Home | | Knowledge Management | Knowledge Management System Life Cycle

Chapter: Knowledge Management

Knowledge Management System Life Cycle

1 Challenges in Building KM Systems 2 Conventional Vrs KM System Life Cycle (KMSLS) 3 Knowledge Creation and Knowledge Architecture 4 Nonaka’s Model of Knowledge 5 Creation and Transformation. Knowledge Architecture

KNOWLEDGE MANAGEMENT SYSTEM LIFE CYCLE

 

1 Challenges in Building KM Systems

2 Conventional Vrs KM System Life Cycle (KMSLS)

3 Knowledge Creation and Knowledge Architecture

4 Nonaka’s Model of Knowledge

5 Creation and Transformation. Knowledge Architecture

 

 

1 Challenges in Building KM Systems

Knowledge Evaluation:

Involves assessing the worth of information.

 

Knowledge Processing:

Involves changing people's attitudes and behaviours.

 

Involves the identification of techniques to acquire, store, process and distribute information.

 

Sometimes it is necessary to document how certain decisions were reached. Knowledge Implementation:

 

An organization should commit to change, learn, and innovate.

 

It is important to extract meaning from information that may have an impact on specific missions.

 

Lessons learned from feedback can be stored for future to help others facing the similar problem(s).

 

2 Conventional Vrs KM System Life Cycle (KMSLS)

Key Differences:

 

The systems analyst gathers data and information from the users and the users depend on analysts for the solution.

 

The knowledge developer gathers knowledge from people with known knowledge and the developer depends on them for the solution.

 

The main interface for the systems analyst is associated with novice users who knows the problem but not the solution.

 

The main interface for the knowledge developer is associated with the knowl- edgeable person who knows the problem and the solution.

 

Conventional systems development is primarily sequential, whereas KMSLC is incre- mental and interactive.

 

In case of conventional systems, testing is usually done towards the end of the cycle (after the system has been built), whereas in KMSLC, the evolving system is verified and validated from the beginning of the cycle.

 

Systems development and systems management is much more extensive for conven- tional information systems than it is for KMSLC.

 

The conventional systems life cycle is usually process-driven and documentation- oriented whereas KMSLC is result-oriented.

 

The conventional systems development does not support tools such as rapid prototyping since it follows a predefined sequence of steps

 

KMSLC can use rapid prototyping incorporating changes on the spot.

 

Key Similarities:

Both cycles starts with a problem and end with a solution.

 

The early phase in case of conventional systems development life cycle starts with information gathering.

 

In KMSLC the early phase needs knowledge capture.

 

Verification and validation of a KM system is often very similar to conventional systems testing. Both the systems analyst and the knowledge developer needs to choose the appropriate tools

 

for designing their intended systems.

 

3 Knowledge Creation and Knowledge Architecture

 

Knowledge Creation

 

 

Knowledge update can mean creating new knowledge based on ongoing experience in a specific domain and then using the new knowledge in combination with the existing knowledge to come up with updated knowledge for knowledge sharing.

 

A team can commit to perform a job over a specific period of time.

A job can be regarded as a series of specific tasks carried out in a specific order.

 

When the job is completed, then the team compares the experience it had initially (while starting the job) to the outcome (successful/disappointing).

 

This comparison translates experience into knowledge.

 

While performing the same job in future,the team can take corrective steps and/or modify the actions based on the new knowledge they have acquired.

 

Over time, experience usually leads to expertise where one team (or ind There exists factors that encourage (or retard) knowledge transfer.

 

Personality is one factor in case of knowledge sharing.

 

 

For example, extrovert people usually posses self-confidence, feel secure, and tend to share experiences more readily than the introvert, self-centered, and security-conscious people.

 

People with positive attitudes, who usually trust others and who work in environments conductive to knowledge sharing tends to be better in sharing knowledge.

 

Vocational reinforcers are the key to knowledge sharing.

 

People whose vocational needs are sufficiently met by job reinforcers are usually found to be more likely to favour knowledge sharing than the people who are deprived of one or more reinforcers.

 

Knowledge Architecture

 

Knowledge architecture can be regarded as a prerequisite to knowledge sharing. The infrastructure can be viewed as a combination of people, content, and technology.

 

These components are inseparable and interdependent

By people, here we mean knowledge workers, managers, customers, and suppliers.

 

As the first step in knowledge architecture, our goal is to evaluate the existing information/ documents which are used by people, the applications needed by them, the people they usually contact for solutions, the associates they collaborate with, the official emails they send/receive, and the database(s) they usually access.

 

All the above stated resources help to create an employee profile, which can later be used as the basis for designing a knowledge management system.

 

4 Nonaka’s Model of Knowledge

 

In 1995, Nonaka coined the terms tacit knowledge and explicit knowledge as the two main types of human knowledge. The key to knowledge creation lies in the way it is mobilized and converted through technology.

 

Tacit to tacit communication (Socialization):

Takes place between people in meetings or in team discussions.

 

Tacit to explicit communication (Externalization):

Articulation among people trough dialog (e.g., brainstorming).

 

Explicit to explicit communication (Communication):

 

This transformation phase can be best supported by technology. Explicit knowledge can be easily captured and then distributed/ transmitted to worldwide audience.

 


 

Explicit to tacit communication (Internalization):

 

This implies taking explicit knowledge (e.g., a report) and deducing new ideas or taking constructive action. One significant goal of knowledge management is to create technology to help the users to derive tacit knowledge from explicit knowledge.

 

5 Creation and Transformation.

5.1 The People Core

By people, here we mean knowledge workers, managers, customers, and suppliers.

 

As the first step in knowledge architecture, our goal is to evaluate the existing information/ documents which are used by people, the applications needed by them, the people they usually contact for solutions, the associates they collaborate

 

with, the official emails they send/receive, and the database(s) they usually access.

 

All the above stated resources help to create an employee profile, which can later be used as the basis for designing a knowledge management system.

 

5.2 Knowledge Architecture

The idea behind assessing the people core is to do a proper job in case of assigning job content to the right person and to make sure that the flow of information that once was obstructed by departments now flows to right people at right time.

 

In order to expedite knowledge sharing, a knowledge network has to be designed in such a way as to assign people authority and responsibility for specific kinds of knowledge content, which means:

 

5.3 Identifying knowledge centers:

 

Here, the term knowledge center means areas in the organization where knowledge is available for capturing.

 

These centers supports to identify expert(s) or expert teams in each center who can collaborate in the necessary knowledge capture process.

 

Activating knowledge content satellites

 

After determining the knowledge that people need, the next step is to find out where the required knowledge resides, and the way to capture it successfully.

 

This step breaks down each knowledge center into some more manageable levels, satellites, or areas.

 

5.4 Assigning experts for each knowledge center:

 

After the final framework has been decided, one manager should be assigned for each knowledge satellite who will ensure integrity of information content, access, and update. Ownership is a crucial factor in case of knowledge capture, knowledge transfer, and knowledge implementation.

 

In a typical organization, departments usually tend to be territorial.

 

Often, fight can occur over the budget or over the control of sensitive processes (this includes the kind of knowledge a department owns).

 

These reasons justify the process of assigning department ownership to knowledge content and knowledge process adjacent/interdependent departments should be cooperative and ready to share knowledge.

 

5.6 The Technical Core

 

The objective of the technical core is to enhance communication as well as ensure effective knowledge sharing.

 

Technology provides a lot of opportunities for managing tacit knowledge in the area of communication.

 

Communication networks create links between necessary databases.

 

Here the term technical core is meant to refer to the totality of the required hardware, software, and the specialized human resources.

 

5.7 User Interface Layer

 

Usually a web browser represents the interface between the user and the KM system. It is the top layer in the KM system architecture.

 

The way the text, graphics, tables etc are displayed on the screen tends to simplify the technology for the user.

 

The user interface layer should provide a way for the proper flow of tacit and explicit knowledge.

 

The necessary knowledge transfer between people and technology involves capturing tacit knowledge from experts,storing it in knowledge base, and making it available to people for solving complex problems.

 

Features to be considered in case of user interface design:

ü   Consistency

 

ü   Relevancy

 

ü   Visual clarity

 

ü   Usability

 

ü   Ease of Navigation

 

Authorized Access Layer

 

This layer maintains security as well as ensures authorized access to the knowledge captured and stored in the organization's repositories.

 

The knowledge is usually captured by using internet, intranet of extranet.

An organization's intranet represents the internal network of communication systems.

 

Extranet is a type of intranet with extensions allowing specified people (customers, suppliers, etc.) to access some organizational information.Issues related to the access layer: access privileges, backups.

 

The access layer is mostly focused on security, use of protocols (like passwords), and software tools like firewalls.

 

Firewalls can protect against:

ü   E-mails that can cause problems.

 

ü   Unauthorized access from the outside world.

 

ü   Undesirable material (movies, images, music etc).

 

A mobile agent roams around the internet across multiple servers looking for the correct information. Some benefits can be found in the areas of:

 

Fault tolerance. Heterogeneous operation.

 

Key components of this layer:

 

Membership in specific services, such as sales promotion, news service etc. The registration directory that develops tailored information based on user profile. The search facility such as a search engine.

 

In terms of the prerequisites for this layer, the following criteria can be considered:

ü   Security.

 

ü   Portability.

 

ü   Flexibility

 

ü   Scalability

 

Issues related to the access layer: access privileges, backups.

 

The access layer is mostly focused on security, use of protocols (like passwords), and software tools like firewalls.

 

Firewalls can protect against:

ü   E-mails that can cause problems.

 

ü   Unauthorized access from the outside world.

 

ü   Undesirable material (movies, images, music etc).

 

A mobile agent roams around the internet across multiple servers looking for the correct information. Some benefits can be found in the areas of:

ü   Fault tolerance.

 

ü   Heterogeneous operation.

 

ü     

Key components of this layer:

 

Membership in specific services, such as sales promotion, news service etc. The registration directory that develops tailored information based on user profile. The search facility such as a search engine.

 

In terms of the prerequisites for this layer, the following criteria can be considered: Security.

ü   Portability.

 

ü   Flexibility

 

ü   Scalability

 

Study Material, Lecturing Notes, Assignment, Reference, Wiki description explanation, brief detail
Knowledge Management : Knowledge Management System Life Cycle |


Privacy Policy, Terms and Conditions, DMCA Policy and Compliant

Copyright © 2018-2024 BrainKart.com; All Rights Reserved. Developed by Therithal info, Chennai.