Exploiting Tacit Knowledge Through Knowledge Management Technologies By Frank Nyame-Asiamah


Published on

You may read the full paper at: http://bura.brunel.ac.uk/handle/2438/3613

This presentation examines the contribution and suitability of available KM technologies including the Web2.0 for tacit knowledge exploitation. The author proposes CAMTaKE (Complex Adaptive Model for Tacit Knowledge Exploitation) as a new integrated framework for extracting tacit knowledge in organisations.

Published in: Business, Education
  • Hi Lester,
    Thank you for your intellectual review. I appreciate your constructive feedback. Below is a description of CAMTaKE in relation to your question:
    CAMTaKE combines the principles of organisational learning & learning organisation with KM tools for learning in a complex adaptive system (CAS), where multiple interactions between individuals, teams and groups create an appropriate ambience to exploit tacit knowledge. Thus, CAMTaKE is a distributed knowledge-processing platform which creates equal opportunity and autonomy for participants’ interaction without fear of reprisal. The environment provides opportunity for the various agents of learning to exploit new knowledge and solve problems in sincerity. The evocative power of KM tools for learning provides impetus for individuals, teams and groups to exploit, share and transfer tacit knowledge into all forms of explicit knowledge through the externalisation corridor. Reified knowledge is further developed to rejuvenate agents’ cognitive maps for generating new knowledge and sharing of new experiences. The inclusion of asynchronous collaborative tools makes CAMTaKE more effective for stimulating the flow of tacit knowledge at a faster speed. CAMTaKE therefore accounts for the ‘evocative session design’.
    The full paper will be published on the EIfEL’s website later: http://www.eife-l.org/publications/allproceedings It will be interesting to read once published. Thank you and keep in touch.
    Are you sure you want to  Yes  No
    Your message goes here
  • I am currently reviewing the field of KM after close to 2 decades of technology-centric knowledge work. Your presentation is valuable to me as a state-of the art review of current thinking in the KM field. For that I thank you. As a feedback, I would like to say that what will differentiate an effective tacit knowledge extraction system is it's evocative power. Tacit knowledge is not conciously hoarded because, by definition, it lacks structure or format in the mind of the participant. Instead, the impediment to tacit knowledge flow is likely to be the lack of appropriate 'ambiance' or 'impetus' that could dislodge it. It seems to me that technology by itself would be not be central to such a system...though it MAY accentuate the ease of evocation. The 'moderator' or 'the framing of context' may be much more central to 'evocative session design'. Does CAMTaKE specifically provide for some of that ?
    Are you sure you want to  Yes  No
    Your message goes here
  • The use of knowledge management technologies in tacit knowledge exploitation is one of the areas I am currently exploring. Any constructive feedback will be very much appreciated
    Are you sure you want to  Yes  No
    Your message goes here
No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Exploiting Tacit Knowledge Through Knowledge Management Technologies By Frank Nyame-Asiamah

  1. 1. Exploiting Tacit Knowledge Through Knowledge Management Technologies Learning Forum London 22-24 June 2009 By Frank Nyame-Asiamah Brunel University
  3. 3. OBJECTIVES & METHOD Objectives:  To examine the contributions and suitability of the available KM technologies, including the Web 2.0 in exploiting tacit knowledge  To propose an integrated framework for extracting tacit knowledge in organisations Method:  A comprehensive literature exploration covering knowledge management (KM), KM technologies and organisational learning (OL) 24 June 2009 Frank Nyame-Asiamah © 3
  4. 4. KNOWLEDGE  Valuable information from human mind - reflection, synthesis and context (Davenport & Prusak, 1997)  Facts and principles organised by mankind in the course of time” (Clarke, 1992)  “Information that is contextual, relevant and actionable ” (Turban et al, 2006, p.368).  An intellectual asset for organisations (Davenport & Prusak, 1997) 24 June 2009 Frank Nyame-Asiamah © 4
  5. 5. KNOWLEDGE CLASSIFICATION 2 Main Types Reference Tacit Explicit Mental models not Artefacts easily Polanyi 1966; Nonaka, 1991 easily conveyed accessed Informal Formal Conklin, 1996 Softer Harder Hildreth et al, 1999 Unstructured Structured Hahn & Subramani, 2000 Symbiotic Semiotic Sharif, 2008 24 June 2009 Frank Nyame-Asiamah © 5
  6. 6. COMMONALITY IN KNOWLEDGE TYPES Tacit All Knowledge Knowledge Externalisation Points of focus Forms Membership Documents Interacting Monuments Mutuality Instruments Acting Projections Living in a world NOTE: Knowledge is an asset, exists in different forms, mostly created by humankind and hidden parts difficult to exploit 24 June 2009 Frank Nyame-Asiamah © 6
  7. 7. KNOWLEDGE CONCERNS FOR ORGANISATIONS  Early retirements & staff mobility can lead to loss of knowledge (March, 1991)  It takes longer time to develop experience (Macintosh, 1999)  Lack of time & reward preclude people from sharing knowledge (Turban et al, 2006)  Death ceases human consciousness  Question 1: How do we exploit tacit knowledge? 24 June 2009 Frank Nyame-Asiamah © 7
  8. 8. RELATIONSHIP BETWEEN OL & KM THEORIES AS Tacit a L and C Know nd Explic KM, O odel , ledge it M Elroy (McA Mode & Mc dam l tone e t al , 2 ( F i r es ) 007) 2004 g St in or rn (D y Mo telli Lea l ) en nin del g n ual ode 1991 g,2 ut M ch, 00 M ar 0) (M Fi ve Mo e, 19 M oP ) l Di de 90 88 ge de (S C 19 sc l ) en o r, g ip Kn lin CT en dI ow e (W n led L a el g , O od b li n, Mo e Sp KM M Tom (N o na del ira l t& k a, 1 ne 006) n 2 991 (Be ) 24 June 2009 8 Frank Nyame-Asiamah ©
  9. 9. TECHNOLOGIES FOR TACIT KNOWLEDGE EXPLOITATION 1 Learning Laboratory: Executive Cognitive Support or ESS: A neutral and non-threatening ‘virtual collaborated Information systems at the organisation’s strategic environment’ where individuals develop deeper level designed to address unstructured decision understanding of their beliefs and exploit tacit making through advanced graphics and knowledge (Pourdehnad et al, 2002) communications (Laudon & Laudon, 2003) UPS used Integrad Learning Laboratory It helps higher level learning, knowledge creation, comprising online learning, three dimensional and provides opportunity for executives to identify models, podcasts, videos, etc to exploit new drivers tacit knowledge (Chen et al, 2003) and trainees skills on safety performance (Ketter, 2008) Collective Cognitive Mapping System: Knowledge Management Suites: An episodic memory representing a container of individual cognitive maps Complete and unified KM solutions consisting An organisational memory representing a reservoir communication, collaboration and storage of collective cognitive maps technologies (Dotsika & Patrick, 2006) A local cognitive map generator which translates They help employees to learn business processes, individual mental models into graphical unlock their tacit knowledge and share them among representations their peers A central collective cognitive map generator which Commerce Bank, Wow Answer Guide deployment exploit cognitive maps of all members for collective saved Commercial Bank a weekly cost of $20,000.00 problem solving (Chen et al, 2003) (Turban et al, 2006, p. 385) 24 June 2009 Frank Nyame-Asiamah © 9
  10. 10. TECHNOLOGIES FOR TACIT KNOWLEDGE EXPLOITATION 2 Enterprise Knowledge Portal: Personal Information Portal: Information gateways including internet, intranet and extranet sites of organisations (Dfouni & Croteau, 2004) They include social network sites, wikis and audio podcasting, video sharing and collaborative tools for learning and knowledge creation Institutions are using web-based CPD (e.g. REfLECT) and VLE to enhance the transfer of tacit knowledge into explicit knowledge (Harris, 2008) E-Discussion Boards: Email: Effective and most important method of knowledge conversion from one person to another - CPD support within the University of Wolverhampton (Harris, 2008) Topmost socialisation tool for extracting and sharing unstructured knowledge (Dfouni and Croteau, 2004) BP exploited knowledge stored in the minds of its employees through the use of email technology (Brooks, 2000) 24 June 2009 Frank Nyame-Asiamah © 10
  11. 11. KNOWLEDGE MANAGEMENT FAILURE  Organisations sometimes fail to communicate KM strategies well with staff  Best employees refuse to publish their good ideas on KM platform  Staff show lack of interest when KM systems become fully implemented  Poor content management techniques and lack of incentives for KM system users (Turban et al, 2005; Barth 2000)  Web 2.0 and social software developers usually base their design approaches on ‘technology to the user’ (Dotsika & Patrick, 2006)  So what do we do with design? - Theory of Deferred Action recommends that KM systems should be designed in the context of organised action 24 June 2009 Frank Nyame-Asiamah © 11
  12. 12. CAMTaKE 24 June 2009 Frank Nyame-Asiamah © 12
  13. 13. CONCLUSION & IMPLICATIONS  KM and Web 2.0 technologies have been beneficial for businesses and continue to support organisational transformation  Technologies for extracting tacit knowledge should be designed around individuals’ cognitive behaviour and natural processes of human techniques  Organisations should persuade each employee to share his/her ideas on the Web 2.0 platforms with ‘X’ number of staff  No idea should be taken for granted in a learning community where an organisation wants to exploit tacit knowledge for transformation 24 June 2009 Frank Nyame-Asiamah © 13
  14. 14. FUTURE RESEARCH  Future research should consider CAMTaKE for tacit knowledge exploitation and management for organisational transformation  Design of KM and Web 2.0 technologies needs to consider the application of the Theory of Deferred Action (ToDA) 24 June 2009 Frank Nyame-Asiamah © 14
  15. 15. Frank.Nyame-Asiamah@brunel.ac.uk 24 June 2009 Frank Nyame-Asiamah © 15