorized, indexed, and accessed via
the company’s intranet or some other means to make it visible, accessible, and
usable. As conceptualized in Figure 7.2, we cultivate new organizational commu-
nities and keep them aligned around the company’s intranet. This includes the
social, interpersonal, financial, managerial, legal, and marketing systems. Such a
“constellation” encompasses all knowledge roles perform ed within the firm. The
connectors are facilitators that make the linkages among the “islands” viable and
bind the constellation together.
212 7 7 7 7 PART III Knowledge Codification and System Implementation
Facilitators
Boundary Spanners
Think of a legal knowledge base, where precedents are codified and made explicit
to authorized users —lawyers, judges, and lay people. Such knowledge can be made
available on diskette and CD-ROMs or it can be downloaded from the Internet for a
charge. Precedents may be available as a model, a knowledge map, a simulation, or a
set of rules. Each approach has unique features and limitations. Technology expedites
action, but no form at encompasses the tacit knowledge of attorneys and judges.
Codified knowledge simply makes available articulated legal knowledge.
i i a « Why Codify?
Like a chameleon, organizations constantly adapt to changing situations—changes in
market, changes in customer tastes and preferences, turnover among company special-
ists and experts, and new developm ents in technology. In codifying knowledge, the
resulting knowledge base serves in several im portant training and decision-making
areas. Among the im portant ones are the following.
DIAGNOSIS
A diagnostic KM system is given identifiable information through the user’s observation or
experience. Built into the system’s knowledge base is a list of all identifiable symptoms of
specific causal factors. For a medical diagnostic system, for example, the goal is to identify
the patient’s illness. It starts by assuming that the patient has a particular illness. It proceeds
by reviewing the rules and their actions and asks the patient for additional information
about unique symptoms in order to create a description of the illness. If it cannot prove an
illness exists on the basis of the symptoms, the system takes up another possible illness as
the assumed illness and proceeds in the same fashion. All previous responses by the patient
are retained in working memory so that repetitive questioning of the patient is avoided.
INSTRUCTION/TRAINING
The basic concept of this type of codified knowledge base is to prom ote training of
junior or entry-level personnel based on captured knowledge of senior employees.
Most training KM systems have explanatory capabilities; they display the reasoning
CHAPTER 7 Knowledge Codification a a i a 213
behind their solutions. Some systems allow students to pose hypothetical “what if” sce-
narios, enabling them to learn by exploration.
INTERPRETATION
Interpretive codified knowledge systems compare aspects of an operation to preset
standards. Typically, they use sensor data to infer the status of an ongoing process or to
describe a given situation. Much of the reasoning is coupled with confidence factors.
For example, one knowledge rule in an auto knowledge advisor reads, “If water tem -
perature is over 50 percent of max and oil pressure is less than 9, then there is .78 cer-
tainty that engine is low on oil.” In such a case, the system flashes a warning message,
“CHECK EN GINE OIL.”
PLANNING/SCHEDULING
A planning KM system maps out an entire course of action before any steps are taken.
The system creates detailed lists of sequential tasks necessary to achieve two or more
specific goals. An example is a system used by the U.S Air Force in the Afghanistan
war. It makes 5-day projections of the missions to be launched and materiel to be used
in reducing the enemy’s military capability over a designated geographical area. Once
a plan is completed, the system refines each step to arrive at the optimal schedule. The
system rejects any out-of-line approach that is not within the prescribed constraints.
PREDICTION
Predictive KM systems infer the likely outcome of a given situation and flash a proper
warning or suggestions for corrective action. The system evaluates a set of facts or con-
ditions and compares it by analogy to precedent states stored in memory. The knowl-
edge base contains several patterns on which predictions are based. These systems are
used in hurricane prediction, for example. They are capable of estimating damage to
real estate, and they can predict the nature of the hurricane by evaluating wind force
and ocean and atmospheric conditions.
In summary, justification for codifying knowledge is. to address the areas where
codified knowledge results in efficient, productive, and value-added knowledge bases
and knowledge applications. It means improving an organization’s competitive advan-
tage by reducing its dependence on human experts, who are expensive, hard to come
by, inconsistent, and mortal. Codified knowledge and the resulting knowledge base
mean allow organizational users to perform at a level closer to that of a human spe-
cialist in the domain. In the least, knowledge bases can be used as training grounds for
junior employees to go through the thought process of the seasoned specialists and
learn from it.
THINGS TO REMEMBER
As a process, knowledge codification is neither easy nor straightforward. There are
things for the knowledge developer to remember before beginning to codify. As shown
in Figure 7.3, they include the following:
• Recorded knowledge is difficult to access, either because it is fragmented or
poorly organized.
• Diffusion of new knowledge is too slow.
• Knowledge is not shared, but hoarded. This has political implications, especially
when knowledge cuts across departments.
• People are oblivious to who has what knowledge.
214 7 7 7 7 PART III Knowledge Codification and System Implementation
New Knowledge
Diffusion Too Slow
Location
Knowledge
/ Not
/ Shared People Do \
f Form / Time '\ Not Know
/ Knowledge \ Where
V Dimension J 1 Knowledge
Resides /
Difficult to
Know Who Knowledge
Has Knowledge Not Shared
Recorded (content)
Knowledge
Difficult to
Access
• Knowledge is often
• not present in the proper form (form)
• not available when needed (time)
• not present where the knowledge process is carried out (location)
• not complete (content)
1 fl 1 i 1 fl
Knowledge capture is part of knowledge creation, which requires group work, recog-
nition of the value of tacit knowledge, and support for socialization and internalization.
Knowledge creation also requires experience, which over time leads to expertise. Human
experts become candidates for tapping their tacit knowledge via knowledge capture.
identified and put into some usable form before sharing it outside the organi-
zation. The goal is to look for relevance of knowledge, not completeness.
Knowledge codification requires specific aims rather than merely making
knowledge available.
• How useful is existing knowledge for codification? As we shall see later, one way
to make existing knowledge useful is via knowledge maps —diagramming the
logic trail to a major decision.
• How would one codify knowledge? That is, what medium or tool would be the
most appropriate for codification? Mapping corporate knowledge is an essential
part of the codification process. To do the job, the knowledge developer must
identify the type of knowledge —rich versus schematic, tacit versus explicit, rule-
based or frame-based, and so forth. What can be done with the knowledge
depends on the level of importance, its type, and how labor-intensive it will be
for proper evaluation.
KNOWLEDGE MAPS
In tacit knowledge capture, it has been said, “You can’t verbalize unless you visualize.”
One way to codify knowledge is to visualize it via knowledge maps. Knowledge maps
arose from a belief that people act on things that they understand and accept. They
simply do not like to be told what to think. This means self-determined change is sus-
tainable. Instead of telling employees what to do to succeed, knowledge maps are tools
to transform employees into knowledge partners for effective decision making.
A knowledge map is a visual representation, not a repository of knowledge.
Typically, it is a straightforward directory that points to people, documents, and reposi-
tories. It does not contain them, however. The main purpose of knowledge maps is to
direct people where to go when they need certain expertise. Such maps usually recog-
nize explicit and tacit knowledge captured in documents, repositories, and in experts’
heads. Knowledge maps can represent explicit or tacit, formal or informal, documented
or undocumented, and internal or external knowledge. In terms of tacit knowledge,
codification effort is generally limited to locating the person with the knowledge,
pointing the seeker to it, and making the expert available for interaction.
W ithout a “knowledge highway” map to access knowledge locations, finding
knowledge would be difficult. In addition to the guiding function, knowledge maps
may also identify strengths to exploit and missing knowledge gaps to fill. For example,
codifying a corporate strategic plan for a new product may make it clear that the sales
force has been using a successful procedure that was never part of the plan. Not cap-
turing and storing but using knowledge is the aim of knowledge maps. They should be
integrated into knowledge management tools such as intranets and groupware to sup-
port operational processes.
• The nature of the collaborative discussion among peers should be an open and
trusting environment, facilitated by a coach. Otherwise, knowledge maps will
not work.
• Finally, postsession follow-up activities are reviewed, and conclusions are drawn.
Have you
checked out? A fW ™ Have rail RfX) 555-1111
ment.
'' Basic level knowledge Foundation knowledge. For example, ability to send and
Local competency receive e-mail as part of a job.
tory, but it can influence the territory in the way it defines it and represents it. FAQs on
knowledge maps are presented in www.appliedleaminglabs.com/kmaps/faqs.html.
DECISION TABLES
A nother scheme used for knowledge codification is the decision table. A decision table
is more like a spreadsheet; it is divided into two parts: (1) a list of conditions and their
respective values and (2) a list of conclusions. The various conditions are matched
against the conclusions. A simple example that determ ines the discount policy of a
book publisher is shown in Table 7.2.
Note that the answers are represented by a “Y ” to signify “yes,” an “N ” to signify
“no,” or a blank to show that the condition involved has not been tested. In the action
entry quadrant, an “X ” or check mark indicates the response to the answer(s) entered
in the condition entry quadrant. Each column also represents a decision or a rule. For
example, rule 1 states:
IF customer is bookstore and order_size > 6 copies
THEN allow 25% discount
The decision table example provides six decisions and, therefore, six knowledge rules.
DECISION TREES
Another knowledge codification scheme is the decision tree. A decision tree is a hierar-
chically arranged semantic network and is closely related to a decision table. It is com-
posed of nodes representing goals and links that represent decisions or outcomes. A deci-
sion tree is read from left to right, with the root being on the left. All nodes except the
root node are instances of the primary goal. To illustrate, the decision table in Table 7.2 is
shown as a decision tree in Figure 7.7. The primary goal is to determine a discount policy.
The equivalent rule is IF customer is a bookstore and order size is greater than 6 copies,
THEN discount is 25 percent. Several other rules can be extracted from the same tree.
222 7 7 7 7 PART III Knowledge Codification and System Implementation
FRAMES
A frame is a structure or a codification scheme for organizing knowledge through pre-
vious experience. It handles a combination of declarative and operational knowledge,
which makes it easier to understand the problem domain. A frame represents knowl-
edge about an entity in the real world, such as an employee, a person, or person type.
Frames were developed by Marvin Minsky of MIT, and they are based on the idea
that people use analogical reasoning to build new systems by taking a previous collec-
tion of structures from memory. A fram e can contain inform ation about various
aspects of the situations that people describe.
A frame is like a cookbook recipe: Its “slots” contain both the ingredients for the
recipe and the procedural details (“cook over medium heat,” “toast until brown,”) to
make the data operational or to fill the slots, within or between frames. The idea is to
catalog the requirements for membership of certain elements of a knowledge scheme. In
other words, it is a data structure with a name, a type, and a set of attributes, called slots.
Frames have two key elements:
• A slot is a specific object being described or an attribute of an entity. For ex-
ample, in a personnel knowledge base, some of the slots are “instructor,”
“unique feature of employee verification,” and “training certification.”
• A facet is the value of an object or a slot. As shown in Figure 7.8, the facet
(value) of slot type “instructor” is “Olesek”; “verification” is “training license”;
and so forth.
Figure 7.9 shows a frame describing automobiles. The frame consists of six slots
(attributes): manufacturer, city of origin, year, color, miles per gallon, and owner. One
or more facets are associated with each slot. They include range (set of possible val-
ues), default (value to assume if none were specified), i f needed (how to determine
actual value), and i f changed (what to do if the slot’s value changes). If-needed and if-
changed are called demons or procedures that allow procedural knowledge to be com-
bined with the declarative knowledge part of the frame. They specify the actions that
should take place if certain conditions occur during processing. If-needed means “the
demon lays waiting until needed,” and at that point it is “triggered.”
When all the slots are filled with values, the frame is considered instantiated, which
means an instance of the frame is created. The value of the slot could be a string, an
integer, or a pointer to another frame instance.
The problem-solving technique used by a frame-based system is called matching,
in which the values associated with a given entity are matched with the slot values of
frames. With a sufficient match, the frame-based system assumes that an instance has
occurred.
Frames represent knowledge about a particular idea in one place. They provide a
framework or structure, in which new information can be interpreted. They are espe-
cially helpful in dealing with hierarchical knowledge, because their organization of
knowledge makes inferences easy to describe.
Frames can also be linked —one frame may inherit properties of a higher-level
frame. In the example shown in Figure 7.10, a “performance review” is a type of “ses-
sion” with an “informal” nature. The director, attendance, and frequency are attributes
special to the performance review. Relying on the concept of “inheritance,” the child
frames of “session” and “m anager” are a specialized type derived from the more gen-
eral parent frame. Because of this relationship, one can assume that the child frames
inherit attributes of the parent frame. The “child” may also have properties of its own
not shared by the parent. The inheritance mechanism means only information specific
to a given frame will be specified. Knowledge-based systems using frames determine
the particular process for operating inheritance relationships.
PRODUCTION RULES
A popular form of tacit knowledge codification is based on production rules, com-
monly known as rules. Rules represent the major elements of a modular knowledge
codification scheme, especially when using specialized computer-based software pack-
ages. Rules are conditional statements that are easy to understand and write; they spec-
ify an action to be taken if a certain condition is true. They also express relationships
between param eters or variables. In expert systems vocabulary, production rules are
also called premise-action, cause-effect, hypothesis-action, condition-action, test-result,
I F . .. THEN, or I F . .. T H E N . . . ELSE. In the latter form, IF is the rule’s antecedent,
THEN is some consequent, and ELSE is some other consequent.
CHAPTER 7 Knowledge Codification a a a a 225
Child Frame
Session
Type
Nature: Informal
Time: 10:10 a .m .
Place: Office
Parent Frame
Performance Review
Type Is a Session
Nature: Informal
Director Is,a Manager
Attendance: ?
Frequency: ?
Child Frame
Manager
Type Is a Conference
Seniority: Member of Evaluation
Review Committee
The basic idea of using rules is to codify tacit knowledge in the form of premise-
action pairs as follows:
Syntax: IF (premise) THEN (action)
Example: IF income is “average” and pay_history is “good”
THEN recommendation is “approve loan”
Knowledge-based rules differ from the traditional if-then programming statements.
In knowledge-based systems, rules are relatively independent of one another and are
based on heuristics or experiential reasoning rather than algorithms. Rules can carry
some level of uncertainty. A certainty factor is represented as CNF or CF and is synony-
mous with a confidence level, which is a subjective quantification of an expert’s judg-
ment. In the preceding example, the rule means: “IF the applicant’s income is average
and pay history, which implies a previous loan, is good, THEN the recommendation is
approval of the loan at the 80 percent level of confidence.” Eighty percent is the default.
Figure 7.11 specifies the structure of a rule, which consists of a premise and an action. The
premise has three expressions or clauses, each of which has an attribute, an object, and a
value. The action has one expression or a clause with an attribute, an object, or a value.
A Premise
The IF . . . TH EN structure of the rule language is represented by prem ise and
action clauses or statements. The premise is a Boolean (yes/no, true/false) expression
that must be evaluated as true for the rule to be applied. It is composed of one or more
statem ents separated by AND or O R connectors. A specialized software package
226 ■ ■ i ■ PART III Knowledge Codification and System Implementation
Premise: IF Cloud site is black and wind force > 35 mph and
wave height > 18 feet
Action: THEN There is .6 evidence that classification of storm is
hurricane.
processes a rule by testing its premise for truth or falsity. The test must be satisfied
before any action of a rule can be executed. Examples of a rule premise are as follows:
If G PA is “high” THEN . . .
IF car_motor is “bad” or car_body is “fair” THEN . . .
IF income > $50,000 and assets > $300,000 or payment_history is “good”
TH EN ...
In multiple premises, processing proceeds from left to right. AND has a higher
precedence than OR. Parentheses may be used to change or specify precedence. The
default order of precedence is X and /(divided by), + and —, left association. For exam-
ple 2 + 3 X 5 - 6/8 X 7 is evaluated as ([2 + ( 3 x 5)] - (6/8 X 7)}.
An Action
The action part of a rule is the second component, separated from the premise by
the keyword THEN. The action clause consists of a statement or a series of statements
separated by ANDs or commas (,) and is executed if the premise is true. It could be
either a list of commands to be carried out if the premise evaluates to true or it could
be a Boolean expression that evaluates to true whenever the premise is true. If any part
of the premise were false, then the action would not be true or would be true at a spe-
cific level of uncertainty. Examples of rule action include the following:
IF owns auto = “false” THEN potential_insurance = “high”
IF income > $100,000 THEN federal_tax_rate > .35
IF loan holder - “late payer” THEN add “penalty = .5” to premium
For multiple action clauses, statements must be linked with AND or commas. For
example:
IF GPA - “H IG H ” and SAT > 1400
THEN admission = true and financial_aid = $6,000
In this example, two values are assigned to admission with financial aid. Two
actions are also fired. In most business-oriented knowledge-based systems, rules are
used almost exclusively. They are a natural expression of “what to do” knowledge or
“how to do” knowledge. They are easy to understand and to represent the expert’s
know-how. Their main drawback is the way they are expressed at a fine level of detail.
Such fine-grained representation makes the know-how involved difficult to under-
stand. Also, the amount of knowledge that can be expressed in a single rule is limited.
This limitation depends largely on the shell. For example, EXSYS Corvid (a knowledge-
CHAPTER 7 Knowledge Codification aaaa 227
based software package) allows as many as 126 conditions in the IF and the THEN
parts of a rule.
Role of Planning
For some time, writing rules was viewed as being synonymous with expert systems
development. Later, complex projects required greater coordination and organization.
A lack of planning was reflected in poor quality solutions, incomplete answers, or in-
efficient systems. Planning is an important part of the knowledge management develop-
ment process. It ensures proper transition from knowledge capture to knowledge codi-
fication, verification, validation, and im plem entation. For example, in knowledge
codification, knowledge developers sort out the rules, decide on their sequence and con-
tent, determine which rules belong in which modules, and so on. A knowledge devel-
oper is also responsible for planning the development and execution phases and how
the user will interface with the resulting KM system —activities that are difficult to
carry out without a plan.
In knowledge-based systems, planning involves the following aspects:
• Breaking the entire KM system into modules or manageable components
• Looking at partial solutions
• Linking partial solutions through rules and procedures to arrive at final solutions
that make sense
• Deciding on the programming language
• Selecting the right software package
• Arranging for the verification and validation of the system
• Developing user interface and consultation facilities before installing the KM system
• Promoting clarity and flexibility
228 7 7 7 7 PART III Knowledge Codification and System Implementation
CASE-BASED REASONING
One type of reasoning that is a promising candidate for knowledge m anagement is
case-based reasoning or reasoning by analogy. A case is knowledge at an operational
level. It is an episodic description of a problem and its associated solution. Case-based
CHAPTER 7 Knowledge Codification • ■■■ 229
reasoning or CBR is reasoning from relevant past cases in a manner similar to humans’
use of past experiences to arrive at conclusions. An expert, for example, relies on previ-
ous cases for solving a current problem through a process of recalling the closest cases
in memory, making inferences based on comparisons of the cases, and asking questions
when inferences cannot be made. From an algorithmic view, CBR is a technique that
records and documents cases and then searches the appropriate cases to determ ine
their usefulness in solving new cases presented to the expert (see Figure 7.12).
Day-to-day examples of CBR are numerous:
• A doctor sees a patient with unusual symptoms. The doctor remembers previous
patients with similar symptoms and prescribes the old diagnosis as a solution.
• An auto mechanic facing an unusual electrical problem is likely to recall other
similar cases involving the same year or make and consider whether the old solu-
tion corrects the current problem.
• When updating a corporate pension fund, an estate-planning attorney relies on
previous pension fund experience to expedite the completion of the current one.
Referring to old cases is especially advantageous when dealing with recurring situ-
ations. Because no old case is exactly the same as the new one, old solutions must often
be adapted to fit a new case. In every case, some reasoning and some learning, are
involved. The success rate of problem solving improves with recurring CBR.
One obvious advantage of CBR over rule-based systems is its time savings.
Knowledge developers can spin their wheels in manually capturing knowledge from
human experts for building the KM system. In CBR, less time is needed to retrieve rep-
resentative cases for performing knowledge development. CBR allows the reasoner to
come up with solutions to problems quickly, without having to start from scratch. CBR
is most advantageous when rules are difficult to formulate and when cases are readily
available, particularly when the domain expert is uncertain, not available, inconsistent,
or uncooperative.
A nother advantage is its maintenance requirements. In rule-based systems, the
cost of maintaining and enhancing the system stem from the difficulty in structuring
rules into a workable system. In CBR, maintenance entails simply adding more cases
that offer features similar to the case in question.
CBR has a downside, as well. Using CBR means rigorous initial planning that
takes into account all possible variables. Also, because cases age, it is almost mandatory
that recent cases be incorporated into the case base on a regular basis. Although a case
provides accurate and consistent documentation, it lacks the dynamics or the best deci-
sion based on maturation that a human expert can provide.
The goal of CBR is to bring up the most similar historical case that matches the
current case —not an easy task. For example, in the analogy “a flashlight battery is like
a reservoir,” the size, color, shape, or make of the battery is not the relevant aspect.
The relevant aspect is the fact that both the battery and a reservoir store and pro-
vide energy as power. In this situation, only relationships dealing with these two attrib-
utes would be useful in this analogy.
Another problem is the difficulty in mechanizing a person’s insight and ability to
see an analogy between a previously encountered case and a current case. No general
representation procedure prescribes how to reason by analogy. As a consequence, rea-
soning by analogy tends to introduce errors, biases, and inconsistencies into the formu-
lation of rule-based systems. To improve the usefulness, and reliability of rule-based
systems, a better understanding of human reasoning is needed.
A third problem is m aintenance of appropriate indexes. Adding new cases and
reclassifying the case library most often expand knowledge. A case library broad
enough for most CBR applications requires considerable database storage with an
efficient retrieval system. CBR can be fully automated, depending on how much cre-
ativity is required to derive solutions and how much complexity is involved.
Regardless of the level of automation, the biggest factor in making CBR work is its
case library. Table 7.4 uses the attributes in Table 7.3 to summarize the limitations of
CBR in a KM environment.
KNOWLEDGE-BASED AGENTS
In software language, an intelligent agent is a program located in a computer-based
system that is capable of performing autonomous action in a timely fashion. It is not
intended to replace hum an intelligence, but to support it. In addition to acting in
response to their environm ent, intelligent agents are capable of exhibiting goal-
directed behavior by taking initiative. They can also be programmed to interact with
other agents (or humans) by some agent communication language.
In terms of knowledge-based systems, an agent can be programmed to learn from
the user behavior and deduce future behavior in order to assist the user. Because they
can take some control, agents need to have access to decision knowledge. Such knowl-
CHAPTER 7 Knowledge Codification m■ a ■ 231
edge can be about the user as a personal assistant or the domain, as is the case in
expert systems.
Information agents are unique in the way they search on behalf of their users or
other agents. The search involves evaluating, retrieving, or integrating inform ation
from multiple information sources (for example, knowledge bases). They learn user
preferences and provide appropriate information based on these preferences. They can
autom atically execute special tasks such as filtering unw anted e-mail messages. In
essence, they learn by “looking over the shoulder” of the user while he or she is work-
ing. They can provide suggestions when the user reaches a useful level of success in
their predictions.
KNOWLEDGE REQUIREMENTS
Computer Technology
The knowledge developer should be well-versed in hardware and software, how
operating systems work, and issues regarding legal matters, security, testing, documen-
tation, and maintenance. A general background in science and computer architecture
is helpful.
Domain-Specific Knowledge
The knowledge developer must be familiar with the nature of the problem, the
business of the user organization, and the factors surrounding the problem domain,
such as the organization’s political climate, level of m anagem ent support, and the
users’ computer literacy. For example, if the problem domain is mortgage loan analysis,
the knowledge developer should have a basic understanding of lending practices and
232 77 7 7 PART III Knowledge Codification and System Implementation
Cognitive Psychology
The knowledge developer should have a basic familiarity with the principles of
cognition, the understanding of knowledge in general and of how human experts think
or reason. Cognitive skills are im portant in capturing and codifying complex, ill-
defined, and judgmental knowledge and understanding the domain expert’s thought
processes such as decision making under conditions of uncertainty. Background in this
field improves communications, interviewing, and listening skills.
SKILLS REQUIREMENTS
Interpersonal Communication
The most pervasive factor in a knowledge developer’s success is the ability to com-
municate. If he or she cannot understand and relate the expert’s intent or meaning
accurately, the reliability of the resulting knowledge base will be questionable.
Persons with poor interpersonal skills cannot be effective knowledge developers;
their deficiency cannot help but detract from their relationships with experts, users,
management, and others. This also applies to domain experts. They must enunciate
concepts and procedures in simple, clear terms so that the knowledge can be codified
accurately. Interpersonal skills enable one to work with people to achieve common
goals or to help others work together as a team. Interpersonal behavior is closely
related to personality and dictates a person’s management style.
Personality Attributes
When it comes to personality attributes, knowledge developers should exhibit the
attributes described here.
Job Roles
The knowledge developer plays a variety of roles, depending on the nature of the
knowledge project, the type of knowledge, and the organization’s climate. Some of the
key roles are those of change agent, investigator, diplomat, architect, builder, tester,
accountant, and salesperson. He or she may also be a project planner, contractor, moti-
vator, quality inspector, and adept at conflict resolution. These roles relate to personal-
ity attributes as well as knowledge and skills requirements.
234 7 7 7 7 PART III Knowledge Codification and System Implementation
I 1 1 1 fl 1 BOX 7.1
If you think you are beaten, you are; Think big and your deeds will grow;
If you think you dare not, you don’t; Think small and you’ll fall behind;
If you would like to win and don’t think you can, Think that you can and you will.
It’s almost a cinch you won’t. It’s all in the state of the mind.
If you think you’ll lose, you’re lost; If you think you are outclassed, you are;
For out in the world you'll find You’ve got to think high to rise.
Success begins with a fellow’s will. You’ve got to be sure of yourself before
It’s all in the state of the mind. You can ever win a prize.
Full many a race is lost Life’s battles don’t always go
Ere even a step is run, To the stronger or faster man;
And many a coward fails But sooner or later, the man who wins
Ere even his work is begun. Is the fellow who thinks he can.
SOURCE: Awad, E. M. Expert Systems. Minneapolis, MN: West Publishing Co., 19%, p. 129.
a i I i a a-
S u mma r y 1 ■■1
• Knowledge codification is organizing and coordinating knowledge before the
user can access it. It must be in a form and a structure meaningful for access at
any time, from anywhere, by any authorized person.
• Codification is a prerequisite to knowledge transfer. The resulting knowledge
base serves several useful areas such as diagnosis, scheduling, planning, instruc-
tion, and training. However, there are bottlenecks such as difficulty in accessing
knowledge and slow diffusion of new knowledge. Bottlenecks can also be created
when knowledge is not in the proper form, not available in a timely manner,
incomplete, or not present at the right location.
• The four modes of knowledge conversion tag the four possible relationships
between tacit and explicit knowledge and the resulting outcomes of socialization,
externalization, internalization, and combination.
• Before codification begins, an organization must address several questions: What
organizational goals will codified knowledge serve? What knowledge exists in the
organization that addresses these goals? How useful is existing knowledge for
codification? How would one codify knowledge?
• Codifying tacit knowledge is complex and is more of an art than a science. Several
different ways of encoding facts and relationships to codify knowledge exist.
They include knowledge maps, decision tables, decision trees, frames, produc-
tion rules, and software agents. Each has a unique approach to knowledge
codification.
• A knowledge map is like a knowledge highway to access knowledge location. It
identifies strengths to exploit and missing knowledge gaps to fill. Building the
map requires three steps: Developing a structure of the knowledge requirements,
236 7 7 7 7 PART III Knowledge Codification and System Implementation
defining the knowledge required of specific jobs, and rating employee perfor-
mance against knowledge requirements.
A decision table scheme is divided into two parts: (1) a list of conditions and
their respective values and (2) a list of conclusions. In contrast, a decision tree is
a hierarchically arranged semantic network that is closely related to a decision
table. It is composed of nodes representing goals and links that represent deci-
sions or outcomes.
A frame is a structure for organizing knowledge. It handles a combination of
declarative and operational knowledge and makes the current problem domain
easier to understand. It represents knowledge about an entity in the real world
and catalogs the membership requirements of certain elements of a knowledge
scheme. The two key elements of a frame are a slot, which is a specific object
being described or an attribute about an entity that holds a value or facets, and a
facet, the value of an object or slot. When all slots are filled with facets, an
instance of a frame is created.
Rules represent the major elements of a modular knowledge codification scheme.
They are conditional statements that specify an action to be taken, if a certain
condition is true. They express relationships between parameters and represent
the human expert’s tacit knowledge in the form of premise-action pairs.
Knowledge developers are more than talented programmers or knowledge cap-
ture people. They are professionals with skills in tapping human expert knowl-
edge and using tools to codify that knowledge. They perform several key func-
tions. They identify knowledge-based applications, develop project proposals,
capture knowledge, oversee testing and implementation, perform user training,
and maintain knowledge systems.
Knowledge development requires certain knowledge and skills. Knowledge
requirements include computer technology knowledge of the domain, program-
ming knowledge using special tools, and cognitive psychology. Skills requirements
include communication and interpersonal skills.
The personality attributes of the knowledge developer typically include intelli-
gence, creativity, patience, realism, persistence, and a good sense of humor.
Te r ms t o Kn o w * 1 * »
Action: Consists of a list of commands to be carried out if Certainty factor: A measurement of belief or a subjective
the premise evaluates to true, or a Boolean expression quantification of an expert's judgment and intentions.
that evaluates to true whenever the premise does; con- Decision table: A list of conditions with their respective
clusions to be drawn with some appropriate degree of values matched against a list of conclusions.
certainty or instructions to be carried out. Decision tree: A hierarchically arranged semantic net-
Agent: A lso called intelligent agent; a bit of intelligence work that is closely related to a decision table; com-
that represents specific attributes to other agents in a posed of nodes representing goals and links that repre-
knowledge base or on a network. sents decisions or outcomes.
Case: Knowledge at an operational level; episodic Facet: The value of an object or a slot.
description of a problem and its associated Frame: A structure or a codification scheme for organiz-
solution. ing knowledge through previous experience.
Case-based reasoning: A m ethodology that records and Inference engine: The “brain” of a knowledge-based
documents previous cases and then searches the rele- system; a cluster of computer programs that
vant case(s) to determine their usefulness in solving a coordinate reasoning and inferencing based on
current problem; computer systems that solve new the rules of the knowledge base to produce the
problems by analogy with old ones. solution or advice.
CHAPTER 7 Knowledge Codification i 1 i i 237
Inferencing: Deriving a conclusion based on statements Production rule: Knowledge codification method in
that only imply that conclusion. which knowledge is formalized into rules.
Inheritance: An instance of a particular class is assumed Rapid prototyping: Spontaneous, on-the-spot, iterative
to have all the properties of more general classes of approach to building knowledge-based systems;
which it is a member. an iterative process by which the knowledge devel-
Instantiate: Create a frame by filling its slots. oper shows the domain expert or the user what
Knowledge codification: Organizing and coordinating the system looks like based on the knowledge cap-
knowledge in a form and a structure meaningful to tured to date.
the user. Reasoning: The process of applying knowledge to arrive
Knowledge developer: A specialist responsible for plan- at solutions based on the interactions between rules
ning the developm ent and execution phases of a knowl- and data.
edge management system. Rule: A conditional statement that specifies an action to
Knowledge map: A directory that points to people, docu- be taken if a certain condition is true; a formal way of
ments, and repositories. specifying a recommendation directive, or strategy,
Logic: The study of reasoning; the scientific study of the expressed as IF (premise).
process of reasoning and the set of rules and proce- Rule of inference: A deductive structure that determines
dures used in the reasoning process. what can be inferred if certain relations are taken to be
Matching: The values associated with a given entity true; facts known to be true and used to derive other
paired with the slot values of the frames to signify that facts that must also be true.
an instance has occurred. Slot: A specific object being described or an attribute of
Premise: A Boolean expression that must be evaluated as an entity.
true for the rule to be applied.
Test Y o u r U n d e r s t a n d in g 1 a a 1
1. What assumptions can be made about knowledge codification?
2. Distinguish between:
a. rule premise and action
b. slot and facet
c. decision table and decision tree
3. Two key elements make up a frame. Use an example of your own to illustrate
these elements.
4. How can frames be linked?
5. Summarize the pros and cons of decision tables versus decision trees. Under
what conditions would you use one tool over the other?
6. In your own words, write a short essay explaining the importance of knowl-
edge codification.
7. In your own words, explain knowledge codification. How does it differ from
knowledge creation?
8. Present justification for knowledge codification. How important a step does
it play in building knowledge management systems?
9. How im portant is planning in knowledge codification? Be specific.
10. In what way(s) do the four modes of knowledge conversion result in social-
ization and externalization?
11. What is a knowledge map? How does it differ from a decision tree?
12. Discuss the role of inferencing in knowledge-based codification.
13. Why do we call software agents “agents”? Where do they fit when it comes to
knowledge codification?
Kn o w l e d g e Ex e r c is e s 1111
1. Using the Internet, research case-based reasoning. W rite a 2-page essay
describing the CBR process.
2. Review the employment ads in two consecutive Sunday editions of a major
newspaper. What pattern in knowledge management jobs may be significant?
Knowledge Codification and System Implementation
Re f e r e n c e s 1 1 1 1
Awad, E. M. Expert Systems. Minneapolis, MN: West Financial Systems, Inc., www.dmreview.com/whitepaper/
Publishing Co., 1996, p. 129. wid274.pdf, Date accessed August 2002.
Brown, E. Donald, et al. “Expert Systems,” February 1999, Lamont, Judith. “Expert Systems and KM Are a Natural
agents.gsfc.nasa.gov/ papers/pdf/es.pdf, D ate accessed Team,” K M W orld, October 2000, www.kmworld.com/
April 2002. publications/magazine/index.cfm?action = readarticle&
Davenport, Thomas H., and Prusak, Laurence. Working A rticle_ID =944& Publication_ID =42, Date accessed
Knowledge. Boston, MA: Harvard Business School August 2002.
Press, 2000, pp. 68-87. Marwick, A. D. “Knowledge Management Technology,”
Dixon, Nancy M. Comm on Knowledge. Boston, MA: IBM Systems Journal, vol. 40, no. 4,2001, p. 815.
Harvard Business School Press, 2000, pp. 143-160. Tiwana, Amrit. The Knowledge Management Toolkit. Upper
Gallupe, R. Brent. “Knowledge Management Systems: Sur- Saddle River, NJ: Prentice Hall, 2000, pp. 146-185.
veying the Landscape,” April 2000, business.queensu.ca/ Applied Learning Labs, www.appliedlearninglabs.com/
docs/fp_00-04.pdf, Date accessed August 2002. kmaps/faqs.html. Date accessed August 2002.
Haley, Paul, and LeFebvre, Peter. “Knowledge M anage-
ment and Knowledge Automation Systems,” Gallagher
I I I I I I I C H A P T E R I I I fl I I I
System Testing
and Deployment
Contents
In a Nutshell
Quality and Quality Assurance
Knowledge Testing
Key Definitions
Issues to Consider
Approaches to Logical Testing
Circular Errors
Redundancy Errors
Unusable Knowledge
Subsumption Errors
Inconsistent Knowledge
Approaches to User Acceptance Testing
Test Team and Plan
User Acceptance Test Criteria
User Acceptance Test Techniques
Managing the Testing Phase
KM System Deployment
Issues Related to Deployment
Selection of the Knowledge Base Problem
Ease of Understanding the KM System
Knowledge Transfer
Integration Alternatives
The Issue of Maintenance
Organizational Factors
O ther Factors
Role of the Champion
User Training and Deployment
Preparing for KM System Training
Combating Resistance to Change
Postimplementation Review
Security Considerations
Implications for Knowledge Management
240
CH A PTER 8 System Testing and D eploym ent i 1 i ■ 241
Summary
Terms to Know
Test Your Understanding
Knowledge Exercises
References
X e r o x V ic e Pr e s id e n t o f Q u a l it y
■■■■ In a Nutshell
The time comes to put a KM system to the test. What good is a system that has not
proven its worth or reliability? Imagine using one in a critical real-time application,
such as m anned space missions, without proving that it will not make catastrophic
errors. At each level of the KM system life cycle, testing and evaluation of the finished
product are critical steps before deployment (see Figure 8.1).
System reliability is one of the most important testing issues in knowledge-based
systems. Reliability refers to how well the system delivers the information or solution
with consistency, accuracy, and integrity. It also means detecting and removing anomalies
(such as redundancy, ambivalence, and deficiency). As KM systems become larger and
more complex, reliability is emerging as a significant issue in developing KM systems.
Two prime considerations behind reliability are quality assurance and m aintain-
ability of the system after deployment. The primary goal of the knowledge developer is
to ensure that the system says what it means and means what it says. In other words,
quality representation of the knowledge requires exhaustive testing. It provides a way
of checking that the user’s requirements are not misunderstood at the conceptual, cap-
ture, or codification phases of the KM system development.
The building process of most KM systems often generates anxiety and concern. In
the rush to build and deliver the system, many knowledge developers cut corners when
it comes to testing. The reasons range from not knowing how to test to running out of
time or funds. Regardless of the reasons, ethical and legal obligations prompt knowl-
edge developers to subject the system to rigorous testing prior to deployment.
Testing KM systems calls for informal, subjective, time-consuming, and often arbi-
trary creation and execution of test cases. In this chapter, the various aspects of testing
are discussed: who should do the testing; what testing criteria should be used; issues in
testing of the KM system; and how to promote objectivity and order.
In this chapter, we shall find that the logical part of testing is a process that ana-
lyzes the program(s) and their relationship to one another. In contrast, user acceptance
testing is a process that assumes that the KM system works fine, but it tests for how
well the system meets user requirements. The problems with the two kinds of tests are
lack of standardization and reliable specification—deciding what constitutes an error
and the sources of test cases. For logical testing, cases must address circular and redun-
dant errors and verify system functionality. User acceptance testing begins with a per-
son or a testing team armed with test criteria using realistic test cases.
No single technique detects all logical or clerical errors in a KM system. Some
tools work better than others, depending on the type of KM system. Known user accep-
tance tools include face validation and test cases provided by the knowledge developer
or the user. The key issue in user acceptance testing is planning and managing a test
242 . . . . PART III Knowledge Codification and System Implementation
/
Knowledge
Knowledge
Innovation
Sharing
Knowledge
Transfer
Database
Knowledge
Base
FIGURE 8.1 : Knowledge Testing and Deployment in the KM System Building Life Cycle
plan that includes decisions on how, when, and where to evaluate the knowledge base
and who should do the testing; these are consistent evaluation criteria for various kinds
of errors. Once planned, testing becomes a m atter of time.
The latter part of the chapter covers im plementation issues and procedures. An
important aspect is user training. The questions often pondered are “How should the
user be trained?” “W here should training be conducted and for how long?” “Who
should do the training?” Obviously, how user friendly and how well documented the
system is has much to do with training ease and success. User motivation, proper fund-
ing, and the role of the champion are additional success factors.
user expectations. Performance capabilities are equated with the quality of the knowl-
edge (tacit and explicit) stored in the knowledge base.
The definition of quality depends on whether the viewpoint is that of the expert,
the user, or the knowledge developer. For the expert, quality is a reasoning process that
gives reliable and accurate solutions within the framework of the KM system. For the
user, quality is the system’s ability to be quick, easy to use, easy to understand, and for-
giving when the user makes mistakes. For the knowledge developer, quality is how well
the knowledge source and the user’s expectations are codified into the knowledge base.
Knowledge Testing
The most challenging part of building KM systems is testing. The basic motivation is to
control performance, efficiency, and quality of the knowledge base. The goal is compli-
ance with user expectations, human expertise, and system functioning. When a KM sys-
tem is built via prototyping, each phase of the building process can be properly tested
during building instead of waiting until the end, as is usually done in testing infor-
mation systems. The comments made at each stage could save time, money, and the
unnecessary embarrassment of reworking the final version of the system. Prototypes
are perhaps the least used form of “rejection insurance” that a knowledge developer or
a development team can ever acquire.
KEY DEFINITIONS
The two main types of testing for knowledge bases and knowledge base systems are
logical testing and user acceptance testing. Logical testing answers the questions, “Are
we building the system right?” “Was the system developed using well-established
knowledge developm ent principles?” It means checking the system to make sure it
gives solutions or results correctly. It looks for anomalies, such as redundant or defi-
cient knowledge, and ensures a bug-free knowledge base.
Logical testing addresses the intrinsic properties of the KM system and its compo-
nents. Intrinsic refers to the syntactic or mechanical aspects of the knowledge base pro-
grams. A logical process analyzes codified tacit and explicit knowledge for sequence,
structure, and specifications. Because no external factors are considered, the quality of
this type of testing can be objectively measured by answering questions such as “What
is . . . ?” “How many . . . ?” This is usually done in a static (paper and pencil) mode,
even when the system is not yet operational. Its goal is error-free codification.
User acceptance testing follows logical testing and checks the system’s behavior in
a realistic environm ent. As a user acceptance phase, these tests ignore the internal
mechanics of the system. Meaning and content of the codified tacit knowledge must
meet codified criteria of adequacy. The quality measurement of user acceptance testing
tends to be subjective. For example, questions based on tacit knowledge such as “What
do you think o f .. . ?” “How well do you like . . . ? are often asked when conducting
user acceptance testing (see Box 8.1).
It is important to note that user acceptance testing is carried out only for technical
verification. When the system is m odular, each module goes through both steps in
building the KM system. See Box 8.2 for an illustration of user acceptance testing.
In today’s practice, no standardization, specific tools, or methodologies guide the
testing of a knowledge-base system. The process is complex and unique at the same
time. Intelligence and knowledge are hard to define, let alone evaluate. Consequently,
the whole testing process is subjective and error-prone. Table 8.1 provides a summary
of select features of logical acceptance and user acceptance testing criteria.
244 7777 PART III Knowledge Codification and System Implementation
1 I fl fl fl fl BOX 8.1 » 1 i » i 1
SOURCE: Awad. E. M. "Building Travel Advisor System, Using EXSYS Resolver." Unpublished manuscript, June 2001.
fl 1 I fl I 1
ISSUES TO CONSIDER
The best KM system test is not so much ensuring how well the system functions, but
determining under what conditions it will begin to fail. This is called force-fail testing.
During planning, the knowledge developer puts together a strategy that uses a minimal
set of test cases to discover a maximal set of failures. It is a time-consuming and diffi-
cult process to follow. In fact, it is impractical when marginal cost is measured against
marginal benefits.
CH A PTER 8 System Testing and D eploym ent u i ■ i 2 4 5
« fl 9 I fl fl BOX 8.2
SOURCE: Awad, E. M. “Validation and Verification o f a Breath Gas Monitoring S y s t e m Unpublished manuscript, August 2001.
CIRCULAR ERRORS
Carelessness often results in rules that employ circular reasoning. A circular rule tends to be
contradictory in meaning or logic. For example, suppose rule 1 states that A is greater than B,
and rule 2 states that B is greater than C. If rule 3 states that C is greater than A, then rule 3 is
circular and contains an error in logic. The best solution in this case is to remove rule 3.
H ere is another example of a circular error:
R5 IF John and Rob are co-owners of company A
THEN John and Rob own the same company
R6 IF John and Rob own the same company
THEN John and Rob are co-owners.
CH A PTER 8 System Testing and D eploym ent aaaa 247
r- Unusable Rules
— Duplicate
— Redundant Rules —
— Subsumed
If R6 finds a match, its premise part will cause R5 to match and fire. The problem
here is that the premise part of R5 matches the action of R6, causing R6 to fire and so
on, resulting in useless firing of the two rules.
As a simple example of logical testing, consider a KM system that has several cases
involving a house with a living room. We can evaluate cases to determine that there is
something incorrect with a case that has a bathtub in the living room. There is probably
redundant knowledge in the case if the living room contains two sofas. Likewise, the
case of a living room without a sofa probably would be considered incomplete. Finally,
we might find it inconsistent if two identical items were labeled the same name. For
example, a sofa for one item is labeled a couch for another item.
REDUNDANCY ERRORS
Redundancy errors are ones that offer different approaches to the same problem.
There is actually duplication of knowledge. One gets the same results either way—the
“dinosaur” effect. For example, study the following rules:
IF (Salary > 60,000 OR Home > 100,000)
AND (Loan < 10,000 AND Mortgage < 40,000)
THEN Max = 100,000
IF (Salary > 60,000 OR Home > 100,000)
THEN Assets = ‘yes’
IF (Salary >50,000 AND Dividend > 10,000)
THEN Assets = ‘yes’
IF (Loan < 10,000 AND Mortgage < 40,000)
AND Assets = ‘yes’
THEN Max = 100,000
In this example, we find two approaches to the same problem of determining Max.
We also do not need to use dividends in the second approach to establish assets.
Redundancy can cause difficulties in maintaining the KM system. One version of the
rule could be revised; another version could be left as is.
UNUSABLE KNOWLEDGE
An unusable knowledge in the form of a rule is one that only “fires” (executes) if the
conditions succeed or fail, one that never fires, or one that has one or more contradic-
tions. They are all in error and, therefore, unusable. An example of an unusable rule
that is always false is:
IF humidity is 5% AND heavy_rain = yes
THEN conclusion
This rule cannot succeed. If a rule premise (IF) will be false for all valid values, the
rule will never succeed. In this example, heavy rain cannot occur in 5 percent humidity.
Unusable rules are also called conflicting rules.
SUBSUMPTION ERRORS
In subsumption, if one rule is true, one knows the second rule is always true. Consider
this example:
R l: IF A AND B,THEN D
R2: IF A AND B AND C, THEN D
CH A PTER 8 System Testing and D eploym ent i i ■ ■ 249
INCONSISTENT KNOWLEDGE
In inconsistency errors, the same inputs yield different results. For example,
IF (Salary > 50,000 OR Home > 100,000)
AND (Loan < 10,000 AND Mortgage < 40,000)
THEN Max - 100,000
IF (Salary > 50,000 OR Home > 60,000)
AND (Loan < 3,000 AND Mortgage < 20,000)
THEN Max = 50,000
A user will get different answers, depending on which rule is used. Tests conducted
for consistency can also be used to test for completeness. The whole idea is to make
sure all the parameters included in the rules are codified correctly and consistently.
Team members normally represent a variety of the users’ areas of operation, espe-
cially in the final testing phase. The entire procedure should be guided by a plan that
defines the roles and responsibilities for everyone involved in the system’s life cycle,
and it should provide documentation with respect to testing. The plan should:
Having the knowledge developer do the user acceptance testing poses limita-
tions. In user acceptance testing, the problem for most knowledge developers is that
they have only limited knowledge in developing test cases that meet user acceptance
criteria. The human expert can be consulted to approve the procedure and the ac-
ceptability of the solution. In the end, whoever ends up being the tester depends on
the availability of expertise, motivation, time, and funds allocated for the testing
phase. A test team representing the users’ interests and based on a plan would be the
best choice.
C H A PTER 8 System Testing and D eploym ent i i i i 251
Face Validation
In face validation, a knowledge developer, along with users and company experts,
evaluates the perform ance of the KM system at its face value. System solutions are
compared with those of the human experts, and a value judgment is made about the
reliability of the results.
Face validation can be used to test chunks of knowledge at any phase of the devel-
opment life cycle. It is mainly a group effort of the knowledge developer, the expert,
and the end user. This ad hoc tool is quite useful for testing user-system interfaces, user
friendliness, and assist facilities. However, it is not a rigorous user acceptance tech-
nique. As such, it offers no measurable assurance of performance or reliability.
252 7777 PART III Knowledge Codification and System Implementation
Test Cases
A popular test technique is executing a set of prepared test cases on the KM sys-
tem. The results are examined for agreement with those of an independent expert or a
panel of experts that solves the same problem. Only system inputs and outputs are sig-
nificant (see Box 8.3).
In addition to those provided by the human expert, test cases may be provided by
the knowledge developer and the user. Those provided by the developer have been
known to be more effective than those provided by others. The domain expert, the
« a « fl i fl box 8.3 a fl a i fl a
Type I error 9 0
The chief limitations of the previous decision-
Type II error 0 1
making process included the lack of emphasis on
W ithout the use of the hiring profiler, there ability and the lack of standardization in the wage
was a 33.3 percent (10 out of 30) error rate. The placements.
SOURCE: Awad, E. M. “Test Cases For the Knowledge Recruiting P r o f i le r Unpublished manuscript, January 2002.
I I 1 1 I fl
CH A PTER 8 System Testing and D eploym ent a ■ a ■ 253
knowledge developer, and the user are somewhat like three blind men describing an
elephant. Each looks at a different aspect of the KM system and tries to make sense
out of it. Test cases from all three sources are considered to be the best combination,
because they provide a m ore com prehensive test of the system. They also tend to
increase the objectivity of the testing process.
Like other techniques, testing a knowledge base that is based on test cases has its
own share of limitations. When the expert who writes the test cases is also the tester,
the credibility of the test process can be undermined. Bias—based perhaps on person-
ality conflicts or on ignoring nontechnical aspects such as user interface or ease of
use—can filter into them, especially if test case generation is done in an ad hoc manner.
• Decide when, what, how, and where to evaluate the knowledge base. The reliability
of answers, explanation, training capability, and the like must be evaluated.
Timing and duration of testing in the hands of specialists are crucial to a success-
ful system test and eventual implementation.
• Decide who should do the logical and user acceptance testing. All indicators point
to having the expert handle the whole process. The next best approach is to have
an outside expert or a team do independent tests of the knowledge base.
• Draft a set o f evaluation criteria in advance. This task involves knowing what to
test for. One can get the system to run, but what are you proving or looking for?
What are the hard criteria?
• Decide what should be recorded during the test. When it comes to testing rule-
based tacit knowledge, among the important statistics to record are the following:
• Rules that always fire and succeed
• Rules that always fire and fail
• Rules that never fire
• Test cases that have failed
• Review training cases, whether they are provided by the expert, the knowledge
developer, or the user. Appropriateness of the test cases should be emphasized in
this task.
• Test all rules. This task ensures that every param eter is correct. Testing looks for
two types of errors in rules:
• Type I error—A rule that fails to fire when it is supposed to fire. This is tanta-
mount to failing to detect a problem and similar to a false negative in statistics.
• Type II error—A rule that fires when it is not supposed to fire. This is similar
to a false positive in statistics.
Finally, generating test cases is so time-consuming and costly that this phase is
often viewed as a chore rather than a challenge. It takes a certain know-how and objec-
tivity to generate test cases. Even then, users have been known to accept the system,
regardless of how lax the test process has been. With this attitude, testing can go for-
ward with no difficulty.
254 7777 PART III Knowledge Codification and System Implementation
«■ ■■ KM System Deployment
The goal of every KM system development is successful deployment. Even the best
system will fail if deploym ent concerns are not addressed. At issue is how well the
knowledge developer coordinates the deployment with the end user. Depending on
how knowledge codification was carried out, the end user might have been a regular
participant all along, which means deployment stands a good chance of user accep-
tance and successful deployment.
Deployment is affected by organizational, technical, procedural, behavioral, eco-
nomic, and political factors, especially where the organization is large and the existing
technology is too established to allow change to occur easily. KM system deployment is
especially complex. In this next section, we examine deployment issues as they relate
to managing KM system projects as well as user training. Knowledge transfer is cov-
ered in the next chapter.
The two aspects of deployment are the transfer of the KM system as a technology
from the knowledge developer to the organization’s operating unit and the transfer of
the system’s skills from the knowledge developer to the operating person in the orga-
nization. This step may also include training an organization’s operating unit for system
maintenance and upgrade. The issues, prerequisites, and techniques for both of these
aspects will also be discussed in this section.
■ i a a « i BOX 8.4
SOURCE: Awad, E. M. “Building Travel Advisor System, Using EXSYS R e s o lv e r Unpublished manuscript, June 2001.
fl fl fl i fl a
256 T7T7 PART III Knowledge Codification and System Implementation
KNOWLEDGE TRANSFER
Two approaches can be used to transfer KM system technology in implementation. In
the first approach, the KM system is actually transferred from the knowledge devel-
oper directly to the working unit (end user) in the organization. The other approach
simply means installing the system on the resident hardware. It includes dropping off
the user’s manual and help facility, a technical manual containing a line-by-line print-
out of the knowledge codification, and copies of the knowledge base for backup. This
step may or may not include user training. Actually, training the user on the KM system
is relatively easier than training on a conventional information system because of the
unique technical and procedural facilities embedded in the KM system.
In the second approach, which transfers KM system technology skills, the knowl-
edge developer transfers to a group within the organization the knowledge and neces-
sary know-how to maintain and upgrade the system in the future. Such a transfer may
include special technical training in the diagnosis and test procedures necessary to
make changes in the system. Once com pleted, the developer is out of the picture,
except perhaps in a consultative role.
Transfer of KM systems can be approached in one of two ways: (1) an abrupt, one-
time transfer that results in a permanent installation on a specific day or (2) a gradual
transfer over a given time period. In the latter case, most often through rapid prototyp-
ing, a receiving group becomes part of the developer’s team. Once one phase of the
CH A PTER 8 System Testing and D eploym ent aaaa 257
system is verified and ready to use, responsibility is transferred to the receiving group,
which then examines the makeup of the partial system. The transfer involves the shar-
ing of training, methodologies, experiences, and techniques. Eventually, the rest of the
system is transferred, allowing the receiving group to take full responsibility for the
system’s operation and maintenance.
Implementation can also be approached as a stand-alone KM system installation
on a PC or as a fully integrated application that interfaces with other applications or
databases. KM systems should be designed on platforms that are compatible with other
KM systems in the organization. The compatibility feature makes explanation or justi-
fication of the new system easier. It also makes user training easier, because most users
presumably look at the new system as “a system just like the others.”
INTEGRATION ALTERNATIVES
A KM system can be integrated into the organization’s existing operations through the
following methods:
• Technical integration occurs through the company’s local area network environ-
ment, the resident mainframe, or existing information system infrastructure. This
job is not exactly straightforward. M anagement must decide on a system’s level of
priority for access in the network. For example, in one organization’s IT department,
a LAN-based KM system was given a low priority access, because the course that
258 7777 PART III Knowledge Codification and System Implementation
used the system was taught only during weekends. During regular workdays, em-
ployees frequently experienced considerable delays (more than 20 seconds) in
response time. They complained that work assignments were always late coming
off the printer.
• Knowledge-sharing integration is required, for example, in a firm that needs to
make a KM system available to each of its 17 branches in an equitable way. This
level of availability often requires upgrading the local area network, the main-
frame, or lines to ensure equitable service. For example, in the case of the Travel
Profiler, after the travel agency installed a LAN, it made plans to have the KM
system available to all travel agents at the same time with the same response time.
• Decision-making flow integration suggests that the way the KM system assesses a
problem situation should match the user’s style of thinking. Providing such a
match can be crucial to user acceptance and satisfaction.
• Workflow reengineering considerations come into play when implementation of a
new KM system triggers changes in the workplace or within jobs in the user’s
domain (such as merging jobs or deleting positions). This type of situation can
occur because the actual building of the product leads the KM system and the
user, during their interactive sessions, to develop new insight into the problem
domain and to a more creative way of dealing with it. One can expect a certain
amount of backlash as a result of job reengineering.
The attractiveness of change depends greatly on m anagement’s perception of its
potential contribution to the productivity of the area in which the new system will
reside. The concept of reengineering is evolutionary and usually takes weeks or even
months to firm up. In other words, for a KM system to survive, it must be amenable to
change. It must also provide built-in flexibility to accommodate the kind of change
expected by the user.
• The system’s help facilities must satisfy the user’s requirements as closely as pos-
sible. User acceptance of the solution is easier with the availability of clear pre-
sentation of the solutions.
• The availability of a qualified person or a team can ensure that maintenance is
carried out effectively and on schedule. With large organization-wide KM sys-
tems, maintenance could be a full-time job.
To assure successful maintenance, responsibility for it needs to be assumed by a
qualified person within the organization. Otherwise, the maintenance function should
be contracted to a freelance specialist. Part of the maintenance function establishes a
change-order procedure with proper docum entation that includes the authorized
requester, the person who made the change, and the outcome of the change.
ORGANIZATIONAL FACTORS
Of all the deployment issues, a prime consideration is a firm commitment to the project
by top management and the user. It means strong, senior-level leadership, because there
will be challenges that arise. Management can support system deployment by providing
adequate funding, ensuring the availability of technology and personnel, and allowing
the champion to function throughout the development process. The second organiza-
tional factor is user participation in the building process. Participation improves com-
mitment, enhances system quality, and fosters a sense of ownership of the KM system.
Commitment is not the same as contribution, however. Anyone can make a contri-
bution through system participation without having to make a commitment to system
use. Commitment to a project means taking responsibility for its outcome, which is
expected to contribute to successful deployment. The anecdote in Box 8.5 illustrates
the distinction.
O ther organizational factors include organizational politics and organizational cli-
mate. This could mean turf war. Different departm ents (such as purchasing and pro-
duction) may support the overall goal of the new KM system but have conflicting pri-
orities. Politics is jockeying for leverage to influence o n e’s domain and control
procedures, technology, or the direction of an area of operation. The prevalence of poli-
tics, especially in a negative sense, is often ignored or deemphasized. The knowledge
developer must remain neutral within the political arena of the firm.
* « 1 ■ 1 1 BOX 8.5
The organization’s climate dictates whether a KM system’s time has come. The key
questions that the knowledge developer should ask are “Is today, this week, or this
month the right time to implement the product?” “Is the organization ready for this
particular environm ent?” Timing and readiness factors must be assessed in advance.
For example, in banking, most computer-based systems are installed during weekends
so as not to interfere with the weekday business activities. A KM system, including
training, should be completed in an environment devoid of interruptions.
User readiness can also influence deployment success. Foot dragging and delaying
the inevitable are not solutions. Users who know that work will accumulate during their
training make poor trainees. This suggests that deployment must be planned in advance.
OTHER FACTORS
There are several other implementation factors to consider. The return on investment
(R O I) factor is not easy to measure. If it is simply “greater custom er loyalty and
improvement in employee satisfaction,” it is a hard sell with the board of directors. The
costs are not hard to quantify, but the benefits are intangible and soft. A company may
decide to spend a $1 million on a KM system, but if it does not make its quarterly fig-
ures, the quick fix is to shelve expensive projects. When that happens, momentum is
lost, consultants leave, and the KM system dies a natural death.
Another factor worth considering is quality information. The number-one require-
ment for a successful KM system is an infrastructure capable of sharing real-time and
accurate information. Content is a critical part of KM system implementation, espe-
cially when the knowledge developer is trying to meet deployment deadlines, cut down
on costs, or do a quick sell to the user.
credit cards to prospective applicants. He appointed a staff member to undergo the ini-
tial training. She, in turn, trained a volunteer as backup.
Training went well. After the system was successfully installed on the local area
network’s server, the vice president called for an area meeting to announce the official
operation of the applicant assistant and to recognize the contributions of the division
manager in the development process. A similar announcement was also placed in the
bank’s employee newsletter on the intranet later that month.
In a situation where resistance could kill a worthwhile project, a champion makes
a difference.The KM system cost the bank $80,000. Based on the bank’s past records, it
paid for itself in 7 months by eliminating high-risk applicants.
One way to promote successful KM system deployment is to follow a few simple steps:
• Define how the KM system agrees with the organizational mission.
• Demonstrate how the KM system can help meet organizational goals.
• Allocate adequate resources to a feasible project.
• Advocate positive effects of KM systems, but do not create unrealistic expectations.
• Perform cost/benefit analyses of KM system technology and sell the company on
the system’s benefits and potential.
To raise awareness, a company might distribute Post-it notepads reading “KM
System, (name of the company)” to all employees everywhere.
Another resistance category comes from the system itself rather than people. If a
KM system offers poor user interface and requires extensive training to master, it could
spell disaster for effective deployment. There is no doubt that user friendly, knowledge-
based systems are a sure way to overcome resistance to KM system deployment. Ideally,
what is needed is a user who has an open mind about change and is “friendly” to tech-
nology and the concept of knowledge sharing via technology. Overconcentration on
technology and overlooking behavioral issues have resulted in many KM system failures.
Because a major user concern in system deployment is how to work the system,
users frequently ask, “W hat functions are available?” “How do I access each func-
tion?” “How do I know if the system has answered my questions correctly?” Another
user concern is how the KM system selects the right knowledge—how it reaches con-
clusions or lines up with the problem at hand. The knowledge developer must demon-
strate the system and provide detailed training in a timely manner.
With these ideas in mind, there are various m ethods to prom ote KM system
deployment:
1. User-attitude survey
2. Communication training
3. Training sessions
4. Role negotiation
In a user-attitude survey, opinions are collected from actual users to learn how well
they liked the system and how closely it met their requirements. Poor communication
skills could be a problem, but the survey is still worth the effort. Communication train
ing can prove to be invaluable for enhancing user-knowledge developer relationships
and successful system deployment.
For small to medium-sized KM systems, training sessions are normally run by the
knowledge developer. For larger systems, they are conducted by a knowledge specialist
who is expected to be a skilled communicator. In either case, the trainer should address
the user’s training needs and gear the pace of training accordingly. Some users may
learn the system in one day; others take much longer.
Resistance to change becomes obvious when users perceive adverse changes in
their jobs. An interesting technique, called role negotiation, attem pts to clarify what
the user expects the altered job to offer. Once understood, users have been known to
accept their roles in the change more readily.
In summary, for a new KM system to ensure user support, knowledge developers
and users must improve communication channels and jointly discuss the new system’s
features and how the change can improve their jobs. Users should also participate in all
phases of deployment. Sensitivity to user expectations is a step toward “deployment
without tears.”
Postimplementation Review
A fter the KM system has been deployed and the operation is up and running, the
effect of the new system on the organization should be carefully evaluated. System
impact must be assessed in terms of its effect on people, procedures, and performance
of the business. More specifically, the main areas of concern are quality of decision
making, attitude offend users, and cost of knowledge processing. For example, a post-
implementation study of the Travel Profiler showed an increase in the number of over-
all travelers accommodated by a factor of 2.5. It also showed that travel agent time had
improved by 20 percent.
264 7777 PART III Knowledge Codification and System Implementation
SECURITY CONSIDERATIONS
Safeguarding the KM system against unauthorized access is a necessary system deploy-
ment issue. Similar to a conventional information system, at a minimum, the new sys-
tem should provide password or protocol protection so that only users with the correct
code can log onto the system. One aspect of user training is to ensure that passwords
and security procedures are consistently observed. Beyond this point, restricted access
regarding the update of the knowledge base itself can be secured through the existing
LAN or the server in operation.
Domain
Expert
User Knowledge
Developer
Organizational
Climate
fl fl fl fl fl fl FIGURE 8.4: Internal and External Factors Affecting Knowledge-Based System Quality
how it is going to be absorbed has not been resolved. Any of these issues can inhibit
successful deployment.
Other managerial issues affect the direction and outcome of KM system projects.
For example, the depth of the knowledge required to solve the problem is often an
unknown commodity due to the nature of the expertise and the limitations of the
knowledge developer. Forcing clarification too early in the building phase can result in
a less-than-satisfactory system. Therefore, managing expectations and scoping the sys-
tem are crucial early tasks.
Finally, the role of the hum an expert in system deploym ent is also im portant.
Management should properly compensate the expert for efforts in developing a KM
system. A manager may also play a proactive role in the deployment phase by simply
sharing interest or excitement in the system. A lack of this type of enthusiasm and
overt support puts a damper on the whole project.
S u mma r y 1111
• KM system reliability is one of the most im portant issues in knowledge-based sys-
tems. Reliability means how well the system delivers information with consis-
tency, accuracy, and integrity. The prime emphasis beyond reliability is quality
assurance and maintainability of the system after installation.
• The most important part of building KM systems is testing. Logical testing
answers the question, “Are we building the system right?” and its goal is an error-
free program or software. User acceptance testing answers the question, “Are we
building the right system?” and tests the system’s behavior in a realistic environ-
ment. Such testing is done only after the system is operational.
266 ■ ■ ■ ■ PART III Knowledge Codification and System Implementation
• Some important challenges or issues that are considered during testing include
the following:
• The subjective nature of knowledge-based testing
• Lack of reliable specifications
• The problem of establishing consistency and correctness
• The determination of what constitutes an error
• Sources of test data
• The danger of negligence in testing
• Adequacy of automatic logical testing tools
• The complexity of user interfaces
• A circular error tends to be contradictory in meaning or logic. Redundancy errors
offer different approaches to the same problem. An unusable rule always fires
and fails, never fires, or has one or more contradictions. In a subsumption error, if
a rule is true, one knows the second rule is always true. In inconsistency errors,
the same inputs yield different results.
• The steps for user acceptance testing are as follows:
• Select a person or a team for testing.
• Decide on user acceptance testing criteria.
• Determine objective measures for the selected criteria.
• Develop a set of test cases and scenarios unique to the problem.
• Maintain a log or various versions of the test and test results.
• Some user acceptance testing tools are face validation, test cases, and subsystem
validation.
• Three im portant deployment issues are worth noting: selection of the problem,
knowledge codification and deployment, and organizational factors.
• Technology transfer includes actual transfer of the KM system from the devel-
oper to the working unit or the transfer of KM system technology skills.
Deployment can be approached as a stand-alone installation on a PC or as a fully
integrated application that interfaces with other applications.
• A KM system can be integrated into an organization in a number of ways:
• Technical integration
• Knowledge-sharing integration
• Decision-making flow integration
• Reengineering considerations
• The level of user training depends on the user’s knowledge of the KM system, com-
plexity of the system, the trainer’s experience and communication skills, and the
environment in which training is carried out. In any case, training should be geared
to the specific user and, in some cases, introduced in stages for a lasting impact.
• Regardless of what organizational aspects are being changed, deployment means
change, and people in general resist change. The resistors included experts, non-
experts, troublemakers, and narrow-minded technical superstars. Resistance is
displayed in the form of projection, avoidance, and aggression and has much to do
with the individual personality, the organizational structure in which the user works,
and the group relations in the area where the system will be installed. User edu-
cation, training, and participation can help reduce or control resistance to change.
• Deployment can be promoted in a number of ways: user-attitude survey, commu-
nication training, training sessions, and role negotiation. In any case, sensitivity to
user expectations is a step toward implementation without tears.
C H A PTER 8 System Testing and D eploym ent aaaa 267
Terms t o K n o w 1 1 1 1
Aggression: Resistance to KM systems through em ployee Pupil user: Unskilled worker trying to learn or gain some
sabotage of the system. understanding of the captured knowledge.
Avoidance: Resistance to KM systems through em ployee Redundancy rule: A rule that offers a different approach
withdrawal from the job or scene. to the same problem; duplication or meaning the same.
Circular rule: A rule that has embedded contradiction in Reliability: Dependability; truthfulness of the response or
meaning or logic. answer to a given question; credibility; how well the
Deployment: Physical transfer of the technology to the system delivers solutions with consistency, accuracy, or
organization’s operating unit. integrity; detecting or removing anomaly.
Enhancement: Upgrading the system to m eet a new set of Subsumption: In rules, if one knows one rule is true, one
requirements. also knows the second rule is always true.
Exhaustive testing: A procedure in which all possible Technical integration: Integrating an expert system
combinations of input values are tested. into an existing operation through the firm’s local
Face validity: Testing a system at its face value; comparing area network environment, the resident mainframe,
a human domain expert’s value judgment to test results workstations, and other information system
for reliability. applications.
Inconsistency: A rule that has the same input but differ- Testing: Time-intensive logical and user acceptance test-
ent results. ing of KM systems.
Knowledge-sharing integration: Integrating the expert Unusable rule: A rule that only fires if the conditions suc-
system in such a way that it can be accessed by differ- ceed, one that never fires, or one that has one or more
ent branches of the company, allowing them to share contradictions.
information. User acceptance testing: A system test to ensure the right
Logical testing: A system test to ensure the proper func- system from the user’s perspective; a system that meets
tioning of the system; addresses the intrinsic properties the user’s expectations; beta test; user acceptance test.
of the KM system; alpha test. User-attitude survey: A survey in which opinions are col-
Projection: Resistance to KM systems through em ployee lected from users to learn how well they like the system
display of hostility toward peers. and how closely the system meets user requirements.
Test Y o u r Understanding 1 1 , 1
1. What is the goal of logical testing? What is the goal of user acceptance
testing?
2. In your own words, explain the various phases of KM system testing.
3. Distinguish between:
a. logical and user acceptance testing
b. circular and redundant rules
c. force-fail test and exhaustive test
4. The chapter discusses two approaches to verifying knowledge-based systems.
Discuss each of them briefly.
5. How does verification of knowledge base formation differ from knowledge
base functionality?
6. Give examples of the following:
a. circular error
b. redundant error
c. subsumed error
d. unusable rule
7. In terms of securing test cases for user acceptance testing, where should the
test cases come from? How would one assure their reliability or relevance?
8. Who should do the user acceptance testing? Should it be the end user or the
domain expert? The knowledge developer? Explain.
9. In what way(s) is each of the following validation tools useful:
a. face validation
b. test cases
268 7777 PART III Knowledge Codification and System Implementation
10. If you were coordinating user acceptance and logical testing, what guideline
would be useful before the actual test?
11. How can system users be assured of system success?
12. In what way(s) is knowledge codification related to user acceptance testing?
13. “Successful KM system implementation depends on several factors.” Briefly
explain each factor.
14. Elaborate on the role of maintenance in the life of an expert system.
15. Distinguish between:
a. maintenance and enhancement
b. pupil and tutor user
c. projection and avoidance
16. How would one approach transfer of technology in system implementation?
Which approach do you suggest for implementing a small system on a stand-
alone PC? Why?
17. There are several alternatives for integrating KM systems into the organiza-
tion. Briefly explain each alternative. U nder what condition(s) would one
choose one alternative over the others?
18. Why is place of training important? What about duration of training? Explain.
19. What determines whether user training will be successful? Be specific.
20. How would one promote successful KM system implementation?
21. What is postimplementation review? Why is it important to carry out this step?
Kn o w l edge Ex e r c is e s 1,11
1. Discuss the key issues during logical and user acceptance testing. Is one issue
necessarily more critical than all others? Be specific.
2. Discuss the role of security in KM system use. How important is KM system
security compared to security measures in conventional information systems?
3. If you were asked to coordinate the implementation phase of a KM system in
a department where users are not that interested in the change, what approach
or procedure would you follow to combat resistance to change? Cite a specific
situation or the conditions under which you would handle the assignment.
4. If a KM system is user friendly and has the necessary help facility, how nec-
essary is a user’s manual?
5. How important are organizational factors in system implementation?
6. Discuss the main steps to user acceptance testing. How and why are they
important?
7. “A strategic education plan prepares an organization to adopt a KM system.”
Do you agree? Why or why not?
8. If testing is never that perfect or complete, why test anyway?
9. When a KM system is finally installed and ready to go, is the knowledge
developer released from further obligations to the system? Why?
10. Consider the following rules:
R1 IF 0 = 10
AND b = 15
THEN c = 20
R2 IF a = 10
THEN c —20
Of the two rules, which rule is subsumed by the other?
11. Consider the following rules:
IF tem perature > warm AND
humidity is high AND
atmospheric pressure is low
THEN there will be thunderstorms
CH A PTER 8 System Testing and D eploym ent 1 «« i 269
Re f e r e n c e s 1111
Awad, E. M. “Building Travel A dvisor; with EXSYS Awad, E. M. “ Test Cases For the Knowledge Recruiting
R e s o l v e r Unpublished manuscript, June 2001. A d v i s o r Unpublished manuscript, January 2002.
CH A PTER 8 System Testing and D eploym ent a a a a 271
Awad, E. M. “ Validating and Verification of a Breath Gas Gupta, Uma G. “Successful Development Strategies:
Monitoring System,” Unpublished manuscript, Au- Moving to an Operational Environment,” Information
gust 2001. Systems Management, vol. 9, no. 1,1992, pp. 21-27.
Ayel, M., and Laurent, J. P “SACCO-SYCOJET: Two Horibe, Frances. Managing Knowledge Workers. New
Different Ways of Verifying Knowledge-Based York: John Wiley & Sons, Inc., 1999, pp. 109-126.
Systems,” in M. Ayel and J. P. Laurent (eds.), Verification Jafar, Musa, and Bahill,Terry A. “Interactive Verification
and Validation of Knowledge-Based Systems. New York: of Knowledge-Based Systems,” IEEE Expert, Febru-
John Wiley & Sons, Inc., 1991, pp. 63-76. ary 1993, pp. 25-32.
Freedman, Roy S. “Knowledge-Based Software Testing,” Tiwana, Amrit. The Knowledge Management Toolkit.
The Journal of Knowledge Engineering, Spring 1991, Upper Saddle River, NJ: Prentice Hall, 2000, pp. 99-109.
pp. 47-65.
Knowledge Transfer
and Knowledge
Sharing
Contents
In a Nutshell
Knowledge Transfer As a Step in a Process
The Knowing-Doing Gap
Prerequisites for Transfer
Instill an Atmosphere of Trust in the Organization
Transfer Methods
Nature of the Problem
Transfer Strategies
Inhibitors of Knowledge Transfer
How Knowledge Is Transferred
Role of the Internet in Knowledge Transfer
Internet Service Providers
Stability and Reliability of the Web
Unique Benefits of the Internet
Limitations
Implications for Knowledge Management
Summary
Terms to Know
Test Your Understanding
Knowledge Exercises
References
A m an has no ears
fo r that to which experience
has given him no access.
—F r ie d r ic h N ie tz s c h e
C H A PTER 9 Knowledge Transfer and Knowledge Sharing a a a a 273
In a Nutshell
We have seen that for knowledge to be shared, it must first be captured, codified, and
deployed in a format acceptable to the user. The goal is to turn knowledge into action
or to transform individualized learning into organizational learning. This is why this
material was placed after the KM system life cycle. In most instances, the life cycle is a
prerequisite to knowledge transfer and knowledge sharing
Knowledge sharing is more than simply knowing the right thing to do. Knowledge and
information are obviously critical to performance. However, we live in a new millennium,
where there are a growing number of organizations in the business of capturing and transfer-
ring best practices. The goal is to narrow the gap between what they know and what they do.
Part of a changing environment is first to gather intelligence (such as information,
added value, and tacit knowledge) that triggers insight (responsiveness) to generate innova-
tion in products, services, and processes. As part of the KM system life cycle, once knowl-
edge is captured, codified, tested, and deployed, the next step is to demonstrate how it is
transferred to the right party in the right format and at the time needed. Knowledge trans-
fer is a prerequisite for knowledge sharing for competitive advantage, performance, and
profitability. Knowledge sharing is making available what is now known. Knowledge trans-
fer’s role in the building life cycle is shown in Figure 9.1. It may come from knowledge bases,
databases, or via the Internet. A knowledge-based system that helps a user answer technical
questions on the job is an example of knowledge that is being shared with that user.
Of course, there are other ways to transfer and share knowledge. Knowledge may be
transferred between persons and computers, computers and computers, teams and individ-
uals, or between individuals. In this chapter, each option is covered in detail to reflect the
multifaceted nature of knowledge transfer. We also discuss transfer strategies and methods,
inhibitors to knowledge transfer, and how explicit and tacit knowledge are transferred.
that one looks organization-wide for the best expert or the one with the deepest
knowledge. This brings up the concept of bounded rationality. H erbert Simon, a
renowned behavioral scientist at Carnegie Mellon University, coined the term to rec-
ognize hum an limits to a person’s knowledge of all alternatives and their conse-
quences. The hope is to get “good enough” inform ation from someone nearby. The
“good enough” view is referred to as satisficing rather than optimizing.
To transfer knowledge, we consider three factors:
It should be noted that only a limited amount of human expertise can be captured
as explicit knowledge to be part of a knowledge base application. This means that most
of human expertise is tacit knowledge, with practical limits as to how much or what
types of knowledge can be transferred between people or within a team configuration.
In any case, knowledge transfer facilitates knowledge sharing. The collective
knowledge of an organization is gleaned from the learning of its members as well as its
stakeholders and customers. Knowledge transfer enhances knowledge flows through
collaborative technologies, especially the intranet and the Internet. Hard, high-tech
communications technologies and networks serve as the enablers of knowledge trans-
fer and assure constant availability of knowledge on demand. This is best enforced by
support from top management (see Box 9.1).
Figure 9.2 shows a partial view of select knowledge transfers and their respective
knowledge m anagem ent applications. Knowledge transfers distribute to points of
action—support education and training, act as customer service representatives, and
so forth. In contrast, knowledge applications use knowledge to deliver' products and
services—assist knowledge workers to perform unique functions in a real-time envi-
ronment, make knowledge available to solve difficult problems, and the like.
a 9 ■ fl fl 9 BOX 9.1 9 9 9 9 9 9
SOURCE: Excerpted from Clark, Linda E. “A Stitch in Time,” Intelligent Enterprise Magazine, October 20,2000, p. 2.
276 aaaa PART III Knowledge Codification and System Implementation
a a a a ■ ■ FIGURE 9.2: A Partial View of a KM System for Knowledge Transfer and Knowledge Application
THE K N O W IN G -D O IN G GAP
Many organizations know what to do, but for various reasons ignore the information
that is available and perform differently—creating the “knowing-doing” gap. Recog-
nizing this problem should help firms make corrections and set up a knowledge transfer
environment for all employees to benefit. Even knowledge is not always a solution. To
illustrate, in the spring of 2001, one of us gave a 1-day seminar to senior officers of a
M iami-based banking group. The topic was “Employees Come First” —a topic that is
param ount in a service industry like banking. It has been known for years that
employee attitudes and morale affect turnover, customer satisfaction, and profitability.
CH A PTER 9 Knowledge Transfer and Knowledge Sharing 1 1 1 1 277
At the end of the seminar, one senior executive vice president of loans made com-
plimentary remarks about the good ideas she got from the session, but added that none
of those ideas would work at the bank. The bank’s president, she said, had no appreci-
ation for the rank-and-file staff (tellers, bookkeepers, and customer service clerks) of
the bank. Every time he passed by her employees, in the hallways or lunchroom, all he
wanted was to make sure employees did not take too much time off. At the end of the
year, it was always a big fight to get him to approve salary increases based on perfor-
mance that was carefully assessed by the human resources department. All he worried
about was what his bonus would look like based on the bottom line. Short of replacing
the president, there was not much that could be done to implement change.
An hour later, there were two senior officers from another bank still in the seminar
room. Although their bank recently implemented performance measures due to a recent
acquisition of a smaller bank, they had condensed their notes on paper napkins to take
back to the office for follow-up. One officer said, “Although we have activated much of
what you covered, the seminar gave us a different way of finalizing the performance
measures. To tell you the truth, we did a lousy job in sharing the information with those
whose jobs will be affected by the change.” The other officer was already on her cell
phone, reporting to her boss the changes she wanted to make first thing next Monday.
The first episode illustrates a knowledge-hoarding, m anipulative organization
under tight top management control. In contrast, the latter episode is an example of a
learning organization on the rise. The spirit of cooperation and collaboration was obvi-
ous in the way the officers worked together, clarified their notes, contacted the head
office, and showed interest in doing something positive for the good of the organiza-
tion. It is an environment where knowledge transfer and knowledge sharing should be
no problem.
respond,“You should tell management how you l'eel so that they understand that it is
not enough to know what to do, but for whom and why you’re doing it.” A learning
organization begins with employee queries, feedback, and transfer of experience
across the board.
A learning organization may also begin with a set of guidelines about how it will
operate. In one large Virginia bank, top management have set three core values for
tellers in 38 branches that guide their behavior: fairness, cordial treatment, and willing-
ness to share experience with other tellers. The same bank has a set of core assump-
tions about its employees in general:
• Respected as humans and treated fairly
• Intrinsically creative and capable of thinking and learning, if given a chance
• Can be responsible and be held accountable
• Will make mistakes and can gain experience from trial and error
• Willing to make a contribution, if given a chance
In summary, it is important to remember that when it comes to knowledge trans-
fer, people should be equipped with an attitude and a philosophy and that precedence
should not be allowed to substitute for thinking. What creates longevity and combats
turnover in a business is making use of the untapped potential within the employees
and transferring the training to help each employee work at peak performance. As a
result, a firm can learn and communicate with newcomers, regardless of job or distance,
and do so in a way consistent with its philosophy and core values. This is what creates
success and boosts performance.
form a team with experienced members who show novices why a job is needed and
how it is done before they are released to do the job. Unfortunately, knowing by doing
is a costly and time-consuming way of transferring knowledge. Going that route, how-
ever, will certainly shrink the knowing-doing gap in most jobs.
Actions speak louder than words and are more effective than concepts or theory
not tested by experience. Talk without action is no longer workable in a learning orga-
nization. To think that because a decision is made through discussion that action will
follow is also losing viability.
knowledge sharing by everyone in the group. Em ployees begin to learn from one
another and build an attitude or a belief that the best way for them to succeed is if their
peers succeed. They also begin to build a culture of cooperation that makes the final
product competitive in the marketplace.
Turning away from internal rivalry to cooperation and collaboration is good for
any business that can see beyond the horizon. This is especially true when teamwork is
based on commonality of goals and the aspiration of its members. When teams are
properly formed, team members freely exchange ideas, knowledge, and resources and
manage any conflict that stands in the way of doing an excellent job as a team. With the
increasingly complex nature of global business in a business organization, it is team -
work and groupware that count. It is fine to hire and retain human talent, but talented
people cannot do multifaceted projects alone. They need talented help.
In summary, one can easily foresee the benefits and potential of turning knowl-
edge into action in businesses that have replaced fear and internal rivalry with trust, a
sharing attitude, cooperation, and m utual respect for peers and the organization.
M arket competition continues to be a factor in organizational performance, but with
knowledge sharing, the focus is now on fighting the com petition rather than one
another inside the organization.
In order to make the change possible, managers are put through specialized train-
ing to understand the transformation process. Knowing about the knowing-doing gap
is superficial without the action that must follow. The mind-set has to change before
change can be made in the business. Much depends on m anagem ent practices that
come from the company’s philosophy that values innovation, creativity, and an attitude
of action. Those who have been with the organization a long time may find it difficult
to adopt the change. As a result, they have to be replaced, transferred to stand-alone
jobs, or offered an early retirem ent package.
or could occur when braking down a long steep hill in heavy rain. Sand, dust, grease
spots, or other m atter accumulating on the drums could be routine factors to consider
in solving the problem.
The procedure for repairs is considered routine, because all the mechanic has to do is
to replace the brake pads, the drums, or both. To do so, he pulls the wheels and the brake
assembly; he looks for foreign deposits, inspects the hubs, and checks the brake lines for
leaks. However, this often turns out to be the wrong solution. An experienced mechanic
may quickly find nothing wrong with the brakes or the deposits anywhere. He knows from
similar cases with the same model, though, that after 10,000 to 15,000 miles of driving in
the local climate, the hubs get hot and have a tendency to warp or get out of round. Once
that happens, it cause unevenness in the braking process; therefore, the squeak. The best
action is to replace the front hubs, hopefully with a better quality product.
The nonroutine, infrequent nature of the problem found a solution with the expe-
rienced mechanic. If he is working with or collaborating with other less experienced
mechanics, the tacit knowledge of the experienced m em ber can be verbally and
directly transferred to the rest of the team for future use. If the squeak problem hap-
pens to be a chronic complaint and more customers bring in their cars for repairs, the
diagnosis and procedure can be autom ated or stored in a knowledge base to be
accessed when needed. Even when the mechanics take notes about the new procedure,
they are transferring new knowledge on paper for later reference or use. In any case,
we experience knowledge transfer as a step for knowledge sharing.
TRANSFER STRATEGIES
Knowledge management implies formalized knowledge transfer and requires specific
strategies to ensure successful transfer. Knowledge is transferred via documents, an
intranet, groupware, databases, knowledge bases, and a lot more. By far, the most
effective channel for knowledge transfer is face-to-face meetings in the business place
(see Box 9.2).
One formalized strategy is codifying and storing tacit knowledge that is neither
easy to transfer nor guaranteed to be up to date, compared to the human expert from
whom such knowledge is captured. Perhaps the best way to absorb tacit knowledge is
to be in the domain where tacit knowledge is practiced. This is done through job rota-
tions, job training and retraining, and devoting specialized focus on on-site learning. It
involves on-site decision making, absorbing the mechanics and the heuristics as they
occur, and coming up with a new knowledge base that emulates the domain in a unique
way. The main limitation of such strategy is time, especially when certain problems can-
not wait a year or two before knowledge becomes available for a solution.
The traditional management attitude in most of today’s organizations is “stick your
nose in the job, minimize the chatter, and get to work.” For example, one multinational
firm placed a sign by each watercooler that read, “For safety reasons, the company dis-
courages any prolonged meetings or discussions around the watercoolers or anywhere in
the hallways, cafeteria, or around the elevators.” When asked by one manager the reason
for the notice, a senior executive replied, “It means don’t kill time when you should be in
your office at work.” For years, employees have used the watercooler or cafeteria (and
rest rooms) as a place to exchange views and resolve problems. The company in question
had no conference rooms or a place for group discussions. Management had the attitude
that such meetings promote gossip and feed the rumor mill.
In contrast to the traditional view, the knowledge management view is not “stop
talking and get to work,” but “start talking and get to work.” The watercooler get-
together could be the enabler of serendipity. W atercooler-type chats are a hit with
286 7T 77 PART III Knowledge Codification and System Implementation
i a fl i a a bo x 9.2 a a a a a a
SOURCE: Excerpted from Abramson, Gary. “Wiring the Corporate Brain,” Enterprise Magazine, March 15,1999, pp. 2-8.
a a a i a a
teams transferring or sharing focused knowledge during a break away from the office.
Spontaneous, brief sessions are door openers for generating ideas and exchanging
views; they have the potential for generating new ways of problem-solving. This is one
approach to creating exchanges that could produce unique results.
Knowledge transfer should adopt or adjust the organization’s culture to facilitate
knowledge transfer and knowledge sharing. Management in the Japanese culture sets
up talk or conference rooms to encourage dynamic knowledge exchange. Japanese
m anagers spend time together after work. From group dinners to social clubs and
sports, they practice knowledge transfer. They function as a mechanism for establishing
trust and take time for constructive criticism. They prefer meeting face to face over
e-mail and on-the-job experience over learning via a computer-based knowledge base.
The whole process, which includes company standards of perform ance and highly
respected protocols, is followed on a regular basis with value-added results.
With this in mind, it would be difficult to fit the Japanese culture with American
business. In so many ways, e-mail is an American invention for efficiency and produc-
tivity. The notion of “Why call for something you can attach to an e-mail message?” is
CH A PTER 9 Knowledge Transfer and Knowledge Sharing a i « a 287
the American way of promoting performance at the cost of informal or personal knowl-
edge transfer. An employee who spends hours leafing through and responding to e-mail
is viewed as being hard at work. An employee found reading a professional magazine as
a way of capturing knowledge is frowned upon as being “waste at work.” A company
that supports knowledge exchange, on the one hand, and discourages reading or talking
on company time confuses many employees. Irrespective of culture, “slack time” should
be used for knowledge sharing to the advantage of employees and company alike.
paths that define the way, timing, and duration of job experiences. In contrast,
knowledge downloaded from a database or a knowledge base is not a match for
the on-site, person-to-person knowledge transfer.
In addition to quality of transfer is the speed of acquiring and making use of
knowledge. This is where technology can be a tremendous help, especially if the
knowledge transferred affects employees and procedures company-wide. Both
quality and the efficiency with which it is transmitted and received would be of
concern to management in deciding how well the firm uses knowledge capital.
When performing a job, team members are on constant alert regarding the following:
• How did a m em ber’s task affect others in the team?
• How did a member’s way of performing a task contribute to the performance of others?
• What factors affect a m em ber’s performance on the job?
• How does a m em ber’s job impact the team ’s overall performance?
These observations are usually stored in each m em ber’s mind until the next time
the team meets and exchanges experiences. During the meeting, the sharing of experi-
ence and the transformation of experience into new or updated knowledge is what a
team should take with it onto the next job. The knowledge transfer process also facili-
tates the conversion from personal knowing to group knowing. When that occurs, it
contributes to the achievement of team goals.
Transfer Protocol. In every team setting, there is a protocol or a way to specify how a
team should function. With a focus on collaborative sequential knowledge transfer,
where jobs are interdependent and performed in some sequence, each team member is
expected to carry a “suitcase” of knowledge. There is also an assumption that each
member has vested interest in sharing rather than hogging knowledge. Any activity
carried out by members is done in fulfilling team goals—completing a project collec-
tively, efficiently, and effectively.
The unique features of collaborative sequential knowledge transfer include the
following:
• Team meetings are usually brief, but are held regularly as time and the occasion
permit. Meeting formats are understood, based on the way the team has con-
ducted previous meetings. There is usually a facilitator or an informal leader who
initiates the meeting, monitors the discussions or exchanges, and makes sure
things do not drag unnecessarily. Facilitators are routinely rotated among the
members. Some of the questions raised center around what happened during the
job just completed, whether there were any differences that should be discussed,
and why things happened the way they did.
• Meetings are held with all participants being equal. There are no discrimination
or hierarchical priorities set as to who speaks first, how influential one’s comments
290 7777 PART III Knowledge Codification and System Implementation
are compared to the rest, and the like. With this in mind, team members are
expected to be proactive rather than reactive and assertive rather than laid back,
with no attitude such as “Look, this was not my job, so I can’t comment” or “My
job is to lay pipes, no more no less.”
• Whatever takes place in meetings is kept within the team. There is no reporting
relationship to the organization’s higher-ups. This eliminates the fear that a nega-
tive report might prompt layoffs or dismissals. It means that team members
begin to understand and trust the circumstances under which they can or cannot
share knowledge.
• A unique feature of collaborative sequential knowledge transfer is focus on the
project, not the person or the personality. The approach, the setting, and the seat-
ing arrangements are not army style (one row behind the other) or classroom
style. Team members face one another, and anyone can make a comment anytime
within reason. The goal is to fine-tune performance, improve quality, and assure
integrity of the work performed by the team (see Box 9.3).
Even with all these advantages, this type of transfer also comes with its own set of
problems. A team could be overcommitted or overworked; fatigue or boredom could
set in; or the team might be operating under a tight budget. All of these circumstances
will make it difficult for the team to meet. A nother problem is the level of fluency of
-----------------------------------a a a a a a b o x 9►.3
SOURCE: Excerpted from Dell, Pamela. “Getting the Most out of Getting Together,” Knowledge Management, August 2001, p. 1.
CH A PTER 9 Knowledge Transfer and Knowledge Sharing ■ ■ ■ ■ 2 9 1
House A
o
Team B
Trap
Ro<
Prob
Subdivision Y
• Pipe Fitter
House B • Backhoe Operator
• Laser Engineer
• Contractor Representative
Team A
Subdivision X
292 7777 PART III Knowledge Codification and System Implementation
They designed a special apron to protect the tree from any damage should the pipe burst
or corrode. This new discovery was shared with another team in subdivision Y, which has
a similar problem but was about to cut the tree and dig up the roots to allow the inflexi-
ble pipes to lay straight to the trap. The new experience from team A was shared in time
to save the tree.
Interteam knowledge transfer is explicit knowledge, because most of the knowl-
edge transferred is routine work and the procedure is precise. Tacit knowledge is trans-
ferred in situations where the team might have found a new or a creative way to get
around problems. In our example, in Figure 9.6, the tree got in the way in both subdivi-
sions. Team A designed an apron to save the tree without compromising the quality of
the work. The apron is something team B never thought of; team B was about to cut the
tree. When the two teams met or a representative of team A met with team B, the
apron design was shared in time to be of use.
Personal interaction is ideal in projects that are timely and can benefit from quick
feedback. It is also useful in situations that reinforce relationships and solidify cooper-
ation and coordination between teams. E-mail or other electronic transmissions of
“news and views” cannot be a satisfactory substitute. It can be useful to supplement
personal interaction in interteam knowledge transfer.
Despite the benefits, there are human relations and other factors that make it dif-
ficult to implement explicit interteam knowledge transfer. One factor is the organiza-
tional subculture of the receiving team. In the case of the apron, team B might feel too
proud to accept any suggestions or ideas from an outside team, especially if the inno-
vation is simple or if it is something that team members should have thought of on
their own. A team may simply be reluctant to share explicit or tacit knowledge, espe-
cially in situations where their innovation and productivity will bring bonuses or spe-
cial awards. Finally, lack of time can be the worst enemy of knowledge transfer or
knowledge sharing. For reasons of their own, the team with the new experience might
not have the motivation to take extra time after work to spoon-feed another team with
the change that it took time and collaboration to invent.
control the fire and the smoke that had virtually covered the skies and sand dunes of
Kuwait. American ingenuity, skill, and self-discipline combined to master the seem-
ingly impossible. A dair’s tacit knowledge was translated to the Kuwaiti fire-fighting
team in a form different from what they had used before the war. Adair formed a new
company in 1993 to provide consulting services to fire-fighting teams on a global basis.
In every consulting job, he transfers his tacit knowledge to similar teams unrelated to
his and in areas and locations foreign to Texas.
A dair’s team demonstrated the ability to understand a specific situation and then
customize their response to that situation. His team members evaluated the new situa-
tion, which triggered memories of past episodes and their respective solutions for the
final decision on the approach used to control the unique Kuwaiti fires. What distin-
guishes this approach from explicit knowledge transfer is the fact that transfer of tacit
knowledge goes to another team doing a similar kind of work (extinguishing oil fire),
but the knowledge is customized to the location, culture, ability, and constraints of the
receiving team (see Figure 9.7).
One of the problems in tacit knowledge transfer is the understandable difficulty in
tapping tacit knowledge. A dair’s case was no exception. His tem peram ent, tolerance
for ambiguity, and patience for explaining details were barriers to'his knowledge trans-
fer. The process unique to the Kuwaiti fires was very difficult to capture on paper or to
train overnight. Unlike explicit knowledge transfer, tacit knowledge transfer is not
practically transferred electronically.
Backbone
Network
Access
Points (NAPs)
Regional
Networks
Regional
ISPs
User
Level
agement, a highly skilled technical staff, and a healthy budget to bring the technology
in line with the voracious appetite of today’s consumer. The trick is to ensure a balance
between creativity and control and between managing growth and a stable technical
infrastructure.
The Internet has spawned discussion groups, chat rooms, and online interactive
sessions in which technical and managerial staff evaluate products and processes and
arrive at value-added decisions that result in lower costs and increased performance.
B etter technical support is one of the key benefits of linking to the Internet.
IBM, for example, offers custom er and technical support and handles software
upgrades on the Internet. There are thousands of free software programs available
for anyone to download.
Market research firms are a natural for the Web. Credit bureaus, lawyers, private detec-
tives, accountants, baby-sitters, and teachers are all examples of people or agencies that use
the Internet for scheduling or advertising their services. The Internet contains thousands of
databases containing information about everything from medicine, vehicles, and food
preparation to hundreds of research and development (R&D) discussion groups. For thou-
sands of research journals, automated searches through current and back issues are avail-
able in minutes rather than the days and weeks it once took to find the information in a
brick -and-mortar library. White papers that research centers place on their Web sites pro-
vide current information about the latest developments in various fields.
Company research is no different. Companies use the Internet to seek information
about customer tastes and preferences, to profile a customer base for a new product, or
to test a new concept to see if it is worth developing. All of this can be done in a mat-
ter of days.
LIMITATIONS
Like any system with unique benefits, the Internet and the World Wide Web also have
unique limitations. The following paragraphs highlight the importance of continuing to
work on these limitations in the interest of advancing use of the Internet in general and
the Web in particular as a knowledge transfer and exchange medium.
The main limitations of Internet use for knowledge exchange are security and pri-
vacy. Key questions that are continually asked by online consumers are “How do I
know I am sharing knowledge on a secure line?” “How do I know the Web site assures
me privacy for the information I am seeking?” In terms of privacy, according to a study
of major Web exchanges by the Federal Trade Commission (FTC), only 20 percent
met FTC standards for protecting consumer privacy. However, the study also found a
90 percent compliance rate by Internet companies (for posting their privacy policies).
In addition to fakes and forgeries, there are other threats. Hackers, worms, Trojan
horses, viruses, and zombies threaten the security and integrity of any information or
knowledge exchange. Viruses are the best-known malicious software. These programs
secretly attach themselves to other programs and then infect and reproduce in a man-
ner similar to biological viruses.
Because hackers (those who access others’ computer systems illegally) continue to
threaten the integrity of files and transactions, hacking schools that teach students how
to hack or break into software to protect their own computer systems have begun to
appear in various cities. In one typical 4-day seminar, students (usually network admin-
istrators) pay $3,500 to learn the tricks of the trade. They are provided with hacking
tools that are available over the Internet for free (for example, an information gather-
ing tool, Sam Spade, and a port-scanning tool, SuperScan, that sends queries to
Internet servers to check their security status). At the completion of the course, stu-
dents sign an affidavit that they will use their experience appropriately.
Despite sophisticated FAQs, e-mail, and other technologies, companies still have a
problem with simple issues like securing information. In customer service, the heavy
demand also puts added pressure on customer service personnel.
298 7777 PART III Knowledge Codification and System Implementation
Su m m a r y 1,11
• Knowledge transfer is part of everyday organizational life and a step in the KM
building life cycle. Knowledge can be transferred from repositories to people,
from teams to individuals, and between individuals.
• To transfer knowledge, we consider where knowledge is transferred from, the
media used in knowledge transfer, and where the knowledge is transferred. In any
case, this transfer facilitates knowledge sharing and enhances knowledge flows
through collaborative technologies.
• Knowledge transfer distributes to points of action. It supports education and
training, substitutes as customer service representatives, and so forth.
• The knowing-doing gap is a situation where an organization knows what to do,
but for various reasons ignores the information available and performs differ-
ently. Knowing about this problem should help firms make corrections and set up
a knowledge transfer environment for all employees to benefit.
• The terms transfer and share are interrelated. Knowing is considered deeply per-
sonal; it is asking someone to give something that is his or her own property. It is
CH A PTER 9 Knowledge Transfer and Knowledge Sharing aaaa 299
a mechanistic term, which provides knowledge for someone else. The term share
is an exchange of knowledge between individuals, between or within teams, or
between individuals and knowledge bases, repositories, and the like.
Translating knowledge into action is not straightforward. To overcome the gap
between knowledge transfer and knowledge sharing, the following guidelines
are useful:
• Instill an atmosphere of trust in the organization.
• Fix the culture to accommodate the change.
• Push reasoning before process.
• Rem em ber that doing is far better than talking.
• Know how the firm handles mistakes.
• Ensure that cooperation and collaboration are not competition or inter-
nal rivalry.
• Identify what counts and what makes sense.
• Take a close look at the managers and how they view knowledge transfer.
• Assess employee job satisfaction and the stability of the workplace.
There is no single best transfer method for all tasks. Much depends on factors
such as the nature of the problem, the type of knowledge to transfer, and the
barriers to transfer. The upshot of knowledge, transfer is to adopt or adjust the
organization’s culture to facilitate knowledge transfer and knowledge sharing.
Irrespective of culture, “slack tim e” should be used for knowledge sharing to the
advantage of employees and company alike.
The key inhibitors of knowledge transfer are lack of trust, lack of time and con-
ference places, status of the knower, and quality and speed of transfer. Each
inhibitor should be seriously considered before knowledge transfer can be
expected to take hold reliably among participants.
The three main types of knowledge transfer are collective sequential transfer,
explicit interteam knowledge transfer, and tacit knowledge transfer. In collec-
tive sequential transfer, an ongoing team specialized in one specific task
moves to other locations and performs the same task. Once the task has
been completed, the same team reuses the same knowledge, goes to another
new site, builds the same system, and so forth. Team meetings are generally
brief; meetings are held with all participants being equal; whatever takes
place in meetings is kept within the team; and the focus is not on the person,
but the process.
Explicit interteam knowledge transfer allows a team that has done.a job on one
site to share the experience with another team working on a similar job on
another site. Interteam knowledge transfer is explicit knowledge, because most of
the knowledge transferred is routine work and the procedure is precise; it must
follow preset guidelines. Personal interaction is ideal in projects that are timely
and can benefit from quick feedback.
Tacit knowledge transfer is unique in complex, nonalgorithmic projects, where
knowledge is mentally stored. The team receiving tacit knowledge is different by
location, by experience, by technology, and by cultural norms. This means that
whatever knowledge is being transferred has to be modified in language, tone,
and content to be usable by the receiving team. One of the problems with this
type of knowledge transfer is the difficulty in tapping tacit knowledge. Unlike
explicit knowledge transfer, tacit knowledge transfer is not practically transferred
electronically.
300 7777 PART III Knowledge Codification and System Implementation
Term s t o K n o w 1111
Authority: The right to decide or to act. ing the experience with another team working on a
Belief: A way of thinking; feeling or impression. similar job on another site.
Bounded rationality: Tendency to select less than the Knowing-doing gap: Ignoring available information and
best objective or alternative; engage in a limited search performing a given job differently.
for alternative solutions; have inadequate information Knowledge transfer: Transmission of knowledge and use
and control of the factors influencing the outcom es of of transmitted knowledge.
a decision. Learning organization: A n organization that uses and
Collaboration: Sharing in the decision-making process for shares its knowledge to promote creativity and innova-
solutions considered to be mutually beneficial. tion; learning from the resulting experiences to advance
Collective sequential transfer: Transferring knowledge and grow in a competitive environment.
from one team specializing in one task to other loca- Satisficing: The practice of selecting an acceptable objec-
tions where the same task is needed. tive or alternative, which might be easier to identify
Culture: Those acquired and learned behaviors that have and obtain, less controversial, or otherwise safer than
persisted in human groups through traditions; the the best object or alternative available.
shared characteristics and values that distinguish the Tacit knowledge transfer: Transferring knowledge on a
members of one group of people from those of another. complex project stored in a human’s mind.
Empowerment: The leader’s sharing of power with subor- Value: A basic belief about a condition that has consider-
dinates. able import and meaning to persons within a society
Explicit interteam transfer: The transfer of explicit knowl- and is relatively stable over time.
edge from a team that has done a job on one site; shar-
Test Y o u r U n d e r s t a n d in g 1 , 1 1
1. Where does knowledge transfer fit in the KM system building life cycle?
2. In what way(s) is knowledge transfer a step in a process?
3. “Knowledge transfer is not only from knowledge bases or repositories.” Do
you agree? Why or why not?
4. What is “bounded rationality”? How does it relate to satisficing?
5. Cite and explain briefly the factors that affect knowledge transfer.
6. Distinguish between:
a. explicit interteam knowledge transfer and tacit knowledge transfer
b. values and beliefs
c. authority and empowerment
d. knowing-doing gap and bounded rationality
7. Explain briefly the key prerequisites for knowledge transfer.
8. List and briefly explain some of the positive cultural values in an organization.
9. How does employee satisfaction affect knowledge transfer?
10. Explain the factors that determine the effectiveness of knowledge transfer.
11. Elaborate on the key inhibitors of knowledge transfer.
12. What are the distinctive features of collective sequential transfer?
13. Give an example of your own tacit knowledge transfer.
14. Summarize the uses and limitations of the Internet as they relate to knowl-
edge management.
K n o w le d g e E x e r c is e s 11,1
1. How would one instill trust in an organization?
2. In your opinion, does one fix the culture and then get the employees to share
or vice versa?
3. Discuss the difference(s) between collaboration and commitment. How are
they related?
4. In what way(s) is it difficult to fit the Japanese culture onto American business?
5. How important do you think trust is in the process of knowledge transfer?
CHAPTER 9 Knowledge Transfer and Knowledge Sharing a ■■a 301
R e fe r e n c e s 1 1 1 1
Abramson, Gary. “Wiring the Corporate Brain,” Horibe, Frances. Managing Knowledge Workers. New
Enterprise M agazine , March 15,1999, pp. 2-8. York: John Wiley & Sons, Inc., 1999, pp. 21-44.
Becker, Rick. “Taking the Misery Out of Experiential Koulopoulos,Thomas M., and Frappaolo, Carl. Smart
Training,” Training, February 1998, p. 80. Things to K now A bou t Knowledge Management. Oxford,
Clark, Linda E. “A Stitch in Time,” Intelligent Enterprise UK: Capstone Publishing, Ltd., 1999, pp. 127-165.
M agazine , October 20,2000, p. 2. Pfeffer, Jeffrey, and Sutton, Robert I. The K nowing-D oing
Dell, Pamela. “Getting the Most out of Getting Together,” Gap. Boston, MA: Harvard Business School Press,
Knowledge Management, August 2001, p. 1. 2000, pp. 89-106.
Dixon, Nancy M. Com m on Knowledge: H ow C om - Wiig, Karl. Knowledge M anagement Foundations—
panies Thrive by Sharing What They Know. Thinking A b o u t Thinking—H ow People and
Boston, MA: Harvard Business School Press, Organizations Create, Represent, and Use Knowledge.
2000, pp. 33-142. Arlington, TX: Schema Press, 1993.
Knowledge Transfer
in the E-World
Contents
In a Nutshell
The E-World
Intranets
Extranets and Knowledge Exchange
Groupware
Groupware Applications
E-Business
The Value Chain
Supply Chain Management (SCM) and Knowledge Exchange
Implications for Knowledge Management
Summary
Terms to Know
Test Your Understanding
Knowledge Exercises
References
In a Nutshell
Knowledge management does not operate in a vacuum any more than it is only about
technology. A learning organization is driven by intelligence, and knowledge is volun-
tarily shared via teams, between individuals, face to face, and electronically. Technology
is an inescapable part of most knowledge management success stories. The company’s
CHAPTER 10 Knowledge Transfer in the E-W orld 1 a ■■ 303
technology—including an intranet, groupware, and extranet—plays a major role in
knowledge transfer and knowledge sharing when distance is a problem within the firm
and between firms worldwide. External stakeholders such as vendors, customers, and gov-
ernment are considered partners in a company’s global integrated knowledge manage-
ment system, where knowledge sharing is part of a geographically dispersed environment.
One area where knowledge transfer has gained popularity is in e-business and
e-commerce. It is an environment where external stakeholders form a networked rela-
tionship with a company’s knowledge bases or organizational members. In e-business,
there are e-merchants, e-vendors, and the knowledge automation tools that make each
relationship a value-added reality. Supply chain management is the architecture that
makes such relationships p ossible.In this chapter, we discuss knowledge transfer
through technology that facilitates knowledge sharing. These electronic relationships
involve the company’s intranet and the Internet. Intranets and extranets as part of an
integrated knowledge management environment are also discussed.
In term s of knowledge transfer, e-business helps create knowledge m arkets
through intelligent exchange of information, strategies, and processes. Small groups
inside big firms can be funded with seed money to develop new ideas. DaimlerChrysler
created small teams to look for new trends and products. A Silicon Valley team is doing
consumer research on electric cars and advising car designers. Sooner or later, these
groups create electronic linkups with outside affiliates.
Today’s electronic marketplaces improve knowledge sharing between merchants
and customers and prom ote quick, just-in-time deliveries. Customers and merchants
save money; are online 24 hours a day, 7 days a week; experience no traffic jams and no
crowds; and do not have to carry heavy shopping bags. However, security continues to
be a problem for online knowledge transfer. In a 2000 Economist article, 95 percent of
Americans expressed reluctance to give out their credit card number via the Internet.
■■ ■ ■ The E-World
By e-world, we refer to the electronic facilities available to a company that accommo-
date knowledge transfer and knowledge exchange, regardless of place, location, or dia-
logue. The facilities include the intranet, extranet, groupware, e-commerce, and e-business.
These are the commonly used technologies that address knowledge management solu-
tions. Most of them handle the explicit side of knowledge transfer.
INTRANETS
Intranet is a term used when we apply Internet technology to serve the internal needs
of an organization. It can be viewed as Internet-like capability at the internal organiza-
tional level. The user can simply point and click to access the available information. The
drill is easy. Click on an icon, a button, or a link on the screen and go to different pages.
Internet technology is superior to conventional internal communication sys-
tems. The Web browser, for example, is a readily available and familiar access tool.
Documents are handled easily, and multiple media can be supported as well. Mid- to
large-sized organizations are spending thousands of dollars just to keep their documents
under control. Managers constantly share documents and knowledge on an inter- and
intradepartmental level. With various operating systems, network protocols, and applica-
tion suites, trying to ensure homogeneity in managing knowledge can be quite a chal-
lenge. Intranets handle all transfers and exchanges with ease.
The following scenario is typical of an intranet. Flameless Electric, the second
largest m anufacturer of electrical parts in Virginia, needed to roll out and sell two
304 77T7 PART III Knowledge Codification and System Implementation
m ajor products in 2002. Its strategy used the Internet, intranet, and extranet. The
Internet part was easy. The com pany’s Web site displayed the products, which were
explained by a company expert for customers to see and order. The company’s intranet
was accessible only by its 743 knowledge workers. Its priority was to support its 112 sales
reps statewide. The intranet supplied them with marketing and technical information
about the products and an autom ated sales application that minimized paperwork,
regardless of location or size of order. They were also in touch with product designers
and other experts who could explain each product as needed.
The third part was Flameless’ extranet. An extranet is an intranet with extensions
that allow clearly identified customers or top suppliers to access company-related tech-
nical and educational knowledge bases. The com pany’s extranet was accessible to
950 electricians and small electrical parts dealers via a special company Web page. An
electrician, for example, couid enter an assigned password to access information about
new products and special deals that were available to high-volume buyers. There was
also a knowledge base, called CRM (custom er relationship m anagem ent), that
addressed customer relations. The system stores customer complaints and weaves their
solutions into more intelligent answers for future complaints. Answers to customer
complaints are based on refined past knowledge of the same.
A fter 7 m onths of use, Flam eless’ N et-based system was paying dividends. It
cut down on phone calls and fax orders and gave sales reps in the field immedi-
ate online support for the knowledge they needed to transact business. It even im-
proved shipment schedules and deliveries. A summary view of that intranet is a way of
thinking about how knowledge workers in a business transfer and share knowledge
(see Figure 10.1).
Intranet operation is a communication project designed by a technical staff. It is a
network of people, not of wired machines. The focus is the message, not the media.
Concentrating on the technology of the intranet is like an author worrying about the
presses and typesetting rather than the manuscript.
Production Team —
New Product
CHAPTER 10 Knowledge Transfer in the E-World l a i i 305
Benefits
An intranet provides many benefits and has distinctive features. It links knowledge
workers and smart managers around the clock and automates intraorganizational traf-
fic. Today’s face-to-face com m unication and knowledge transfer systems are labor-
intensive, although they are effective once the parties go beyond the exchange of pleas-
antries. An intranet m akes it possible to gain better access to the knowledge and
experience of the decision makers who work within it. It is a creative and empowering
tool for a company and the foundation for developing an enterprise-wide knowledge-
based interactive environment. It is a model for collaborative knowledge transfer and
knowledge sharing (see Box 10.1).
An intranet is not for every business. First, from a cost/benefit analysis view, the
investment is justified when there are 100 or more employees. One major application is
listing employee benefits, company news and views, vacation schedules, job openings,
and recognizing special employees. A company needs an intranet when:
• It has a large pool of information to share among hundreds of employees. It is an
effective way of cutting the cost of producing conventional multiple hard copies.
• Knowledge transfer must reach its destination in a hurry. Because intranets oper-
ate across platforms such as Windows, UNIX, and Mac, they are the easiest way
to get people communicating.
O ther than human resources, an intranet facilitates knowledge transfer and knowl-
edge sharing in other intelligent applications. They include detailed e-mail for inter-
office communication, internal company office circulars, bulletin board service, a daily
to-do list and assignments from a central desk to all connected desks, and a channel for
a bo x 10.1
BEST INTRANET SITE ployees to use the Web as the central medium of
collaboration. The Ford intranet is the repository
Bud M athaisel makes no apologies for the way
for all “corporate knowledge.” Every vehicle team
Ford M otor Co. cajoled thousands of employees
has a Web site where they post questions and
to use the Web as the engine for all kinds of busi-
results and resolve business issues. Employees in
ness activities. First, the IT department gave work-
800 facilities worldwide report that 90 percent of
ers a kick-start by seeding the intranet with tons of
the critical data they need to do their jobs is avail-
data and easy-to-use templates. Then, senior man-
able in the Web knowledge base. The intranet has
agement applied the real pressure. “G roup vice
reduced the time it takes to bring new models into
presidents ask—no, direct—their staff to publish
production, improved quality, and cut travel costs,
all of their knowledge and best practices on the
Mathaisel says. “In my career, I have seen many
Web,” says Mathaisel, Ford’s CIO. “The Web is the
promised silver bullets,” he says. “None has pro-
critical conduit for just about all activities.”
duced the value that the intranet has.”
That might explain how, 2 years after its
launch, the Ford intranet has lured 101,000 em -
SOURCE: Joachim, David. “Best Awards Business on the Internet,” InternetWeefc, April 19,1999, p. 47.
a
306 7777 PART III Knowledge Codification and System Implementation
Suppliers
CHAPTER 10 Knowledge Transfer in the E-W orld a a a a 307
Once a business goal has been established, the next step is for IT departments to
discuss feasibility. In a vertical industry like manufacturing, the focus is on improving
operations through the existing supply chain; in vertical companies like retail chains,
the focus would be on improving revenue. Working with the IT group should bring
both technical and business information together for a master design of the extranet.
Understanding corporate business processes is the key to a successful deployment of
an extranet. By planning the deployment around a well-defined business plan, it is eas-
ier to prove how technology will help the bottom line (see Box 10.2).
1 1 1 i ■ ■ BOX 10.2
EXTRANET AT KODAK
SOURCE: Awad, E! M. Electronic Commerce: From Vision to Fulfillment. Upper Saddle River, NJ: Prentice Hall, 2002, p. 372.
s fl a a a a
308 7777 PART III Knowledge Codification and System Implementation
Security varies with the type of user, the sensitivity of the knowledge transferred,
and the com m unication lines used. Security questions deal with access control, au-
thentication, and encryption. Access control relates to what users can and cannot
access, what can be accessed from what server(s), what accessible data are for display
only, and what accessible information can be restricted to certain times of the day. In
terms of authentication, decisions must be made regarding the level of authentication
for each user, whether passwords and user names are adequate security, and how well
other security measures complement the authentication. Is encryption required? If so,
how strong should it be? W hat type of com m unication line or inform ation should
be encrypted?
Extranets are changing how organizations share internal resources and interact
with the outside business world. Built with technology and used by people, they can
ensure lasting bonds between business partners and corporate members. The entire
commitment should be viewed as a knowledge management asset rather than a mere
networking expense to expedite business. This is where a champion becomes a critical
part of the installation.
A champion who best promotes an extranet is someone who knows the organiza-
tion’s processes, goals, and politics and has technical experience and leadership quali-
ties. This person is an advocate with ability to build company-wide support for the
extranet. It is a demanding role, requiring a detail-oriented expert who can sell top
management on the viability and potential of the extranet. The key to making his or
her case heard is to dem onstrate how an extranet can m eet the company’s revenue
goals. Specifically, there should be a convincing argument for how the extranet will
generate revenue, how the technology will solve the business problem s defined in
advance, and how the work will get done through the proposed extranet.
A champion must drive home the key advantages of an extranet:
• An extranet helps the organization ensure accountability in the way it does busi-
ness and exchanges knowledge with partners.
• An extranet promotes more effective collaboration with business partners, which
improves the potential for increased revenues.
• An extranet is a long-term investment in competitive advantage. Sooner or later,
having an early start on the competition is bound to pay off.
GROUPWARE
One of the most popular technologies that facilitate intermediation is groupware. By
interm ediation, we mean connections between people and how knowledge is trans-
ferred between knowledge seekers and knowledge providers. Groupware is software
that helps people work together, especially for organizations that are geographically
distributed and less likely to encounter face-to-face exchange among knowledge work-
ers. Through this specific class of technology, people rely on groupware to communi-
CHAPTER 10 Knowledge Transfer in the E-World i«ai 309
cate ideas, cooperate in problem-solving, coordinate work flow, or negotiate solutions.
It seems logical to invest in an intranet that can perform locally within the company
and link globally via e-mail and the Internet. Groupware applications on a company’s
intranet can help the organization do more for less (see Box 10.3).
G roupw are is categorized according to (1) whether users of the groupware are
working together in the same place (face to face) or in different locations (distance)
and (2) whether they are working together at the same time or different times (see
Figure 10.3).
Groupware goes beyond cooperation or work by teams. In designing the technol-
ogy, the prime consideration is learning about group concepts and how group members
behave in a group setting. The goal is to identify the tasks, understand how the group
communicates, and decide on group structure and member roles. Once understood, the
next step is to have a feel for networking technology and how it can assure a produc-
tive user’s positive experience.
GROUPWARE IN ACTION
What attorney Bill Wright was facing was a fail- work and started using it to discuss business.
ure to communicate. First, one of his three part- When Wright had to produce a draft of a pro-
ners suddenly up and left, taking 17 employees of posed settlement, for example, he no longer had
the Bellmawr, New Jersey, law firm and lots of to rummage through notes from previous dis-
clients with him. Then, within days of his depar- cussions and interrupt his partners with time-
ture, the prodigal lawyer sued his former partners. consuming questions. Instead he simply looked in
Of course, Wright’s firm turned around and filed the program ’s database for a record of earlier
a countersuit. W hat with im prom ptu hallway memos and messages relating to the topic.
discussions, emergency meetings, news flashes, A year after the suits were settled, groupware
urgent requests for background, and the rest of had become the interactive glue holding Wright’s
their caseload, the remaining staff at Farr, Burke, firm together. Their application now has 14 users
Gambacorta & Wright barely had time to breathe. (partners, lawyers, paralegals, and the office man-
“We had to find a way to help us handle the flood ager) and covers 32 topics, from legal procedures
of information,” says Wright. “And we had to find to new cases. If, for example, a bankruptcy judge
it fast.” Simple e-mail, he knew, would not suffice. makes an idiosyncratic procedural ruling about
He needed something that would organize and foreclosures, an associate adds that tidbit to the
catalog information, not just zap bulletins around pertinent topic. Some topics are available to every-
the office. one; others, like the one that disseminates confi-
W hat W right and his colleagues did was to dential information about management, are open
turn to groupware, a category of software used, as only to partners. A pregnant attorney created a
the name suggests, to help people work in groups. subject area related to her cases so that others
Instead of holding one meeting after another, could track her cases while she was on maternity
they bought and installed a program called leave and so that she could get up to speed
TeamTalk (from Trax Softworks) on their net- quickly when she returned to work.
a a a a a a
310 7777 PART III Knowledge Codification and System Implementation
• Groupware works well with groups having common interests or work and where
it would not be practical for the same number of people to meet face to face.
• Certain problems are best solved by groups, not individuals.
• Groups can bring multiple opinions and expertise to a work setting.
• Groupware facilitates telecommuting, which can be quite an effective time-saver.
• Joint meetings are often faster and more effective than face-to-face meetings.
Communication Structure
In a typical face-to-face session, the protocol is standard. Communication is highly
structured. Someone asks a question or explains a situation while the others listen.
There is usually a question, then a response, and so on. When a communication struc-
ture is known, a groupware system takes advantage of it to speed up communication
and improve the perform ance of the exchange. This communication environment is
referred to as a technologically mediated communication structure. The expectation is
order, discipline, and following a known protocol of question-response.
An alternative communication structure is what we call a socially mediated com -
munication structure , where individuals send a request through technology like e-mail,
with no control over how soon or whether the recipient will respond. This communica-
tion exchange is good for certain problem-solving situations, but not for others. The
im portant point is for the designer to set up a groupware system to fit the specific
requirements of the group that will use it. Unless the prerequisites are identified, there
is the risk that any groupware technology might backfire.
Session Control
Groupware systems require that sessions be conducted within the framework of
protocols designed to ensure privacy, integrity, and successful completion of each ses-
sion. A session is a situation where a group of people agrees to get together to conduct
a meeting in person, over the telephone, or in a chat room. Session control is more like
a bouncer standing at the door of a private club and checking identification, determ in-
ing whether the person is wearing the proper attire, and so forth. Session control deter-
mines who can enter and exit the session, when they can enter, and how. Once inside,
the rest of the group should be aware of the newcomer and his or her role. Some of the
rules used in session control include the following:
• Make sure users do not impose a session on others. Like a telem arketer call with
no filter such as caller ID or an answering machine, a resident feels vulnerable
not knowing who the caller is.
• Conversational group members should be identified before being allowed into a
session. This way, other participants have an idea who is included in the session
and the role they play.
• The system should control unnecessary interruptions or simultaneous transmis-
sions that might result in confusion or chaos.
• A group member should be allowed to enter and leave at any time. However, par-
ticipants should know when such a situation occurs.
• Make sure there is a ceiling on how many people can participate and how long
the session should last.
• Assign a moderator who controls access to a shared whiteboard or a repository
and how long access should last.
• Ensure anonymity, privacy, and accountability at all times. Each user should have
control over the information to be shared; other communications should be pri-
vate or confidential.
When people use technology like groupware to communicate, various types of
information are communicated through channels, implicitly and explicitly. Awareness
inform ation such as docum ents and location and tasks of coworkers should all be
312 7777 PART III Knowledge Codification and System Implementation
GROUPWARE APPLICATIONS
E-Mail and Knowledge Transfer
Besides the traditional telephone, e-mail is the most common groupware applica-
tion. Unlike the telephone, which involves two persons exchanging information via a
dedicated cable, an e-mail system provides much more. It can send and receive mes-
sages, forward messages, file messages, and create mailing groups. It can also attach
files to a message. Most e-mail systems provide features for sorting and processing
messages. A message can easily be routed to any number of destinations.
The intranet and e-mail is a marriage made in “cyberheaven.” E-mail is what a
company’s intranet is best known for; it is “the N et’s killer app” (Dell 2000). Almost
90 percent of Net users report e-mail as the most frequently used online contact
between knowledge workers. It is a major communication platform in business and
government. Scott McNealy, chief executive officer of Sun Microsystems, Inc., once
commented: “You can take out every one of the 300 to 400 computer applications that
we run our company on and we could continue —but if you took out our e-mail system,
Sun would grind to an immediate halt.”
Over 200 million in-boxes are active worldwide. Frequent e-mailers already recog-
nize that their in-box is as much a database of appointments and news as it is a place to
store messages. With e-commerce volumes on the rise, this knowledge transfer and
communication tool is becoming part of e-marketing and sales.
E-mail is also becoming smarter: It can now manage data and documents with
ease. It can direct specific messages to defined folders and be a place to check voice,
text, and fax messages. This is called content management or unified messaging services.
Managing information with e-mail is more efficient than dealing with the flood of let-
ters, faxes, and bills we handle today. As e-mail becomes the standard for content dis-
semination of all kinds, it should attract more and more users and become as popular
as the cell phone.
Chat Rooms
This groupware system allows many people to participate in a session, where they
write messages that appear to all participants on the bottom s of their respective
screens. In one chat session, the author was invited to give a talk on e-commerce appli-
CHAPTER 10 Knowledge Transfer in the E-W orld i i i i 313
cations to an Association for Computing Marketing (ACM) chapter 300 miles away via
the host university’s chat room. The monitor displayed a text message that seven partici-
pants were present. It began with a message from the moderator: “Now the meeting will
come to order. I am pleased to present our speaker for the evening.” A message was dis-
played every time someone connected to the chat room or exited. As the presentation
was entered electronically in text, the presenter was informed of what was going on by
participants through the chat room. For example, when a question was entered, it was
displayed on one corner of the monitor. A t the end, an “applaud, applaud” message was
displayed with a thank-you note, which concluded the chat session.
One thing worth noting about the text version of chat is that there is a transcript of
the presentation, which makes it easier for participants to react at any time. As a result,
in most chat sessions, participants are engrossed in listening, thinking, and responding
to the ongoing exchange. It simulates a live session in a human group.
Video Communication
Another groupware application that is gaining in popularity is video communica-
tion. This system is essentially a phone system with video hardware. This application is
ideal in discussions requiring a video display or when visual information is being dis-
cussed. It also projects a view of activities going on at a remote site. Video communica-
tion systems allow live video for two-way or m ultiple locations, depending on the
requirements of the group session.
Knowledge Sharing
Knowledge-sharing groupware is unique in small business situations; it allows you
to store and share information through a resident knowledge base. The attraction of
such a system is that it involves a few steps that are easy to learn and apply; everything
resides in the knowledge base and is easily accessible (Field 1996).
E-Business
E-business brings the universal access of the Internet to the core business process of
exchanging information between businesses, between people within a business, and
between a business and its many clients. From an interface perspective, e-business
involves various knowledge exchanges: business-to-business, business-to-consumer,
and consumer-to-consumer. Each type is explained later in the chapter.
The focus of e-business is on knowledge transfer and knowledge sharing. It means
connecting critical business systems directly to critical constituencies—customers, ven-
dors, and suppliers—via the Internet, extranets, and intranets. The technology-based
environment provides electronic information to boost performance and create value
by forming new relationships among businesses and customers. E-business is more
than a Web site, in that it affects all aspects of business, from strategy and process to
314 7777 PART III Knowledge Codification and System Implementation
trading partners and the ultimate consumer. It combines the resources of traditional
knowledge-based systems with the global reach of the Web.
From a knowledge management viewpoint, e-business enables learning organiza-
tions to accomplish the following goals:
1. Create new products or services and, consequently, new market knowledge
2. Build customer loyalty through knowledge exchange and knowledge sharing
3. Enrich human capital by more direct and immediate knowledge transfer
4. Make use of existing technologies for research and development and creation of
new knowledge for new and more advanced products and services
5. Achieve market leadership and competitive advantage
E-business means exchange of inform ation with anyone, anywhere, anytime. It
breaks two traditional rules of knowledge sharing: Companies do not share knowledge
with competitors, and suppliers do not share knowledge with buyers, especially knowl-
edge ihat determines pricing. One of the drivers that promotes e-business is change in
organizations. Today’s learning organizations empower front-line workers to do the
kind of work once performed by junior management. There is also a trend toward part-
nering owners and managers across departm ents to develop a chain of relationships
and knowledge sharing that adds value to the enterprise. Downsizing of larger organi-
zations, outsourcing of specialized tasks, and encouraging cross-functional business
processes all require better communication between the departm ents that perform
these functions. E-business, which makes communication easy, is an ideal method of
making these connections (see Figure 10.4).
Support Activities
4^ ?
9 9 I fl 9 I FIGURE 10.5: A Knowledge-Based Value Chain
The trend in e-business is to integrate the knowledge management life cycle, from
knowledge creation (such as seeking inform ation from the custom er, vendor, or
employees) to knowledge distribution (such as providing reports, analysis, or forecast-
ing to top managem ent) via three major applications: business-to-consumer (B2C),
business-to-business (B2B), and business-within-business. These are also known as the
Internet, extranet, and intranet, respectively (see Table 10.1).
BOX 10.4
SOURCE: Stein,Tom, and Jeff Sweat. “Killer Supply Chains ” InformationWeek, January 16,2000, pp. 1-3.
knowledge workers and suppliers to make sure orders and inquiries are filled correctly.
More and more, companies are extending their focus from internal operations like
scheduling and enterprise resource planning to relationships with external customers
and suppliers. They are looking for the perfect virtual enterprise that will link their sup-
plier’s suppliers to their custom er’s customers to operate together under one umbrella
with seamless connections among knowledge bases, databases, manufacturing, inven-
tory systems, and Web servers (see Box 10.5).
As you can see, B2B exchanges pave the way for a new model of the digital econ-
omy. It is a distinct network of suppliers, distributors, Internet service providers, and
customers that use the Internet for communications and transaction handling. As com-
m unication tools get better and cheaper, transaction costs should drop. With the
Internet, many transaction costs are approaching zero. People around the world can
now quickly and cheaply access the information they need almost instantly. Companies
can also add value to a product or service from any location, at anytime, day or night.
CHAPTER 10 Knowledge Transfer in the E-W orld a a ■a 319
a a ■ ■ a a BOX 10.5
SOURCE: Chadbrow, Eric. “Supply Chains Go Global,” InformationWeek, April 3,2000, p. 52.
a a a a a a
SOURCE: Violino, Bob. “The Leaders of E-Business,” InformationWeek, December 13,1999, p. 72.
CHAPTER 10 Knowledge Transfer in the E-World a a i a 321
allows multiple channels of communication with customers and supply chain partners
and uses customer information stored in databases and knowledge bases to construct
predictive models for customer purchase behaviors. Companies provide a robust net-
work system in order to support a successful CRM implementation. The main benefits
include the following:
The two critical elements of CRM software are operational and analytical tech-
nologies. The operational com ponent uses portals that facilitate communication
between customers, employees, and supply chain partners. As shown in Figure 10.6, the
portal resides in the presentation layer of the CRM technical architecture. Some of the
basic features included in the portal product are as follows:
• Allow the capture of a very large volume of data and transform it into analysis
formats to support enterprise-wide analytical requirements
• Deploy knowledge —an intuitive, integrated system; rapidly enables processing of
the intelligence gathered from analytical environments
• Calculate metrics by the deployed business rules; identifies pockets of activity by
a consumer in real time, enabling truly strategic targeting
The portal serves as a window to the wealth o f information contained within the organization. It is the key to
a successful CRM architecture.
Portal
t
Presentation Layer
Data Marts
Access Layer
9 9 9 ■ 9 1 FIGURE 10.6: Operational and Analytical Components of CRM in Its Technical Configuration
SOURCE: Adapted from Zurell, Nancy. “Operational and Analytical Technologies for Optimizing Your
CRM System,” D M Review, February 2002, p. 82.
(also known as intranets) operate over the Internet and connect departments that are
located at rem ote areas. The overall CRM infrastructure that provides communica-
tions within the organization and with outside entities is illustrated in Figure 10.7.
Telephone Call
Customer IP Phone Supply Chain
Partners
Call Center
Purchase Order
Returns
□ Corporate
Database
Customer Information
Web-Based
Portal
handle the speed of change. The person who figures out how to harness the collective
genius of the organization will blow the competition away.
Intranets are tools to manage corporate intelligence. They offer unique leverage
and a competitive advantage at all levels of the organization. Among the key success
factors are strong leadership, a focus on users, and effective m anagem ent of the
intranet project. From a managerial view, change may not be immediate and should
be nurtured with care. This author spent 7 weeks designing and im plementing a
$700,000 intranet site for a foreign central bank with 950 employees. After 3 months
of training, coaching, selling, and demonstrating the uses of the new intranet, less than
20 percent of the employees made a habit of using the new system. The rest of the
staff continued to deliver memos, documents, reports, and messages the old-fashioned
way—in person.
Change is closely related to employee satisfaction, and the effect of the intranet on
the way employees do their jobs is important. Those who are forced to use a new sys-
tem will find a way to get back at the company. For example, gripe sites are available on
the Internet that employees use to state their dissatisfaction with the employer. For
example, www.vault.com and www.aolsucks.com are gripe sites that accept such
complaints. They are normally started by competitors, disgruntled employees, whistle-
blowers, or activists. The motive ranges from sheer anger to venting frustration or get-
ting revenge by spreading damaging inform ation. A nyone with an ax to grind can
smear the employer for the public to read. IT and company recruiters should review
such sites and check what is posted about their company.
A nother implication for management is the strategy for recruiting qualified tech-
nical personnel. The trend used to be offering significantly higher salaries than the
industry average for that job title. However, most organizations today look for appli-
cants with stability, loyalty, and com m itm ent to the work ethic. They offer bonuses
based on performance rather than raises, because they do not have to repeat them in
later years.
324 . . . . PART III Knowledge Codification and System Implementation
Extranets are career enhancers for many IT professionals. Those who work on a
successful extranet project usually end up having the biggest impact on their employer.
In one case, an extranet designer deployed an extranet with the goal of driving down
costs. The extranet met the goal by automating processes, improving overall efficien-
cies, and decentralizing functions for faster and better quality decision making. In addi-
tion to knowledge of the company’s business processes, her skills included client/server
technology, data communication and networking, and HTTR She saw a way of securely
linking customers, suppliers, and vendors to the corporate network. When the extranet
was implemented, the company recognized the change in revenue, which translated
into a hefty raise for the 23-year-old newcomer.
With change being accepted as a way of life, the human resources department has
the option of changing the staff or changing the people already on staff. There is a new
focus for building productive organizational culture, managing change and results,
building intellectual capital, creating future leaders, managing organizational learning,
and pushing for growth and innovation. As someone said, “If you are not the lead ele-
phant, you’ll never charge.”
In terms of success in today’s digital economy, the real asset is not money; money
is just a commodity. Our real value is knowledge sharing and how knowledge is used
to create value for the customer. More than half of doing business is on the soft side —
the core personnel of the firm and the customer. Having employees be part of the orga-
nization and improving their skill sets adds value and contributes to the success of
the firm.
A ttracting qualified technical people is a challenge, but finding ways to retain
them is a full-time job. In its annual job satisfaction survey, involving 575 respondents,
C om puterw orld reported that overall job satisfaction had decreased in 1999. More
than two-thirds of the IT workers said they were not working to their potential and
more than 25 percent said they planned to look for a job elsewhere. With the economic
downturn in 2001, the situation has not improved much. The ability of IT team mem-
bers to work well together contributes to their retention and productivity. Recognition
and flexible hours were found to be extremely im portant in technology-based work.
Stress stemming from heavy workloads was cited as the main drawback.
Finally, the top challenge in managing knowledge through e-commerce is in under-
standing the customer. Most of the successful companies form a 360-degree customer
view by gathering data from every possible source and analyzing it to shed light on the
kinds of details that mark the way consumers shop and buy. Obviously, companies that
better understand their customers’ preferences can sell more. They know which cus-
tomers are most important, most profitable, and most loyal.
Su m m a r y 1,11
• The Web is the fastest growing, most user friendly, and most commercially popu-
lar technology to date. Internet service providers link commercial traffic to its
destination. This involves paying for transactions, managing networks, and linking
consumers and businesses to the Internet. As the enabler of e-commerce, the
Internet has many uses; it also has many limitations. It can be a tool for gathering
opinions, exchanging knowledge, and trying out new ideas. It can also be a vehicle
for inexpensive, easy mass distribution of information, products, and services.
There are limitations as well: security and privacy issues, hackers, worms, Trojan
horses, viruses, and customer relations problems.
CHAPTER 10 Knowledge Transfer in the E-W orld aaaa 325
• An intranet is a network connecting a set of company clients by using standard
Internet protocols, especially TCP/IP and HTTP. Intranets can handle all kinds of
communication with ease.
• An extranet or company Web site links two or more trading partners. When con-
templating an extranet installation, there are five key factors to consider: identify-
ing the user, listing the technology components, specifying the security require-
ments, setting up the administration, and understanding the usability.
• There are several benefits to an intranet: It links employees and managers around
the clock; companies gain access to their primary resources; and it is the founda-
tion for developing an enterprise-wide information system and a model for inter-
nal information management and collaborative computing. In addition, there are
cost advantages and ease of access, plus portability and scalability.
• Electronic business connects critical business systems directly to key constituents—
customers, vendors, and suppliers—via the Internet, intranets, and extranets. One
of the main advantages of electronic commerce is knowledge sharing and the
ability to swap information within organizations, between organizations, and
between organizations and their suppliers and customers worldwide. The main
limitations are concerns about knowledge protection and the integrity of the sys-
tem that handles the knowledge.
• Groupware is essentially people using technology to communicate various types
of information implicitly or explicitly.
• There are several groupware applications worth noting: e-mail, newsgroups and
mailing lists, work-flow systems, calendaring and scheduling, video communica-
tion, and knowledge sharing.
• A value chain is a way of organizing the activities of a business so that each activ-
ity provides added value or productivity to the total operation of the business.
• Supply chain management (SCM) means having the right product, in the right
place, at the right time, and in the right condition. The goal is to improve effi-
ciency and profitability.
• CRM allows companies to establish multiple channels of communication with cus-
tomers and supply chain partners and uses customer information stored in databases
and knowledge bases to construct predictive models for customer purchase behaviors.
• The knowledge transfer and knowledge-sharing life cycle includes three major
e-commerce applications: business-to-consumer (B2C), business-to-business
(B2B), and business-within-business.
• An intranet wires the company for knowledge exchange and links a company’s
knowledge network electronically. E-mail replaces paper.
through support in the time and place dimensions; tech- there is the assurance of having the right product in the
nology that facilitates the work of groups. right place, at the right time, at the right price, and in
Internet: An infrastructure that links thousands of net- the right condition.
works to one another; the information highway that Support activity: The activities of a business that support
makes the information stored on thousands of com- its primary activities.
puters worldwide available to millions of people Value chain: A way of organizing the activities of a busi-
everywhere. ness so that each activity provides added value or pro-
Intranet: A private network based on the same technol- ductivity to the total operation of the business.
ogy as the Internet, but restricted to an organization, its Web farming: Systematically refining information
employees, and select customers. resources on the Web for business intelligence capture.
Primary activity: The key functions of a business, includ- World Wide Web: Also known as WWW or the Web; the
ing inputs, operations, outputs, marketing and sales, whole constellation of resources that can be accessed
and service. by using tools such as HTTP; an organization of files
Supply chain management (SCM): Integrating the designed around a group of servers on the Internet,
networking and communication infrastructure programmed to handle requests from browser software
between businesses and their suppliers so that that resides on users’ PCs.
Te s t Y o u r U n d e r s t a n d in g 1 1 a a
1. What is e-commerce? How does it relate to knowledge management, knowl-
edge transfer, or knowledge sharing?
2. Contrast e-commerce with e-business.
3. Do you think the advantages of e-commerce outweigh the limitations?
Explain.
4. What is groupware? How does it differ from e-mail or the telephone?
5. What guidelines are involved in controlling chat room sessions?
6. In what way is security a limitation of e-commerce?
7. Distinguish between:
a. value chain and supply chain management
b. intranet and extranet
c. e-commerce and Internet
8. Cite the key benefits of an intranet. Is it beneficial in every type of knowl-
edge exchange? Why or why not?
9. Briefly describe the uses of the Web.
10. What is the relationship between an intranet and groupware?
Kn o w l edg e Ex e r c is e s 1111
1. How does the Web fit with knowledge sharing? Discuss.
2. “Technically, there is no difference between the Internet and an intranet,
except that only select people are allowed to connect to the intranet.”
Evaluate this statement in the light of the way intranets are designed.
3. Do you think having an intranet environment is the best way to communi-
cate within the firm? Assess alternative modes of communication, and report
your findings in class.
4. If intranets offer so many benefits, why do you think some companies resist
having them? Is it the size of the firm? The nature of the product? The caliber
of personnel?
5. How does the Web affect our traditional sales channels, partners, and
suppliers?
6. How can a company best prepare to use the Web as a channel for knowl-
edge sharing?
7. Find a company that chooses not to use e-business in its business. What fac-
tors or problems does it consider in staying away from e-commerce?
CHAPTER 10 Knowledge Transfer in the E-W orld aai a 327
8. Go on the Internet and find a tutorial on the World Wide Web. Review the
tutorial and explain why you think it is easy (or difficult) as a learning tool.
9. Is the Internet different from other media for knowledge transfer?
10. Give an example of how e-business can help a firm reach its customers in a
very low-cost fashion.
11. Access a chat room of your choice on the Internet, and report your experience.
12. Check the following Web sites to learn more about practices in electronic
commerce:
a. Let customers help themselves: www.got.com and www.edmunds.com
b. Nurture customer relationships: www.amazon.com
c. Target markets of one: www.wsi.com
d. Build a community of interest: www.cnet.com
13. Discuss the value chain by visiting the FedEx Web site at www.fedex.com.
How does it relate to knowledge transfer? Knowledge sharing?
14. Internet participation will alter the traditional form of knowledge sharing.
Do you agree? Locate inform ation on the Internet that might support or
negate this statement.
15. Interview a businessperson or a technical person who is involved with e-business.
What has been his or her experience in incorporating the technology into the
company’s day-to-day media for knowledge transfer? What performance cri-
teria are used to judge the success (or failure) of e-business in the business?
Write a short news release for the college or university newspaper to share
your knowledge.
16. You are an Internet consultant to a company that wants you to do a 1-hour
presentation to top m anagem ent about the im portance and potential of
the Internet in the company’s electronic knowledge creation and exchange.
What information do you need before you prepare the presentation? Write a
3-page report detailing the content of the speech.
17. Visit a large firm on an intranet site. Identify the technology that operates the site.
18. Identify a large retailer in your area and determ ine whether it is ready to
adopt an intranet and an extranet. Interview the head of the IT division and
learn about the technology in use. R eport your findings to class.
19. Design an intranet (on paper) for a small bank of 65 employees. Explain the
details of the infrastructure to a local IT specialist. What did he or she find
right and wrong with your design? Write a 4-page report summarizing your
experience.
Re f e r e n c e s * 1 ' 1
Anton, Kathleen. “Effective Intranet Publishing: Getting Chadbrow, Eric. “Supply Chains G o Global,”
Critical Knowledge to Any Employee, Anywhere,” InformationW eek, April 3,2000, p. 52.
Intranet Design M agazine, August 12,2000, pp. 1-5. D eck, Stewart. “The A BC s of CRM,” CIO .com , Febru-
Awad, E. M. Electronic Commerce: From Vision to ary 23,2001, pp. 1-4.
Fulfillment. Upper Saddle River, NJ: Prentice Hall, D eck, Stewart. What Is CRM ? www.cio.com/research/
2002, p. 372. crm/edit/crmabc.html, D ate accessed D ecem -
Brandel, Mary. “D em ise of the Skill Premium,” ber 2002.
Com puterw orld, July 31,2000, p. 62. D ell, B. J. “The N et’s Killer Application,” Knowledge
Brinck, Tom. “Groupware: Introduction,” www.usabilityfirst. M anagement, D ecem ber 2000, p. 34.
com/groupware/intro.txl, 1998, Date accessed August 2002. Downes, Larry and Mui, Chunka, Unleashing the Killer
Brown, Eric, and Candler, James W. “The Elements of App. Harvard Business School Press, 1998.
Intranet Style,” Intranet Design M agazine, August 12, Elbel, Fred. “General Guidelines and Tips (H ow to Get
2000, pp. 1-5. Rid of Junk Mail, Spam, and Telemarketers),”
328 7777 PART III Knowledge Codification and System Implementation
In a Nutshell
The “Learning” Concept
Data Visualization
Neural Networks As a Learning Model
The Basics
Supervised and Unsupervised Learning
Business Applications
Relative Fit with Knowledge Management
Association Rules
Market Basket Analysis: PETCO
Classification Trees
Definition
Decision for Granting a Loan
Tree Construction
Implications for Knowledge Management
Summary
Terms to Know
Test Your Understanding
Knowledge Exercises
References
Web Sites
■■■■ In a Nutshell
Learning is an iterative process, where the final model results from a combination of
prior knowledge and newly discovered information. The improved model gives a busi-
ness an important competitive advantage. Learning tools are critical for developing a
knowledge-management environment. The approach is to identify whether such tools
are theory-driven or data-driven. Theory-driven learning tools require the user to spec-
ify a model based on prior knowledge and to test that model for validity. Data-driven
learning tools automatically create the model based on patterns found in the data.
However, the newly discovered model must be tested before it can be considered valid.
Inadequate or incomplete knowledge for decision making often plagues managers
at all levels. In this chapter, we demonstrate how certain processes coordinate fragments
of knowledge to enable learning organizations to function effectively. It is im portant to
understand how certain mechanisms, procedures, and processes mobilize the knowl-
edge needed to generate quality decision making. We start with the concept of learning,
and learning from data, as one aspect of the learning process in an organization.
In this chapter, we cover three major techniques employed in data mining: neural
networks, association rules, and classification trees. The data-mining process is covered
in Chapter 12.
Crimea
CHAPTER 11 Learning from Data ■«■■ 333
Nightingale’s use of visual statistics furthered cholera deaths. He was able to locate a large cluster
the progress of the nursing profession as an inte- of deaths (over 500 in 11 days) around a water
gral and essential part of every medical facility. pump on Broad Street. The pumps were immedi-
ately disabled, and the number of deaths decreased
substantially. Surprisingly, John Snow also noted
JOHN SNOW:
that workers at a nearby brewery on the same street
In 1845, an outbreak of cholera hit the London/ were relatively unaffected by cholera. This was due
Soho area (see figure on facing page). The medical to the workers’ drinking beer instead of water.
officer commissioned to investigate the disease was Snow’s use of spatial analysis was revolution-
Dr. John Snow. He attempted to locate the source of ary at the time. Today, spatial mapping is used in
the cholera by drawing the map shown here and medical geography to locate, corner, and identify
pinpointing in black those areas with reported deaths related to all forms of diseases.
Yards
50 0 50 100 150 200
i______________i______________i______________i______________ i______________i
SOURCES: Tobler, W. “John Snow’s Original 1854 Map on the Location of 578 Deaths from Cholera,” www.ncgia.ucsb.edu/pubs/
snow/snow.html, Date Accessed November 2002; Evans, D. H. “The Story of Florence Nightingale,” www.florence-nightingale.
co.uk/biography.htm, 1933, Date accessed December 2002.
334 a a a a PART IV K M System Tools and Portals
One of the areas where neural nets make a definite contribution to decision mak-
ing is in knowledge automation systems. Neural nets show superior performance over
that of human experts for eliciting functional relationships between input and output
values. In a comparison of the two technologies, neural nets prove to be better at learn-
ing by example rather than by rules, and they continue to learn as the problem envi-
ronm ent changes. This capability makes them well suited to deal with unstructured
problems and inconsistent information. Neural nets can also handle fuzzy data without
losing accuracy. Knowledge autom ation systems largely depend on complete data
before they offer a final solution. In summary, knowledge autom ation systems offer
structure, explanatory capability, and validity, whereas neural nets offer the creative
part of problem-solving. They learn from experience in much the same way that a
human expert develops decision-making skills.
THE BASICS
The human brain consists of 10 billion or so neurons; each neuron interacts directly
with 1,000 to 10,000 other neurons. A neuron fires or does not fire. The rate of firing
determines the magnitude of information. When the brain accepts inputs, it generally
responds to them. The responses are a combination of learning and what has been
genetically programmed over time.
A neural network (NN) is an information system modeled after the human brain’s
network of electronically interconnected basic processing elements called neurons. It is
viewed as a self-programming system based on its inputs and outputs. Each neuron has
a transfer function that computes the output signal from the input signal. A typical
neuron building block, or node, is shown in Figure 11.1. The neuron evaluates the
inputs, determines their strengths or weights, “sums,” the combined inputs, and com-
pares the total to a threshold (transfer function) level. The threshold could be some-
thing as simple as zero or could mirror the input within a given range (0-1). If the sum
is greater than the threshold, the neuron fires. That is, it sends output from that particu-
lar neuron. Otherwise, it generates no signal.
Interconnecting, or combining neurons with other neurons, forms a layer of nodes
or a neural network. The interconnection is analogous to the synapse-neuron junction
in a biological network.
■ ■ ■ ■ ■ fl FIGURE 11.1: A Single Node with Weighted Inputs and Summation Function
Stimulation
Level
n
CHAPTER 11 Learning from Data ■■■■ 335
In a real-world problem, inputs represent variables, and the connecting weights are
relationships between variables. Once input values are received by a trained network,
the output value of each unit is computed by the output function. In Figure 11.2, the
neural network model predicts a firm’s status; solvent versus bankrupt. Five input vari-
ables are fed into the system with two possible outcomes as outputs. The hidden units
adjust the weights to the right threshold and are used to support the transformation
from input to output.
Retained Earnings/
Total Assets
Solvent Firms
EBIT*/Total Assets
Sales/Total Assets
Input
Units
BUSINESS APPLICATIONS
Neural networks are best applied in situations having a need for pattern recognition,
where data are dynamic. Even though this technology has been applied in virtually
every industry, the business sector has experienced significant successes with neural
networks. Financial institutions, for example, are using neural networks to simulate
cash management, asset and personnel risk management, and capital investments. In
the capital investment arena, neural networks are used to simulate the reaction of
investors to changes in organizational concerns such as capital structure, dividend pol-
icy, and reported earnings.
The following applications demonstrate neural networks’ contributions to solving
business problems in various industries.
Risk Management
A major New York bank uses a neural network to appraise commercial loan appli-
cations. The network was trained on thousands of applications, half of which were
approved and the other half rejected by the bank’s loan officers. From this experience,
the neural net learned to pick risks that constitute a bad loan. It identifies loan appli-
cants who are likely to default on their payments.
CitiBank London
CitiBank London needed to develop a successful system to forecast the fluctua-
tions of the foreign exchange market. They needed a very complex nonlinear system
suitable for pattern recognition and neural networks.
FX trader is a hybrid system that combines the strong searching ability of genetic
algorithms with the detailed pattern recognition abilities of neural nets. Genetic algo-
rithms (GA) were used to identify combinations of technical indicators that were most
accurate at forecasting FX exchange rate changes by screening and selecting those that
offered the most forecasting power. The values produced by these combinations of
indicators were then used as inputs to a neural network. Following this, the system
advised on a buy or sell decision. The system was trained for the exchange rates of the
U.S. dollar against the Swiss franc and the Japanese yen, using data from the first 6 months
of 1990. Then it was tested over an 8- to 11-week period.
The results revealed a return on capital of about 20 percent, an attractive record,
given that the best human traders could make 15 percent per year. Moreover, the sys-
tem correctly forecasted the market direction 57 percent of the time, far surpassing the
best human traders. Citibank plans to develop this system for other markets, including
U.S. interest rate markets and the Nikkei Index. It also hopes to license the forecasting
technology to fund managers and preferred customers.
Fidelity Investment
Fidelity Investment needed both to save time and to maintain high standards in
the screening of stocks for its portfolio. A universe of 2000 stocks was scanned to select
about 50 stocks for its portfolios. The scan was based on objective criteria and data
about the studied companies, such as stock prices, dividends, historical earnings, and
balance sheet information. This data was fed to the neural network, which was able to
issue a signal indicating which stock was suitable for further consideration.
The neural network system is simple and could easily be transferred to other popu-
lations of stocks given the data and the skills indicated. The performance of the mutual
CHAPTER 11 Learning from Data ai aa 337
fund is quite impressive. The portfolio has five stars, and only 18 funds in the United
States have that number of stars. Since December 1988, the stock market has gone up
71 percent, while the Fidelity Funds portfolio has gone up 99.8 percent and has out-
performed the market every year since then.
Mortgage Appraisals
One of the most promising applications is a neural network system called AREAS,
which reviews mortgage appraisals. The program uses the data in the mortgage loan
application with a sophisticated statistical model of real estate valuations for the
immediate neighborhood, the city, and the country where the property is located. Then,
the system comes up with a valuation for the property and a risk analysis for the loan.
For each valuation, the cost has been less than one-half of the manual method, which
was also time-consuming and subject to various errors.
Innumerable neural network applications pop up each year. In business, applica-
tions identify qualified candidates for specific positions, optimize airline seating, and
determ ine fee schedules. In finance, applications identifying forgeries, interpreting
handw ritten forms, and assessing credit risks have already justified the necessary
investment for these neural networks. In manufacturing, neural network applications
control quality and production line processes, select parts for an assembly line, and per-
form quality inspection of finished products.
A common thread running through these applications is pattern recognition. The
neural network looks for a pattern in a set of cases, classifies and evaluates patterns,
and reconstructs the correct pattern with a high degree of accuracy. This technology
offers businesses a chance to assist decision makers in the kind of work that was once
relegated to human perception and judgment.
Perhaps the best a neural network can do is to advise rather than replace humans
in problem-solving. The fact that humans can still veto a neural netw ork’s decisions
attests to the higher-level of learning capacity and intelligence of humans.
A nother knowledge-based tool is the association rule technique, which generates a set
of rules to help understand relationships that may exist in data. The main types of asso-
ciations are as follows:
• Boolean rule: If a rule consists of examining the presence or the absence of items,
it is a Boolean rule. For example, if a customer buys a PC and a 17-inch monitor,
then he will buy a printer. The presence of items (computer and 17-inch monitor)
implies the presence of the printer on the customer’s buying list.
• Quantitative rule: In this rule, instead of considering the presence or absence of
items, we consider the quantitative values of items. For example, if a customer
earns between $30,000 and $50,000 and owns an apartm ent worth between
$250,000 and $500,000, he will buy a 4-door automobile.
• Multidimensional rule: This rule refers to several dimensions. For example, if a
customer buys a PC, then he will buy a browser. This rule is a single dimensional
rule, because it refers to a single attribute, that of buying. If a customer lives in
a big city and earns more than $35,000, then he will buy a cellular phone. This
rule involves three attributes: living, earning, and buying. Therefore, it is a multi-
dimensional rule.
• Multilevel association rule: A transaction can refer to items with various levels of
abstraction.
For example,
If a customer earns $50,000, he will buy a laptop.
If a customer earns $50,000, he will buy a computer.
These rules refer to different levels of abstraction. The first one is at the lower level
of abstraction, because buying a laptop also means buying a computer, and buying a
computer could also mean buying a laptop or PC, see Figure 11.3.
An association rule assumes a larger number of items, such as computers, moni-
tors, and printers, appearing together in a buying list or in a market basket. This con-
cept could be extended to text analysis. In this context, a market basket is the sentence,
and the items are the words making up the sentence. Similarly, one can consider the
document as the basket and the sentences forming the document as the items.
15 17
PC Laptop Jacket Laser Inches Inches Third Level o f Abstraction
CHAPTER 11 Learning from Data aaaa 339
Association rules are statements of the form: When a customer buys a computer, in
70 percent of the cases, he or she will also buy a printer. This happens in 14 percent of
all purchases. This statem ent shows an association rule consisting of four elements:
Rule body: When a customer buys a computer
A confidence level: In 70 percent of the cases
A rule head: He will buy a printer.
A support: It happens in 14 percent of all purchases.
The rule body is the condition of the rule, and the rule head is the result.
Other terminologies exist to define a rule. The left-hand side (antecedent) may be
used to replace the rule body. The right-hand side (consequent) may be used to replace
the rule head. The confidence level is the ratio of the total number of transactions, with
the items of the rule body, to the num ber of transactions, with the items of the rule
body, plus the items in the result.
Consider the previous rule: A confidence level of 70 percent means that when buying
a computer occurs in a transaction, there is a 70 percent chance that the item, “printer,”
occurs at the same time. More formally, let us consider the rule: If A and B, then C. If this
rule has a confidence level of 30 percent, it means that when A and B occur in a trans-
action, there is a chance (likelihood) of 0.3 that C occurs in the same transaction.
The second measure of a rule is called support. The first rule states that it has a
support of 14 percent. This measures how often items in the rule body occur together
as a percentage of the total transactions.
Here is another example:
11,000 transactions
2.000 transactions contain a PC
500 transactions contain a laptop
1,500 transactions contain a printer
1.000 transactions contain a PC and a printer
150 transactions contain a laptop and a printer
PCs and printers appear together in 1,000 transactions out of 11,000. The support
of the rule, “When a customer buys a PC, he will buy also a printer,” is equal to 1,000/
11,000 = 0.09. Therefore, 9 percent is the support of this rule. The confidence of this
rule is 2,000/1,000 or 50 percent. It is equal to the num ber of transactions containing
PCs and printers divided by the num ber of transactions containing PCs. To find an
association rule linking computer rules to printer rules, we can say:
“A customer buying a computer in 57 percent of the cases will buy a printer. It hap-
pens in 1.5 percent of all the purchases.”
Here, we have considered a new type of item —namely, computers with a higher
level of abstraction than PCs and laptops.
The confidence is calculated as follows:
Number of transactions containing computers (PCs or laptops) and printers _
Number of transactions containing computers
1.000 + 150
2.000 + 500
The support is calculated as follows:
Number of transactions containing a computer and a printer _ 1,150 _ ^
Total number of transactions 11,000
340 a ■ i a PART IV K M System Tools and Portals
Sometimes the rules are stated in a different way, for example, when people buy
PCs, they also buy a printer half of the time. The confidence level is computed as fol-
lows: 1,100/2,000 = 0.5; the support is equal to 1,100/11,000 = 0.09.
The Challenge
PETCO needed a way to make it possible for them to obtain company information
in a quick and accurate manner. They needed a store analysis to get an in-depth look at
the sales and margins section, and the base stores’ perform ance for the last 2-year
period. They also wanted to have access to inventory levels at all times, in order to
accommodate customers with the appropriate products and services. Identification of
store uniqueness was needed to allow for pricing and store assortm ent for proper
product placement and sale. A suitable solution needed to be put into practice in order
to properly target their m arket and track down customers to evaluate their specific
buying habits. Promotional, product, and vendor divisions also needed to be analyzed
to gain full interpretation of the business.
The Solution
Systech delivered an enterprise business intelligence solution, which aided ad hoc
detail merchandising to allow for reporting of data based on specific merchandising
units and also aided in overall store analysis across all reporting components. The pri-
mary platform and framework built were necessary for the data warehouse to function
completely.
A nother important component was the development of the market basket analy-
sis. PETCO wanted to be able to totally understand their customers’ buying habits and
to be able to cross-sell and up-sell to their customers. In order for the implementation
of the business intelligence solution to be successful, Systech had to carefully craft
seven crucial stages and understand each one to the fullest extent, to give PETCO the
solution they needed.
Results
Because of the business intelligence solution, PETC O now has the ability to
accomplish store and merchandising analysis. This results in better tracking of products
and services. The evaluation of vendor performances can also be obtained with the
new solution. This helps to analyze which vendors give better and faster service, allow-
ing for PETCO to have all the necessary products in stock to provide better customer
service. Prom otional analysis is now effectively generated, which helps PETCO
enhance their sales and improve their margins. Systech delivered an enterprise solu-
tion, which aided ad hoc detail merchandising. This is the reporting of data based on
specific m erchandising units. Inventory reports drawn out by the solution are effi-
ciently used to address key issues, such as the fill ratio. This effectively shows the quan-
tity sold in a particular store to quantity received from the distribution center. Some of
CHAPTER 11 Learning from Data i a a a 341
the key reports, which are done by executives and are available through the data ware-
house, are active store comparisons, a store M erchandising Perform ance R eport,
(MPR), daily sales (showing the distribution of sales for a particular store based on
each sku, subclass, or departm ent by m onth, week, or day), the daily margin, and
departm ent sales comparisons. A m arket basket analysis was also developed to fully
understand customer-buying habits and to allow for cross-sell and up-sell. Targeted
marketing helped PETCO properly m arket their products to specific customers to give
them the full customer experience. Systech’s implementation of the business intelli-
gence solution will aid PETCO in delivering better analysis across all reporting com-
ponents (Systech 2002).
■■ Classification Trees
Classification trees are powerful and popular tools for classification and predic-
tion. The attractiveness of the classification trees m ethod is basically due to the fact
that, in contrast to NN, classification trees represent tools. Rules can be explained
so hum an beings can understand them or they can be created in a database access
language like SQL, so that records falling into a certain category can be retrieved
easily.
This point is crucial for situations where interaction is involved. For example, it is
equally im portant for the loan officer and the bank customer to understand the reason
behind denying a credit application. For the banker, it is im portant to find a reasonable
argument, even if it is generated by a computer, to justify the decision.
DEFINITION
The concept of “tree” is derived from graph theory. A tree is a network of nodes con-
nected by areas, sometimes called branches, so that there are no loops in the networks.
In general, there is a root node that is considered to be the starting node of the tree. The
ending nodes of the tree are called the leaf nodes. The root and leaf nodes are separated
by a certain num ber of interm ediate node organizations in layers, sometimes called lev-
els. Figure 11.4 shows a tree with two interm ediate levels.
Leaf Node
i a ■ fl PART IV K M System Tools and Portals
W hen two nodes branch out from each node, this tree is called a binary tree.
Adding concepts to the nodes and to the branches transforms the tree from a theoreti-
cal network to a decision-learning tool. The decision tree is a tree where nodes repre-
sent actions and areas represent events that have a certain probability to occur.
If the savings account > $a and the assets owned > $/?, then grant the loan;
otherwise, do not grant the loan.
The problem lies in how to reach such a rule, in other words, how to construct such
a tree. The bank has to start by collecting data about previous customers, relying on its
historical data stored in a customer database. In the historical database, the bank has
the needed information about previous customers both who failed to honor their debt
and those who were able to honor their debt.
In such a simple case, the two classes of customers are clearly separated. In addi-
tion to the rule governing the classification, it is easy to induce what would happen in
more complex situations; a systematic technique for tree construction is needed.
TREE CONSTRUCTION
Many elements should be considered when constructing a classification tree. At each
level, nodes will split data into groups until they reach the ending node, where the
classes are identified. The first question is how to assign attributes to nodes. More
specifically, if we consider the root node, one of the attributes has to be assigned to this
node. For example, we added the attribute, “savings account,” to the root node in the
bank loan cases. We could have selected the attribute, “assets owned,” for that node.
Assigning an attribute to a node that will split the data is the first task to be achieved
by classification tree algorithms. The second task is to decide when a classification tree
is complete. The third task is to assign classes to the ending nodes. Finally, the fourth
task is to convert the classification tree into a set of rules.
Su m m a r y a 1 a ■
• Learning tools are divided into two groups: theory-driven and data-driven.
Theory-driven learning, often called hypothesis testing , attempts to substantiate or
disprove preconceived ideas. Data-driven learning tools automatically create the
model based on patterns found in the data.
• There are several types of associations:
• Boolean rule. If the rule considered consists of examining the presence or
the absence of items, it is a Boolean rule.
• Q uantitative rule. In these rules, instead of considering the presence or
absence of items, we consider the quantitative values of items.
• Multidimensional rule. These are rules referring to several dimensions.
• M ultilevel association rule. A transaction can refer to items with various
levels of abstraction.
344 ■ ■ ■ ■ PART IV K M System Tools and Portals
Terms t o K n o w * • * 1
Antecedent: When an association between two variables Neural network: A knowledge-based technology modeled
is defined, the first item (or left-hand side) is called the after the human brain’s network of electrically inter-
antecedent. connected processing elem ents called neurons; a self-
Associations: An association algorithm creates rules that programming system that creates a model based on its
describe how often events have occurred together. For inputs and outputs.
example, “When prospectors buy picks, they also buy Supervised learning: A learning strategy that specifies the
shovels 14 percent of the time.” Such relationships are correct output for a certain input.
typically expressed with a confidence interval. Support: The measure of how often the collection of
Classification tree: A decision tree that places categorical items in an association occurs together as a percentage
variables into classes. of all the transactions. For example, “In 2 percent of the
Confidence: Confidence of rule, “B given A,” is a measure of purchases at the hardware store, both a pick and a
how much more likely it is that B occurs when A has oc- shovel were bought.”
curred. A 95 percent confidence interval for the mean has Transfer function: A function that transforms the neuron
a probability of .95 of covering the true value of the mean. input into an output value.
Consequent: When an association between two variables Unsupervised learning: A learning strategy in which the
is defined, the second item (or right-hand side) is called correct output is not specified.
the consequent. Weight: An adjustable value associated with a connection
Input: Stimulation level in a neural network. between neurons or nodes in a network.
CHAPTER 11 Learning from Data ■■■■ 345
Te s t Yo u r U n d e r s t a n d in g Mi , <
1. Define a neural network in your own words. W hat does the technology
attem pt to do?
2. “The interesting aspect of a neural net is its known contributions in solving
cum bersome problem s that traditional com puters have found difficult to
tra c k ” Do you agree? Why or why not?
3. Explain how a neural network functions. Give an example of your own.
4. In your opinion, how severe are the limitations of a neural network?
5. How are neural networks different from knowledge automation systems?
6. Explain in some detail how neural networks learn.
7. How are inputs and outputs used to contribute to a solution?
Kn o w l edge Ex e r c is e s 1 , 1 1
1. Search on the Internet or in related literature and write an essay detailing a
neural network application in business. What did you learn from this exercise?
2. Suppose you have a small kiosk database of purchased items.
The available food items in the kiosk are as follows:
• Coca-Cola
• Pepsi-Cola
• Sprite
• Budweiser beer
• Guinness beer
• Estrella chips
• Pringles chips
• Taffel chips
The database contains the following purchase transactions:
What kind of rules do you get with a confidence threshold of 0.0 and a sup-
port threshold of 0.2?
Create a hierarchy for the food items in the kiosk, and try to determine if
you could get more meaningful information by using multilevel association rules.
Is it possible to set different support thresholds on different hierarchy levels?
Source : Han and Kamber 2000
3. Using a realistic example, discuss in detail how neural networks can be used
to solve real-life problems.
346 a « a a PART IV K M System Tools and Portals
Re f e r e n c e s 1 1 1 1
Awad, E. M. Building Expert Systems. Minneapolis, MN: and Applications. New York: John Wiley & Sons,
West Publishing, 1996, p. 437. Inc., 1998.
Cherkassky,Vladimir, and Mulier, Filip. Learning from Mitchell, Tom M. Machine Learning. New York: McGraw
Data: Concepts, Theory and Methods. New York: John Hill, Inc., 1997.
Wiley & Sons, Inc., 1998. Smith, Reid G., and Farquhar, Adam. “The Road Ahead
Han, J., and Kamber, M. Data Mining: Concepts and for Knowledge Management: A n AI Perspective,” A l
Techniques, section 6.3. N ew York: Morgan Kaufmann M agazine, vol. 21, no. 4, Winter 2000, pp. 17^40.
Publishers, 2000. Systech, PETCO case study, www.systechusa.com/
Michalski, Ryszard S., Bratko, Ivan, and Kubat, Miroslav. clients/pop_pet.htm, Date accessed D ecem ber 2002.
Machine Learning and Data Mining: M ethods
W e b S it e s X 1 1 1
www.dsi.unifi.it/neural This site covers recent topics in psychology, neurobiology, mathematics, physics, com-
neural networks and machine learning. puter science, and engineering.
www.inns.org/nn.html Neural Networks is an international www.ncaf.co.uk The Natural Computing Applications
journal that serves as a central, interdisciplinary publi- Forum runs meetings (with attendees from industry, com-
cation. Its editors represent a range of fields including merce, and academia) on applications of neural networks.
CHAPTER 11 Learning from Data 1 i i « 347
www.ewh.ieee.org/tc/nnc/index.html The IEEE Neural graphics, neuroscience, artificial intelligence, and
Networks Society advances and coordinates work in many other areas.
neural networks. It is exclusively scientific, literary, and wwwl.ics.uci.edu/~mlearn/MLRepository.html This is a
educational in character. repository of databases, domain theories, and data gen-
www.ime.usp.br/-cesar/revision/neural.htm This erators that are used by the machine learning commu-
source covers a series of issues related to vision, in- nity for the empirical analysis of machine learning
cluding computer vision, image processing, computer algorithms.
Data M ining-
Knowing the
Unknown
Contents
In a Nutshell
What Is Data Mining?
Definitions
Data Mining and Business Intelligence
Business Drivers
Technical Drivers
Role of Statistics
Machine Learning
Data Warehouses
OLAP
Evolution of the Decision-Making Architecture
DM Virtuous Cycle
Business Understanding
Develop the DM Application
Data Management
D ata Sources
Taxonomy of Data
Data Preparation
Model Building
Param eter Settings and Tuning
Model Testing and Analysis of Results
Taking Action and Deployment
Postdeployment Phase
DM in Practice
Role of DM in Customer Relationship Management
Customer Acquisition
Campaign Optimization
Customer Scoring
CHAPTER 12 Data M ining—Knowing the Unknown a i a i 349
Direct Marketing
Integrating DM, CRM, and E-Business
Implications for Knowledge M anagement
Summary
Terms to Know
Test Your Understanding
Knowledge Exercises
References
Selected U RL Listings
In a Nutshell
In the previous chapters, we discussed knowledge management and building a KM sys-
tem from capturing tacit knowledge to codifying, testing, transferring, and sharing it. One
important issue discussed in Chapter 4 was how to create knowledge. Our perspective is
to look at explicit and tacit knowledge as the two primary types of knowledge. Tacit
knowledge is created and captured through teamwork and from one’s experience.
Explicit knowledge is knowledge codified in books, documents, reports, and the like.
D ata mining (DM) is becoming a fundamental component of the global business
infrastructure that assists firms in the decision-making process and helps them capture the
multifaceted aspects of the new economy. In this chapter, we consider data as a source of
undiscovered knowledge. We discuss the process of extracting knowledge from data and
information stored in databases, data warehouses, and other repositories. This process is
called data mining. We also discuss the role of DM in the decision-making process.
The challenge for KM is to find a way to exploit huge amounts of transactional data
that might add value and intelligence to decision making and operational busi-
ness processes. It is estimated that the amount of information in the world doubles every
20 months. Clearly, little can be done to take advantage of this flood of raw data, unless
an autom ated approach is elaborated. This is where DM provides a viable source of
knowledge discovery and an efficient way to deliver new added value for business. From
this perspective, DM is an essential component of the corporate knowledge architecture.
1 i I 1 1 1 BOX 12.1 1 1 1 1 1 i
DATA MINING IN THE FEDERAL AGENCIES it to scour plane crash data to find common
causes so future failures can be avoided.
From predicting how many Marines will leave the
corps to rooting out fraudulent health-care bills MAKING PREDICTIONS
for the H ealth Care Financing A dm inistration,
data mining is becoming a popular technological Data mining is more than slicing and dicing data; it
tool for agency m anagers trying to make sense is doing predictive work as well. The Marine Corps
and b etter use of mounds of governm ent data. is using data mining to predict which types of offi-
D ata mining is accomplished with commercial cers and enlisted members will stay in the corps
off-the-shelf software applications that use so- and which will bail out. “We want to use historical
phisticated statistical analysis and advanced mod- data to predict our loss rates in specific areas,”
eling to turn volumes of data into usable informa- says M ajor Joe Van Steenbergen, a m anpower
tion. By uncovering subtle trends or patterns in manager for the Marine Corps. By mining a data
data, the application can enable users to draw warehouse containing career and biographical
conclusions or make predictions. “D ata mining is information for every officer and enlisted member
getting the ‘aha’ out of data,” says Adam Crafton, in the past decade, the Marine Corps expects to
a data-m ining m anager for IB M ’s public-sector find answers to questions such as “Are married or
operations in Bethesda, Maryland. single Marines more or less likely to leave the ser-
Commercial retailers first developed data- vice?” “A re m embers in high-skill career fields
mining software nearly 30 years ago to track con- like information technology more likely to leave
sumer buying habits. By combining those early than members with jobs that require less training?”
models with advances in artificial intelligence over By answering those questions and many oth-
the past decade, data-m ining firms have moved ers, the Marine Corps can create a profile of those
beyond helping retailers to assisting many busi- likely to stay in various positions and use it to
nesses. D ata mining’s uses now range from pre- make better management decisions when recruit-
dicting production breakdowns for large manufac- ing, assigning, and promoting personnel.
turers to helping financial institutions uncover
IMPROVING SERVICE
patterns of money laundering.
Many agencies are already using data mining The Centers for Disease Control and Prevention’s
to m ake better m anagem ent decisions and im- National Im m unization Program in A tlanta is
prove services. The Justice D epartm ent has used installing data-mining software that allows better
it to find crime patterns so it can focus its money tracking of reactions to vaccines. The program has
and resources on the most pressing issues. The a huge database of adverse reactions to vaccines
Veterans Affairs D epartm ent has used it to pre- reported by physicians, clinics and hospitals, pa-
dict demographic changes among its 3.6 million tients, and pharmaceutical companies across the
patients so it can prepare more accurate budgets. nation. Federal researchers and statisticians moni-
The Internal Revenue Service uses the technol- tor the data regularly to find problems caused by a
ogy at its custom er service center to track calls single vaccine or vaccine combinations. Data min-
in order to pinpoint the most common customer ing has helped the agency recover millions of dol-
needs. The Federal Aviation Adm inistration uses lars in fraud cases.
SOURCE: Excerpted from Cahlink, George. “Data Mining Taps the Trends,” www.govexec.com/features/1000/1000managetech.htm,
September 18,2000, Date accessed October 16,2002.
CHAPTER 12 Data M ining—Knowing the Unknown i ■i i 351
business community. Even the term data mining is subject to controversy. Other than
data mining , the literature uses knowledge discovery from databases (KDD), informa-
tion discovery, information harvesting, data archeology, and data pattern processing.
The term K D D appeared in 1989 to refer to extracting knowledge from databases. It
has mostly been used by artificial intelligence and machine learning researchers. In
contrast, statisticians, data analysts, and the MIS community have used the term DM.
There is actually no difference between the two, although DM is not restricted to the
mechanism of discovering knowledge (Fayyad et al. 1996).
DEFINITIONS
DM definitions are derived from the interaction of three entities (Figure 12.1):
1. A body of scientific knowledge accumulated through decades of forming well-
established disciplines, such as statistics, machine learning, and artificial intelligence
2. A technology evolving from high volume transaction systems, data warehouses,
and the Internet
3. A business community forced by an intensive competitive environment to innovate
and integrate new ideas, concepts, and tools to improve operations and DM quality
A review of the literature reveals a wide variety of definitions:
• The search for relationships and global patterns that exist in large databases but
are hidden among the vast amount of data (Holsheimer and Kersyen 1994)
• A set of techniques used in an automated approach to exhaustively explore and
bring to the surface complex relationships in very large data sets (Moxon 1996)
• The process of finding previously unknown and potentially interesting patterns
and relations in large databases (Fayyad et al. 1996)
Scientific Business
Knowledge Community
i .a i a ■ ■
Information
Technology
FIGURE 12.1: DM and the
Three Bodies of Knowledge
352 «i a i PART IV K M System Tools and Portals
BOX 12.2
SOURCE: First Conference on Integrating Data Mining and Knowledge Management, Geneva 2002.
Business intelligence (B I) is a global term for all processes, techniques, and tools
that support business decision making based on inform ation technology. The
approaches can range from a simple spreadsheet to an advanced decision support sys-
tem. Data mining is a component of BI. Figure 12.2 shows the positioning of different
BI technologies used at different levels of m anagement and for different purposes,
including tactical, operational, and strategic decisions.
Decision Maker
Business Analyst
Managers
Data Architects
Database Administrator
ROLE OF STATISTICS
Statistics embraces concepts, such as hypothesis testing and correlation. The statistician
has to start her analysis by assuming a hypothesis about the relationships among the
data attributes. With databases organizing data records of hundreds of attributes, the
statistics methodology of the hypothesize-and-test paradigm becomes a time-consuming
process. DM helps by automating the formulation of new hypotheses.
MACHINE LEARNING
As a subfield of Al, machine learning (ML) has focused on making computers learn
things for themselves. Over time, attention has focused on the technological applica-
tions of machine learning. Machine learning is the automation of the learning process
that is a crucial function in any intelligent system. Its methodology includes learning
from examples, reinforcem ent learning, and supervised or unsupervised learning.
Machine learning is a scientific discipline considered to be a subfield of artificial intel-
ligence. In contrast, data mining is a business process concerned with finding under-
standable knowledge from very large real-world databases.
DATA WAREHOUSES
For years, companies recognized that the volume of data generated by operations such
as online transaction processing (OLTP) systems, point of sale (POS) systems, auto-
mated teller machine (ATM) systems, and the Internet could be a volatile asset. The
CHAPTER 12 Data M ining—Knowing the Unknown m■ ■ ■ 355
challenge is to make data available anytime and anywhere for the decision-making
process. For example, Midwest Card Services (MCS) is a rapidly growing financial
products services company, with more than 1,000 employees and 200,000 clients. Very
quickly, MCS developed the technology infrastructure to m eet business needs and pro-
vide clients with real-time information. Unfortunately, the company had the technol-
ogy in place, but lacked the integration of a multitude of stand-alone systems. They had
a lot of data available but could not cross-reference among systems. Bringing together
data from disparate transactional systems and providing consistent decision-making
capabilities across the various functional systems was a real challenge.
As can be seen, data warehousing (DW) is extracting and transform ing opera-
tional data into informational or analytical data and loading it into a central data ware-
house. The major features of DW are as follows:
1. Subject oriented. D ata warehouses are organized around subjects such as cus-
tom ers’ vendor products. In contrast, operational systems are organized around
business functions such as loans, accounts, and transactions.
2. Integration. D ata loaded from different operational systems may be inconsistent.
The date in one application may be “yym m dd” and “m m ddyy” in another.
Integration shows up in consistent naming of variables, in some measurements of
variables, and so forth.
3. Time variant. Data may be stored but not updated for several years. These are
considered historical data and used for prediction, forecasting, and trend analy-
sis purposes.
4. Nonvolatile. There are two kinds of operations perform ed on data warehouses:
the initial loading and the access of data. In the operational environment, insert-
ing, deleting, and changing are done regularly. These DW features lead to an envi-
ronm ent that is very different from the operational environment. Hence, there is
no redundancy between operational data houses and data warehouses.
OLAP
The need for nonstatic reporting systems has led to the development of online analyti-
cal processing (OLAP). D ata is now used in a proactive way that provides value for the
firm. This approach uses computing power and graphical interfaces to manipulate data
easily and quickly at the convenience of the user. The focus is showing data along sev-
eral dimensions. The manager should be able to drill down into the ultimate detail of a
transaction and zoom up for a general view.
OLAP has several strengths:
These lim itations are actually the main strengths of DM. It appears from this
analysis that data warehousing, OLAP, DM, and operational systems can be integrated
in a single framework to serve the needs of knowledge workers. This model is shown in
Figure 12.3.
356 a a ■ « PART IV K M System Tools and Portals
■ DM Virtuous Cycle
The goal of DM is to allow a corporation to improve its internal operations and its
external relationships with customers, suppliers, and other entities. H ie virtuous cycle
of DM is about harnessing the power of data and transforming it into added value for
the entire organization. It incorporates DM into the context of corporate business
processes and provides the following capabilities:
• Response to extracted patterns
• Selection of the right action
CHAPTER 12 Data M ining—Knowing the Unknown aaaa 357
Reporting
BUSINESS UNDERSTANDING
The first step in the virtuous DM cycle is identifying the business opportunity, which
means defining the problem s faced by the firm. The goal is to identify the areas
where data can provide values. This stage is the most crucial and the most delicate
stage in conducting a DM project. Finding interesting answers for a meaningless busi-
ness problem is of no use to the company. That is why defining the problem should
involve the technical people and the business experts. The DM project m anager is
expected to possess a combination of skills, including a good command of technical and
business cultures. For example, one of the insurance industry’s m ajor challenges is
fraud, which tends to take different form s—claim fraud, premium fraud, and indemnity
fraud. O ther im portant challenges are customer retention or loyalty enhancement pro-
grams. Table 12.1 lists business challenges facing different industries and the corre-
sponding DM goals. Identifying these goals is actually the outcom e of the business
understanding phase.
358 a ■ a ■ PART IV K M System Tools and Portals
Front-Office CRM
Application
Real-Time
Data Feeds
E-Business
Applications
Back-Office ERP,
SCM Applications
.pptications
Recommendations
The development process begins with identification of the outcomes expected from
the DM application. The outcomes are called DM tasks and consist of the following:
• Clustering. Clustering is a tool that divides a database into different groups. The
tool finds groups that are very different from each other, but whose members are
similar to each other. Unlike classification, we do not know what the clusters will
be when we start or by which attributes the data will be clustered. Consequently,
someone knowledgeable in the business must interpret the clusters. After the
clusters that reasonably segment the database are found, they may be used to
classify new data.
• Classification. The classification function identifies the characteristics of the
group to which each case belongs. This pattern helps us understand the existing
data and predict how new instances will behave. For example, we may want to
predict whether individuals can be classified as likely to respond to a direct mail
solicitation, as vulnerable to switching over to a competing long-distance phone
service, or to be a good candidate for a surgical procedure.
• A ffinity grouping. Affinity grouping is a descriptive approach to exploring data
that can help identify relationships among values in a database. The two most
common approaches to affinity grouping are association discovery and sequence
discovery. Association discovery finds rules about items that appear together in
an event, such as a purchase transaction. M arket-basket analysis is a well-known
example of association discovery. Sequence discovery is similar to association dis-
covery, in that a sequence is an association related over time.
Once the expected outcomes are identified, the next step is to collect and gather
the data needed to start the analysis and match the results to the expected outcomes
before releasing the results for decision making.
360 a a i i PART IV K M System Tools and Portals
TABLE 12.1 Business Challenges Faced by Different Industries and the DM Goals
Industry Business Challenge DM Goals
Customer services The main challenge is understanding Customer acquisition profile
that the individual preferences of
the customers is the key to Customer retention profiling
satisfying them. What one customer
may consider as being “attentive” Customer-centric selling
customer service, another may Inquiry routing
deem “oppressive ” That is why it is Online shopping
extremely crucial to understand Scenario notification
these differences and know how to Staffing level prediction
address them in the proper and Targeting market
suitable way. Web mining for prospects
Financial services Retaining customer loyalty is of the The financial services industry
industry utmost importance to this industry, is a leader in applying DM
and it is currently the key business applications. Very focused
challenge. statistical and DM appli-
cations are prevalent. Risk
management for all types
o f credit and fraud detec-
tion are among the DM
applications in financial
services companies.
Health-care business Keeping pace with the rate of Early DM activities have
technological and medical focused on financially
advancement provides a significant oriented applications. Pre-
challenge. Cost is a constant issue dictive models have been
in this everchanging market. applied to predict length
of stay, total charges, and
even mortality.
TAXONOMY OF DATA
Various types of data can be collected. Numerical measurements and text documents
are simple types; geographic data and hypertext documents are complex types. They
can be found in several forms:
• Business transactions. Every business transaction, whether it is related to internal
business functions like purchasing or external business operations such as rela-
tionships with clients, is recorded in large databases. For example, supermarkets,
through the bar-coding system, store millions of transactions daily; this helps
managers reduce inventory costs.
• Scientific data. Scientists collect huge amounts of data from their experiments or
observations; this data may include astronomical data and weather data for later
analysis and better predictive outcomes.
• M edical data. Hospitals keep patients’ medical records for years. This type of data
is continuously updated based on the health situation of the patient. It is
extremely helpful to physicians in diagnosis or prescribing treatments.
• Personal data. Government and other institutions collect information about indi-
viduals, groups, and communities for security or planning purposes. This has
become especially noticeable and critical since the September 11,2001, attacks.
• Text and documents. Most of the communications between companies are based
on reports and written documents that are exchanged, communicated, and stored
for later use.
• Web repositories. For the last decade, the Internet has been a huge vehicle for
data stored and organized in repositories.
DATA PREPARATION
The purpose of this step is to change or modify data in order to fit exploration findings.
A t this point, the following operations are performed on the data:
• Evaluating data quality
• Handling missing data
362 a a a i PART IV K M System Tools and Portal?
• Processing outliers
• Normalizing data
• Quantifying data
During the data preparation phase, we begin to understand the importance of some
variables and the irrelevance of others. The result is more like a filter, eliminating use-
less variables and focusing on the significant ones. New variables could be introduced in
order to understand more accurately groupings of customers that appeared unexpect-
edly during the exploration of the initial set of data. This task is called feature extraction
and enhancement. It consists of selecting the field to use from each record. The chosen
fields are called features. Various methods are used to ensure the selection of the best
set of features. This task is not easy; many tools have been developed for this purpose
MODEL BUILDING
In this phase, various modeling techniques are selected and applied, and their param e-
ters are calibrated to optimal values. Typically, for the same data-mining problem type,
there are several techniques, some of which have specific requirements on the form of
data. Therefore, stepping back to the data preparation phase is often needed.
Once data is prepared, a model is built to explain patterns in data. The first step is
to select the modeling technique. The most popular techniques are as follows:
• Association rules
• Classification trees
• Neural networks
These techniques were covered in Chapter 11.
There are situations where more than one technique is applied. Each technique is
applied separately. The results are then compared in terms of performance, business
advantage, and gain. Sometimes, there are constraints and requirements that limit the
choice of possible techniques. Among the reasons that restrict the use of a certain tech-
nique are the assumptions that the technique makes about the data. The assumptions
must be compared to the description of the data. If the assumptions do not agree with
the data, the designer may have to step back to the data preparation phase and readapt
the data. If this cannot be done, the technique then is rejected.
POSTDEPLOYMENT PHASE
The purpose of this stage is to provide feedback resulting from the deployment of the
newly created model. M easurements are often used to provide feedback. The question
is what to measure and how to do it. One im portant measure is the return on invest-
m ent (RO I). It m easures the financial impact, the response rate, and other impacts
resulting from the DM project.
• • • • DM in Practice
DM can be used in two ways: to improve the internal business functions and to address
the company’s relationship with its customers. Most efforts are being made to under-
stand custom er behavior and adjust a com pany’s products and services accordingly.
Over 70 percent of marketing departments currently conduct DM projects (Vee Box 12.3).
364 a a a i PART IV K M System Tools and Portals
a i a a a i b ox 12.3 a a a a a a
INFORMATION JACKPOT WAS IN THE CARDS HOW DO YOU GET THEM TO USE THEIR CARDS
AND WHAT KIND OF RESPONSE RATES ARE
Dick’s Supermarkets uses data-mining tools from
YOU CURRENTLY GETTING?
Datasage, Inc., in Reading, M assachusetts, to
gather purchasing-history information from shop- We developed several incentive programs for cus-
pers’ scan cards. The company then uses this data tomers using the card. We have given away prizes
to identify product relationships and custom er such as lawn mowers and computers. Currently,
buying patterns. 90 percent of our total store [sales are] captured
K enneth L. Robb, senior vice president of by these cards.
m arketing at the Platteville, W isconsin-based
Brodbeck Enterprises, Inc., which operates the ARE THERE SOME GENERAL THINGS YOU’VE
eight-store supermarket chain, recently talked to LEARNED ABOUT YOUR SALES?
Computerworld about the project.
We discovered that 45 percent of our customers
represent close to 90 percent of our volume.
WHAT HAS DATA MINING DONE FOR DICK’S
Using this information, we can offer the best dis-
SUPERMARKETS?
counts to the best custom ers so that we deliver
It has m ade us sm arter about our customers, value to those customers who represent the bulk
sm arter m arketers —and made us more efficient of our business.
in our marketing and merchandising investments.
WHAT ELSE HAVE YOU LEARNED?
WHAT’S THE BASIS OF A GOOD DATA-MINING
We looked over IV2 years’ worth of data and dis-
PROGRAM?
played the top product correlations. In our stores,
You have to establish the integrity of your data we found a high correlation between yogurt and
because th a t’s im portant to the decisions you’ll granola bars and also pie filling and canned milk.
make. For us, that means getting our customers to We placed a display of granola bars adjacent to
use their scan cards with each purchase so that we the yogurt and measured a 60 percent difference
have good and thorough data about what goes on in sales between that type of display and a regular
in our stores. display in the store.
a a a a a a
i 1 i 1 1 i BOX 12.4 1 1 1 1 1 1
SOURCE: Adapted from SPSS case studies, www.spss.com/success/pdf/HSB-0200.pdf, Date accessed August 2002.
DM application must bring data and information from various sources and business
departments. DM is a required component for various business applications, as shown
in Figure 12.7.
The most popular DM applications are as follows:
CUSTOMER ACQUISITION
This type of application involves finding customers who previously were not aware of
the product, who were not candidates for purchasing the product (for example, baby
diapers for new parents), or who in the past have bought from competitors. Data min-
ing segments prospective customers and increases the response rate that an acquisition
marketing campaign can achieve.
Customer churn is another significant problem in many industries. It is generally
far more cost-effective to retain existing customers than to secure new ones,. It is desir-
able to identify customers who are at risk of changing service to a new provider and
offer them incentives to retain their existing service.
Customer historical data contains information that can be extremely valuable to
retention specialists. Historical data holds usage patterns and other important customer
SOURCE: Shaw, M. J., et al., “Knowledge Management and Data Mining for Marketing, Decision Support
Systems, vol. 31,2001, pp. 127-137.
368 ■ • ■ ■ PART IV K M System Tools and Portals
characteristics that can be used to identify satisfied and dissatisfied customers. By iden-
tifying which customer renewed their service, which did not renew their service, and
what incentives were offered to both groups, a predictive model can be built to predict
customers who will not renew their service and to make recommendations as to the
most effective incentives to offer.
CAMPAIGN OPTIMIZATION
In most marketing organizations, there are many ways to interact with customers and
prospects. Besides the offers made, there are multiple communication channels (direct
mail, telemarketing, e-mail, the Web) that can be used. The process of marketing cam-
paign optimization takes a set of offers and a set of customers, along with the charac-
teristics and constraints of the campaign, and determines which offers should go to
which customers, over which channels, and at what time. The key to satisfying cus-
tomers, optimizing their experience, and thereby quite possibly their loyalty lies in
understanding their individual preferences. Twenty-first century custom er relation-
ships are based on mass customization rather than mass production. What one cus-
tom er may consider “attentive” custom er service another may deem “oppressive.”
Being able to recognize the differences between these two types of customers and
making effective use of such information remains a challenge. It is a challenge that
data-mining techniques are uniquely well suited to address.
CUSTOMER SCORING
Once a model has been created by a data-mining application, the model can then be
used to make predictions for new data. The process of using the model is distinct from
the process that created it. Typically, a model is used many times after it is created to
score different databases. Identifying customers who are at risk of changing their ser-
vice and subsequently determining the appropriate actions to take that will encourage
custom ers to retain their service presents a significant challenge to organizations
responsible for customer care and customer retention. It is often unclear exactly what
characteristics dissatisfied customers exhibit and, therefore, difficult to predict exactly
which customers will not renew their service. In addition, even when it is known that a
specific custom er is dissatisfied, it is difficult to determ ine what incentives can be
offered that will encourage that customer to retain their service.
DIRECT MARKETING
Direct marketing is one of the most popular applications of data mining, because the
results can be readily applied to obtain a better campaign response and a higher return on
investment. For example, a trained statistician or consultant can develop a response
model by using data from a past direct marketing campaign to predict those most likely to
respond to the next campaign. By contacting only those most likely to respond, that mar-
keter can substantially increase the percentage of responses and generate higher profits.
Direct marketing campaigns extend beyond the retail merchandising industry to
other consum er and business services. The convergence of direct m arketing and
Internet-based electronic commerce provides a rich resource for future applications of
data mining.
Customer- Valued
Customer Centric Data Customer
Loyalty Warehouse Experience
Growing
Data Asset
4. Feedback ^
f o r Traffic InfovO'f
■Purchase P attei*4
Visitor Profited
tor Preference
/ Modeling \ ( Problems \
/ Mistakes \ / • No Commitment \
• Inadequate Tools • Culture
\ • Bad Sampling J \ • Structure /
J
• Inadequate Testing \ • No Deployment
\ / \ Efforts
neural network when they cannot be sure it will pay off. Conversely, if the potential
payoff is sufficient, these techniques may be fully justified or they may indeed be the
only ones with the power to provide the required results.
Many DM projects falter because they are championed by the technical depart-
ment, which understandably wants to try out a new and exciting technique on some
interesting data that it holds. The results the project delivers may intrigue the user
departm ent to which they are offered. Ultimately, however, because the user has no
real business justification for the results and cannot act upon them in a timely manner,
there is no impetus to follow up on the project.
Problems that most data-mining project managers stumble across are listed here:
• Insufficient understanding o f business needs. Many organizations are leaping onto
the DM bandwagon; they know who their competitors are. The “me too” approach
to the technique is a mistake: Companies should have a business justification for
DM, just as they would for any other new technology. The organization will only
reap the benefits of DM if there is a real business case to answer because only then
will the project be bound tightly into a business process It should not be an experi-
ment for experiment’s sake. In other words, a business needs to resist the technol-
ogy push of tools, vendors, and technical departm ents—which often argue for a par-
ticular technique regardless of how appropriate it is—and look for user pull.
• Careless handling o f data. Data that are carelessly handled and conditioned can
mislead data miners by deceptively revealing irrelevant patterns and even
destroying existing patterns. D ata mishandling errors include the following:
a. Overquantifying data. This can lead to the “hiding” of relationships.
b. Miscoding data. This can lead to the creation of pseudopatterns.
c. A nalyzing without taking precautions against sampling errors. For example,
some data miners use the first x number of records as the training data and
CHAPTER 12 Data M ining—Knowing the Unknown aiaa 371
blindly assume that the total population of records is randomly distributed
and independent.
d. Loss o f precision due to im proper rounding o f data values.
e. Incorrectly handling missing values. For example, a blank field replaced with
a u0” should not be used if a mean average of all the fields is to be taken.
D ata visualization and reporting tools should always be used to “see” and statisti-
cally analyze data sets to determine if the information is damaged. Additionally, a
domain expert, such as a data owner, should check to determine if obvious pat-
terns are still existent in the postconditioned data. This can be done by question-
ing the postconditioned data set by asking, “Are the relationships still there?” “If
this was to replace the original data set, can I still make sense out of it?” “Is it pre-
cise, and does it still answer what we already know?”
• Invalidly validating the data-mining model. Validating the data-mining model is of
utmost importance. This involves testing that a model is properly running as
expected by feeding it a large representative data set not used previously in train-
ing. Additionally, auditing and using multiple samples from a population can be
used to assure the validity of the model.
Most data miners will face either abundant amounts of testing data or, as
often seen, extremely scarce amounts. It is important to never ignore suspicious
findings, even if we are hastily trying to meet deadlines. Haste can lead to believ-
ing everything the data owners tell us about the data and, even worse, believing
everything our own analysis tells us. It is important to question the irrational-
sounding voice that asks, “Can this be truly right? I don’t think so.”
A good habit is to go through individual records before mining data to get a
feel for the information. Many times, a simple examination of the records will
raise the awareness of data miners and even bring to their attention to new fields
and relationships. Remember: The devil is in the details.
• Believing in alchemy. Many data owners believe that data mining is a form of an
alchemic process that will magically transform their straw databases into golden
knowledge. Data-mining efforts that find nothing are seen as “fool’s gold” by data
owners. However, they may not necessarily be failures. All data-mining efforts are
motivated by the human-induced suspicions that something exists; therefore, the
failure may be in the suspicion, not in the data to be mined or the techniques
used. Additionally, it could be that the data given to data miners are not suited for
the purpose. The technology used might also be inadequate to handle the mass of
data available or it may simply have been misapplied. The overall expectations of
the project may also play a role in making the gold seem to be fake. For example,
a company that wants to reduce all customer churn might drop a project that has
reduced it only 10 percent, even though this could be a first step.
Challenging and rechallenging the outcomes is the best way to guarantee that real
ROI is being achieved. In a rapid prototyping methodology, attacking and analyzing
the system as a whole led to finding that the data itself was the problem. In addition,
while developing a DM project, managers should consider the following issues:
• Assessing vendor selection: This task is quite difficult because the DM market is
still immature and lacks industry standards.
• Team building: Select the right people to participate in the project.
Su mma r y * 1 * 1
• D ata mining is the process of extracting useful patterns and regularities from large
bodies of data (that is, bodies of data that are too large to be analyzed by hand).
• Data mining is an umbrella term that covers the tools and techniques used in the
analysis of large databases. D ata mining is the process that is transforming raw
food into blood that nourishes the various functions of the corporation.
• Business intelligence tools are software products that provide the opportunity to
take action that will ultimately result in a measurable business benefit. They
include a range of tools such as reporting, OLAP, statistical analysis, data visual-
ization, and data mining. Business intelligence tools encompass all tools that could
be useful for supporting end users in their analysis and decision-making processes.
• Historically, the term data mining appeared in the 1990s, after a long maturation
process involving statistics, artificial intelligence, machine learning, and data ware-
housing. Tracing history to its roots, DM is a double-path discipline originating
from the birth of data organization and analytical techniques. On the data organi-
zation side, before DM can be applied, data must be properly collected and
stored. One such method is data warehousing. D ata warehousing collects data
from various operational systems, organizes it, transforms it, and makes it avail-
able for further DM investigation.
• The primary goals of data mining are prediction (predicting unknown or future
values) and description (finding human-interpretable patterns to data). The two
goals can be used to carry out primary DM tasks such as classification, regression,
clustering, summarization, and dependency modeling.
• The DM process is best illustrated by a seven-step methodology: business under-
standing, data understanding, data preparation, data modeling, analysis of the
results, knowledge assimilation, and deployment evaluation.
Te r m s to Kn o w i i i b
Categorical data: Categorical data is either nonordered claims experience. It divides a data set so that records
(nominal) such as gender or city or ordered (ordinal) with similar content are in the same group, and groups
such as high, medium, or low temperatures. are as different as possible from each other.
Classification: refers to the data-mining problem of Cross validation: A method of estimating the accuracy of
attempting to predict the category of data by building a a classification or regression model. The data set is
model based on som e predictor variables. divided into several parts, with each part in turn used to
Classification tree: A decision tree that places categorical test a model fitted to the remaining parts.
variables into classes. Data: Values collected through record keeping or by
Cleaning (cleansing): Refers to a step in preparing data polling, observing, or measuring; typically organized for
for a data-mining activity. Obvious data errors (such as analysis or decision making. More simply, data are facts,
improbable dates) are detected and corrected, and transactions, and figures.
missing data is replaced. Data accuracy: Refers to the rate of correct values in
Clustering: Clustering algorithms find groups of items the data.
that are similar. For example, clustering could be used Data format: Data items can exist in many formats such
by an insurance company to group customers according as text, integer, and floating-point decimal; refers to the
to income, age, types of policies purchased, and prior form of the data in the database.
CHAPTER 12 Data M ining—Knowing the Unknown saaa 373
Data mining: An information extraction activity whose OLAP: Online analytical processing tools give the user
goal is to discover hidden facts contained in databases. the capability to perform multidimensional analysis of
Using a combination of machine learning, statistical the data.
analysis, modeling techniques, and database technology, Outliers: Outliers are data that fall outside the boundaries
data mining finds patterns and subtle relationships in that enclose most other data items in the data set.
data and infers rules that allow the prediction of future Pattern: A pattern is a relationship between two variables.
results. Typical applications include market segm enta- Range: The range of the data is the difference between
tion, customer profiling, fraud detection, evaluation of the maximum value and the minimum value.
retail promotions, and credit risk analysis. Alternatively, range can include the minimum and
Data-mining techniques: Procedures and algorithms maximum, as in “The value ranges from 2 to 8.”
designed to analyze the data in databases. Sampling: Creating a subset of data from the whole.
Deployment: After the m odel is trained and validated, it Random sampling attempts to represent the whole by
is used to analyze new data and make predictions. choosing the sample through a random mechanism.
Discrete: A data item that has a finite set of values. Sensitivity analysis: Varying the parameters of a model to
Discrete is the opposite of continuous. assess the change in its output.
External data: Data not collected by the organization, Sequence discovery: The same as an association rule for
such as data available from a reference book, a govern- the market basket analysis except that the time
ment source, or a proprietary database; effect on the sequence of events is also considered. For example,
dependent variable of the other. “Twenty percent of the people who buy a VCR buy a
Internal data: Data collected by an organization, such as camcorder within 4 months.”
operating and customer data. Test data: A data set independent of the training data
Missing data: Data values can be missing because they set, used to fine-tune the estimates of the model
were not measured, not answered, were unknown, or parameters.
were lost. Training: Another term for estimating a m odel’s parame-
Model: A model is a road map using data to help understand ters based on the data set at hand.
what is happening or predicting what might happen. Training data: A data set used to estimate or train a model.
Model accuracy: Refers to the degree of fit between the Transformation: Reexpression of the data such as aggre-
model and the data. This measures how error-free the gating it, normalizing it, changing its unit of measure, or
m odel’s representations are. Because accuracy does not taking the logarithm of each data item.
include cost information, it is possible for a less accu- Validation: The process of testing the models with a data
rate m odel to be more cost effective. set different from the training data set.
Te s t Yo u r U n d e r s t a n d in g 11,1
1. Why is DM a process and not an end in itself? Explain.
2. Describe the differences and similarities among DM, machine learning, and
business intelligence. How are they related?
3. “DM can be thought of as a form of advanced statistical techniques.” Do you
agree with this statement? Why or why not?
4. “DM is a tool to develop intelligent systems.” Define intelligence, explain
how systems could have intelligent behavior, and discuss this statement.
5. Describe the differences betw een O LA P and DM. When would you use
each tool?
6. What are the limitations of OLAP? How is DM able to overcome them?
7. What is the role of DM in e-business?
8. Describe, with examples, when you would use predictive DM and when you
would use descriptive DM.
9. Explain how DM is used in the health sector and in the telecommunications
industry.
10. Explain how com panies are using DM to understand their custom ers’
behavior and predict their intentions.
11. D escribe the m ajor pitfalls faced by com panies when im plementing DM
solutions.
374 a a a « PART IV K M System Tools and Portals
Kn o w l edge Ex e r c is e s a M a a
1. Discuss what types of industries can best benefit from DM. Which ones can-
not? Hint: Think of the ones having the most transactions and accessible data.
2. Statistical and DM applications both produce different results for manage-
ment, even though they might use the same historical data. Discuss the simi-
larities and differences in reporting capabilities.
3. A large online bank needs to mine data coming from many sources, including
marketing, accounting, and customer databases. Discuss the best way to col-
lect and prepare multisource data.
4. Minetise.com is an Internet company specializing in online banner ads. The
company is developing an application that customizes a banner according to
a custom er’s historic profile. Discuss how DM can be used to develop such an
application.
5. Your manager is extremely worried about integration problems that might
arise from implementing a DM application on your com pany’s SQL data-
base. Some of the questions bothering him include the following: How will it
integrate into the current computing environment? Will it work on our exist-
ing SQL database, or do we need anything else? How easily will the system
work on our intranet? Discuss the problems and possible solutions to these
questions. What other problems might your company face?
6. Finance Trance is a stock brokerage firm. They are thinking of using DM in
their customer services department. Suggest some uses and services they can
offer. Also, discuss the DM tasks that are to be used.
7. An online bookstore has asked your company to develop a DM application
to recom m end books to customers. Your m anager wants you to analyze
how the company works and see what data you can pull from their data
warehouses. How would you go about understanding the business and data
available before starting the project? What part does this fulfill in the over-
all project?
8. How could a mobile phone company use DM to lower customer churn? Can
it use DM to increase variables such as product development speed, m arket-
ing effort, or even customer retention?
9. During the data preparation stage, a supermarket omitted certain data fields
that were later shown to have significant adverse effects on the overall DM
application. Which stages of the DM process will be affected? A t which
stage could this problem have been detected? How do you think the prob-
lem was detected?
10. Design a survey to glean trends from several companies that are planning to
develop DM applications. This survey should help clarify the role of execu-
tive managers, the characteristics of the planned project, and the return
expected from it.
11. Conduct an in-depth case study with a company that has implemented a DM
solution to identify the best practices and common pitfalls.
12. Carrier Corp. is using data mining to profile online customers and offer them
cool deals on air conditioners and related products. By using services from
WebMiner, Inc., the air-conditioning, heating, and refrigeration equipment
m aker has turned more Web visitors into buyers, increasing per-visitor reve-
nue from $1.47 to $37.42.
Carrier, part of $26 billion United Technologies Corp., began selling air
conditioners, air purifiers, and other products to consumers via the Web in
1999. However, it sold only about 3,500 units that year, says Paul Berman,
global e-business m anager at the Farmington, Connecticut, company. Not
knowing just who its customers were and what they wanted was a big part of
CHAPTER 12 Data M ining—Knowing the Unknown ■ ■■■ 375
the problem. “We were looking for ways to raise awareness [of Carrier’s Web
store] and convert Internet traffic to sales,” Berman says.
Last year, Carrier gave WebMiner a year’s worth of online sales data,
plus a database of Web surfers who had signed up for an online sweepstakes
the company ran in 1999. WebMiner combined that with third-party demo-
graphic data to develop profiles of C arrier’s online customers. The typical
customer is young (30 to 37), Hispanic, and lives in an apartm ent in an East
Coast urban area.
WebMiner matched the profiles to ZIP codes and developed predictive
models. Since May of 2002 C arrier has enticed visitors to its Web site
(www.buy.carrier.com/), with discounts. When they type in their ZIP codes,
WebMiner establishes a customer profile and pops up a window that offers
appropriate products, such as multiroom air conditioners for suburbanites or
compact models for apartm ent dwellers. “It’s the first time we’ve intelligently
delivered data-driven promotions,” Berman says.
Online sales have exceeded 7,000 units this year, Berman says, compared
with 10,000 units for a ll of last year. C arrier chose the W ebMiner service
because it was quick to implement and is relatively inexpensive —$10,000
for installation and a $5 fee to WebMiner for each unit sold, compared with
6-figure alternatives.
a. The DM application used by Carrier was one that was predictive in
nature. Could a descriptive model also be used? How would you use it,
and what outputs would you expect? Would they be of any use to Carrier?
b. What other data-driven promotions could Carrier come up with using
other data mining techniques?
c. What manufacturing-driven applications can Carrier implement using
data mining? Hint: How can it be used to forecast manufacturing defects?
d. What finance-driven applications can Carrier implement using data min-
ing? Hint: How can Carrier use DM to distinguish on-time paying cus-
tomers from doubtful ones?
SO URCE: Whiting 2001.
13. IAURIF, a French regional studies organization, needed to predict what
mode of transportation Parisians would use —and why they would use it—
from a large data set not originally collected for data mining.
With Clementine’s rule-induction algorithms, IA U RIF uncovered unex-
pected insights and proved the group’s first assumption, which was based
solely on experience, to be untrue. Instead, C lem entine’s rapid modeling
environment revealed the most im portant travel factors and derived accu-
rate results based on fact.
Results were as follows:
• Accomplished more accurate traffic forecasting
• Improved transportation planning
Analyzing and predicting traffic flows and growth is a complex process.
For IAURIF, this process started with an existing database of 400,000
records. These previously collected datia, from a detailed Parisian transport
survey, were not originally intended for data mining. That m eant a more
complex task right from the start, because IA U RIF had to complete exten-
sive preprocessing before it could begin data mining.
A rm ed with C lem entine’s data m anipulation capabilities, IA U R IF
began by grouping the 200 original fields under general headings, such as
place of residence and socioeconomic class. Then, analysts selected a repre-
sentative variable for each group of fields and ensured the groups were in-
dependent of their effect on transport mode. This im portant preprocessing
376 a a a a PART IV K M System Tools and Portals
Re f e r e n c e s 1 , 1 1
Adriaans, Pieter, and Zantinge, Dolf. Data Mining. Harvard Business Review, vol. 77, no. 2,1999, pp. 106-116,
Boston, MA: Addison-Wesley, 1996. harvardbusinessonline.hbsp.harvard.edu/b02/en/
Cabena, Peter, et al. Discovering Data Mining: From com m on/item_detail.jhtml?id=4347, Date accessed
Concept to Implementation. Upper Saddle River, NJ: October 19,2002.
Prentice Hall, 1998. Holsheimer, M., and Kersten, M. L. Architectural Support
Cahlink, George. “Data Mining Taps the Trends,” www. for Data Mining. K D D Workshop 1994, pp. 217-228.
govexec.com/features/1000/1000managetech.htm, Hunt, E., Marin, J., and Stone, P. Experiments in
September 18,2000, D ate accessed October 16,2002. Induction. N ew York: Academic Press, 1966.
Deck, S. “Data Mining,” Computerw orld, March 29,1999, Inmon, Bill. Managing the Data Warehouse. New York:
www.computerworld.com/hardwaretopics/hardware/ John Wiley & Sons, Inc., 1996.
esktops/story/0,10801,43509,OO.html, Data accessed 2002. Kaplan, Abraham. The Conduct o f Inquiry: M ethodology
Delmater, Rhonda, and Hancock, Monte. Data Mining fo r Behavioral Science. Chicago: Chandler Publishing
Explained. Boston, MA: Digital Press, 2001. Company, 1964.
de Ville, Barry. M icrosoft Data Mining: Integrated Kaplan, Robert S., and Norton, David P. The Balanced
Business Intelligence fo r E-Com m erce and Knowledge Scorecard: Translating Strategy into Action. Boston,
Management. Boston, MA: Digital Press, 2001. MA: Harvard Business School Press, 1996.
Dhar, Vasant, and Stein, Roger. Seven M ethods fo r Kass, G. V. “Significance Testing in Automatic Interaction
Transforming Corporate Data into Business Intelligence. D etection,” A pplied Statistics, vol. 24, no. 2,1976,
Upper Saddle River, NJ: Prentice Hall, 1997. pp. 178-189.
Fayyad, Usama M., et al. Advances in Knowledge Discovery Kass, G. V. “An Exploratory Technique for Investigating
and Data Mining. Menlo Park, CA: A A A I Press, 1996. Large Quantities of Categorical D a ta ” A pplied
Groth, Robert. Data Mining: A Hands-On Approach fo r Statistics, vol. 29, no. 2,1980, pp. 119-127.
Business Professionals. Upper Saddle River, NJ: Kluge, Jurgen, Stein, Wolfram, and Licht, Thomas.
Prentice Hall, 1998. K nowledge Unplugged: The M cKinsey & Company
Groth, Robert. Data Mining: Building Competitive G lobal Survey on Knowledge Management. New York:
Advantage. Upper Saddle River, NJ: Prentice Hall, 2000. Palgrave, 2001.
Han, Jiawei, and Kamber, Micheline. Data Mining: Kuhn, Thomas. The Structure o f Scientific R evolutions,
Concepts and Techniques. San Francisco, CA: Morgan 3d ed. Chicago: University of Chicago Press, 1996.
Kaufmann, 2001. Loshin, David. Enterprise Knowledge Management: The
Hansen, Morten T., Nohria, Nitin, and Tierney, Thomas. Data Quality Approach. San Francisco, CA: Morgan
“What’s Your Strategy for Managing Knowledge?” Kaufmann, 2001.
CHAPTER 12 Data M ining—Knowing the Unknown ■a ■a 377
Mena, Jesus. Data Mining Your Website. Boston, MA: Quinlan, R. “Discovering Rules by Induction from Large
Butterworth-Heinemann, 1999. Collections of Examples,” in D. Michie (ed.), Expert
Michael, J. A., Linoff, Berry, and Linoff, Gordon. Data Systems in the Microelectronic Age. Edinburgh, 1979,
Mining Techniques: For Marketing, Sales, and Customer pp. 168-201.
Support. New York: John Wiley & Sons, Inc., 1997. Rud, Olivia Parr. Data Mining C ookbook. New York:
Michael, J. A., Linoff, Berry, and Linoff, Gordon. John Wiley & Sons, Inc., 2001.
Mastering Data Mining: The A rt and Science o f Shaw, M. J., Subramaniam, C., Wan Tan, G., and Weldge,
Customer Relationship Management. New York: John M. “Knowledge M anagement and Data Mining for
Wiley & Sons, Inc., 2000. Marketing,” Decision Support System s, vol. 31,2001,
Michalski, Ryszard S., Bratko, Ivan, and Kubat, Miroslav. pp. 127-137.
Machine Learning and Data Mining: Methods and Smith, Reid G., and Farquhar, Adam. “The Road Ahead
Applications. New York: John Wiley & Sons, Inc., 1998. for Knowledge Management: An A l Perspective,” A l
Michie, D. “M ethodologies from Machine Learning in M agazine, vol. 21, no. 4, Winter 2000, pp. 17-40.
Data Analysis and Software,” The Com puter Journal, Sonquist, J. A., Baker, E., and Morgan, J. Searching fo r Struc-
vol. 34, no. 6,1991, pp. 559-565. ture. Ann Arbor, MI: Institute for Social Research, 1973.
Microstrategy, Inc., “E-Business Elevating Customer Spence, Robert. Information Visualization^ Boston:
Relationships,” white paper, p. 6,2001. Addison-W esley, 2001.
Millaer, William L., and Morris, Langdon. Fourth Genera- SPSS, HSBC Bank U S A , www.spss.com/success/pdf/HSB-
tion R&D: Managing Knowledge, Technology, and 0200.pdf, Date accessed August 2002.
Innovation. New York: John Wiley & Sons, Inc., 1999. Stewart,Tomas A. Intellectual Capital— The New Wealth o f
Mizuno, Shigeru. Management fo r Quality Improvement: Organizations. New York: Doubleday-Currency, 1997.
The Seven New Q C Tools. Cambridge, MA: Produc- Sturm, Jake. Data Warehousing with M icrosoft S Q L
tivity Press, 1979. Server 7.0 Technical Reference. Redmont, WA:
Morgan, J. N , and Sonquist, J. A. “Problems in the Analysis Microsoft Press, 2000.
of Survey Data, and a Proposal,” Journal o f the American Thuraisingham, Bhavani. Data Mining: Technologies,
Statistical Association, vol. 58, June 1963, p. 415. Techniques, Tools, and Trends. Ft. Lauderdale, FL: CRC
Moxon, B. “Defining Data Mining,” D B M S Online, Data Press, 1999.
Warehouse Supplem ent, www.dbmsmag.com/9608d53. Tiwana, Amrit. The K nowledge Management Toolkit.
html, August 1996, Date accessed 2002. Upper Saddle River, NJ: Prentice Hall, 2000.
O ’D ell, C., Hasanali, F., Hubert, C., Lopez, K., and Westphal, Christopher, and Blaxton, Teresa. Data Mining
Raybourn, C. Stages o f Implementation: A Guide fo r Solutions: Methods and Tools fo r Solving Real-W orld
Your Journey to Knowledge Management Best Problems. New York: John Wiley & Sons, Inc., 1998.
Practices. Houston,TX: APQC, 2000. Whiting, R. “Carrier Fans Sales With Data Mining,”
Payne, L. W., and Elliot, S. “Knowledge Sharing at Texas InformationW eek, August 6,2001, www.information
Instruments: Turning Best Practices Inside Out,” week.com/story/IWK20010802S0005, Date accessed
Knowledge Management in Practice, vol. 6,1997. November 2002.
www.apqc.org/prodserv/km-06.pdf, Date accessed Witten, Ian H., and Frank, Eibe. Data Mining: Practical
August 2002. Machine Learning Tools and Techniques with
Pyle, Dorian. Data Preparation fo r Data Mining. San Java Implantations. San Francisco, CA: Morgan
Francisco, CA: Morgan Kaufmann, 1999. Kaufmann, 2000.
S e le c te d W e b S it e s 1 1 , 1
www.dmg.org The Data Mining Group is a consortium a nonprofit international consortium that creates inter-
of industry and academics formed to facilitate the crea- operable industry specifications based on public stan-
tion of useful standards for the data-mining community. dards such as XM L and SGML. OASIS members
The site provides a member area and a software reposi- include organizations and individuals who provide, use,
tory, and it also provides news and announcements. and specialize in implementing the technologies that
www.kdnuggets.com KD Nuggets is a leading electronic make these standards work in practice. OASIS provides
newsletter on data mining and Web mining. Its monthly information on such emerging standards as predictive
release provides up-to-date news items on develop- model markup language (PMML) in the separate XML
ments in data mining and knowledge discovery. cover pages site www.oasis-open.org/cover.
www.oasis-open.org The Organization for the Advance- . www.xml.org This is an independent resource for news,
ment of Structured Information Standards (O ASIS) is education, and information about the application of
378 a a i i PART IV KM System Tools and Portals
XML in industrial and commercial settings. Hosted by also has a list of job offerings if you are looking for a
OASIS and funded by organizations that are commit- new opportunity within the field.
ted to product-independent data exchange, this Web www.mdcinfo.com This site provides information on the
site offers valuable tools, such as a catalog to help Meta Data Coalition, an organization originally set up
you make critical decisions about whether and by Microsoft to provide metadata solutions in data
how to employ XML in your business. For business- warehousing, business intelligence, and data mining.
people and technologists alike, this Web site offers www.icpsr.umich.edu/DDI The Data Documentation
a uniquely independent view of what’s happening Initiative (D D I) is an effort to establish an interna-
in the XML industry. tional criterion and methodology for the content, pre-
www.microsoft.com/sql This is the homepage for sentation, transport, and preservation of metadata
Microsoft SQL Server. This particular U R L provides a (data about data) in the social and behavioral sciences.
list of Microsoft online businesses. You can learn how Metadata constitute the information that enables the
to get real-time access to the most powerful data in effective, efficient, and accurate use of those data sets.
business intelligence, how to manage your business The site is hosted by the ICPSR (Interuniversity
partnerships more effectively, or how to share informa- Consortium for Political and Social Research) at the
tion within your organization through knowledge man- University of Michigan.
agement. You may also read how companies plan to use www.dhutton.com David Hutton A ssociates are consul-
wireless and other mobile technologies. tants in quality management. They are specialists in the
www.mlnet.org This site is dedicated to the field of Baldrige-style business excellence assessment as a tool
machine learning, knowledge discovery, case-based rea- to drive organizational change and improvement.
soning, knowledge acquisition, and data mining. This www.salford-systems.com Salford Systems are develop-
site provides information about research groups and ers of CART and M ARS data-mining, decision tree,
persons within the community. You may browse and regression modeling products. The site contains
through the list of software and data sets and locate the information about these products, white papers, and
events page for the latest calls for papers. This Web site other technical reports.
Knowledge
Management
Tools and
Knowledge Portals
Contents
In a Nutshell
Portals: The Basics
What A re Portals?
Evolution of Portals
Key Characteristics
Illustration
The Business Challenge
Portals and the Business Transformation
M arket Potential
Knowledge Portal Technologies
Key Functionality
Collaboration
Content Management
Collaboration Versus Categorization: The Case of the World Bank
Intelligent Agents
Implications for Knowledge Management
Who Is Building Enterprise Portals?
Who Sponsors Enterprise Portals?
Implementation Issues
Bandwidth
Portal Product Selection
Summary
Terms to Know
Test Your Understanding
380 a a i i PART IV K M System Tools and Portals
Knowledge Exercises
References
In a Nutshell
This chapter is concerned with the identification of the right tools to set up the infrastruc-
ture, services, and applications needed by the enterprise to manage effectively the flow of
information and the various activities related to the acquisition, production, and dissemi-
nation of knowledge. The goal is to provide an in-depth analysis of the technology trends
and issues related to the implementation of knowledge management solutions.
In previous chapters, we focused on knowledge management consisting of three
main processes: capture, codification, and integration. A variety of tools are emerging
to provide an enterprise with needed capabilities. The capacity to create knowledge
begins with collecting and organizing information. The value of information depends
on accuracy and timely accessibility. The more accurate and timely information is, the
more valuable it becomes for analysis and the creation of insight and new knowledge.
To be useful in creating knowledge, information must reach knowledge workers in the
most convenient, complete, and accurate way.
Portals are among the latest and most powerful tools to help achieve these goals. A
KM solution must employ a tool for capturing knowledge wherever it exits (in documents,
in experts’ minds, in databases, or as historical data). Another important tool is a user
interface that makes knowledge available to a larger community of knowledge workers.
By providing an integrated framework for linking people, processes, and knowledge,
portals can play a central role in simplifying managerial complexity, increasing opera-
tional productivity, and adding value to a company's business operations. Portals employ
distribution channels such as the Internet, intranets, and extranets. These distribution
channels enable companies to grasp potential advantages that are lying dormant in a com-
pany’s information and knowledge-based systems. Portals evolved from pure information
providers to sophisticated interfaces containing knowledge management features such as
content management for knowledge categorization, collaboration tools for knowledge
sharing, and personalization capabilities to facilitate the search function. Box 13.1 illus-
trates the impact of knowledge management portals on performance.
- ■ 1 1 1 1 1 BOX 13.1 1 1 1 1 1 1 -
FRITO-LAY: THE KNOWLEDGE CRUNCH m ation about the team ’s custom ers —including
sales, analysis, and the latest news —the portal
THE PROBLEM: UNLOCKING KNOWLEDGE
would contain profiles on who’s who in the corpo-
Corporate executives knew that capturing best prac- ration, making finding an internal expert a snap.
tices and corporate information would give employ-
ees something they could sink their teeth into. How- THE IMPLEMENTATION: BUILT FROM SCRATCH
ever, information was scattered around the company
M arino’s group established three goals for the
in disparate systems, and there was no easy way for
Frito-Lay portal: to streamline knowledge, exploit
the geographically dispersed sales force to get at it.
customer-specific data, and foster team collabora-
“We had knowledge trapped in files everywhere,”
tion. He brought in Navigator Systems, a consul-
says Mike Marino, vice president of customer devel-
tancy based in Dallas, which had worked with Frito-
opment at Frito-Lay, an $8.5 billion division of
Lay in the past and had some experience building
PepsiCo in Plano, Texas. Marino says that he knew if
knowledge management portals. Navigator built a
the 15-member sales team could only access the same
prototype in about 3 months using technologies
information, it would solve its ongoing problems
previously approved by Frito-Lay’s IS department.
within information sharing and communication.
Marino and Navigator essentially had to start
Additionally, much valuable knowledge was
from scratch when it came to populating the portal.
squirreled away on each salesperson’s system.
“Never before at Frito-Lay had they tried to cap-
There were many idiosyncratic methods of cap-
ture expertise systematically in one place,” notes
turing information, “none of which were terribly
Todd Price, a consultant at Navigator. Marino and
efficient,” Marino says. The sales team also lacked
Price did an audit within the company and then
a place for brainstorming and collaboration online.
created expertise profiles on the portal so that
If somebody got a piece of research and wanted
sales staff in the field would have an easy way to
to get input from account executives in Baltimore
learn who’s who at headquarters in Plano. That
and Los Angeles, the ability to collaborate [online]
way, people who have expertise in areas such as
just was not there.
promotion planning, activity planning, costing, or
new product announcem ents can be readily
THE SOLUTION: A KNOWLEDGE
tracked down and contacted for information.
MANAGEMENT PORTAL
The portal went live in January 2000. Since
The answer, M arino’s group realized, was to build then, three additional sales teams, or c u s to m e r
a knowledge m anagem ent portal on the corpo- c o m m u n itie s as they are called internally, have
rate intranet. A KM portal is a single point of been given access to the portal with different
access to multiple sources of information, and it co n ten t—including research abstracts and what
provides personalized access. Com panies are Marino calls performance scorecards, which evalu-
starting to pay attention to portals, because they ate account performance. “If somebody in sales or
offer an efficient way to capture information, says m arket research did a study in a particular area
Carl Frappaolo, executive vice president and like private-label trends, [the user] would be able
cofounder of the Delphi Group, a consultancy in to click to that abstract and get a summary of that
Boston. A KM portal at Frito-Lay would give the study.” Users access the portal, known as the
sales departm ent a central location for all sales- C u s to m e r C o m m u n ity P o r ta l ( C C P ) y through a
related customer and corporate information and Netscape Navigator browser and enter their
cut down on the time it took to find and share name and password on the Frito-Lay intranet.
research. In addition to different types of infor- ((c o n tin u e d )
382 ■ a « a PART IV K M System Tools and Portals
SOURCE: Shein, E., “ The Knowledge Crunch,” CIO, May 1,2001, www.cio.com/archive/050101/crunch.html, Date accessed
August 2002.
EVOLUTION OF PORTALS
Initially, portals were mere search engines. They employed simple search technology to
find information on the Web. The next phase transformed the portals to “navigation
sites” to describe the functions available at sites like Quicken, MSN, Lycos, and Yahoo!.
Those portals categorize personal interests in groups (such as news, sports, finance,
education, science, and others). An example of the logical hierarchy of groups is shown
in Figure 13.1. They are referred to as Internet public portals.
Because of the increasing amount of information accessible internally and exter-
nally, the need for m ore personalized inform ation is becoming more critical and
urgent. To facilitate access to large accumulations of information, portals evolved to
include advanced search capabilities and taxonomies. Because emphasis was on infor-
mation, they were called information portals.
The evolution of the portal concept is shown in Figure 13.2.
Information portals provide the next step in the portal technology evolution. In
November 1998, Christopher Shilakes and Julie Tylman of Merrill Lynch’s Enterprise
Software team introduced the concept of “enterprise portal.” The concept was
described as “applications that enable companies to unlock internally and externally
stored inform ation and provide users a single gateway to personalized information
needed to make informed business decisions. They are an amalgamation of software
applications that consolidate, manage, analyze, and distribute information across and
outside an enterprise, including business intelligence, content management, data ware-
house, data mart and data management applications” (Shilakes and Tylman 1998).
Companies are becoming more aware of the opportunities for using and adding
value to the information lying dorm ant in scattered information systems. Companies
need to use both “publish” (pull) and “subscribe” (push) media to ensure that the right
information is available or distributed to the right people at the right time. The main
^
P«itonjl fm jn c t
^
Shop
" V i« L H o o f #Emlil e> i
M±!r
Yahoo! Travel - Reserve: Flights. Hotels. Cars. Cruises Gel Deals: Web Fares from American Airlines
11A v FANTASYFOOTBALL 1
Season starts Tonight!
Piav Yahoo! Sports Fantasv Football
Yahoo! PayOirect - The safe, quick way to move money
[ great deals on
IfrHI •GHome
ear up *or
Essentials
19
> Markets, sap soo ♦ . % • N**daq ♦ . % 27
r*H o ;C
p u c l 3
m\
^ 1*57
'. s<?ny
DVDP lavers under*1QQ
..Sbaw£i)se - Ho! Products
Newa - W n f t t r - Sports - Stock Ouoto
Personalization
Content Management
Examples
benefits for companies include lowered costs, increased sales, and better deployment of
resources. Integration is the key feature of enterprise portals. Portals integrate applica-
tions by combining, standardizing, analyzing, and distributing relevant information and
knowledge to end users, whether they are customers, employees, or partners.
The effectiveness of information portals can be enhanced by building applications
that combine the search, analysis, and dissem ination of inform ation. This goal is
achieved through knowledge portals.
In the knowledge portal, the focus is not on the content of information but on the
way knowledge workers will use it. The knowledge portal is a key component in the
knowledge management architecture. It is the central piece, allowing producers and
users of knowledge to interact. A major trend in knowledge management systems is
the move to online knowledge portals.
Knowledge portals provide information on various topics, and they can be cus-
tomized to meet a user’s individual needs. Portals make it easy to access knowledge
because of their universal interface —a Web browser. Online portal systems let IT
organizations access a variety of back-end systems (such as process management soft-
ware and methodology databases).
Knowledge portals provide two kinds of interfaces:
• The knowledge producer interface. It facilitates the knowledge worker’s job of
gathering and analyzing information, collaborating with peers or colleagues, and
finally generating new knowledge.
• The knowledge consumer interface. It facilitates the dissemination of knowledge
across the enterprise. A key feature of knowledge portals is a sophisticated per-
sonalization facility that takes into account the consumer profile.
KEY CHARACTERISTICS
Knowledge portals provide information about all business activities and also supply
m etadata for decision making. Enterprise knowledge portals (EKP), therefore, distin-
guish knowledge from information. They provide a facility for producing knowledge
from data and information. They also provide a better basis for making decisions than do
enterprise intelligence portals. Those who have knowledge gain competitive advantage
CHAPTER 13 Knowledge Management Tools and Knowledge Portals ■«** 385
a a i a « a bo x 13.2 a a a a a a
SOURCE: Excerpted from Davydov, Mark M. Intelligent Enterprise, vol. 3, no. 4, March 1,2000. Accessed from www.intelligent
enterprise.com/000301/supplychain.html. August 2002.
over those who have mere information. The essential characteristics of enterprise intelli-
gent portals and enterprise knowledge portals are shown in Table 13.1.
ILLUSTRATION
Let us illustrate using the case of the army’s knowledge online portal. The objective of
this portal is to transform the army into a networked organization that leverages its
intellectual capital to better organize, train, equip, and maintain a strategic land com-
bat force. More specifically, the army needs to do the following:
• Allow its enterprise information to be accessed more quickly and easily for less cost
• Use information technology to leverage army-wide innovation in services,
processes, and knowledge creation
Figures 13.3,13.4, and 13.5 show the capabilities of the army knowledge portal, the
communities of practice that were created, and their features.
■i n PART IV K M System Tools and Portals
1^ Back. ® ® &1$ SM
reh <3 ^History |
jAddeM,jg j7 //C :/P o c w ^ «agQan(0^e>ting«/uharwky^X5ag2DSettir^enwaiy^2af<eme<X20FtetA^ntentlE5/4DY1AB67/38Q.6.Stde6jj fr>Go |
Knowledge Center
SOURCE: E-Gov Knowledge Management Conference. “Using Army Knowledge Online for Mission
Success,” April 11,2000, www.army.mil/ako/webbriefing.ppt, Date accessed August 2002.
CHAPTER 13 Knowledge Management Tools and Knowledge Portals aaaa 387
j F fe : E d f B ro m c G o to F a v o r ite ,' H * ' ■ : ’
J £»B ack » »» -
hannky/locaK20Se<lingj/Tefnpo<a»y5:2C(n<e(ne<5J2CiFtes/Conten( IEfvMDY1A867/356.7.0ff>c*f C«e« Management Knowledge Center
^fTri®“uSno«nZonT
■ ■ ■ I ■ I FIGURE 13.4: The Army Communities of Practice
SOURCE: E-Gov Knowledge Management Conference. “Using Army Knowledge Online for Mission
Success,” April 11,2000, www.army.mil/ako/webbriefing.ppt, Date accessed August 2002.
SOURCE: E-Gov Knowledge Management Conference. “Using Army Knowledge Online for Mission
Success,” April 11,2000, www.army.mil/ako/webbriefing.ppt, Date accessed August 2002.
388 ■ « ■ ■ PART IV K M System Tools and Portals
required to meet these challenges is a rigorous internal discipline to expose and inte-
grate the sources of enterprise knowledge. As a result, organizations are facing trem en-
dous challenges. Consider these pressures faced by just about all organizations:
• Shorter time to m arket New products and services have to be conceived, devel-
oped, and delivered in months, or even weeks.
• Knowledge worker turnover. When a pivotal person leaves, the pain is widely
and quickly felt. “It’s becoming increasingly difficult to acquire and retain
employees, and a company’s strongest asset is its people,” says Chris Moore,
chief technology officer at Training Server, Inc. “Organizations that do not
tap into their mind share and take advantage of the knowledge within will
quickly fall behind.”
• More demanding customers and investors. For virtually every organization, the
squeeze is on customers wanting to pay less while investors want more value
from their portfolios. This means that all the resources to which an organiza-
tion can lay claim, including its intellectual resources, must be managed for
the best result.
]
Accelerate Time to Market with Products 39%
I
Penetrate New Market Segments 39%
I 9 ■ fl I I
] FIGURE 13.6: Main Reasons
Reduce Costs 38% for Launching KM Projects
MARKET POTENTIAL
Knowledge portals have emerged as a key tool for supporting the knowledge work-
place. According to David Folger, a senior program director at WCS, “Portals are big
business. More than 85 percent of organizations plan to invest in portals during the
next 5 years. The median expenditure is $500,000. We believe that as the world becomes
more networked, these estimates are bound to climb. Why? Portals can provide easier,
E-mail Traffic
Bandwidth Use
Productivity Time in Meetings
Locating Documents Phone Calls
Collaboration Response Times
Better Decisions Redundant Efforts
Quality of Data
Sharing Knowledge
Identifying Experts
390 a i a « PART IV K M System Tools and Portals
* ! * ■ ■ ■ BOX 13.3
SOURCE: Bolds, Robert. “Enterprise Information Portals: Portals in Puberty,” a white paper KMWorld, vol. 2, July/August 2001.
a a a a a a
BOX 13.4
SOURCE: Finkelstein, C. “Building Enterprise Portals Using XML,” The Data Warehouse Institute Conference, 2001.
■ i a ■ fl a
392 aaaa PART IV K M System Tools and Portals
KEY FUNCTIONALITY
The main goal of a portal is to provide a single point of access to all inform ation
sources. Therefore, portals must be the ultimate tools for universal integration of all
enterprise applications. At the same, because every individual has different informa-
tion needs and knowledge uses, portals have to deliver a personalized interface. Given
the complexity of this challenge, portals must include the following functionalities:
• Gathering. Documents created by knowledge workers are stored in a variety of
locations (such as files on individual desktops, Web sites on the network, and
databases on servers). In order to be accessible, data and documents need to be
captured in a common repository.
• Categorization. This facility profiles the information in the repository arid orga-
nizes it in meaningful ways for navigating and searching. Portals should support
categorization at all levels, including the employee, partner, and customer levels.
It should also support categorizations in various dimensions, including the
process, product, and service dimensions.
• Distribution. This facility acquires knowledge, either through an active mecha-
nism (search interface) or a passive mechanism (push). This facility supports the
distribution of structured and unstructured information in the form of electronic
or paper documents.
• Collaboration. Collaboration is achieved through messaging, workflow, discussion
databases, and so forth. This facility expands the role of portals from a passive
information provider to an interface for all types of organizational interactions.
• Publish. This facility publishes information to a broader audience, including indi-
viduals outside the organization.
• Personalization. Personalization is a key component of the portal architecture
because it allows individuals to enhance their productivity. It is becoming a neces-
sity for successful portals. This is due to the proliferation of information available
through the portal. To take advantage of this facility, knowledge
workers must be able to manage and prioritize the delivery of information
on task-function or interest bases.
• Search/navigate. This component provides tools for identifying and accessing spe-
cific information. The knowledge worker can either browse or submit a query.
Figure 13.8 shows the most common features of portals. It shows also their busi-
ness benefits.
Box 13.5 shows the Microsoft portal architecture.
COLLABORATION
The goal of the collaboration tool is to create a basic, collaborative knowledge man-
agement system that supports sharing and reusing information. To support the require-
ment of capturing undocumented knowledge, the messaging and collaboration module
is a perfect tool. If writing e-mail, sending documents, or participating in discussions
are easy tasks for knowledge workers, the motivation to act with knowledge manage-
CHAPTER 13 Knowledge Management Tools and Knowledge Portals aaaa 393
r
Common Features Business Benefits
A
( Query, Reporting, Better decision support as well as information dissemination and sharing^
I and Analysis
[ Integration of Information Ability to access through a single interface, all applications and |
I and Applications information required for increased job throughout J
^Publish and Subscribe Maturation of business processes by collaborating with others, sharing ]
information, and improving business performance J
^Personalization Arranging the interface to meet an individual’s needs and desires for |
increased job productivity J
ment in mind is much higher than in infrastructures that do not support this or that
make it hard to use collaborative features. In a well-designed collaborative environ-
ment, this knowledge flow can be easily captured in e-mail, stored in document and dis-
cussion databases, and archived in the knowledge management system for later reuse.
Collaboration in the knowledge management context is the ability for two or more
people to work together in a coordinated manner over time and space using electronic
devices. One has to distinguish between two types of collaborations: asynchronous and
synchronous collaboration.
• Asynchronous collaboration is human-to-human interactions via computer sub-
systems having no time or space constraints. Queries, responses, or access occur
anytime and anyplace.
• Synchronous collaboration is computer-based, human-to-human interaction that
occurs immediately (within 5 seconds). It can use audio, video, or data technologies.
Table 13.2 describes the requirements for a successful collaboration component.
A nother im portant distinction to make is that of “push” versus “pull” technologies.
Push technology places information in a place where it is difficult to avoid seeing it.
E-mail is a classic example of a push technology. Pull technologies require you to take
specific actions to retrieve information. The World Wide Web is a good example of a
pull technology. An electronic mailing list that uses the push technology of e-mail is
extremely powerful as a collaborative tool because it requires little learning or behav-
ior change on the part of the user. In spite of its relative simplicity when compared to
sophisticated Web-based collaborative forums, electronic mailing lists are the most
popular collaborative tool.
Table 13.3 shows the advantages and disadvantages of the different technologies
available to perform asynchronous and synchronous collaboration.
394 7777 PART IV K M System Tools and Portals
1 ■ fl fl I ■ BOX 13.5 fl fl fl fl I fl
SOURCE: Honeycutt, Jerry. “Knowledge Management Strategies,” Redmond, WA: Microsoft, p. 167.
a a a a a a
CONTENT MANAGEMENT
Content managem ent requires directory and indexing capabilities to automatically
manage the ever-growing warehouse of enterprise data. This component addresses the
problem of searching for knowledge in all information sources in the enterprise. This
knowledge includes structured and unstructured internal information objects such as
office documents, collaborative data, MIS and ER P systems, and experts, as well as
information from outside sources. This component handles how knowledge assets get
into the knowledge management information base. To handle this new complexity of
CHAPTER 13 Knowledge Management Tools and Knowledge Portals aaaa 395
the knowledge management information base and to help the knowledge workers to
stay focused on solving business problems (without disappearing in technology), a
sophisticated knowledge management taxonomy needs to be built based on metadata
(data that describes other data). M etadata is needed to define types of information.
The content management component also needs to publish information in the knowl-
edge base (for example, categories and attributes).
A nother im portant issue handled by content management is the way documents
are analyzed, stored, and categorized. Once the documents have been gathered, they
must be analyzed so that their content is available for retrieval and use by the system
or end users. As documents enter the portal system, they are stored for later retrieval
and display. However, it is not useful to simply put the documents away in their raw
form. Systems typically analyze the docum ent content and store the results of that
analysis so that subsequent use of the documents by the system and users will be more
effective and efficient.
As the number of documents under management grows, it becomes increasingly
important to gather similar documents into smaller groups and to name the groups.
This operation is called categorizing. All automatic categorizing methods use features
to determine when two documents are similar enough to be put into the same cluster.
Because document collections are not static, portals must provide some form of
taxonomy maintenance. As new documents are added, they must be added to the tax-
onomy at appropriate places, using a classification technology. As the clusters grow,
and especially as the conceptual content of the new documents changes over time, it
may become necessary to subdivide clusters or to move documents from one cluster to
another. A portal administrator, using the taxonomy editor, can monitor and imple-
ment these suggestions and can periodically assess the health and appropriateness of
the current taxonomy and document assignments within it (Mack, Ravin, and Byrd
2001). In the publishing process, several things should be considered concerning the
knowledge m anagem ent taxonomy. Although tagging docum ents with m etadata is
important for the quality of content in this stage of document publishing, it is a burden
to submit information if tagging the metadata is a complex or time-consuming process.
This is where the XML language comes into play. Box 13.6 provides a brief description
of this language.
a a ■ i i a box 13.6 a a a a a a
SOURCE: Bryan, Martin. “An Introduction to the Extensible Markup Language (XML),” SGML Centre, 1997,
www.personal.u-net.com/~sgml/xmlintro.htm, Date accessed December 2002.
a a a a a a
ing rigor in classification through the use of controlled vocabulary, resource discovery
is much more efficient, both in terms of searching and browsing.
With regard to building knowledge bases (comprehensive knowledge reposito-
ries), the overwhelming message from the World Bank is that this is a difficult, ex-
tremely labor-intensive process. After 4 years of investment in knowledge management,
398 ■ ■ ■ ■ PART IV K M System Tools and Portals
Knowledge
\nnovatioii
i
Communication, Document
Management, Work Flow
Output
Strategy Lotus Notes PeopleSoft
Oracle 8 Database
the bank reports that they have had much more success with collaboration strategies
than with codification.
Although codifying knowledge is a fundamental activity of any knowledge-based
organization, the cost of com prehensive codification technologies such as EDMS
needs to be evaluated in terms of a return on investment with respect to both technol-
ogy and people (Denning 1998).
INTELLIGENT AGENTS
Intelligent agents are tools that can be applied in numerous ways in the context of EKPs.
As a tool, intelligent agents are still in their infancy. Most applications are experimental
and have not yet reached the efficient commercial stage. However, there is no doubt that
they will play a crucial role in all aspects of EKPs, especially in intelligent search and fil-
tering the right documents according to some criteria. One application is the use of intel-
ligent agents in ERPs such as CRM portals, specifically in areas of competition.
As the relationships between companies and their customers become more com-
plex, the enterprises need more information and advice on what these relationships
mean and how to exploit them. Intelligent agent technology offers some very interest-
ing options for addressing such needs.
Customers set certain priorities while purchasing products and services. Intelligent
agents can m aster individual custom ers’ or custom er groups’ dem and priorities by
learning from experience with them, and they can quantitatively and qualitatively ana-
lyze those priorities. Agents are software entities that are able to execute a wide range
CHAPTER 13 Knowledge Management Tools and Knowledge Portals ■■* i 399
of functional tasks (such as searching, comparing, learning, negotiating, and collaborat-
ing) in an autonomous, proactive, social, and adaptive manner. The term intelligent in
this context means only that we are dealing with entities that are able to adjust their
behavior to the environment. In other words, intelligent agents are able to learn from
previous situations and replicate the behavior of the customer to predict purchasing
patterns. There is a vast range of services customers require that intelligent agents can
address. Some of these services may include the following:
• Customized customer assistance with online services: news filtering, messaging,
scheduling, making arrangements for gatherings, ordering, and so on
• Customer profiling, including inferring information about customer behavior
based on business experiences with the particular customer
• Integrating profiles of customers into a group of marketing activities
• Predicting customer requirements
• Negotiating prices and payment schedules
• Executing financial transactions on the custom er’s behalf
These examples represent a spectrum of applications from the somewhat modest,
low-level news filtering applications to the more advanced and complicated customer
relationship management applications that focus on predicting customer requirements.
The main point is that an intelligent agent is an intermediary between the enterprise
and its customer, and a source of effective, utilitarian information encountered at dif-
ferent virtual destinations.
Figure 13.10 shows the new technology trends in im plem enting portals. The
emphasis is on collaborative technologies to create communities of practice; advanced
human computer interaction to enhance performance; and intelligent agents to auto-
mate the search function.
IMPLEMENTATION ISSUES
Although technology issues can be categorized in many different ways, the codification
versus collaboration paradigm also provides a particularly useful structure for under-
standing current trends in information technology. For globally distributed organizations
400 * * * * PART IV K M System Tools and Portals
SOURCE: Conover, Joan. “Using Portal Technology to Fuse Corporate Information Knowledge
Management, Information Management, Data Warehousing,” New Technology Digital Library.
www.c3i.osd.mil/km/proceedings/53.ppt, Date accessed August 2002.
(that is, most international development organizations) that rely on the Internet as a
medium for the sharing of knowledge, the issue of bandwidth is fundamental. At this point
in the evolution of the Internet, bandwidth is a chief constraining factor for many applica-
tions. The determination of an organization’s overall KM strategy will provide guidance for
the implementation of appropriate technology. Hansen, Nohria, and Tierney (1999) pre-
sent a valuable model to help guide thinking about managing organizational knowledge by
distinguishing between ‘"codification” versus “personalization” strategies. This dichotomy is
useful in making the critical decisions required to ensure the right technological mix.
Codification focuses primarily on computer use, whereby knowledge is carefully coded
and stored in databases for easy access (see Chapters 7 and 9). By contrast, the personaliza-
tion KM strategy makes use of computers to help people communicate knowledge, not to
store it. The emphasis is on knowledge sharing via direct person-to-person contacts.
BANDWIDTH
Current trends point toward a steady decrease in the cost of Internet access. The rapid
and pervasive spread of Internet communication coupled with the evolution of faster
and cheaper technology is resulting in improved access to the Internet at lower costs.
CHAPTER 13 Knowledge Management Tools and Knowledge Portals ai aa 401
This trend has been slowest at m anifesting itself in Africa. However, even their
Internet access is spreading rapidly and is becoming much less expensive, especially in
capital cities.
Given the importance of collaboration and the creation of communities of practice
as a method for knowledge sharing, it is worth investigating the costs of a significant
increase in bandwidth for regional offices that could support the following:
• Desktop videoconferencing
• Internet telephony
• Improved access to information systems based at headquarters
• Other collaborative tools
• Access to more sophisticated information resources
Most of the technological tools now available tend to help dissemination of know-how,
but they offer less assistance for knowledge use. Tools that assist in knowledge creation are
even less developed, although collaborative work spaces offer promising opportunities by
enabling participation, across time and distance, in project design or knowledge-base
development; those most knowledgeable about development problems—the people living
them on a day-to-day basis—can actively contribute to their solutions. Some of the more
user friendly technologies are the traditional ones—face-to-face discussions, the telephone,
electronic mail, and paper-based tools such as flip charts. Among the issues that need to
be considered in providing information technology for knowledge-sharing programs are
the following:
• Responsiveness to user need. Continuous efforts must be made to ensure that the
information technology in use meets the varied and changing needs of users.
• Content structure. In large systems, classification and cataloguing become impor-
tant so that items can be easily found and quickly retrieved.
• Content quality requirements. Standards for admitting new content into the system
need to be established and met to ensure operational relevance and high value.
• Integration with existing systems. Because most knowledge-sharing programs aim at
embedding knowledge sharing in the work of staff as seamlessly as possible, it is
key to integrate knowledge-related technology with preexisting technology choices.
• Scalability. Solutions that seem to work well in small groups (such as HTML
Web sites) may not be appropriate for extrapolation organization-wide or on a
global basis.
• Hardware-software compatibility. Hardware-software compatibility is important
to ensure that choices are made that are compatible with the bandwidth and com-
puting capacity available to users.
• Synchronization o f technology with the capabilities o f users. This is important so as
to take full advantage of the potential of the tools, particularly where the technol-
ogy skills of users differ widely.
Plumtree Plumtree • Automatic population of mapped • Easy and extensive content and
Corporate taxonomies with filtered content application integration
Portal 4.0 • E-mail, voice, and wireless notification • Scalability
of content updates • Advanced security and access control
• Integration with LDAP directories • Trainable taxonomies
• E-room tools for collaboration and • Voice and wireless data access
virtual communities • Customization and extensibility
Su mma r y a1 1a
• A portal is a secure, Web-based interface that provides a single point of integra-
tion for and access to information, applications, and services for all people
involved in the enterprise, including employees, partners, suppliers, and customers.
• Born with search engines such as Yahoo! and Alta Vista, portals have since made
their way into enterprises, bringing together not only information from the
Internet, but in-house data as well. These portals, which are known as enterprise
CHAPTER 13 Knowledge Management Tools and Knowledge Portals a a a a 403
knowledge portals (EKPs), aim to offer a single, uniform point from which all of
an enterprise’s data sources can be accessed.
• The term data sources encompasses structured data (such as databases, Lotus
Notes, and so forth) and unstructured data (such as e-mails, files, and archives); it
also includes the data resulting from specific processes and enterprise applica-
tions (such as ER P and CRM tools). Today, the EIP market is thriving, and many
vendors are betting big on portals’ well-founded ability to fulfill enterprise needs.
• Content management in the EKP context requires directory and indexing capa-
bilities to automatically manage the ever-growing store of structured and unstruc-
tured data residing in data warehouses, Web sites, ERP systems, legacy applica-
tions, and so forth. Using m etadata to define types of information, good content
management can serve as the backbone for a system of corporate decision mak-
ing where business intelligence tools mine data and report findings back to key
players in the enterprise. Content management may also involve going outside
the enterprise, employing crawlers that find pertinent data via the Internet, incor-
porating it into existing systems, indexing it, and delivering it to appropriate ana-
lysts, knowledge workers, or decision makers.
• The collaborative functionality of EKPs can range from tracking e-mail to devel-
oping workplace communities. Some EKPs might allow workers in different parts
of the world to easily create virtual meeting rooms where they can conference by
chat, voice, or video communication.
Terms t o K now • • • •
Bandwidth: The term used to describe the speed of a net- Enterprise knowledge portal: An electronic doorway into
work connection. A fast connection allows the user to a knowledge management system.
view images and videos, and interact with remote sites Extensible markup language (XML): A specification
as if they were local. developed by the W3C designed especially for Web
Browser: A software application used to locate and dis- documents.
play Web pages. Groupware: A generic term used to describe applications
Content management system (CMS): A system used to that support and facilitate the work of teams and
manage the content of a Web site. groups of people.
Document management system: The computerized Intelligent agents: Programs used extensively on the Web
management of electronic as well as paper-based that perform tasks such as retrieving and delivering
documents. information and automating repetitive tasks.
Electronic collaboration: A process through which pro- Intranet: A network based on TCP/IP protocols (the
ject partners can contribute jointly to works in progress Internet) belonging to an organization, usually a corpo-
via e-mail, groupware, and public networks. ration, accessible only by the organization's members,
Electronic mailing list: A list of e-mail addresses identi- employees, or others with authorization.
fied by a single name, such as [email protected]. Knowledge repository: The software system that is a col-
When an e-mail message is sent to the mailing list lection of internal and external knowledge inside the
name, it is automatically forwarded to all the addresses knowledge management system.
in the list. Knowledge repository model: Model that describes the
Enterprise application integration (E A I):T he process that 2-step knowledge transfer procedure of person-to-
integrates applications inside an organization or appli- repository and repository-to-person.
cations of many organizations in a seamless fashion. Metadata: Data about data, such as indices or summaries.
Enterprise information portals: Portals that tie together Organizational knowledge base: The collection of knowl-
multiple, heterogeneous internal repositories and appli- edge related to the operation of an organization.
cations as well as external content sources and services Personalization: Software systems that allow an Internet
into a single browser-based view that is individualized site to provide the user with a Web page that reflects
to a particular user’s task or role. the interests, needs, and actions of the user.
404 a a a a PART IV K M System Tools and Portals
Portal: A Web page that offers links to other Web sites. Video mail: Application that enables users to transmit
Portals can be broad or narrow, specific or general. photos, sounds, and video.
Search engines: Software agents whose task is to find Voice portals: Gateways that allow customers and
information by looking at keywords or by following employees to use ordinary phone lines to access and
certain guidelines or rules. request information.
Teleconferencing: Conferring wjth a number of people via Work flow: The defined series of tasks within an organiza-
telephone or computer systems. tion to produce a final outcome.
Vertical portal: Electronic exchanges that combine
upstream and downstream e-commerce activities of
specialized products or services.
Te s t Yo u r U n d e r s t a n d in g 1111
1. Why is there a need for portals? How are portals similar to the concept of
data warehouses and data marts?
2. W hat are the advantages and disadvantages of having your portal on the
Internet instead of an intranet?
3. List the differences between knowledge and information portals. Discuss the
benefits of each.
4. Discuss the strategic and technological fit required for an organization to
implement a portal.
5. Discuss the advantages and disadvantages of purchasing a portal from a ven-
dor. Make sure you explore vendor Web sites such as Viador (www.viador.com)
and Autonomy (www.autonomy.com).
6. Discuss the differences between static and dynamic portals. When would you
use each each?
7. Discuss how you can use content management to sort knowledge from exter-
nal and internal sources. Illustrate with examples.
8. Discuss the issues that can arise when implementing a portal. Focus on tech-
nology, management, corporate strategy, and end users.
9. Give examples and uses of portals for B2B, B2C, B2G, C2C, and C2G.
10. List a number of possible ways a portal can be made accessible, given current
technological trends. Focus on five of these technologies and discuss their
strengths and weaknesses.
Kn o w l edg e Ex e r c is e s 1111
1. In the past, companies used electronic data interchange (ED I) to communi-
cate with suppliers and customers. Discuss how portals can be used to replace
the functions of EDI.
2. An audit firm needs to develop a system that allows auditors and public
accountants to search accounting standards, share knowledge, communicate,
and share Word and Excel files between the head office and clients’ sites. As
a consultant, you have been asked to recommend such a system. What would
you suggest?
3. A hardware retailer wishes to offer real-time support to customers via the
Internet. Suggest how a knowledge portal, equipped with chat and CRM, can
be used to accomplish this. W hat additional support can the hardware
retailer offer? What information can he give to the manufacturer?
4. A m ultinational conglom erate has a centralized human resources depart-
ment in Cleveland, Ohio. The human resources director wishes to launch a
new set of multilingual policies to all employees, according to their function,
CHAPTER 13 Knowledge Management Tools and Knowledge Portals ■i ■a 405
category, and grade. The director also wishes to have employees interact and
give feedback on the policies. Suggest a computerized solution.
5. Discuss how synergy between different strategic business units can be har-
nessed and utilized by knowledge portals.
6. Discuss how portals can offer a solution to the centralized versus decentral-
ized information dilemma. What forms of knowledge can be collected cen-
trally, and what should be left decentralized? Why?
7. How can personalized portals use data-m ining techniques? Suggest how
knowledge management and data mining can be integrated on a portal, and
give supporting examples.
8. Challenge: Establish e-learning portals for customers and partners to help
those audiences succeed with their NCR products and to generate new reve-
nue for NCR.
Strategy:
Use THINQ e-learning solutions to launch and track courses and pro-
vide community features—such as chat rooms and message boards—around
the courses.
Results:
NCR has extended nearly 4,000 online and classroom courses to more
than 2,000 registered users and is meeting its e-learning revenue goals.
NCR has come a long way in the 117 years since it introduced the first
mechanical cash register, but the $6 billion com pany’s trem endous success
still hinges on the individual customer relationship. Today, NCR helps compa-
nies harness the vast amount of customer information they collect at the sales
counter, over the phone, at the ATM, and on the Internet. With this informa-
tion, businesses can satisfy each customer’s unique needs, often automatically,
and transform customer transactions into rich customer relationships.
From the dawn of the cash register through N C R ’s leadership in data
warehousing, the com pany’s offerings have always been sophisticated.
Accordingly, it has always been important for NCR to help customers learn
how to reap the full potential of their NCR hardware and software. It is also
important for NCR partners to completely understand the company’s prod-
ucts so they succeed in selling and implementing them.
NCR has traditionally offered classroom training for customers and part-
ners to achieve these goals. Recently the company started offering courses
over the Internet. These classes combine the incisive content of NC R ’s class-
room training programs with the reach and efficiency of the worldwide net-
work, letting students anywhere in the world take a class any time they can
access a Web browser. In addition to helping customers and partners succeed,
this e-learning program also generates new revenue for NCR.
NCR evaluated a number of e-learning tools for the job of powering its
two custom er and partner e-learning portals. One portal is the Teradata
Education Network (TEN), an e-learning Web site for the company’s data-
warehousing customers. The other is the external NCR University (NCRU),
which extends award-winning NCR employee e-learning to partners. After a
rigorous review, NCR selected THINQ to build and power the portals, which
offer customers and partners Web-based, self-paced training, course tracking,
employee-learning reporting, live virtual classes, hosted educational chats, a
reference library, message boards, and instructor-led courseware registration.
“Em ployee training is im portant, but it just scratches the surface of
e-learning’s potential,” said Janet Perdzock, program manager, Global
Learning Operations of NCR. “These initiatives improve our customers’ and
partners’ businesses, enrich our relationships with those audiences, and generate
406 ■ i ■ * PART IV K M System Tools and Portals
significant new revenue for us. THINQ provides a bridge to our courses, con-
tent, and other back-end systems and is a key ingredient in our success.”
NCR chose THINQ over other e-learning vendors because of T H IN Q ’s
long experience in the learning industry, its integrated product, reputation,
flexibility, affordability, and ability to interoperate with NCR’s existing infra-
structure. TH IN Q ’s satisfied customers also tipped N CR’s decision.
The NCRU portal for partners went live in July 2001 and offers 3,600
courses, including 859 NCR proprietary Web-based training courses, NETg
inform ation technology courses, NETg desktop computing courses, and
multilanguage courses. The portal offers CDs, books, tapes, and classroom
courses —all filtered based on each com pany’s profile. Since the launch,
NCRU has signed up 766 users at 49 companies who have completed 375
courses. They can create individual learning plans, register online, and view
their entire training histories. Counting users who registered for a previous
“interim ” site prior to July 2001, the NCRU portal for customers and part-
ners has 1,528 authorized users.
N C R ’s Teradata Education Network (TEN) learning environment went
live March 30, 2001, to its membership-based learning community. Teradata
Education Network is exceeding all projections with more than 1,300 mem-
bers, more than 1,000 user sessions every week, and more than 660 course
completions in the first 6 months. One-third of all Tbradata companies have
an associate who is a member of TEN, and TEN is on track to meet its reve-
nue goal for 2001. A 13-month membership to the site comes in many shapes
and sizes, depending on the custom er’s need. An individual membership can
cost as little as $895, and a corporate membership can cost as little as $6,795.
Not only do members receive access to the learning community, but they also
are provided with access to over 50 Teradata courses. Members get into mes-
sage boards, access white papers, take virtual classroom courses, and review
recorded virtual classroom presentations.
Unlike most online training programs, Teradata Education Network
allows students from around the globe to communicate with other students
and make direct contact with instructors. One of the most powerful aspects
of the network is the access to knowledgeable Teradata professionals world-
wide, giving students a chance to stay current in an ever-changing market.
In the future, NCR plans more curriculum-mapping/skill-building capa-
bilities and additional, customized portals for specific customers or partners.
It also plans thorough profiling of individual users and corporations to better
meet their e-learning needs.
“Customers were asking for an alternate way to train without leaving the
office that would supplement their classroom learning,” said Adam Zaller,
program manager of e-learning for Teradata Customer Education. “Our cus-
tomers say the Teradata Education Network learning community is like hav-
ing ‘Partners,’ our annual user conference, 365 days a year. It’s a community
of customers helping each other, a revenue stream for the company, and a
great way to help our technology solve critical business problems in the real
world. Our customers and our prospects are now a lot more aware of educa-
tion and what we have to offer. We anticipate usage to continue to grow, reve-
nue to expand, and the program to eventually cover the globe.”
a. Discuss the advantages of Teradata as a learning option. What advantages
does it have over conventional learning in terms of content delivery, con-
venience, and growth opportunities?
b. Discuss the possible disadvantage of having a purely electronic learning
solution. How can the human element be incorporated?
CHAPTER 13 Knowledge M anagement Tools and Knowledge Portals i i i ■ 407
c. Suggest ways for NCR to incorporate curriculum-mapping/skill-building
capabilities and customized portals for specific customers or partners, as
mentioned in the case.
d. Suggest ways in which Teradata can be used to train some of its divisions
and departments. Can Teradata also be used to train line, middle, and
upper management? If so, how can they go about this, and what content
can they use?
SOURCE: THINQ 2002
9. With the help of a corporate portal, the U.S. Postal Service (USPS) delivers
quality KM.
A t many organizations, corporate portals are seen as a convenient way
to centralize proprietary inform ation and m ake it easily accessible to
employees. As such, portals can serve as an ideal knowledge management
tool where employees can tap into a wealth of corporate know-how.
Unfortunately, many portals fall short. Instead of serving as sleek KM vehi-
cles, all too often portals resem ble black holes where inform ation gets
dumped, never again to see the light of day.
For those striving to dust off their dormant corporate portals and trans-
form them into a KM tools, John Gregory has a few sound words of advice.
Gregory, a m arket research analyst for the U.S. Postal Service in Arlington,
Virginia, is in charge of MarketTracks, a knowledge retrieval and competitive
intelligence portal used by 1,000 sales and marketing employees.
Since 1994, the postal service has offered employees centralized sales and
marketing information, first in the form of a client/server system and then,
beginning in 1997, on the Web. Over the years, the organization has honed a
practical strategy for creating useful, relevant online resources that actually work
as advertised—they help employees do their jobs rather than hinder them.
As Gregory sees it, there are a few mysteries to solve when it comes to
figuring out how to create and sustain a useful portal. When considering con-
tent, Gregory assembled focus groups of users and asked them what they
wanted to get out of a portal. In most organizations where 1,000 employees
are the target audience, not everyone needs or wants to see the same infor-
mation. As a result, personalization of content became an im portant criteria.
Once he examined the content issues, Gregory turned his attention to ven-
dors and specific technologies. Vendor selection, Gregory says, is an area hav-
ing many pitfalls, but it is one that often gets short shrift. As a result of lack-
adaisical vetting processes, many companies are saddled with software that
does not fit their needs or vendors that do not work well with them. The end
result is money down the drain. “It can be enormously expensive to roll out a
full-featured portal,” Gregory says. “But it doesn’t have to be that expensive.”
For example, Gregory ruled out Plum tree’s portal software because the
postal service did not need its entire suite and balked at the prospect of pay-
ing for add-ons as they were introduced. Instead, the postal service served as
a beta tester for Epicentric, trying out the company’s enterprise portal soft-
ware among a small group of employees.
“T here’s a lot to be said for being an early adopter,” Gregory says,
adding that the chance of having a good relationship with a vendor is greatly
enhanced by doing so.
Even with careful vendor choices, Gregory says the odds are against
most portals. “A major flaw is design,” he says.
Gregory says that good design means first figuring out what people are
going to do with a portal by focusing on function rather than content.
Essential to function is navigation that is well planned and efficient.
408 ■ ■ ■ ■ PART IV K M System Tools and Portals
“Navigation isn’t just a box marked ‘search,’” he says. “There’s got to be the
taxonomy, links, site map, and a help feature as well.”
The navigation should never become static, however. As organic entities,
portals need to change and adapt as the organization does, a lesson that the
USPS is putting to good use.
“People think of a portal as a database and end up putting up everything
that they’ve got instead of what users need,” Gregory says. “A portal really is
an organic corpus of knowledge.”
S O U R C E : Santosus 2002.
a. Suggest ways in which content can be managed so that it can be person-
ally available to an employee.
b. Discuss the advantages and disadvantages of being an “early adopter”
and how it may impact organizations such as USPS.
c. Discuss the advantages and disadvantages of designing a portal on the
basis of functionality instead of content.
d. What does the author mean by “navigation should never become static”?
Re f e r e n c e s 1 1 1 1
Bolds, Robert. “Enterprise Information Portals: Portals in Honeycutt, Jerry. “Knowledge Management Strategies,”
Puberty,” white paper, K M W orld, vol. 2, July/August Redmond WA: Microsoft, 2000, p. 167,176.
2001, www.kmworld.com/publications/whitepapers/ IBM. “Portals: An Overview,” www-l.ibm.com/services/
portals/bolds.htm, D ate accessed August 2002. kcm/cm_portal.html, Date accessed August 2002.
Bryan, Martin. “A n Introduction to the Extensible IBM. “Portals, Knowledge, and Content M anagement,”
Markup Language (XM L) ” SGML Centre, 1997, www-l.ibm.com/services/kcm/know_mngt_con.html,
www.personal.u-net.com/~sgml/xmlintro.htm, Date D ate accessed D ecem ber 2002.
accessed D ecem ber 2002. IDC, “Knowledge Management Survey,” 1999.
Conover, Joan. “Using Portal Technology to Fuse Mack, R., Ravin, Y., and Byrd, R. J., “Knowledge Portals and
Corporate Information Knowledge Management, the Emerging Digital Knowledge Workflow,” IBM
Information Management, Data Warehousing,” New Systems, vol. 40, no. 4,2001, research web. watson. ibm.com/
Technology Digital Library, www.c3i.osd.mil/km/ journal/sj/404/mack.pdf, Date accessed August 2002.
proceedings/53.ppt, D ate accessed August 2002. Meta Group, “Business Collaboration,” www.metagroup.
Davydov, Mark M. “The Second Wave of E IP ” Intelligent com/cgi-bin/inetcgi/commerce/productDetails.
Enterprise, vol. 3, no. 4, March 1,2000. jsp?oid_29277, Date accessed August 2002.
Denning, Stephen. “What Is Knowledge M anagement?” Santosus, Megan. “In the Know,” CIO.com, February 19,
World Bank Knowledge Management Board, 1998, 2002. www.cio.com/knowledge/edit/K021902_portal.html.
www,apqc.org/free/whitepapers/index.htm, Date Date accessed December 2002.
accessed August 2002. Sestina, A., Graham H., Weaver Smith, B., and Sorg, S. “Tech-
E-G ov Knowledge Management Conference. “Using nology for Knowledge Management,” www.bellanet.org/
Army Knowledge Online for Mission Success,” km/report/KMFinall4.doc?ois=y;template=lists_word.
April 11,2000, www.army.mil/ako/webbriefing.ppt, htm, Date accessed August 2002.
D ate accessed August 2002. Shein, E., “The Knowledge Crunch,” CIO, May 1,2001,
Enterprise Knowledge Portal, www.askmecorp.com, Date www.cio.com/archive/050101/crunch.html, Date
accessed August 2002. accessed August 2002.
“Enterprise Knowledge Portals to Becom e the Shared Shilakes, C. C., and Tylman, J. “Enterprise Information
Desktop of the Future,” www.itweb.co.za/office/bmi/ Portals. In: In-depth Report,” Merrill Lynch, 1998,
9903300919.htm, D ate accessed August 2002. www.sagemaker.com/company/downloads/eip_indepth.
Finkelstein, C. “Building Enterprise Portal Using XM L,” pdf, D ate accessed 2002.
The D ata Warehouse Institute Conference, 2001. T H IN Q ,“Case Study: NCR,” www.thinq.com/pages/
Firestone, J. “Enterprise Knowledge Portals,” White Paper 8, cus_case_ncr.htm, 2002, D ate accessed December
www.dkms.com, D ate accessed August 2002. 2002 .
Hansen, Morten, Nohria, Nitin, and Tierney, Thomas. www.brint.com, D ate accessed August 2002.
“What’s Your Strategy for Managing K nowledge?” Yahoo! Hom e Page, www.yahoo.com, Date accessed
Harvard Business R eview , March-April 1999, p. 106. September 5,2002.
PARTV: E T H I C A L , L E G A L ,
A N D M A N A G E R I A L I SSUES
Who Owns
Knowledge?
Ethical and
Legal Issues
Contents
In a Nutshell
Knowledge Owners
Knowledge for Sale
Releasing Knowledge Gained on the Job
Becoming an Expert via a Corporate Knowledge-Based System
Legal Issues
The Liability Question
The Basis of Liability
Copyrights, Trademarks, and Trade Names
Warranties
Strict Liability
Legal Disputes in Knowledge Management
Web Linking and Domain Name Disputes
The Malpractice Factor
The Ethics Factor
What Is Ethics?
Ethical Decision Cycle
Major Threats to Ethics
Improving the Climate
Where to Start?
Code of Ethics
The Privacy Factor
Implications for Knowledge Management
Summary
409
410 7777 PART V Ethical, Legal, and Managerial Issues
Terms to Know
Test Your Understanding
Knowledge Exercises
References
■■»■ In a Nutshell
Julie, a knowledge developer of a bank, was asked by her company’s marketing depart-
ment for access to the customer mortgage information base. They wanted to use this
information, which included household income, debt history, and other personal items, in
a marketing knowledge base to help target appropriate customers for new bank services.
Although several mortgage managers complained that such information was not
supposed to be used for marketing purposes, Julie delivered the information anyway.
She justified her actions by saying that it was not her job to rule on the uses of infor-
mation, but to expedite their exchanges.
The corporation was soon contacted by a local newspaper reporter, who had heard
of the marketing campaign. He wanted some details about the marketing plan for a
story on privacy and confidentiality. The result was a potentially embarrassing public
relations disaster that had to be quickly and deftly handled by the CEO. After the inci-
dent, the CEO reprimanded Julie for not taking responsibility to ensure proper infor-
mation flow. He made it clear that it was her duty to bring such'issues to the attention
of senior executives.
In this real incident, a custodian of a company’s knowledge base was confronted
with an ethical and potentially legal dilemma: how to manage sensitive information,
how to be the corporation’s knowledge conscience, and how to handle tough corporate
questions regarding the consequences of knowledge-based applications.
By adopting a proactive approach grounded in sound ethical and legal reasoning,
knowledge developers can extend their leadership from the technological arena into
the domain of knowledge ethics. Knowledge managers who assume the moral steward-
ship of knowledge initiatives can provide long-term benefits to both their departments
and their companies.
Unethical acts raise legal and litigation issues as well. Cases involving knowledge-
based systems will depend on who owns knowledge, who is held liable, and on what
basis liability is determined. The laws also vary depending on whether a knowledge
system is considered a product or a service. Warranties and the laws enforcing such
assurances protect employees and users in various ways.
The material covered thus far has examined the principles, procedures, tools, and
methodologies of knowledge management. Each chapter discussed the managerial
implications of this evolving concept and how it might serve productivity of the firm.
However, other questions arise at each stage of development: Who owns knowledge?
What are the ethical issues involved in building and managing knowledge-based sys-
tems? How does an organization address knowledge as a property right related to
employee knowledge or expertise? W hat are the legal im plications of knowledge
management?
CHAPTER 14 Who Owns Knowledge? Ethical and Legal Issues a ■■■ 411
■ Knowledge Owners
In an oral culture where literacy does not exist, knowledge is not owned by anyone: It
is performed. For example, the skills involved in boat building are passed from one
craftsman to another through apprenticeship and tribal arrangements. In contrast, in
literate societies the invention of writing separated text from performance and knowl-
edge from the knower. A manuscript, for example, can be stored and retrieved. By sepa-
rating knowledge from the knower, knowledge can be owned by separate individuals.
The printing press later severed the connection between the author and the transmis-
sion of knowledge.
Following this separation, copyright laws were created in the eighteenth century as
a way of preserving intellectual property. The author began to get paid for his or her
ideas and was given the right to protect the work’s integrity by owning the right to
modify, correct, or retract the content. Knowledge is not what you see, but what you
say. Your knowledge is the result of your grasp of information from observing in the
field. Your knowledge is your own, because you arrive at it by yourself and draw your
own conclusions, (see Box 14.1) If you think that you can gain knowledge by simply
rem em bering what an expert says, then ask yourself if you could learn Russian by
memorizing a Russian dictionary.
In a corporate environm ent, the three possible owners of knowledge are the
expert, the employing organization, and the user who acquires the knowledge autom a-
tion system. O ther situations in which knowledge ownership could be an issue in the
future include the following:
1. If an expert sells personal knowledge
2. If an expert is unwilling to release knowledge gained on the job
i a fl I a a box 14.1 a a a a a a
SOURCE: Excerpted from Sedgwick, James. The Certainty Site, Oxford Press, 2001, p. 5, homel.gte.net/cpqlszzy/
whoownsknowledge.htm, Date accessed August 2002.
a a a a a a
Amble developed the knowledge by using the resources made available by the
firm, but he also developed personal reasoning and deductive abilities at the same
time. Unless he had signed a preemployment contract or intellectual property agree-
ment releasing his ownership of knowledge, he is the owner of knowledge. From the
expert’s point of view, a preemployment contract or intellectual property agreement
helps to limit personal liability for the knowledge automation system. GM would also
want an intellectual property agreement so that it could have title to the savings real-
ized by the knowledge automation system.
CHAPTER 14 Who Owns Knowledge? Ethical and Legal Issues a i a ■ 413
1 1 i 1 1 1 BOX 14.2
SOURCE: Rapport, Marc. “The Price of Knowledge,” Knowledge Management, August 2001, p. 14.
a a fl fl i a
own. They were virtually identical to the system’s decisions. Does the company have a
right to DeM ong’s knowledge? Can the company prevent him from using this knowl-
edge if he leaves the company to start his own business or work for a competitor?
Again, unless DeMong signed some type of intellectual property agreement that
would release ownership of his knowledge, he owns the knowledge and has a right to use
it as he wishes. Intellectual property agreements are also important to the expert in order
to avoid strict liability. This brings up legal issues that are covered in the next section.
WARRANTIES
The UCC is the foundation of commercial contract law in all states, except Louisiana.
As such, it defines the concepts of product law and contains provisions for computer
contracts in the form of warranties. A warranty is an assurance made by the seller
about the goods sold. An additional safeguard to the UCC is the federal Magnuson-
M oss Consumer Product Warranty Act, enacted in 1975. It clarifies the issues relating
to warranty inform ation disclosure requirem ents and regulates the lim itation of
i MONEY
( Career
Personal Finance
Small Business
FPt.Ptjmmles,
Online B u iin a n
) RECREATION
3rd Edition
Outdoors
Recreational Sports
Dummies Specialty Shop: Chack out more For Dummies products Team Sports
T_
including fitness videos, sewing patterns, conversation cards, and
other fun items. J Weekly Highlights
COPYRIGHT
All content included on this site, such as text, graphics, logos, button icons, images, audio clips, digital downloads, data
compilations, and software, is the property of Amazon com or its content suppliers and protected by United States and
international copyright laws. The compilation of all content on this site is the exclusive property of Amazon com and protected
by U.S. and international copyright laws. All software used on this site is the property of Amazon com or its software
suppliers and protected by United States and international copyright laws.
TRADEMARKS
implied warranties. Both the UCC and the warranty act identify the various types of
warranties that can exist and serve as references for further information on the subject.
Of the two types of warranties, an express warranty is offered orally or in writing
by the m aker of the product. It is usually part of a sale. The buyer purchases the goods
in part because of a statem ent by the seller with respect to the quality, capacity, or some
other characteristic of the package. An express warranty need not be an expressed
statement. It may be found in the seller’s conduct.
•^);"liS2!uSar8BS3SflMrffMSMTiv!ZBS5KMJLLiiiLlJjLjr^ili^^ ?
. An important message about mall delivery
An implied warranty arises automatically from the fact that a sale has been made
and that the good will do what it is supposed to do. For example, a knowledge base
should be fit for the ordinary purposes for which it is used. This implied warranty of
merchantability indicates that the Web site should do what it is expected to do. The
other aspect of implied warranty is one of fitness. A knowledge base should be fit for
the particular use intended by the buyer. Violation of this warranty is probably not
common among knowledge developers, although it may be more common among com-
panies that do customized programming.
Disclaimers and warranties are closely related. A disclaimer is the seller’s inten-
tion to protect the business from unw anted liability. Many software packages are
labeled “as is,” meaning they are sold without warranty of any kind regarding perfor-
mance or accuracy. More pronounced disclaimers go so far as to state that neither the
developer, retailer, or anyone affiliated with the developer is liable for damages even if
the developer has been forewarned of the possibility of such damages.
Even though disclaimers are clearly stated, their legal status is fuzzy at best. The
main issue centers on whether the knowledge in question is a product or a service. In
either case, the courts are adverse toward excluding warranty disclaimers or attempts by
the knowledge developer to avoid their applications as unconscionable. Express war-
ranty disclaimers are effective, provided they are conspicuously placed and in writing.
A knowledge-base client can reasonably look toward warranties as protection if
damage is caused through the use of a product purchased through a company’s Web
site. However, showing reason why warranty exclusion should not be accepted is diffi-
cult. In fact, two states have enacted “shrinkwrap” laws, which hold that all warranties
made or disclaimed on the license found inside the shrinkwrapping are legal and final.
Cases involving warranties also require that the user show who is at fault and why,
which is a difficult task. The knowledge automation system in question must necessar-
ily be considered a product under UCC rules for warranty issues to be relevant.
STRICT LIABILITY
Tort theory is based on several issues, namely that the producer of a product is in the
position to reduce risks and insure against injuries that could result. As with warranties, a
software package must be considered a product for the tort theory of strict liability to
apply. If this criterion is met, developers, manufacturers, and distributors could all be held
liable for injuries even though reasonable care standards have been satisfied. For exam-
ple, even though no errors are found in a Web site, the Web designer could still be held
liable under the tort theory of strict liability should damages or losses result from the use
of the Web site. Imposition of this theory protects the Web visitor regardless of whether
anyone is at fault, in a strict sense. The major legal issues are summarized in Table 14.2.
manage the top-level domains. Initially, domain names were assigned on a first-come,
first-serve basis. However, this caused companies or individuals to register for domain
names that they had no use for and hold them for future sale at exorbitant prices. Since
1995, the policy has changed. Domain names are still issued on a first-come, first-serve
basis, but applicants are reminded in writing that such issuance does not duplicate or
replace the legal right of another party such as a registered tradem ark to use the name.
The low-cost fee of $70 for 2 years of registration has caused several individuals to
register and hold known names hostage for big money. One poacher, for example, regi-
stered for 200 domain names, including his former employer’s. However, he kept losing
cases filed against him by firms defending their right to use their tradem ark name. The
general rule for resolving domain name disputes is to determ ine the date that the
claimant first used his tradem ark or the effective date of his validated tradem ark regis-
tration. If the registered holder appears to have infringed on the registered trademark
Owner, then NSI assigns the registered holder a new domain name. The court is the
only other avenue to seek relief (see Box 14.3).
Here are some ideas regarding domain names and trademarks:
• Find out whether the proposed domain name infringes upon any trademarks. The
fact that one registers for a domain name does not in itself give the owner the
legal right to use it.
• Secure federal trademark registration of the proposed domain name. Once it
clears against possible claims of infringement, then it should be registered as a
trademark with the U.S. Patent and Trademark Office.
• Register the proposed domain name with InterNIC (Internet Network Information
Center)—the agency that represents the U.S. government in assigning domain names.
* i i * 1 1 BOX 14.3
SOURCE: Adapted from Plitch, Phyllis. “Court Order Lets Bell Atlantic Wrest Dom ain Nam es from Cybersquatter,” D ow
Jones & Company, February 2,2000.
fl fl fl fl fl fl
CHAPTER 14 Who Owns Knowledge? Ethical and Legal Issues mmmm 423
• In the event of a poached domain name, bring a lawsuit to force InterNIC to reas-
sign the name.
• Get permission before linking to other Web sites. There are issues of liability in
linking to other Web sites without such permission.
« ■ 9 I a a BOX 14.4
SOURCE: Awad, E. M. Building Expert Systems. Minneapolis, MN: West Publishing Co., 1996, p. 346.
424 7777 PART V Ethical, Legal, and Managerial Issues
WHAT IS ETHICS?
The word ethics is not easy to define. It means different things to different people. To
begin to discuss the concept, a common definition is needed. Ethics is one or all of the
following: fairness, justice, equity, honesty, trustworthiness, and equality.
Stealing, cheating, lying, or backing out on one’s word are all descriptive of a lack
of ethics. Something is ethical when a person feels it is innately right, which is a subjec-
tive judgment. For example, “Thou shalt not steal” is a belief held by most people; how-
ever, a single parent who steals a loaf of bread to feed starving children may be for-
given for the behavior even though it is illegal.
An unethical act is not the same as an immoral or an illegal act, although one may
lead to the other (see Box 14.6). For example:
1. Cheating on o n e’s federal income tax return is more illegal than immoral,
although it is implicitly unethical.
2. Cheating on a friend is more immoral than illegal, although it is tacitly unethical.
CHAPTER 14 Who Owns Knowledge? Ethical and Legal Issues a ■a a 425
BOX 14.5
SOURCE: Excerpted from Simpson, Glenn. “A New Twist in Tax Avoidance: Firms Send Best Ideas Abroad,” The Wall Street
Journal, June 13,2002, p. AlOff.
426 «■«« PART V Ethical Legal, and Managerial Issues
I 1 I i ■ 1 BOX 14.6 1 1 1 1 1 1
Incidents like these are related to one’s value system, beliefs, and culture. Laws are
often created to combat unethical acts that threaten societal image and survival. They
are also used to reinforce existing ethics. Ethics creates a strong sense of professional-
ism. Ethical misbehavior among knowledge developers is no greater or less than it is
among the mass public (see Box 14.7).
A model of acceptable behavior, with ethics as a factor, is shown in Figure 14.4. If
a person falsely reports a donation to a charitable organization, it is considered both
illegal and immoral (quadrant A). This action implies a lack of ethical standards and
personal values. In quadrant D, rescuing hostages from a foreign country might be ille-
gal (and dangerous) by that country’s laws but be moral (and implicitly ethical) in
terms of justice under U.S. laws. Deciding what is moral, legal, or ethical creates a con-
stant struggle.
CHAPTER 14 Who Owns Knowledge? Ethical and Legal Issues aaaa 427
■ I ■ ■ ■ I BOX 14.7
a fl fl a fl a
Legal
Example: Example:
Restricting Immigration Donating to Charity
B C
A D
Example: Example:
• Robbing a Bank Rescuing Hostages from a
• Falsely Reporting Foreign Country
Charitable Donation
Illegal
allegedly using his position and company affiliation to promote his side business and
pressure company suppliers into buying products from him —all of which were carried
out using e-mail and fax. Because no one knows more about information technology
and has better access to the company’s knowledge base than the head of the IT depart-
ment, should the head of the IT«department be the one to establish and enforce ethical
standards for the company as a whole?
BOX 14.8 9 9 9 9 9 9
SOURCE: Excerpted from Schultz, Ellen, and Francis, Theo. “Worker Dies, Firm Profits—W hy?” The Wall Street Journal,
April 19,2002, p. A l.
430 7777 PART V Ethical, Legal, and Managerial Issues
WHERE TO START?
Once the meaning of ethics has been agreed upon, the next step is to decide who is
going to lead the “ethics movement.” With knowledge workers, learning organizations
have used two approaches: bottom-up and top-down. The b o tto m -u p approach incul-
cates ethical behavior at the employee level with full support of top management. As
employees follow ethical practices, the entire organization benefits. The impact creates
waves of appreciation up the chain of command and benefits the entire firm over the
long run.
The to p -d o w n approach suggests that actions of the company start with the CEO.
By virtue of personal acts, decisions, and overall behavior, the top corporate officer sets
the tone for the kind of image the corporation will adopt. Corporate obligations extend
to a variety of stakeholders (such as customers, employees, and vendors), and these
obligations are generally recognized as being central to the ethical standards of the
firm. Carrying out these obligations requires a com prehensive ethics code that is
understood and supported in every sector and at each level of the organization.
Take the case of Boeing A ircraft’s chief executive William Allen. In September
1945, he resigned from his law firm to lead Boeing Aircraft to focus on postwar prod-
ucts after World War II. Allen had served as a company attorney for 20 years and direc-
tor for 14 years. He is remembered as a man of great sincerity, honesty, and integrity. It
was a great environment for knowledge sharing. When he accepted the offer of presi-
dent, he offered the following resolution as a reflection of his personal values:
• Do not be afraid to admit that you don’t know.
• Be definite —tell it like it is.
• Try to promote honest feelings toward the company around Seattle.
• D on’t talk too much . . . let others talk.
• Be considerate of your associates’ views.
• Above all, be human —keep your sense of humor and learn to relax.
Like Allen, the firm acquired a reputation as a highly ethical firm whose employ-
ees developed a strong sense of values and integrity in the way they approached their
CHAPTER 14 Who Owns Knowledge? Ethical and Legal Issues aaa1 431
work and shared their ideas and knowledge. His term in office is rem em bered as a
period of “uncompromising high standards and clean ethics.” Employees always knew
where they stood. It shows that an ethics program should be “rolled out” from the top
down the line, which contributes to making each manager an effective ethics leader.
CODE OF ETHICS
Business ethics are closely tied to corporate culture and values, which means that a
code of ethics should represent the entire company. The code should be all encompass-
ing and stable over time. It does not make sense, for example, to change the code for
every new situation that arises.
Once a code of ethics has been posted and approved by management and employ-
ees, it becomes a commitment to behave within its guidelines on a day-to-day basis. An
honest workplace where m anagers and employees are held accountable for their
behavior and trust one another is the best environment in which to promote ethical
corporate behavior. To keep the ethical climate healthy, an organization must stress
regular self-assessment and encourage open debate within the workplace. Such a step
can be a sure winner in knowledge exchange and knowledge sharing.
Self-assessment is a question-and-answer procedure that allows individuals to
appraise and understand their personal knowledge about a particular topic. In the
case of ethics, it is not an exercise to satisfy others. The goal is to think about ethics
and adjust one’s behavior accordingly. It should be an educational experience for the
participant.
One self-assessment procedure asks a participant to assess a scenario and judge
whether an ethics issue is involved. The response is recorded on a special form and later
compared to the judgment of a panel of experts. The following story is an example.
St. John’s Corporation manufactures computerized voting machines and has won
several contracts from southern states to install them well before the next presidential
election. Alpha Corporation programs the machines for St. John’s and carries out the
installation on the sites. An Alpha engineer, Smith, is visiting St. John’s plant one day
and learns that problems in the construction of the voting machine could result in mis-
counts as high as one in 10 under heavy volume. Smith reports this finding to her
supervisor, who informs her that it is St. John’s problem, not A lpha’s. Smith does noth-
ing further.
Question: Is an ethics issue involved?
Opinion: Participants nearly unanimously agreed that doing nothing further
would be unethical. Use of inaccurate voting machines could
invalidate elections and potentially harm the general public trust.
Responsible (ethical) behavior and good business practice are not
inconsistent. The engineer should pursue the m atter further.
The thought of being monitored is unsettling. Hidden video cameras, phone taps,
and e-mail analysis are all examples of technologies that are considered to be unethical
(and sometimes illegal), because they allow information to be captured about individ-
uals without their knowledge.
The FTC (Federal Trade Commission) has identified five principles of privacy pro-
tection, which are widely recognized in the United States, Canada, and Europe:
1. Notice. Employees have the right to be told in advance about any personal infor-
mation being gathered.
2. Choice. Employees should have the final say regarding the use of personal infor-
mation, other than the processing of such information.
3. Access. Employees should be able to access and correct any personal information
captured in company files or databases.
4. Security/integrity i Employees’ personal information should be processed, stored,
and transmitted in a secure way so as to assure integrity at all times.
5. Enforcement. The courts should back employees if any of these principles are violated.
There are three categories of concern regarding information and knowledge pri-
vacy. The first involves the electronic knowledge that businesses store about con-
sumers, vendors, and employees. Who owns such knowledge? The second is the security
of electronic knowledge transmission. Encryption has been promoted as a secure way
to transmit information or knowledge over the Internet. The third concern is the un-
authorized reading of personal files. Public key infrastructure (PKI) and other tech-
nologies are used to control unauthorized access.
Sum m ary * 1 * •
• Ethics may include any of the following: fairness, justice, equity, honesty, trustwor-
thiness, and equality. Something is ethical when a person feels it is innately right,
which is a subjective judgment. An unethical act need not be immoral or illegal,
although one act may imply another.
• Several issues represent major threats to ethics. These include faster computers,
sophisticated networks, ease of access to information, and transparency of soft-
ware. Software copyright infringement, unauthorized e-mail access, and sale of
competitive information are also serious ethical issues. To improve the corporate
ethics climate, top management should act as the role model, establishing a realis-
tic code of ethics and a strong training program.
• A code of ethics is a declaration of principles and beliefs that govern how
employees of a corporation must behave. The code should be all encompassing
and stable over time. Once posted, it becomes a commitment for the organization
as a whole. Self-assessment allows periodic adjustments in the code.
• In an age of litigious proliferation, users and developers should be cognizant of
legal issues arising from knowledge ownership and knowledge-based system use
or misuse. The key issue is determining who owns the knowledge. Depending on
interpretation and the laws, it could be the user, the expert, the organization, or
the knowledge developer. With no prior agreements, the expert is the rightful
owner of knowledge and can be the target for litigation resulting from a faulty
knowledge-based system. A preemployment contract releasing ownership to the
firm would help limit the liability of the expert.
• The issue of whether a knowledge-based system is a product or a service depends
on interpretation. If the software is custom-designed, then it is a service and the
contract laws of the state in question would apply. If it is off-the-shelf software, it
is a product, which means proving negligence is unnecessary to holding the devel-
oper liable.
• The Uniform Commercial Code (UCC) offers provisions for computer contracts
in the form of warranties. Warranties may be implied or expressed. Implied war-
ranties expect the product to do what it is intended to do, which is covered under
implied warranty of merchantability or fitness. Express warranties are presented
orally or in writing by the seller.
• Knowledge developers are open to malpractice—negligence due to design defects
and resulting damages. A t present, neither standardization nor certification recog-
nizes knowledge developers as professionals. In this respect, they are not yet
liable for malpractice. Sooner or later, knowledge developers should be licensed
to build knowledge-based systems.
434 7777 PART V Ethical, Legal, and Managerial Issues
Te r m s to Kn o w 1111
Code of ethics: A declaration of principles and beliefs narily regulate human affairs, would do; lack of reason-
that governs how em ployees of a corporation are to able conduct and care.
behave. Product liability: A tort that makes a manufacturer liable
Copyright: Ownership of an original work created by an if its product has a defective condition that makes it
author; a form of intellectual property protection that unreasonably dangerous to the user or consumer.
covers the “look and feel” and content of printed media Self-assessment: A question-and-answer procedure that
like articles, textbooks, and software packages. allows individuals to appraise and understand their per-
Copyright law: A law that gives the author or creator of a sonal knowledge about a particular topic.
tangible product the right to exclude others from using Stakeholder: Customer, employee, vendor, or distributor
the finished work. who has a vested interest in a company, a product, or a
Disclaimer: Renunciation of a claim or power vested in a system.
person or product. Strict liability: A seller is liable for any defective or haz-
Ethics: Justice, equity, honesty, trustworthiness, equality, ardous products that unduly threaten a user’s safety.
and fairness; a subjective feeling of being innately right. Tort: Wrongful act, subject to civil action; a legal wrong
Express warranty: Warranty offered orally or in writing committed upon a person or a property independent of
by the maker of the system or product. a contract; a wrongful injury to a person, a person’s rep-
Eraud: An intent to deceive; for example, knowing in advance utation, or a person’s property.
of a material fact about a product that is covered up in a sale. Trademark: Registration of a company’s trade name so
Implied warranty: Presumed warranty; certain implied that others cannot use it; a word or a symbol that distin-
facts that represent the product. guishes a good from other goods in the market.
Malpractice: N egligence or professional liability of a cer- Uniform Commercial Code (UCC): A law drafted by the
tified professional related to design defects in systems National Conference of Commissioners on Uniform
tailored specifically for professional use. State Laws that governs commercial transactions.
Misrepresentation: A tort area that tags to fraud. Warranty: A promise made by the seller that assures cer-
Negligence: Omission to do something, which a reason- tain facts are truly representative of a product or ser-
able person, guided by those considerations that ordi- vice, subject to certain limitations.
Te s t Yo u r U n d e r s t a n d in g a ' ' a
1. In your own words, describe how ethics relates to knowledge.
2. Review material on the Internet, and write an essay detailing the latest views
of ethics in knowledge management.
3. In what respect is an ethical act different from an immoral or legal act? Give
examples of your own.
4. Distinguish between:
a. product liability and tort laws
b. out-of-bounds and nontrivial errors
c. code of ethics and self-assessment
d. implied and express warranties
5. Explain briefly the ethical decision cycle. In what respect is it viewed as a
cycle?
6. In your own words, discuss the major threats to ethics. Is one threat more
serious than others? Be specific.
7. How can a code of ethics be applied in an organization? What are some of
the barriers?
8. Suppose you were asked to set up a code of ethics for a learning organiza-
tion. How would you proceed? What steps would you take to do the job?
9. Visit a company in your community, and investigate whether it is a learning
organization. What ethical issues exist in the firm? Write a brief report on
your findings.
10. What is the purpose of self-assessment? How does it contribute to a corpo-
rate code of ethics?
CHAPTER 14 Who Owns Knowledge? Ethical and Legal Issues ■a ■a 435
11. Is a knowledge-based system a product or a service? Explain the pros and
cons of this issue and its implications for litigation.
12. Describe the circumstances under which knowledge developers might be
sued for malpractice in the future.
Kn o w l edge Ex e r c is e s 1 a 81
1. The chapter suggests three possible owners of knowledge. Who are they?
Do you agree?
2. In what ways will knowledge ownership be an issue in the future?
3. Who would be held liable for a defective knowledge-based system? Discuss
in detail.
4. How different do you think a learning organization views or upholds stan-
dards of ethics compared to other organizations?
5. Do you think litigation is the best route to protect knowledge ownership?
Form a group with your peers, and brainstorm the pros and cons.
6. The Internal Revenue Service acquires demographic data about tax-paying
citizens in an effort to elicit relationships to their tax returns. In your opinion,
is this effort an unethical act? Illegal act? Immoral act? Discuss.
7. Shoppers at a national retail chain are asked for their ZIP codes as part of
the checkout process. This information is used to determ ine the pattern of
business coming from various regions in the community. As a result, the store
decides on its products, prices, and specials to maximize sales volume.
Shoppers are not told why ZIP codes are solicited. Is the store’s action ethi-
cal? How does it compare to the use of cookies in Web shopping?
8. The board of directors of a commercial bank had an attorney whose job was
handling cases of bad loans and other legal m atters affecting the bank. The
attorney’s main line of business was real estate. Cases requiring specific
expertise were referred to attorneys in tow at the recom m endation of the
bank’s attorney.
One day, a case came up in which an employee sued the bank and one of
its vice presidents for sexual harassment. The bank’s attorney decided to han-
dle the case himself. A fter a lengthy trial, the court ruled in favor of the
employee. The jury awarded her $350,000 in damages.
W hen asked why he did not have another attorney try the case, the
bank’s attorney replied that he thought he was saving the bank money by try-
ing it himself, even though he had no prior experience with sexual harass-
ment cases. A t the outset, he did not think the case had much substance. The
bank, on the other hand, was not happy with the results and blam ed the
attorney for botching the case.
a. Could any aspect of the attorney’s decision to handle the case be consid-
ered unethical, immoral, or illegal?
b. Should the attorney be fired by the bank? Why or why not?
c. Visit a local law library or talk to a local attorney and determine whether
the bank attorney violated the American Bar Association’s code of ethics.
9. A knowledge-based repository was installed in the loan departm ent of a
local commercial bank to determ ine the qualifications of auto loan appli-
cants. The knowledge captured was based on the departm ent vice president’s
experience. The bank paid the knowledge developer (an outside consultant)
in full for the knowledge database.
Four months later, the developer learned through one of the bank
employees that the bank had modified the knowledge base to develop a real
estate loan knowledge-based system on its own. The junior loan officer took
the software home and spent time learning how to build a knowledge-based
436 77TT PART V Ethical, Legal, and Managerial Issues
system. He then worked with the senior vice president of the real estate
departm ent to build the new database. Several modules of the auto loan
database that check for the applicant’s assets, salary, place of employment,
and so on were copied into the new system. The approach to the system and
the procedure were identical.
The developer filed a lawsuit against the bank, seeking damages and the
right to ownership to the system. The bank, in turn, filed a countersuit, claim-
ing it purchased the knowledge package outright and, therefore, owed the
developer nothing.
a. What went wrong in this case?
b. Was an implied or express warranty part of the auto loan knowledge base?
c. Are any ethical, moral, or legal considerations at issue here?
d. Who do you think owns the knowledge in the real estate repository?
e. Based on the material presented in the chapter, how do you think the
court would rule?
f. Who owns the procedure used to build the knowledge base? Is it
proprietary?
Re f e r e n c e s 1 1 1 1
Amazon.com, “Conditions o f U se,” www.amazon.com/ Okerson, Ann. “Who Owns Digital Works?”
exec/obidos/tg/browse/-/508088/002-2707765-6824853, www.mhhe.com/socscience/english/holeton/chap8/
D ate accessed August 2002. okerson.mhtml, Date accessed August 2002.
Awad, E. Building Expert Systems. Minneapolis, MN: Platt, Nina. “Knowledge Management: Can It Exist in a
West Publishing Co., 1996, p. 346. Law O ffice?” www.llrx.com/features/km.html, Date
Brent, Doug. “History of Ownership,” www.ucalgary.ca/ accessed Decem ber 3,2002.
ejournal/archive/rachel/vln3/vln3.html, Date accessed Plitch, Phyllis. “Court Order Lets Bell Atlantic Wrest
August 2002. Domain Names from Cybersquatter,” D ow Jones &
Emery, Vince. H ow to G row Your Business on the Company, February 2,2000.
Internet, 3rd ed. N ew York: Coriolis Group Books, 1997, Powell, Adam. “MP3: Legal and Ethical Issues,”
pp. 121-140. hotwired.lycos.com/webmonkey/99/06/indexla.html.
Kull, Michael D. “G et a Competitive Edge with Rapport, Marc. “The Price of Knowledge,” Knowledge
Knowledge M anagement,” The Law Marketing Portal, M anagement, August 2001, p. 14.
www.lawmarketingcom/news/km.cfm, D ate accessed Schultz, Ellen, and Francis, Theo. “Worker Dies,
August 2002. Firm Profits —Why?” Wall Street Journal, A pril 19,2002,
Kurland, Norman. “Ownership: Knowledge as a Capital p. A l.
A sset,” cog.kent.edu/archives/ownership/ Sedgwick, James. The Certainty Site. Oxford Press,
msg02255.html, D ate accessed August 2002. 2001, p. 5, hom el.gte.net/cpqlszzy/whoownsknowledge.
Louis-Jacques, Lyonnette. “Legal Research on International htm, D ate accessed D ecem ber 2002.
Law Issues Using the Internet,” www.lib.uchicago.edu/ Simpson, Glenn. “A New Twist in Tax Avoidance: Firms
-llou/forintlaw.html, Date accessed August 2002. Send Best Ideas Abroad,” The Wall Street Journal,
Mason, Richard O. “Four Ethical Issues of the Information June 13,2002, p. AlOff.
Age,” www.misq.org/ archivist/vol/nol 0/issue 1/vol 10/ www.loc.gov/copyright, Date accessed D ecem ber 2,2002.
nol/mason.html, D ate accessed August 2002.
Managing
Knowledge
Workers
Contents
In a Nutshell
What Is a Knowledge Worker?
Personality and Professional Attributes
Business Roles in the Learning Organization
M anagement and Leadership
Work M anagement Tasks
Work Adjustment and the Knowledge Worker
Profile of Vocational Needs and Reinforcers of Knowledge Workers
Smart Leadership Requirements
Technology and the Knowledge Worker
Knowledge W orker’s Skills
Role of Ergonomics
Role of the CKO
Managerial Considerations
Becoming a Change Leader
Managing Knowledge Projects
The Soft Side Always Wins
Implications for Knowledge M anagement
Summary
Terms to Know
Test Your Understanding
Knowledge Exercises
References
437
438 7777 PART V Ethical, Legal, and Managerial Issues
■■■ ■ In a Nutshell
We are living in a continuously changing world fraught with uncertainty, market fluctu-
ations, and aggressive competition. Today’s emerging age of knowledge economy and
knowledge management has created a new breed of company employees, whose intel-
lectual capital is the accumulated experience, commitment, and potential for develop-
ing and maintaining the learning organization. Such a breed is referred to as the knowl-
edge worker. A knowledge worker puts people first. He or she leverages technology to
maximize efficiency and corporate success round the clock. According to one source,
knowledge workers already make up one-third of the U.S. workforce. It is the fastest
growing employment sector of wealthy countries.
The driver of success in the new knowledge economy is knowledge. It is impressive
that people can earn a living by working with something as intangible as knowledge. In
1959, m anagem ent expert Peter D rucker popularized the term know ledge worker ;
which was invented by Fritz Machlup, a Princeton economist. Although the term is
widely used, there is confusion about its m eaning—even among knowledge workers. In
this chapter, we define knowledge workers, their attributes, job qualifications, poten-
tial, and how they should be managed. This is the crux of knowledge management as an
emerging challenge for the learning organization.
a fl i fl i ■ bo x 15.1 a ■ fl a a fl
SOURCE: D ove, Rick. “The Knowledge Worker,” 1998, www.parshift.com/library.htm#0ther% 20publications, D ate accessed
Decem ber 3,2002.
------------------------------------a a a a a a ---------------------------------------------------------------------
who transforms business and personal experience into knowledge through capturing,
assessing, applying, sharing, and disseminating it within the organization to solve spe-
cific problem s or to create value. He or she is the “product” of experience, values,
processes, education, and the ability to be creative, innovative, and in tune with the cul-
ture of the corporation. For example, horse trailer salespeople do not sell trailers, but
they do sell horse transportation solutions. They have to know their customers’ busi-
ness, the shows they attend, distances to haul horses, frequency of use, and the horse
trailer line before they propose the right trailer to meet a custom er’s requirements. In
this respect, the salesperson becomes a knowledge worker. Managers, lawyers, doctors,
systems analysts, and accountants are all knowledge workers (see Figure 15.1).
To a learning organization, data and information are givens. We have seen suc-
cesses in data processing and information processing from the 1960s to the 1980s. The
focus then was on efficiency, where computers replaced human redundant arithmetic
(algorithmic) work. There were quantitative savings and everyone benefited. In the
1990s, information was collated, processed, and converted into relevant (nonalgorith-
mic) knowledge for the decision maker. A t this level, the focus shifted from quantita-
tive to qualitative performance-oriented value-added decision making. Captured and
processed knowledge became the fundam ental building block for today’s learning
organization, where everything operates creatively in real-time as problems arise.
Personalization in electronic commerce and just-in-time (JIT) inventory management
are examples of today’s learning organization. The applications are smart enough to
personalize the inform ation based on the user’s current location and needs (see
Figure 15.2).
increased value in meeting the requirements of the task. Both are important, but the
approach to productivity measures is bound to be different.
In managing knowledge workers, a m anager must consider several factors that
limit knowledge worker productivity and ways to get around them:
Achieving and m aintaining correspondence with the work environm ent are
viewed as basic motives of human work behavior. As shown in Figure 15.3, correspon-
dence begins when the individual brings certain skills (abilities) that enable him or her
to “respond” to the requirem ents of the job or the work environment. On the other
hand, the work environment provides certain rewards (reinforcers such as wages, pres-
tige, personal relationships, and so forth) in response to the individual’s requirements.
W hen both the individual’s and the work environm ent’s minimal requirem ents are
mutually fulfilled, correspondence exists.
When the individual achieves minimal correspondence, he or she is allowed to
stay on the job and have an opportunity to work toward a more optimal correspon-
dence and to stabilize the correspondence relationship. For example, an experienced
teller in a commercial bank who handles customer problems effectively day after day
is rewarded with a prom otion in pay and rank to senior teller and on to head teller
and beyond. It is presum ed that the teller is satisfied on the job and is also consid-
ered a satisfactory employee (satisfactoriness) by the bank. W hen this relationship
(correspondence) continues, it contributes to job tenure and stability of the bank as
an entity.
PART V Ethical Legal, and Managerial Issues
knowledge. For example, a stockroom clerk’s job may be highly structured; therefore, it
provides limited knowledge work. In contrast, a head teller job in a bank entails a sig-
nificant amount of knowledge work, including the following:
1. Assessing the amount of cash available in the teller’s drawer before the lunch break
2. Deciding on the procedure to use in handling irate customers
3. M onitoring cash supply for the drive-in tellers on Friday, when employees of a
local plant cash their paychecks
4. Scheduling lunch breaks of available tellers during the flu season
Most people have an innate ability for problem-solving. However, routine activi-
ties often make it difficult to concentrate on the creative phase of problem-solving.
This situation can be improved in an IT environment that provides the following:
1. A knowledge-based retrieval system that generates knowledge and ideas quickly
2. Interactive functions to derive feasible solutions
3. Functions to communicate a knowledge w orker’s activities to the appropriate
people at the appropriate time via technology such as e-mail or an intranet
IT plays a role in the learning organization in three key processes: knowledge capture,
information distribution, and information interpretation. In knowledge capture, a place
for IT is in market research and competitive intelligence systems. Scenario-planning
tools can be employed to generate the possible futures (Malhotra 1996). Likewise, the use
of e-mail, intranets, and bulletin boards can facilitate information distribution and inter-
pretation. The accumulated archives of such traffic can develop the basis for organiza-
tional memory.
It should be noted that the mere availability of technology does not assure a learn-
ing organization. Take the example of a multibillion-dollar bank, where the author
complained about a cash deposit that would not appear on the customer’s online bank-
ing screen until the following day, after the deposit had been processed. The bank’s
senior vice president of operations replied. “Well, everything, whether cash or checks,
must be held overnight and cannot be made available for the customer before the next
day.” When asked, because the deposit was in cash, how the customer could withdraw
some of this money during the day when the computer did not reflect a deposit. The
answer was, “We try to discourage customers from doing so. We don’t want any cus-
tomer who makes a deposit in the morning to withdraw money later in the same day.”
The contrast is a smaller bank in the same community, where a customer can view
any deposit, withdrawal, or other activity within seconds from anywhere —by the teller,
via ATM, or through the customer's personal computer using the bank’s online bank-
ing system. Obviously, true online banking favors the latter bank, based on the policy
of full customer service. In fact, the latter bank provides newer, quicker, and cheaper
services for its customers on a regular basis.
The ultimate goal of technology is to serve organizational memory and to create a
working environment that provides these conditions. There are various types of equip-
ment and software unique to a knowledge w orker's tasks. They include intelligent
workstations, e-mail, and local area networks. E-mail and local area networks have
been covered in C hapter 3. The intelligent workstation autom ates repetitive, tedi-
ous tasks, freeing the knowledge worker’s time for more creative work. Through the
keyboard or the mouse, the end user performs a host of functions, ranging from cus-
tom er tracking to creating illustrated reports and from calendaring to working with
knowledge-based systems. The single most used application for the executive work-
station, however, is the electronic spreadsheet.
CHAPTER 15 Managing Knowledge Workers i i aa 449
The capabilities of today’s intelligent workstation fall in line with linear thinking—
processes that are carried out step by step in a specific sequence. The learning organi-
zation depends on the knowledge worker to synthesize the information and develop
conclusions. In addition to the mundane tasks, an intelligent workstation should per-
form the following functions:
1. Administrative support functions. These functions include such tasks as maintain-
ing tickler files, scheduling meetings, and maintaining electronic telephone direc-
tories. With the position of private secretary on the wane, professionals are taking
on a number of support tasks.
2. Personal computing functions. These include spreadsheets and business graphics.
3. Intelligent databases. These databases allow knowledge workers to create and
maintain information on an ad hoc basis.Today’s intelligent databases easily han-
dle files, voice messages, and message-switching.
With knowledge worker time at a premium, learning organizations are offering flexi-
ble schedules through telecommuting. The case summarized in Box 15.2 illustrates the role
of technology and networking in today’s knowledge worker’s performance and lifestyle.
A knowledge worker is expected to possess professional experience and technical
know-how in order to access, update, and disseminate information and ideas from
databases and knowledge bases. The com puter should be owned by the knowledge
THE BEST PLACE TO WORK avoid losing them is one reason why this consult-
ing firm ranks among the top 25 employers for
John Lewis, junior partner at a nationwide con-
benefits and low turnover.
sulting firm, became the father of twins. He and
Among the unique benefits consulting firms
his wife already had a boy and a girl from previ-
offers knowledge workers like John Lewis are
ous marriages. The new additions meant more
extended leaves of absence so they can pursue
demands on both parents. In response, John’s
academic degrees or a lifelong dream. In fact, such
company told him to work from home when nec-
a firm gives its employees a chance to set their
essary. This m eant scheduling meetings with
performance goals, review them with their mana-
clients by phone and planning meetings with his
gers, and periodically perform self-assessment to
staff around slack times. John happens to run a
see how well they’re meeting their goals and to
$35 million developm ent project with a new
determ ine ways to correct deviations from the
client, and working from home turned out to be as
goal. The shared responsibilities, teamwork, and
effective as working from the office.
collegiality of the firm are well known among
Without telecommuting, via e-mail and tele-
competitors, vendors, and customers. In fact, it has
conferencing technology, John might have had to
been known to generate more business and ensure
leave his job downtown (a 20-mile drive each way)
security and stability of the workforce.
and look for another job with a company closer to
his home. Accommodating employees this way to
SOURCE: Excerpted from Zetlin, Minda. “Best Places to Work,” Computerworld , May 6,2002, p. 40ff.
l fl I fl a l
aaaa PARTV Ethical, Legal, and Managerial Issues
worker rather than by the company. Knowledge workers should keep their software
and be able to take their computer from one job to another. One would expect them to
customize and handle jobs within their range of experience.
Since the late 1990s, several software packages have become available; their intent
is to em ulate a knowledge w orker’s tasks. For example, KnowledgeW orker from
Datum Consulting is designed to store the experience and skills of company employ-
ees. Through an Internet browser, you can create a secure picture of the unique devel-
opments on jobs, projects, work flows, team communications, and the like. The inte-
grated com ponents include a knowledge library that manages documents that are
easily navigable via a Web browser; a business work flow to manage business
processes; a digital dashboard to promote collaboration and knowledge sharing; and a
search engine that allows users to surf a company’s corporate information as if they
were surfing the Web (Datum Consulting 2002).
Role of Ergonomics
With regular use of the computer day after day, end-user performance and comfort are
closely interrelated. No matter how sophisticated the electronic support, a knowledge
worker can achieve full productivity with proper design of the work environment.
CHAPTER 15 Managing Knowledge Workers 1 «« i 451
Ergonomics is a key issue here. Ergonomics involves comfort, fatigue, safety, under-
standing, ease of use, and any other areas that affect welfare, satisfaction, and perfor-
mance of knowledge workers working with user-machine systems.
The list of factors that affect the ergonomics of knowledge workers falls into three
categories:
1. E nvironm ental issues that include pro p er lighting, layout, and temperature.
Indirect lighting, covering windows near the workstation with blinds or curtains
to reduce the glare, and positioning terminals at right angles to windows —all
contribute to work productivity.
2. Hardware issues that focus on furniture, com fortable seating, and well-designed
workstations. An ergonomically acceptable chair should be adjustable and sup-
portive. Proper lum bar (lower back) support eases back strain over extended
hours of work (see Figure 15.4). The workstation itself might have a built-in
swivel to tilt to the angle of the user.
3. Knowledge w orker-system interface. This addresses software, user training, and
easy-to-follow documentation.
The knowledge worker-system interface emphasizes several features:
1. M inim um w orker effort and memory. This means that inform ation should be
entered only once and nonproductive work eliminated. Documentation should
also be available online in the form of a help routine. User manuals should be
clear, complete, and easy to follow.
2. Best use o f human patterns. Workstations should consistently place similar infor-
mation on screens in the same position, by familiar screen formats, and so on.The
knowledge w orker should use a consistent approach and term inology for all
functions. Performing these functions should require minimum training.
3. P rom pt p roblem notification. The knowledge worker should be alerted to
changes taking place that might adversely affect problem solution. For example,
if a file is approaching capacity (say, 90 percent), a message should be displayed
to indicate the status of the file.
4. M axim um task support. Task docum entation should be com plete and readily
available so that the knowledge worker is not required to use other resources for
task performance.
Demand for systems with good ergonomic designs continues to increase, pointing
to the growing im portance of the human factor. The benefits that ergonomics con-
tribute to productivity are not readily quantifiable, partly because it is not easy to m ea-
sure productivity.
• Teaching and selling. This includes educating the user on technology; selling and
promoting change through demos; seminars; and specialized behavioral training.
In the end, the CKO must make the user want to “buy” change.
• Communicating. The CKO must speak the language of the user, mediate, work
with management at all levels, and be politically sensitive.
• Understanding. This includes identifying problem areas and determining their
impact, grasping employee expectations, and being sensitive to the impact of the
KM system on people.
• Broad knowledge of business practice in general and the ability to translate tech-
nical information at the employee level
• Dynamic interface, making effective use of technical and nontechnical elements
in KM design, especially if the CKO is the chairperson of the KM team
• Knowledge of information technology, information systems, software, and tech-
nology in general; knowing how information works and how it is transformed
into knowledge
In real life, we expect greater emphasis on interpersonal skills during the early phase
of the KM development life cycle. Technical skills become important during knowledge
capture, knowledge storage, data mining, and knowledge organization. In addition
CHAPTER 15 Managing Knowledge Workers ■a a i 453
I 1 fl 1 1 I BOX 15.3 fl I I fl I fl
SOURCE: Excerpted from Date, Shruti. “A gencies Create CKO Posts to Get in the Know," Government Computer News ,
Novem ber 8 ,1 9 9 9 ,pp. 1-2, www.gcn.com /voll8_no36/news/950-l.htm l, Date accessed October 20.2002.
fl fl I fl I I
to these skills, academic preparation and a career in knowledge management are pre-
requisites for filling this emerging position in industry. For example, to help prepare people
for CKO work, the University of California-Berkeley’s School of Information Manage-
ment Systems offers graduate courses for knowledge managers. They include offerings in
social science, management theory, and information technology. A list of these and other
courses are available on UC Berkeley’s Web site at www.sims.berkeley.edu.
In terms of roles, the CKO performs multiple roles such as:
• Agent o f change. This requires having the style to sell the change from knowledge
hoarding to knowledge sharing. The style ranges from that of persuader to
imposer of change, depending on employees’ level in the organization and the
leverage of the CKO.
• Investigator. This includes identifying the real problem(s) in knowledge sharing
and mapping out procedures for alternative solutions.
• “Linking pin. ” This means performing the role of liaison between employees’
expectations and how a KM system must perform to meet those expectations.
• Listener. This includes reaching people, interpreting their thoughts, and drawing con-
clusions from interactions. Listening is the other side of effective communication.
454 7777 PART V Ethical, Legal, and Managerial Issues
• Politician. This means solving a problem by not creating another—an art in itself.
A successful CKO knows who to contact, what to say, and how to use his or her
knowledge to maximize the use of corporate knowledge for profitability and per-
formance. Diplomacy and finesse in dealing with employees and managers can
also improve the acceptance of a new KM system environment.
1 I I « 1 1 BOX 15.4 1 i i M 1 1
WHO IS THE CKO? says. He helped to identify the experts who had
worked on the B-2 and used video recordings to
Given the range of responsibilities involved, it is not
capture their knowledge. The team indexed the
surprising that the backgrounds of actual chief
interviews on the com pany’s Web sites to make
knowledge officers vary. David Owens, CKO of the
them available to others.
St. Paul Cos., an insurance company in St. Paul,
In 1999, Hallmark Cards, Inc., realized that its
Minnesota, is a former teacher. SAICs Greenes is a
customer research division had built vast reposito-
geophysicist who moved through management posi-
ries of data and information, but no one knew
tions into human resources. Dow Chemical Co/s
what to do with it all. The company appointed Tom
Jim Allen worked as a manager in research and
Brailsford manager of knowledge leadership in
development before becoming director of KM
charge of creating a KM infrastructure to tie the
under the CIO of the Midland, Michigan, company.
fragmented sources together and convince the cor-
The career routes that knowledge leaders
porate culture to embrace this knowledge. The
take to their positions show a similar diversity.
result was an intranet site called Voice o f the Market-
Scott Shaffer, project m anager for knowledge
place, which includes customer research data that is
management at Northrop Grumman Corp. in Los
accessible throughout the company.
Angeles, rose through the ranks of the company
No matter who the knowledge leaders report
and took on a knowledge leadership role that
to, CKOs agree that to succeed they must have
evolved over time. After 17 years with the defense
support at the top. Getting executive support can
contractor, Shaffer took a position as program
be difficult because it is not easy to demonstrate
manager on the B-2 stealth bom ber program in
the explicit financial benefits of knowledge manag-
1997. He became concerned about how the com-
ement. “My CEO has to make a leap of faith and
pany would maintain its knowledge about the B-2
say T believe this is right,’ even though I can’t
over the life of the aircraft, especially after the
prove it in dollars and cents,” says Sam Saint-Onge
engineers who had designed it left.
of Clarica Life Insurance Company.
“A t the time, we didn’t know about knowl-
edge management, but we discovered it,” Shaffer
SO U RC E: Excerpted from Flash, Cynthia. “Who Is the CKO?” Knowledge Management, May 2001, pp. 37^1.
CHAPTER 15 Managing Knowledge Workers aaaa 455
• The newest recruit in a customer service departm ent addressing customer com-
plaints as effectively as the most senior representative
• Any salesperson in the field counting on the collective knowledge of the experi-
enced staff anytime, anywhere
• Encourage every team member to create new knowledge in the interest of the
project. New knowledge creates wealth, which is the backbone of a learning
organization.
• Help knowledge workers do their jobs. A knowledge manager must help them
understand the company’s business environment and its strategic orientation, and
how they can apply them to the project at hand.
• Allow knowledge workers to participate in major company decisions, which can
pay off in intrinsic and extrinsic benefits for the company and employees alike.
This includes company image building, improved quality products, and stronger
identification with a successful employer.
• Encourage knowledge workers and employees in general to learn as they earn a
living on a day-to-day basis. This is made possible through on-the-job learning, job
rotation, training sessions, and self-training (see Box 15.6).
fl ■ 1 I fl fl BOX 15.5 I fl fl fl fl fl
DRAFTING KM TEAMS
KNOWLEDGE TEAM FORMATION Inc., in Fort Lauderdale, Florida, has derived six key
roles, which he calls “hats,” that one team member
By definition, it takes at least two people to share
or another must play. In principle, one person might
something. When that something is knowledge
wear more than one hat if the team is small.
applied to the goals of a larger enterprise, the shar-
ing multiplies and the number of people involved 1. Business leads specialize in understanding the
must increase. Therefore, most organizations make measurable results to be obtained.
establishing a project team an early priority in their 2. Organizational leads specialize in communication
knowledge management initiatives. plans, motivational incentives, and other organiza-
Choosing and recruiting the right people for tional needs.
the team is a vital task that will have enduring 3. Superusers can influence the user community and
consequences. Accomplishing corporate business provide practical feedback.
objectives requires a mix of skills, experience, and 4. Interface design leads specialize in
stakeholders interests, so the team members usu- computer/human interaction and integrating con-
ally will come from multiple disciplines. Team tent into work processes.
developers also must consider issues of trust 5. Training leads specialize in cognitive needs, learn-
across departm ents and business units as well as ing strategies, and repurposing legacy content.
between individuals. 6. Technical architects specialize in technology
When helping clients to implement knowledge installation and administration.
management projects, consultants at Chicago-based
Andersen suggest staffing teams with individuals After you have selected the right team mem-
from the business process in question and from the bers, you may have to negotiate their availability
human resources and information technology for the project. Several KM experts advocate full-
departments. A team needs members from all time devotion from members, at least in the early
three sectors. “You don’t find all these skills in one stages. A team member replacement plan must be
person, so you have to ensure that all are repre- worked out at an early stage so it is ready to acti-
sented,” says Christina Schultz, manager of global vate, if necessary. The team also must capture the
knowledge services at Andersen. knowledge that it generates in the process of work-
A team m em ber’s primary duty within the ing on the project, to guide future projects, and for
group is as important as his or her qualifications. transfer to managers who will later take on respon-
From his KM project experience, Fred Merrill, a sibility for the company’s KM efforts. This, after all,
consultant at Ariel Performance Centered Systems, is the purpose of knowledge management.
SOURCE: Excerpted from Robb, Drew. “Draft Your Dream Team,” Knowledge Management, August 2001, pp. 44—50.
knowledge-based system, but also on creating a way to reach out to and learn from one
another within the organization and with others in the know.
The bottom line is that an employee has to be convinced of the goodness of knowl-
edge sharing before the creative process becomes a reality. Woodrow Wilson once said,
“I use not only the brains I have, but all that I can borrow.” For the knowledge man-
ager, the crux of knowledge sharing is externalization or transforming captured tacit
knowledge to explicit knowledge for others to learn from and use anytime, anywhere.
458 7777 PART V Ethical, Legal, and Managerial Issues
■ ■ fl I fl 9 BOX 15.6 fl fl fl fl fl fl
IMPORTANCE OF SELF-TRAINING
SOURCE: Excerpted from Barth, Steve. “Worker, Teach Thyself,” Knowledge Management, August 2001, pp. 65-66.
I fl fl fl fl fl
It is also the question of culture apd trust that must be dom inant in the decision-
making environment and the factors that help build community in the organization.
In one medium-size bank, a strong community culture was discovered. Early one
week, one-third of the bank tellers submitted their resignations. They were all going to
a new bank across the street for higher salaries, bonuses, benefits, opportunities for
advancement, and the like. To survive the “gash” in the teller line, four of the remaining
tellers got together and devised an emergency schedule that handled the normal cus-
tomer traffic without noticeable delay. For example, they staggered the lunch schedule
so that only one teller would be absent for no more than 15 minutes. They also bor-
rowed two former tellers from the loan departm ent to help out. The security guards
were also asked to escort customers with basic deposits or withdrawals to a special ser-
vice window to expedite the traffic. As a result, the “fast checkout” window was
adopted as a great idea for customer service.
The instinct for survival is a good test in any organization, where intelligent, caring,
and trusting employees band together in the interest of the entity. They often come up
with creative ways to repair the wounds that otherwise could leave the organization
bleeding. They share what they know to survive and move on for a better tomorrow.
CHAPTER 15 Managing Knowledge Workers i aaa 459
The bottom line is sharing, cooperating, coordinating, and collaborating for a common
goal (see Box 15.7).
Of these elements, sharing what you know is the most challenging for the knowl-
edge manager. To maintain knowledge sharing, he or she must reinforce and continue
to instill the goodness of sharing and how every knowledge worker benefits with this
new approach to survival and growth. The knowledge manager must deliver consistent
signals that knowledge sharing is what the organization supports and rewards. There
must also be a dem onstration of the value of sharing through unique incentives,
bonuses, and so forth. It means the hujnan resources departm ent must work in a
■ ■ 1 1 1 1 BOX 15.7 1 1 1 1 1 1
A CASE FOR KNOWLEDGE SHARING the system. Not only does that arrangem ent
impede the flow of data outward, it also makes it
The Executive Office of Health and Human Ser-
difficult to share internally.
vices (EOHHS) is the Commonwealth of Massa-
Things came to a head in 1993, when seven
chusetts’ largest secretarial, consisting of 15 agen-
youths were murdered on the streets of Boston by
cies and a budget of roughly $9 billion. EOHHS
other juveniles. Investigation revealed that although
acts as the policy and steering arm to departments
various agencies addressed the problem, they were
covering functions as diverse as children, benefits,
incapable of solving the problem individually.
disabilities, and public health.
“These people knew each other but didn’t nor-
Those agencies operate in close proximity, but
mally work closely together,” says then Commis-
in terms of technology and knowledge collabora-
sioner of Youth Services William O ’Leary, a prime
tion, they may as well be situated on opposite
mover in M assCARES —a joint technology/KM
sides of the Atlantic. Henry Swiniarski, the state’s
initiative designed to centrally coordinate state
assistant secretary for EOHHS, gives examples of
health and human services information, share it
some of the many agencies involved in home visit-
among multiple agencies, and use it to provide bet-
ing programs. “Most of these agencies are entirely
ter care across the state. “There was a commitment
disconnected,” says Swiniarski. “We didn’t know
to collaborate. We got everyone on the same page
who was servicing whom, and multiple interviews
in terms of how we could get data, how we could
were going on covering the same inform ation
share information, and how we could develop pre-
about the same people. As a result, the knowledge
vention strategies to reduce violence.”
of one agency was largely unavailable to others.”
The results were surprising and immediate. They
Sharing inform ation does not necessarily
found out something that individual agencies had no
come easily in government. A hierarchical struc-
way of ever discovering—a handful of individuals
ture and silo-like IT organization mean that each
were responsible for most of the city’s violence. By
department can operate like an information fief-
identifying those responsible and organizing better
dom. The leader runs his or her own staff, intera-
targeted and more closely coordinated actions, the
gency collaboration is typically weak, and data
problem was resolved. For the next 2 years, the city
resides in huge repositories only accessible to one
experienced no further youth shootings.
or two technical staff with the know-how to run
SOURCE: Excerpted from Robb, Drew. “M assCARES Seeks to U nite Disparate State and Local A gencies,” Knowledge
Management, June 2002, pp. 24-25.
fl fl ■ ■ 1 fl
460 7777 PART V Ethical, Legal, and Managerial Issues
creative way to assure the extrinsic and intrinsic returns on knowledge sharing. The
ultimate goal is to practice knowledge sharing as a two-way, reciprocal type of interface
between the knower and the one who wants to know. Because knowledge has value,
the company should subject it to the same economic factors and the resulting rewards
that cement relationships and contribute to tenure and stability on the job.
In terms of incentives, various methods have been tried; some succeeded and oth-
ers failed. Much of what ends up being the right set of incentives depends on company
culture, company policies, and financial considerations. Based on our experience in the
field, the following points should be considered:
• Link incentives to a team approach, where the performance of the team on the
project will determine the size and nature of the incentive. It is assuming that the
team is working together and sharing their knowledge in the interest of the proj-
ect, where their collective strengths represent the quality of the results.
• Use awards or symbols of recognition for teams as well as individuals for unique
contributions, whether it is a new method that saved time and money or a new
idea that led to the creation of a new product or service. Awards tend to be moti-
vational, because recognition is an important human need. They carry little mon-
etary value, but when recognized through the company newsletter or Web site, an
employee of the month program, or special parking space to recognize that
special employee, they have far-reaching effects toward employee satisfaction
and stability on the job.
• Flextime is an approach where the company allows the team to decide on when
to work, when to quit, and so forth. The move away from the traditional 8 a .m . to
5 p .m . schedule implies trust in the team ’s judgment and also freedom for deciding
the time frame for the particular problem under discussion.
• Monetary rewards, bonuses, and special prizes can be a hit with the winning team,
especially when publicized throughout the company. This can be an effective
management tool to jump-start a new knowledge management initiative.
From the knowledge m anager’s view, the ultimate goal is personal advancement of
the knowledge worker’s career path. The incentives provided should be heavily based
on sharing and reciprocity, not individual contributions. If compensation is based solely
on the individual’s contributions, it could easily erode the sharing spirit and revert
team spirit to knowledge hoarding and disintegration.
Su m m a r y 1111
• The driver of success in the new economy is knowledge. Knowledge embodies
experience, innovation, and creativity.
• A knowledge worker holds unique values, aligns personal and professional
growth with corporate vision, adopts an attitude of collaboration and sharing, has
innovative capacity and a creative mind, is willing to learn, is in command of self-
control, and is willing to tolerate uncertainties and grow with the company.
• There are several core competencies of the self-directed knowledge worker:
thinking skills, continuous learning, innovative teamwork, creativity, risk taking,
decisive action taking, and a culture of responsibility toward knowledge.
• When discussing business roles in the learning organization, management and
leadership become important. Smart managers focus on organizational learn-
ing to ensure operational excellence. In contrast, the leader’s role is more
of a facilitator, a teacher, a steward of the collective knowledge of the staff,
and a designer.
• A key ingredient in management and leadership is the way managerial experi-
ence is processed. Work management tasks include searching out, creating, shar-
ing, and using knowledge in everyday activities; maintaining work motivation;
ensuring readiness to work; allocating effort and control-switching among tasks;
managing collaboration; sharing information; and hiring bright, knowledge-
seeking individuals.
• In managing knowledge workers, a manager must keep in mind time constraints,
working smarter and harder but achieving little, knowledge workers doing the
wrong job, work schedule and deadlines, and motivational forces against knowl-
edge work productivity.
• Smart managers strive to ensure the right match between the vocational needs of
their knowledge workers and the requirements of their jobs. A proper match
results in worker satisfaction and hopefully a satisfactory employee as viewed by
management. Vocational needs are many; they include achievement, ability uti-
lization, recognition, and the like.
462 7777 PART V Ethical, Legal, <
2/7d Managerial Issues
Terms t o K now • * ■ 1
Achievement: A drive to accomplish worthwhile, complex Leader: In a learning organization, a facilitator, a teacher,
tasks and a feeling of accomplishment. a steward of the collective knowledge of his or her staff,
Creativity: Trying out on e’s own ideas in an effort to and a designer.
come up with new ones. Smart manager: A person whose main job is to focus on
Ergonomics: The science of providing a physical environ- organizational learning to ensure operational excellence.
ment (such as lighting or swivel chairs) for human com - Traditional manager: An action-oriented person who
fort at work. focuses on the present and spends most of the time
Knowledge worker: A person who transforms business delegating, supervising, controlling, and ensuring com-
and personal experience into knowledge through cap- pliance with set procedures.
turing, assessing, applying, sharing, and disseminating it Work adjustment: An individualized model that prescribes
within the organization to solve specific problems or to achieving and monitoring correspondence between an em-
create value. ployee’s vocational needs and the reinforcers of the job.
CHAPTER 15 Managing Knowledge Workers aaaa 463
Te s t Yo u r U n d e r s t a n d in g 1111
1. What is a knowledge worker? Do you agree with any of the definitions in the
chapter? Why or why not?
2. List and briefly explain personality and professional attributes of the knowl-
edge worker.
3. The self-directed knowledge worker must consider several core competen-
cies. Explain three core competencies of your choice. Why are they called
core competencies?
4. Elaborate on the business roles in the learning organization.
5. In what ways are data and information considered as givens?
6. W hat is the difference between m anagem ent and leadership? Traditional
managers and smart managers?
7. How are learning and teaching related?
8. What do work management tasks focus on?
9. Explain the main factors that limit knowledge worker productivity and ways
to get around them.
10. Explain the work adjustm ent model. How does it relate to the knowledge
worker?
11. Briefly list the vocational needs and reinforcers of knowledge workers.
12. How does creativity relate to achievement?
13. Elaborate on smart leadership requirements.
14. What is meant by return on time? How does it relate to the knowledge chain?
15. Briefly explain the key steps in the knowledge chain.
16. How does technology assist the knowledge worker?
17. What should an intelligent workstation do?
18. List the knowledge w orker’s key skills. Do you agree with them?
19. In what way does ergonomics relate to the knowledge worker?
20. What does it take to become a change leader?
21. “Managing knowledge projects requires a set of qualifications and responsi-
bilities.” Elaborate.
22. Explain the various incentives that might be successful for the knowledge
worker.
23. What implications can you draw from the chapter for knowledge management?
Kn o w l edg e Ex e r c is e s 1 1 , 1
1. Discuss the similarities and differences between the traditional manager and
the knowledge manager.
2. Try to verify the personality and work attributes of the knowledge manager
by doing research on the Internet. Report your findings to the class.
3. Is a college degree im portant for knowledge work? Discuss your beliefs
with the class.
4. Cite three companies that qualify as learning organizations. W hat makes
them unique?
5. Does a leader’s job include management? If so, why do we need managers?
Re f e r e n c e s 1 1 1 1
Apfel, Ira. “Hiring Changes,” www.potomactechjoumal.com/ Awad, E. M. Building Expert Systems. Minneapolis, MN:
displayarticledetail.aspl, Date accessed October 20,2002. West Publishing, 1996, p. 471.
Appleton, L., and Gavin, C. Intellectual A sset Valuation. Awad, E. M. “Select Attributes of the Knowledge Worker
Boston, MA: Harvard Business School Publishing, 2000. in Banking.” Unpublished manuscript, 2002, pp. 1-18.
464 7777 PART V Ethical, Legal, a/zd Managerial Issues
Baltazar, Henry. “Overcoming KM’s Obstacles,” Gravallese, Julie. “Knowledge M anagement,” www.mitre.
Knowledge Management, February 18,2002, pp. 4 3 ^ 4 . org/pubs/edge/april_00/index.htm, D ate accessed
Barth. Steve. “Worker,Teach Thyself,” Knowledge August 2002.
Management, August 2001, pp. 65-66. Hall, Mark. “Build a Long-Term Work Relationship,”
Bennet, Bill. “Just Who Are Knowledge Workers?” C om puterw orld, May 6,2002, p. 46ff.
November 11,2001, Australia.internet.com/r/article/ Hildebrand, Carol. “D oes KM = IT?” www.cio.com/
jsp/sid/11300, Date accessed August 2002. archive/enterprise/091599ic.html, D ate accessed
Bhushan, Navneet. “Creating Next-Generation August 2002.
Enterprises,” E AI Journal, May 2002, p. lOff. Horibe, F. Managing K nowledge Workers, New York: John
Chaleff, Ira. “Process Improvement for Knowledge Wiley & Sons, Inc., 1999.
Workers,” www.ibt-pep.com/afsmart.htm, Date Horvath, Dean. “Knowledge Worker,” searchcrm.
accessed August 2002. techtarget.com/sDefinition/0,290660,sidll_gci212450,00.
Date, Shruti. “A gencies Create CKO Posts to Get in the html, Date accessed August 2002.
Know.” Government Computing N ews, November 8, Kappes, Sandra, and Thomas, Beverly. “A M odel for
1999, www.gcn.com /voll8_no36/news/950-l.htm l, Date Knowledge Worker Information Support,” Knowledge
accessed October 20,2002, p. 1-2. Worker Information Management, September 1993,
Datum Consulting. “Knowledge Workers,” www.datum pp. 1-4, www.cecer.army.mil/kws/kstoc.htm, D ate
consulting.com/solutions_kw_architecture.asp, Date accessed August 2002.
accessed August 2002. Koulopoulos, Thomas, and Frappaolo, Carl. Smart Things
Davis, Gordon B. “An Emerging Issue: Knowledge Worker to K now A b o u t Knowledge Management. Oxford:
Productivity and Information Technology,” Information Capstone Publishing Limited,. 1999.
Science Conference, Krakow, Poland, June 20,2001. Maccoby, Michael. “Knowledge Workers N eed New
Dawis, Rene V., Lofquist, Lloyd H., and Weiss, David. Structures,” www.maccoby.com/Articles/
“The Theory of Work Adjustment.” Minneapolis, MN: KnowledgeWorkers.html, D ate accessed August 2002.
University of Minnesota, 1968. Malhotra, Yogesh. “Knowledge Management, Knowledge
Dove, Rick. “The Knowledge Worker,” www.parshift.com/ Organizations, and Knowledge Workers: A View From
library.htm#0ther%20publications, Date accessed the Front Lines,” April 2001, www.brint.com/
December 3,2002. interview/maeil.htm, Date accessed August 2002.
Drucker, Peter. “Who Is the Knowledge Worker?” Robb, Drew. “Draft Your Dream Team,” Knowledge
www.pbsilink.com/knowledgeworkers.htm, Date Management, August 2001, pp. 44-50.
accessed August 2002. Robb, Drew. “M assCARES Seeks to U nite Disparate
Dvorak, John C. “Know-Nothing Knowledge Workers Must State and Local A gencies,” K nowledge M anagement,
Go!” PC Magazine, May 20,2002, pp. 12-15, www.pemag. June 2002, pp. 24-25.
com/article/0,2997, s%3D1500%26a%3D22201,00.asp, Russom, Philip. “An Eye for the N eedle,” Intelligent
Date accessed August 2002. Enterprise, January 14,2002, pp. 27-30.
Flash, Cynthia. “Who Is the CKO?” Knowledge Manage- Sebra, Bill. “Electrifying Your H R Management,”
m ent, May 2001, pp. 3 7 ^ 1 . www.knowledgeworkers.com/news/news_258.cfm,
Flash,T. “Personal Chemistry” Knowledge Management, D ate accessed August 2002.
August 2001, pp. 36-43. Wesley, Doug. “Retaining Workers in the Knowledge
Frank, J. T. “Strengths of K-Professionals,” www.kwx.com. Economy,” www.findarticles.com/cf_dls/mOFWE/
my/kwx/asp/articles02/articles02/articles0207.asp, Date 10_4/66276585/pl/article.jhtml, D ate accessed
accessed D ecem ber 3,2002. D ecem ber 3,2002.
Garfinkle, Joel. “Steps to Becoming a Change Leader,” Zetlin, Minda. “Best Places to Work,” C om puterw orld,
www.kwx.com.my/kwx/asp/articles02/articles_0203.asp, May 6,2002, p. 40ff.
Date accessed August 2002.
What More Do We
Need to Know?
Contents
Today’s knowledge manager wants to know the reality of tomorrow, not just the reality
of today. In a strategic sense, knowledge management in the next 5 to 10 years is likely
to be shaped by many initiatives that we do not know for certain. Before we talk about
future KM initiatives, our view of today’s KM foundation is shown in Figure E .l.
465
466 7777 What More D o We Need to Know?
The first step is to autom ate and routinize basic tasks that can be handled with
minimum effort by technology. This allows the knowledge manager to concentrate on
higher-order decision making or decide on the knowledge needed to do creative work.
Creativity is the driver of innovation, which should result in a new product or
improved service over time. Knowledge for creative work comes from knowledge
repositories and other sources.
What we now know is this: Knowledge management is a prerequisite for competition.
It is the critical element for innovation. Consider Japan’s industrial growth in the 1960s as
compared to today’s production of Lexus and Camry vehicles, among others. Technology
alone did not do the trick. Products were initially not differentiated from competitors.
When Toyota, for example, began to focus on quality, reliability, and dependability at a
competitive price, it took on the U.S. market. In fact, American car manufacturers began
to rethink their way of building cars to compete with a new way of doing business.
Misconception 2. The more knowledge is available, the more likely individuals will
find what they need to solve a business problem. Humans in general do not have the
patience to surf or scan hundreds of documents to locate the desired item. Also, as
more docum ents are stored in a repository, the num ber of dated docum ents also
increases. This means finding a way to filter useless documents would be required at a
high cost, which is difficult to justify.
Another problem with knowledge search is that knowledge workers do not always
know how to search effectively for the right document to meet specific needs. With an
ever-increasing num ber of knowledge repositories, there is an inevitable increase in
the number of “hits.” This is where frustration sets in, and people want to find an easy
and a quick way out.
One way to address this problem is for a select team of company experts to iden-
tify repository content that provides the most value to the company business in gen-
eral. They could apply the 20/80 rule, where the top 20 percent of the content will sat-
isfy 80 percent of the queries or problems. In addition, an online environment would
continuously purge old documents through filtering. Technology may be employed to
filter out the waste and organize existing resources based on value, frequency of use,
and so forth. This helps ensure targeted knowledge to authorized users.
K M Issues
Management
Program
fl
R eferen ces • • • •
Davenport, Tom. “From Data to Knowledge,” Malhotra, Yogesh. “Knowledge Management and
www.cio.com/archive/040199_think_content.html, Date E-Business in the New Millennium,” January 2000,
accessed August 2002. www.brint.com/ advisor/aOl 1700.htm, Date accessed
Davenport,Tom. “Knowledge Roles: The CKO and November 29,2002.
Beyond,” www.cio.com/archive/040196/davenport_ Olsen, Bjorn. “Mismanagement of Tacit Knowledge:
content.html, Date accessed November 30,2002. Knowledge Management, the Danger of Information
Dueck, Gunter “Views of Knowledge Are Human Technology, and What to D o About It,” www.program.
Views,” IBM Systems Journal, vol. 40, no. 4,2001, forskningsradet.no/skikt/johannessen.php3, Date
pp. 885-88. accessed August 2002.
Dyson, Esther. “Intellectual Value ” www.wired.com/ Thomas, J. C., Kellog, W. A., and Erickson,T. “The
wired/archive/3.07/dyson.html, Date accessed Knowledge Management Puzzle: Human and Social
November 30,2002. Factors in Knowledge M anagement,” Communications
King, W. R., Marks, E. V., and McCoy, Scott. “The Most o f the A C M , October 2002, pp. 863-84.
Important Issues in Knowledge M anagement,” VisionCor. “The Human Element: Knowledge M anage-
Communications o f the ACM , September 2002, m ent’s Secret Ingredient,” www.visioncor.com, Date
pp. 93-97. accessed October 2002.
This page is intentionally left blank.
Index
473
474 7777 Index
issues to address, 172-173 knowledge centers, identifying decision tables, 221, 222, 223
phrasing the questions, 166 experts, assigning to each knowledge decision trees, 221, 222, 223
problem s encountered during the area, 122-124 frames, 223-224
interview, 170-171 knowledge content satellites, activat- knowledge-based agents, 230-231
question construction, 166-167 ing, 122 knowledge maps, 217-221
rapid prototyping, 173-174 people core, 121-122 production rules, 224-228
reliability of information from technical core, 124 See also Production rules for tacit
experts, 168-169 authorized access layer, 127-129 knowledge codification
setting the stage and establishing collaborative intelligence and filter- K nowledge consum er interface, 384
rapport, 165-166 ing layer, 129-133 K nowledge conversion, modes of, 214-215
things to avoid, 167-168 knowledge-enabling application K nowledge creation, 115-118
types of, 163-165 layer, 133 transformation and, N onaka’s
Intranet,43, 127-128, 303-306, 323 middleware layer, 133-134 m odel, 119-121
Iterative approach in know ledge repositories layer, 134, 135 K nowledge developer
capture, 101 transport layer, 133 knowledge requirements
user-interface layer, 125-127 cognitive psychology, 232
K nowledge autom ation systems, 333 com puter technology, 231
J K nowledge-based agents, 230-231 dom ain-specific knowledge, 231-232
K nowledge-based rules, 225 knowledge repositories and data
Jefferson, Thomas, 437
K nowledge capital (B ox 3.5), 96 mining, 232
Justifier, 131
K nowledge capture, 33, 41, 60, 9 9-100 liability o f,415
1 8 0-181,414 skills requirements
K blackboarding, 198-200
brainstorming, 183-185, 186, 187
ability to articulate the project’s
rationale, 232
Kelly, Thomas, 147 challenge in (B ox 5.1), 147 interpersonal com munication, 232
KM architecture, layers of, 103-105 concept mapping, 195 job roles, 234
KM blueprint, 102-105 procedure, 196-197 personality attributes, 233, 234
KM system design, 102-105 semantic nets and, 197-198 rapid prototyping, 232-233
Know-how, 56, 66, 71 consensus decision making, 190-191 See also K nowledge capture;
licensing, 413 defined, 146-150 Knowledge management system
Knowing, 277 Delphi m ethod, 194-195 life cycle (KMSLC);Tacit
K nowing-doing gap, 276-277 experts for, 101-102 knowledge capture
K nowledge, 55 -5 6 iterative approach in, 101 Knowledge dim ensions and bottlenecks
cognition and know ledge m anage- nominal group technique (N G T), (Figure 7.3), 214
m ent, 5 9 -6 0 193-194 K nowledge discovery from databases
as a corporate asset, 44 on-site observation, 182-183 (K D D ), 351
data, information, and, 60-65 protocol analysis, 185, 187 K nowledge em bezzlem ent, 432
defined, 57 procedure, exam ple of, 189-190 Knowledge-enabling application layer, 133
definitions scenario, 188-189 K nowledge evaluation, 84, 85
com m on sense, 5 8-59 repertory grid, 191-193 Knowledge hoarders, 262
experience, 58 “smash and grab” approach, 101 K nowledge im plem entation, 86
intelligence, 57-58 techniques, choosing, im plications for Knowledge infrastructure, of a corpora-
knowledge, 57 knowledge management, 200 tion (B ox 9.2), 286
human thinking and learning, 75-76 See also Tacit knowledge capture Knowledge m anagement
im plications for know ledge m anage- Knowledge centers data mining and (B ox 12.2), 352
ment, 76 -7 7 See Knowledge architecture data mining implications for, 369-372
product or service?,416, 417 K nowledge chain, 446-447 fit with neural networks, 337
select characteristics o f (B ox 2.1), 63 Knowledge codification, 209 foundation of (Figure E .l ) ,465
types of defined, 210-212 future, 470-471
com m on sense, 68 how to codify knowledge, 215-216 human elem ent, 467-468
explicit and tacit, 71 im plications for knowledge m anage- knowledge architecture implications
know-how, 66 ment, 234-235 for, 138-139
procedural to episodic, 68-71 knowledge conversion, modes of, 214-215 knowledge m anagement system life
reasoning and heuristics, knowledge developer’s skill set cycle (K M SLC) implications for
6 6 -6 8 , 69 knowledge requirements, 231-232 KM, 109-110
shallow and deep, 66 skills requirements, 232-234 knowledge transfer implications for, 298
vision, 64 reasons for knowledge workers implications for,
(B ox 2.2), 65 diagnosis, 212 460-461
See also Ethical issues o f knowl- instruction/training, 212-213 legal disputes in, 420
edge; Expert knowledge; interpretation, 213 neural networks implications for, 342-343
K nowledge owners; Legal issues planning, role of, 214 shareability factor, 466-467
o f know ledge planning/scheduling, 213 social factor, 4 69-470
K nowledge architecture prediction, 213 system testing and deploym ent impli-
build in-house, buy, or outsource?, things to remember, 213-214 cations for, 264-265
135-138 tools and procedures tacit knowledge capturing implications
im plications for know ledge m anage- case-based reasoning (C B R ), for, 174-175
m ent, 138-139 228-230, 231 team formation (B ox 15.5), 457
Index i a a i 477
techniques, choosing, im plications user training, 106 e-world, 302
for, 200 manage change and reward struc- extranets and know ledge exchange,
trends, 46 8 -4 6 9 ture, 107-108 306-308
Knowledge m anagem ent (KM ) postsystem evaluation, 108 groupware, 308-313
acceptance of, in industries, 40 Knowledge m anagem ent tools im plications for knowledge m anage-
benefits of, 34 -3 9 See K nowledge portals ment, 322-324
challenges, 4 1 -4 4 K nowledge maps, 217-221 intranets, 303-306
cognition and know ledge m anage- K nowledge networking, 286 explicit interteam transfer, 291-292
m ent, 5 9 -8 0 K nowledge organization framework for (B ox 9.1), 275
defined, 2 6-27 See Knowledge m anagem ent (KM ) im plications for know ledge m anage-
drivers, 3 7 -3 9 K nowledge owners, 409-410 m ent, 298
exam ple (B ox 1.1), 29 clarifying (B ox 14.1), 412 Internet, role of, 293
failure to em bed an operation, 36-37 expert, becom ing, via a corporate benefits of, 296-297
historical overview, 44^-5 knowledge-based system, Internet service providers (ISPs),
im plications for, 50-51 413-414 294-295
intellectual capital (B ox 1.2), 33 know ledge gained on the job, 4 1 1 ^ 1 2 limitations, 297
justification (Table 1.2), 36 price for knowledge, 41 1 ,4 1 3 stability and reliability of the Web, 295
knowledge codification im plications K now ledge portals, 379 know ledge infrastructure, wiring a cor-
for, 234-235 architecture, layers of (B ox 13.5), 394 poration’s (B ox 9.2), 286
knowledge organization, 27-31 business challenge, 386 m ethods
knowledge sharing market potential, 389-391 how knowledge is transferred, 288-293
(B ox 1.4), 42 portals and business transformation, inhibitors o f know ledge transfer,
(B ox 1.3), 39 387-389 287-288
life cycle, 4 8 -5 0 characteristics, 384-385, 386 nature o f the problem , 284-285
myths, 45 -4 7 defined, 380, 382-383 strategies, 285-287
origins of, 39-41 evolution of, 383-384 as a step in a process, 273-275
what it is not, 31 -3 4 illustration, 385, 386, 387 knowing-doing gap, 276-277
See also Drivers for knowledge implications for knowledge management prerequisites for transfer, 277-284
m anagem ent bandwidth, 400-401 tacit know ledge transfer, 292-293
K nowledge m anagem ent system life im plem entation issues, 399-400 See also Groupware; Knowledge shar-
cycle (K M SLC), 82-83 portal product selection, 401-402 ing; Supply chain m anagem ent
B A N K O R exam ple (B ox 3.4), 90-91 who is building enterprise portals?, 399 (SCM ) and knowledge
challenges who sponsors enterprise portals?, 399 exchange; Value chain
knowledge, estim ating worth of next generation of (B ox 13.2), 385 K nowledge validation, 330
(B ox 3.2), 85 perform ance of (B ox 13.1), 380-381 K now ledge value chains, 32
knowledge, processing of portal vendors (Table 13.4),402 K nowledge work, 44
(B ox 3.3), 85-86 technologies K nowledge workers, 44, 353-354, 437
knowledge sharing (B ox 3.1), 84 collaboration, 392-393, 395 business roles in the learning organiza-
challenges in building KM collaboration versus categorization, tion, 441
systems, 8 4-86 396-398 m anagement and leadership, 442-443
versus conventional information systems content m anagem ent, 394, 396, 397 work m anagem ent tasks, 4 43-444
differences, 86-88 functionality, 392, 393, 394 chief knowledge officer (CKO), 452-454
similarities, 88 intelligent agents, 398-399, 400 core com petencies, 440-441
users versus knowledge XM L, role of (B ox 13.6), 397 d efined, 438
workers, 88-89 K nowledge processing, 85-86 (B ox 15.1), 439
design errors to look for, 106 K nowledge producer interface, 384 personality and professional attrib-
evaluating existing infrastructure, 92 K nowledge-related drivers, 38 utes, 439-441
expert, selecting an, 101-102 K nowledge sharing,73, 313, 414 ergonom ics and, 450-452
im plications for know ledge m anage- (B ox 3.1), 84 flexible scheduling through technology
m ent, 109-110 cultural differences’ impact on (B ox 15.2), 449
know ledge developer, role of (B ox 1.4), 42 im plications for knowledge m anage-
design the KM blueprint, 102-105 exam ple (B ox 1.3), 39 m ent, 460-461
im plem ent the KM system, 106 impact of (B ox 15.7), 459 know ledge projects, managing, 456, 460
test the KM system, 105 im pedim ents to (Figure 4.2), 119 KM teams, drafting (B ox 15.5), 457
know ledge m anagem ent developm ent See also K nowledge transfer know ledge sharing (B ox 15.7), 459
(Table 3.2), 8 9 -9 0 K nowledge sharing core, 116 self-training (B ox 15.6), 458
managerial factors, 109-110 Knowledge-sharing integration, 258 knowledge-worker system interface, 451
most critical phase, 83 K nowledge source, 199 managerial considerations, 455
quality assurance, role of, 106 K nowledge testing productivity limitations on, 444
rapid prototyping, 101 See System, testing and deploym ent skills requirements, 450
system justification, 92 K nowledge transfer, 256-257, 272 technology and, 447-450
feasibility question, 9 4 -9 5 , 96, 97 collective sequential transfer, versus users, 88-89
form the KM team, 9 8 -9 9 288-291 work adjustment and, 444-445
knowledge capture, 9 9 -1 0 0 e-business, 313-314 smart leadership requirements,
scope factor, 9 3 -9 4 supply chain management (SCM) and 446-447
strategic planning, 97 -9 8 knowledge exchange, 317-322 vocational needs and reinforcers of
user support, 9 5-97 value chain, 315-217 know ledge workers, 446
478 7777 Index