Knowledge management is becoming a fashion in many organizations. This entails the danger that large investments in knowledge externalization are made with little short-term repayment. Moreover, there is a risk that knowledge management administrations operate in parallel and with little connection to the business processes. We argue that the main purpose of business knowledge is improved action, and therefore we must interrelate processes of knowledge creation and usage with the normal business processes both on a conceptual and a system level. The paper presents a model-based approach for solving this integration problem, and describes an implementation architecture which links knowledges processes
to a workflow environment. Experiences in an organization where our system was successfully installed indicate that such a “light-weight” integrated solution offers a relatively easy and immediately useful entry point into organizational
knowledge management.
The paper will explore the fact that a DES oriented archi-
tecture is not a “sort of SOA”, it\’s not just a “bigger SOA”. A
whole set of new problems are to be addressed namely re-
sponsive alignment with the business, decentralization, owner-ship of the knowledge base and self healing.
Development Challenges, South-South Solutions is the monthly e-newsletter for the United Nations Development Programme’s South-South Cooperation Unit (www.southerninnovator.org). It has been published every month since 2006.
Stories by David South
Design and Layout: UNDP South-South Cooperation Unit
American University of Central Asia,
formed in 1997, is dedicated to improving
the quality of education it offers by adding new curricula, new programs, and new services to equip its graduates with the knowledge and skills necessary to contribute to this rapidly changing and developing region and the world beyond.
Engagement, Evolution, Electronics: El Futuro se escribe con "E"Rogelio Umaña
Presentación realizada en el Seminario Ejecutivo: Medios Sociales en los Negocios, organizado por El Club de Investigación Tecnológica de Costa Rica y la Universidad Veritas.
The paper will explore the fact that a DES oriented archi-
tecture is not a “sort of SOA”, it\’s not just a “bigger SOA”. A
whole set of new problems are to be addressed namely re-
sponsive alignment with the business, decentralization, owner-ship of the knowledge base and self healing.
Development Challenges, South-South Solutions is the monthly e-newsletter for the United Nations Development Programme’s South-South Cooperation Unit (www.southerninnovator.org). It has been published every month since 2006.
Stories by David South
Design and Layout: UNDP South-South Cooperation Unit
American University of Central Asia,
formed in 1997, is dedicated to improving
the quality of education it offers by adding new curricula, new programs, and new services to equip its graduates with the knowledge and skills necessary to contribute to this rapidly changing and developing region and the world beyond.
Engagement, Evolution, Electronics: El Futuro se escribe con "E"Rogelio Umaña
Presentación realizada en el Seminario Ejecutivo: Medios Sociales en los Negocios, organizado por El Club de Investigación Tecnológica de Costa Rica y la Universidad Veritas.
Norse Energy Appeal of Town Frack Ban Back to NY Court of Appeals for Second ...Marcellus Drilling News
The appeal of Norse Energy of the case in which New York's highest court, the Court of Appeals, ruled against Norse and allowed the Town of Dryden to ban fracking townwide. Norse is asking the court to re-hear the case based on a recent decision in a Colorado court that found such municipal bans are illegal.
Abraham recibió la promesa, Sara también, erradamente trataron de cumplirla en sus fuerzas, resultado ISMAEL, pero EL DESTINO de Sara y Abraham permanecieron SU PROMESA, fue cumplida en ISAAC
Presentació de suport a les explicacions realitzades durant la presentació de la Plataforma Rubí Sense Abocadors. Qualsevol dubte, us podeu posar en contacte a https://facebook.com/RubiSenseAbocadors o plataforma.rubisenseabocadors@gmail.com
Strengthening Employees Responsibility To Enhance Governance Of It Cobit Ra...guest418d60a0
The ongoing financial markets debacle and the global economic context advocate enhancing the governance of the companies and, de facto, improving the elaboration and the understanding of employees' responsibilities. Furthermore, the moral aspects of the business and the employees' commitment have appeared as becoming increasingly unavoidable to face emerging ethical challenges. These arising requirements have oriented our research toward the elaboration of an innovative responsibility model built on the concepts of obligation/accountability, right and commitment. This paper aims to present, validate and improve the responsibility model on the basis of a comparison to related concepts from the COBIT framework. In parallel to this improvement, proposals of conceptual modification of the COBIT framework are made and illustrated based on the RACI chart.
1
45
Table of Contents
Introduction3
Need for technology-based solutions3
Infrastructure Automation Tools4
Implementation4
The Central Theory: Organizational Management and Memory4
Organizational Management4
Organizational Memory4
Need of Data Archival And Storage5
Data Storage.5
Types of Storage.6
Data Archival9
Data Archival Process9
Archiving principles12
Data Management Systems12
Enterprise Resource Planning Systems (ERP systems) for data integration.13
Microservices.15
Properties of Monolithic.17
Conclusion22
References24
Introduction
Technology is considered vital in today's globalized world. Especially in terms of business, information technology has both quantifiable and unquantifiable benefits. It is essential to communicate with customers and stakeholders regularly and necessary for communicating quickly and clearly. It helps in implementing business operations efficiently and effectively, also. A business with robust technological capacity creates new opportunities for a company to stay ahead of the competition and grow eventually (Rangus & Slavec, 2017). Consequently, it also makes dynamic teams that can interact from anywhere in the world—furthermore, technology aids in understanding the business needs and managing and securing confidential and critical data.Need for technology-based solutions
The need for data recovery, active and continuous data processing by its life cycle of significance and utility for research, scientific and educational purposes (Bukari Zakaria & Mamman, 2014). The acknowledgment that information is an organization's key asset since late, decisively affecting its profitability, has contributed to some comprehensive corporate memory approaches. The key causes of competitive advantage are corporate memory and organizational learning ability (C. Priya, 2011). Hence the main obstacle is the effectiveness of information management while ensuring the consistency of training facilities.
Organizations need robust technology-based solutions. Thus, software developers have developed and deployed various forms of overtime architectures that enable software products to become resource-effective and usable. Some architectures implement their frameworks in either one layer or various layers or levels (Suresh, 2012). It is understood that ERP implementation efficiency of ERP implementations is influenced by the rise or excess of a certain degree of capability in the volume of data to process (Johansson, 2012). In the last couple of decades, new architectures have been created with creativity that offers optimum solutions. Thus, the microservices architecture is gaining room and becoming part of the technological, financial, and advertising decision-making process. Microservices replace monolithic, tightly dispersed system-focused applications with an independent operation (Vrîncianu, Anica-Popa, & Anica-Popa, 2009).Infrastructure Automation Tools
One issue as microservices are applied is that any s ...
1
45
Table of Contents
Introduction3
Need for technology-based solutions3
Infrastructure Automation Tools4
Implementation4
The Central Theory: Organizational Management and Memory4
Organizational Management4
Organizational Memory4
Need of Data Archival And Storage5
Data Storage.5
Types of Storage.6
Data Archival9
Data Archival Process9
Archiving principles12
Data Management Systems12
Enterprise Resource Planning Systems (ERP systems) for data integration.13
Microservices.15
Properties of Monolithic.17
Conclusion22
References24
Introduction
Technology is considered vital in today's globalized world. Especially in terms of business, information technology has both quantifiable and unquantifiable benefits. It is essential to communicate with customers and stakeholders regularly and necessary for communicating quickly and clearly. It helps in implementing business operations efficiently and effectively, also. A business with robust technological capacity creates new opportunities for a company to stay ahead of the competition and grow eventually (Rangus & Slavec, 2017). Consequently, it also makes dynamic teams that can interact from anywhere in the world—furthermore, technology aids in understanding the business needs and managing and securing confidential and critical data.Need for technology-based solutions
The need for data recovery, active and continuous data processing by its life cycle of significance and utility for research, scientific and educational purposes (Bukari Zakaria & Mamman, 2014). The acknowledgment that information is an organization's key asset since late, decisively affecting its profitability, has contributed to some comprehensive corporate memory approaches. The key causes of competitive advantage are corporate memory and organizational learning ability (C. Priya, 2011). Hence the main obstacle is the effectiveness of information management while ensuring the consistency of training facilities.
Organizations need robust technology-based solutions. Thus, software developers have developed and deployed various forms of overtime architectures that enable software products to become resource-effective and usable. Some architectures implement their frameworks in either one layer or various layers or levels (Suresh, 2012). It is understood that ERP implementation efficiency of ERP implementations is influenced by the rise or excess of a certain degree of capability in the volume of data to process (Johansson, 2012). In the last couple of decades, new architectures have been created with creativity that offers optimum solutions. Thus, the microservices architecture is gaining room and becoming part of the technological, financial, and advertising decision-making process. Microservices replace monolithic, tightly dispersed system-focused applications with an independent operation (Vrîncianu, Anica-Popa, & Anica-Popa, 2009).Infrastructure Automation Tools
One issue as microservices are applied is that any s ...
ONTOLOGY DRIVEN KNOWLEDGE MAP FOR ENHANCING BUSINESS PROCESS REENGINEERINGcseij
It has been a constant human desire to be dissatisfied with the status quo as there is always need to
improve upon the way business is being done. As a result, Business process reengineering is introduced
into organization in order to overcome these challenges of inefficiencies and high running cost. A lot of
problems were encountered during the process of reengineering programmes. One of many factors that are
identified as the possible reason for the failures in most business process reengineering is the lack of giving
much emphasis on the knowledge available within the environment in which the business process is taking
place. In this paper therefore we propose a methodology that addresses this issue through the use
knowledge source map and formal organizational ontology. The organization and business process are
model together to provides most efficient way of utilizing the knowledge in the organization in the event of
business process reengineering.
Knowledge management (KM) has become an effective way of managing organization‟s intellectual capital or, in other words, organization‟s full experience, skills and knowledge that is relevant for more effective performance in future. The paper proposes a knowledge management to achieve a competitive control of the machining systems. Then an application of Knowledge Management in engineering has been attempted to explain. The model can be used by the manager for the choosing of competitive orders.
Educaterer India is an unique combination of passion driven into a hobby which makes an awesome profession. We carve the lives of enthusiastic candidates to a perfect professional who can impress upon the mindsets of the industry, while following the established traditions, can dare to set new standards to follow. We don't want you to be the part of the crowd, rather we like to make you the reason of the crowd.
Today's Effort For A Better Tomorrow
Similar to Rapid Knowledge Deployment in an Organizational-Memory-Based Workflow Environment (20)
Gamification of Community Information SystemsRalf Klamma
SAGE Dissemination Workshop, Sousse, Tunesia, April 2017
Ralf Klamma, Mohammad Abduh Arifin
Advanced Community Information Systems (ACIS)RWTH Aachen University, Germany
klamma@dbis.rwth-aachen.de
The Legacy and the Future of Research Networks in Technology-Enhanced LearningRalf Klamma
Ralf Klamma
Orphée Rendevous 2017, Font Romeu, France
Advanced Community Information Systems (ACIS) RWTH Aachen University, Germany
klamma@dbis.rwth-aachen.de
Scaling up digital learning support for smart workforce development in cluste...Ralf Klamma
4th Research Forum on Small and Medium Sized Enterprises, Chur, Switzerland, February 9-10, 2015
Ralf Klamma & Tobias Ley
RWTH Aachen University, Germany & Tallinn University, Estonia
klamma@dbis.rwth-aachen.de & tley@tlu.ee
Ralf Klamma
Advanced Community Information Systems (ACIS)RWTH Aachen University, Germany
klamma@dbis.rwth-aachen.de
Dresden, January 22, 2015
las2peer is a distributed, highly reliable and secure platform for creating community information systems and community services.
The main goal of las2peer is to provide a fast and flexible way to create services which may communicate with each other and their users through standard protocols. The used and stored information is handled in a trustworthy way and within full control of the communities.
Technical Challenges for Realizing Learning AnalyticsRalf Klamma
Technical Challenges for Realizing Learning Analytics
Learntec 2015, January 28, 2015, Karlsruhe, Germany,
Ralf Klamma
Advanced Community Informations Systems (ACIS) Group
RWTH Aachen University
Technology-Enhanced Learning at the Workplace – From islands of automation to...Ralf Klamma
Technology-Enhanced Learning at the Workplace – From islands of automation to broad deployment of informal learning in small and medium sized enterprises
Invited Talk - Siegen, January 20, 2015
Ralf Klamma, RWTH Aachen
Advanced Community Information Systems Group (ACIS)
Blueprint for Software Engineering in Technology Enhanced Learning ProjectsRalf Klamma
Blueprint for Software Engineering in Technology Enhanced Learning Projects
Ralf Klamma, Michael Derntl, István Koren, Petru Nicolaescu, Dominik Renzel
RWTH Aachen University Advanced Community Information Systems (ACIS) Aachen, Germany
klamma@dbis.rwth-aachen.de
9th European Conference on Technology Enhanced Learning (EC-TEL 2014)
September 18-21, 2014
Graz, Austria
Navigation Support in Evolving Communities by a Web-based DashboardRalf Klamma
Navigation Support in Evolving Communities by a Web-based Dashboard
10th IFIP WG 2.13 International Conference on Open Source Systems, OSS 2014, San José, Costa Rica, May 6-9, 2014
Anna Hannemann, KristjanLiiva, Ralf Klamma
RWTH Aachen UniversityAdvanced Community Information Systems (ACIS)
hannemann@dbis.rwth-aachen.de
Advanced Community Information Systems Group (ACIS) Annual Report 2013Ralf Klamma
Advanced Community Information Systems (ACIS)
Lehrstuhl Informatik 5 – Information Systems
RWTH Aachen University
Ahornstr. 55 | 52056 Aachen | Germany
Community Learning Analytics - Challenges and Opportunities - ICWL 2013 Invit...Ralf Klamma
Community Learning Analytics –Challenges and Opportunities
Invited Talk ICWL 2013, Kensing, Taiwan, October 7, 2013
Ralf Klamma
Advanced Community Information Systems (ACIS)
RWTH Aachen University, Germany
klamma@dbis.rwth-aachen.de
Supporting Professional Communities in the Next Web Ralf Klamma
Keynote
PWM Wissenstag Social Enterprise @ I-KNOW 2013
Wednesday, September 4, 2013 in Graz (Austria)
Ralf Klamma
Advanced Community Information Systems (ACIS)
RWTH Aachen
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Rapid Knowledge Deployment in an Organizational-Memory-Based Workflow Environment
1. Rapid Knowledge Deployment in an Organizational-Memory-Based Workflow
Environment
Ralf Klamma, Sylvia Schlaphof
Lehrstuhl V f¨ r Informatik, RWTH Aachen / COMPRO Gesellschaft f¨ r IT Services & Solutions mbH
u u
Ahornstr. 55, 52056 Aachen, Germany / Otto-Hesse-Strasse 19, 64293 Darmstadt, Germany
email: klamma@informatik.rwth-aachen.de / Sylvia.Schlaphof@compro.de
TABLE I
Abstract— Knowledge management is becoming a fashion in many or-
ganizations. This entails the danger that large investments in knowledge M NEMONIC P ROCESSES MENTIONED IN L ITERATURE
externalization are made with little short-term repayment. Moreover, there
is a risk that knowledge management administrations operate in parallel Literature Mnemonic processes
and with little connection to the business processes. We argue that the Stein and Zwass Acquisition, Search, Retrieval, Retention,
main purpose of business knowledge is improved action, and therefore we [7] Maintenance
must interrelate processes of knowledge creation and usage with the nor- Ramesh [11] Acquisition, Retrieval, Retention, Devel-
mal business processes both on a conceptual and a system level. The paper opment, Reuse
presents a model-based approach for solving this integration problem, and Morrison [12] Acquisition, Search, Retrieval, Retention
describes an implementation architecture which links knowledges processes Wijnhoven [13] Acquisition, Search, Retrieval, Retention,
to a workflow environment. Experiences in an organization where our sys- Dissemination
tem was successfully installed indicate that such a “light-weight” integrated Burstein et al. [9] Acquisition, Retrieval, Retention, Mainte-
solution offers a relatively easy and immediately useful entry point into or- nance, Learning
ganizational knowledge management.
I. I NTRODUCTION
IV while a summary concludes the paper.
Work practice, technology, and processes change in the digi-
tal economy [1]. In order to stabilize the change process, knowl- II. S UPPORTING ACTIVITY O RIENTED K NOWLEDGE
edge management is getting more and more important. Beside
Each enterprise has something like an organizational mem-
new organizational functions like knowledge managers or bro-
ory (OM). We do not want to stress the problematic use of
kers there are large investments in IS support for knowledge
anthropomorphic metaphors here, cf. e.g. [4–6] for a detailed
management.
discussion. According to the definition given by [7] this OM
However, this also entails some risks. First, IS support for
“is the means by which knowledge from the past is brought to
knowledge is no end in itself. The acquisition of computer man-
bear on present activities, thus resulting in higher or lower lev-
ageable knowledge is costly and has to be related to the use-
els of organizational effectiveness.” It should be clear by now
fulness of the acquired knowledge [2]. Second, large invest-
that enterprises follow some kind of business plans and exe-
ments in knowledge management infrastructure can fix current
cute business processes. These processes are defined implicitly
technological support for years, even when now organizational
or explicitly. Following Argyris and Sch¨ n we define implicit
o
and technological change is measured in months. Finally, how
processes as theories-in-use and explicit processes as espoused
can these many small but rapidly growing knowledge-intensive
theories [8]. An IS-supported organizational memory system
companies with quick turnover times for people, technology and
(OMS), is a “means of capturing and giving access to organi-
processes [3] preserve and use their knowledge from the history
zational memory” [9] by so called mnemonic processes oper-
to act for the future?
ating on the OMS. We have reviewed current research literature
In this paper we present the organizational-memory-based [10] and extracted a set of mnemonic processes mentioned in
workflow environment G RAECULUS 1 and a bootstrapping almost every paper (marked bold in table I). Our hypothesis is
method carefully designed to demonstrate the main feature of the following. Business processes involving people and tech-
rapid knowledge deployment. This is reached by explicit rep- nology are that part of the OM promising the best utilization of
resentation and operationalization of so called mnemonic pro- resources. So capturing and accessing OM should concentrate
cesses (cf. section II) to create, maintain and use knowledge on these processes. To strengthen the hypothesis we claim that
about business processes in a model-based environment. We use the interrelation of business and mnemonic processes provide
the environment to externalize a core of business process mod- an ideal OM-based workflow environment for both support-
els with mnemonic processes while reaching a critical mass for ing short-term activities and long-term knowledge management
a functional web-based workflow environment very soon. which is motivated in the following.
The rest of the paper is organized as follows. In section II
1. There should be “no shadow administration” of knowledge
we examine current IS support for activity oriented knowledge
engineering. [14, p. 219].
and then present the bootstrapping method and our model-based
Since knowledge engineering becomes a fashion a lot of activ-
approach in section III. Experiences with using G RAECULUS in
ities in practice and research have been started. Many of them
a small knowledge-intensive company are discussed in section
are leading to new functional units, positions, information sys-
1 Graeculi were well-educated Greek slaves in ancient Rome feeding their tems, and so on. While the importance of knowledge engineer-
masters with information in interlocutions and negotiations. ing is undoubtful, the development, utilization, and maintenance
2. of knowledge management systems are expensive. The integra- processes while there is some kind of explicit mnemonic pro-
tion of classical business information systems and new knowl- cess support.
edge engineering processes could be much cheaper. Mnemonic processes are used implicitly or delegated to man-
2. Change in business processes should be modeled explicitly ual tasks.
by means of mnemonic processes in order to stabilize the change In many business process modeling tools, workflow manage-
process. ment or coordination systems the definition and enactment of
(a) Reference models [15] are generalized “memories” of spe- business processes is supported well. Microsoft Exchange
cial business sectors, e.g. for engineering or financial compa- Server, Lotus Notes, Prominand, ARIS Toolset, and SAP R/3
nies. Therefore, costly mnemonic processes performed by con- are prominent for their functionality. But these systems are lack-
sultants operate implicitly on these models for specific needs ing the explicit support for mnemonic processes.
like tailoring or aligning. But without explicit linkage and Recent research systems like Eule 2 [26], KnowMore [27], On-
recorded traces the experience gained in these operations will toBroker [28] or WorkBrain [29] which try to integrate work-
be lost. flow management and organizational memory functionalities
(b) Business process modeling is embedded in the existing but provide some simultaneous support for both areas. But there
changing world of human resources and information systems. is no explicit interrelation of mnemonic processes and business
Every change in any area will lead to changes in other areas. processes on the modeling level nor on the operational level to
For example, ISO 9000 alignment has caused problems for com- integrate explicit change process support.
panies in a turbulent environment [16]. Again, if this change Eule 2 stems from a project to restructure office tasks for life
management is handled in an implicit manner, the traceability assurance management. It had the goal to assign former experts
of changes will be lost [1]. for special business cases to all possible business cases in a cus-
(c) The speed of changes is rapidly increasing. While (re- tomer base. The expertise to manage the business cases is mod-
)engineering tasks in former days could be measured in years eled in a strict workflow environment. The user has to follow the
the next decade will experience rapid (re-)engineering within rules given by the system. The needed knowledge is integrated
weeks based on new organizational models in the digital econ- by a high-level representation language and a hybrid reasoning
omy [17]. The efficiency of computer-supported tools to handle component.
this enormous effort will depend on their ability to stabilize the The KnowMore project uses the process of building, analysing
change process. and executing workflow representations to create organizational
3. The processes of modeling and performing tasks are cooper- knowledge. If some knowledge is created within a workflow,
ative and evolutionary. the workflow context is stored so that the knowledge can be re-
To support these processes, it is useful to smoothly integrate the trieved for reuse in other workflows. For information retrieval
existing tacit OM and externalize the processes on demand. It and active triggering the system uses a logic-based modeling
should be possible to start for example with small pilot projects. approach on the basis of formal ontologies. An ontology is a
Enterprise resource planning systems like SAP concentrate on specification of shared conceptualization. In business process
big companies with stable and long living processes. Our ap- modeling approaches a meta model has a similar meaning.
proach is directed at small knowledge-intensive companies or A workflow environment on top of the OntoBroker system is
groups within a rapidly changing environment. presented in [28]. Ontobroker allows HTML, RDF and XML
In the literature we have found little support for both, an ex- based formulation of knowledge facts. The integration of doc-
plicit notion of short/long-term activities and an explicit inter- uments containing knowledge and business processes modeled
relation of these concepts. Many systems support short-term by means of high-level petri nets will be implemented with a
communication, cooperation and coordination in networked or- logic-based approach like in the KnowMore project. So, the
ganizations or distributed project teams. The use of metaphors mnemonic processes are views definig a context.
makes them successful by minimizing training efforts [18]. Sys- WorkBrain is an OM-based workflow environment imple-
tems based on the coordinated exchange of electronic mail have mented as a HTTP-Server generating HTML pages (eventually
successfully invaded markets because of their simplicity. Mi- with Java applets) dynamically on top of the commercial work-
crosoft Exchange Server or Lotus Notes are examples for this flow system FLEXWARE. WorkBrain aims at the improvement
class of applications. of worklow execution by learning in two learning loops based
The level of business process awareness in such systems can on the case base of executed worklows and the general orga-
be implicit, explicit or mixed. While explicit use of business nizational knowledge base. Learning by doing increases plan-
processes depends on an externalized description of the process, ning and execution quality by modifying workflows at run-time.
possibly managed by computerized tools, implicit use of busi- Learning by supervision modifies workflows at build-time by
ness processes depends on theories-in-use. analysing and reconfiguration. The mnemonic processes in the
The idea of combining short-term activity support with long- system, e.g. “Retrieval of suitable workflow cases”, support
term knowledge management is obvious (cf. e.g. [19–23]) but these goals. The mnemonic processes are not explicit them-
simultaneous support for both areas has been limited. selves but implemented in a case-based reasoning component.
Business processes are used implicitly or have been coded
III. B OOTSTRAPPING A W ORKFLOW E NVIRONMENT
into the applications.
In organizational memory systems like AnswerGarden [24] or In late 1998 the G RAECULUS system was developed and in-
Knowledge Pump [25] there is no explicit notion of business stalled in a small company concerned with operating a demon-
3. TABLE II
tion (converting explicit to explicit), and internalization (con-
TASK - SPECIFIC PROBLEMS IN A KNOWLEDGE - INTENSIVE COMPANY
verting explicit to tacit). The process itself is structured as fol-
lows:
Problem Example Reason Possible Mea- 1. Identify the core business processes in the enterprise.
sure
This can be done in brainstorming sessions or unstructured in-
(P1) Tacit “How can Employees not Internalize
task-related I cancel an available or explicit task- terviews. A primary core business process for the company is
information entry?” occupied related infor- the organization and performance of workshops. The workshop
not available mation schedule is planned in advance for an one year period. Work-
(P2) Loca- “Where is the No central Combine
tion of explicit template for repository distributed shops much asked for can be repeated short dated. The orga-
paper/computer- name plates?” documents and nization process itself is stable and repeatable. Mainly, it con-
based docu- tasks sists of many time-comsuming but simple tasks, e.g. billing or
ments not
known preparing workshop material, which can be delegated to student
(P3) Business “Why is there Work load hin- Externalize workers. So, externalization starts with that process.
processes not no checklist?” ders documen- business pro- 2. Identify people (agents) working within the core processes.
documented tation cesses and
combine with We have selected five people involved in organizing workshops.
tasks Three of them have been quite a long time in the company. The
(P4) Infor- “Is the flyer Part-time Externalize two others have been project engineers in their first year. Both
mation flow ready?” workers not al- and annotate
breaks ways available finished task have been supported by a few student workers.
(P5) Short- “Where is the Employment Externalize 3. Let agents describe their processes and tools. Use a business
term contracts guy who made of (PhD) tasks and process model to represent these concepts.
for employees the flyer last students related infor-
time?” mation Do structured interviews or perform group meetings [32] with
(P6) Employ- “How can Many software Combine and the different agents. In the knowledge elicitation process we
ees can not I load that packages, internalize have been faced with the problems mentioned in table II. In-
work with all IGES file in personell task-specific
software Konsys?” turnover, daily software terestingly, both experienced and inexperienced employees did
work pressure documentation not complain about the lack of explicit engineering or R & D
expertise but the lack of tedium knowledge of how to perform
simple tasks. While the complaints of inexperienced worker are
strational production plant and performing 20 workshops per an- quite obvious, the experienced workers complained about the
num in modern production technology (e.g. CAD/CAM), qual- disturbance of their work by being asked for task information
ity management, and related issues. This company shows typi- frequently. So, primary goal of the elicitation process has been
cal characteristics of a knowledge-intensive firm. Central factor the identification of the processes performed by the agents and
of production is technological knowledge and its transfer from the supporting tools and documents. In G RAECULUS the usage
university/industry to industry which results in a high through- of arbitray business process models is possible as long as the
put of information. Additionally, the daily work load and the concepts of the models can be related to the meta model.
personnel turnover are very high, mainly due to R & D activities 4. Create to bootstrap repository.
and therefore additional employment of (PhD) students. The ef- Use the mnemonic process knowledge creation to externalize
fect of the two phenomena is a permanent loss of organizational process, agent and tool representations in the underlying repos-
memory. Some of the company’s real problems have been iden- itory. Externalize the links between knowledge agents, pro-
tified in the bootstrapping process and are shown in table II. This cesses, tools, and documents. All objects and relations have
justifies the need of an OM based workflow environment in this been created with the G RAECULUS system by transcribing the
company even though the average company’s total staff is only elicitation results. Also, the system’s representation and its us-
about 10 people. age has been externalized (cf. section III-A).
For the realization of an OM-based workflow environment it 5. Empower people in short training sessions.
is important to have a certain amount (critical mass) of informa- Employees learnt to use the system very fast because of it sim-
tion already in the system. Thus, we need a bootstrapping pro- plicity. Training effort was also reduced since people were al-
cess [30] for the creation of the system. In order to define a way ready involved in the bootstrapping process. Especially search
how to start the rapid knowledge deployment process in a real facilities have been adopted very well. Knowledge creation was
organization we employ the dynamic knowledge conversion ap- a problem at first. People disliked to externalize knowledge fear-
proach by Nonaka and Takeuchi [31]. The describe the creation ing it could be wrong or not interesting. Later on, knowledge
and usage of organizational knowledge through the dynamic in- externalization processes were used more frequently, especially
terplay between tacit and explicit knowledge. Tacit knowledge in delegated tasks performed with the workflow component.
is personal knowledge hard to formalize or to communicate to 6. Let the system run to build up knowledge.
others. Explicit knowledge is formal knowledge easy to trans- Some of the experiences users made with the systems are dis-
mit between individuals, groups or information systems. The cussed in section IV.
dynamic process creates a continuous spiral of organizational
A. The Modeling Approach
knowledge creation with the four modes of knowledge conver-
sion: socialization (converting tacit knowledge to tacit knowl- To interrelate the mnemonic with the business processes on a
edge), externalization (converting tacit to explicit) , combina- conceptual level, we construct a meta model which emphasizes
4. ness processes will be represented by models expressed in a
language chosen by the agents. Since we used a meta model
approach, the use of different modeling languages is possible.
These models can be interrelated by means of mnemonic pro-
cesses and meta modeling techniques. For G RAECULUS we
use the language described in [35] which has been developed
and validated in the FOQUS improvement management context
[36, 37]. For the sake of brevity we here describe the concepts
only in short.
Process. This concept describes business processes performed
by agents. Business processes can be refined by contains.
Agent. This concept characterizes humans (groups of human)
of software performing a business process.
Tool. The tool concept describes technologies supporting the
agents performing their processes. There is a clear distinction
between tools and additional resources which belong to the ob-
ject concept.
Object. In a business process environment the object concept
Fig. 1. Organizational Memory Meta Model (C ONCEPT B ASE Window Dump)
describes artifacts consumed, manipulated or produced in busi-
ness processes.
An OM-based workflow environment which supplies a
knowledge-based support to the company’s activities seems to
be appropriate to enhance the primary objective - the compet-
itive performance - of a company. Hence, the mnemonic pro-
cesses have to deal with the activities of the company. As a con-
sequence, the business processes get the role of objects, which
will be produced, consumed, searched, and represented by the
mnemonic processes (cf. figure 2).
2. Knowledge agents are involved in any kind of processes.
Due to both previous explications, it is obvious that knowledge
agents are not only involved in mnemonic processes but also in
business processes. In reference with mnemonic processes we
have to refine the concept of agent. Therefore, we distinguish
the following refined concepts (cf. figure 1).
Knowledge Creator. New knowledge is obtained through con-
version of explicit and implicit knowledge. In knowledge-
intensive enterprises most of the employees frequently create
new knowledge. To make this knowledge useful for the com-
Fig. 2. Business Processes are Objects of the OM (C ONCEPT B ASE Window
Dump) pany’s goals, the knowledge creator must be able to externalize
and share this knowledge. Within the OM model the knowledge
creator performs the acquisition of new knowledge, so this con-
the coherence between both kind of processes. The meta model cept refers to knowledge creation.
is based on an extended entity-relationship approach, the Telos Knowledge User. People who are looking for some knowledge
language [33]. The mnemonic process part of the meta model - e.g. people, searching for an answer to an emerging question
is given in figure 1 using a graphical presentation. Each icon - are called knowledge users. Knowledge users perform knowl-
represents a concept of the meta model. Attribute links between edge search and retrieval processes within the OM model and
concepts are shown as arrows labeled by an attribute name. In- eventually become experts through their intensive use of pro-
stance links are arrows marked by the label in while isA-links cesses, objects, and tools.
are presented as bold arrows. In the following concepts are Expert. Experts are people who hold a certain part of knowl-
typed italic. The modeling process has been performed with the edge relevant for the company. These people maintain an im-
C ONCEPT BASE system [34] to check integrity and consistence portant part of the OM because they hold implicit knowledge,
of the models. The meta model then has been transferred to the difficult to externalize and in so far can hardly be supported di-
relational database management system on which the G RAECU - rectly by computer supported tools for knowledge management.
LUS system has been built. The most important ideas underlying Knowledge Administrator. The knowledge administrator super-
the meta model can be summarized as follows: vises the OMS. For knowledge can get conflicting or invalid over
1. Business processes models are the primary objects of the sys- time, it is necessary to do so. He can explicitly select processes,
tem. objects, tools and agents for maintenance processes like aging
Organizational activities contain important knowledge. Busi- and archiving. Monitoring processes can also be performed by
5. TABLE III
G RAECULUS was implemented on the server using servlets
K NOWLEDGE C ONVERSION & C ONNECTING S TRATEGIES ( ADAPTED FROM
[40]. Servlets respond to HTTP-queries of web browsers and
[38])
generate web pages dynamically. No additional installation on
the clients is necessary. Using web browsers facilitates hardware
Knowledge flow . . . People . . . Knowledge
People to . . . Socialization Externalization independence and user fitness. Scalability of a central-server
Asking an Expert Query based servlet engine is ensured by frequently used services on
Filtering the internet, e.g. Java Developer Connection. The implementa-
Guided Exploration
Knowledge to . . . Internalization Combination tion and the deployment of G RAECULUS was proven easy and
Subscription Navigation cheap - the whole implementation of G RAECULUS contains no
Task-specific Pushing more than 15.000 lines of code.
The mnemonic processes use the knowledge repository in
different ways. Newly externalized knowledge is propagated
the OMS itself, e.g. for assigning expert roles to agents (knowl- into the knowledge repository by knowledge acquisition, so
edge maintenance). the knowledge repository gets enhanced and actualized. In
Agents use the OMS repository as an essential tool. Through knowledge creation processes affected objects will be locked by
the linkage of relevant information to the business processes, G RAECULUS to avoid inconsistencies. The retrieval of knowl-
knowledge concerning the processes is stored permanently in edge can be obtained by search functionalities. Convenient
this knowledge repository. Furthermore, the modeling approach search strategies are necessary to attain flexibility and fast search
guarantees a documentation of processes for further use, e.g. in runs:
personnel training. Guided search allows to look for particular instances from cho-
3. Mnemonic processes are business processes themselves. sen concepts of the business processes. Therefore, the agent can
The mnemonic processes establish an important determination select a desired concept and receive a list of all stored instances,
for successful knowledge management because someone is un- from which he can choose the sought item.
able to make use of stored knowledge without them. Therefore, Full-text search allows to look for a particular pattern in the
these processes are a central part in G RAECULUS. As described whole knowledge repository. All relevant items will be listed.
in [19] the resulting workflow environment is not only a repos- Index search provides an ordered list of all stored items of
itory but has to be embedded in the processes and tasks of the which the agent can choose the desired item.
organization. Even though mnemonic processes have more long- The process “asking an expert” is used to obtain further im-
term characteristics than short-term business processes, it is im- plicit knowledge. For retrieval, the searched items will be dis-
portant to emphasize that mnemonic processes are activities of played and interrelated items will be referred. To organize the
the company as well. So, these activities have to be supported retrieval of files effectively these files can be opened through
by G RAECULUS just as business processes. Therefore, it is in- MIME functionalities of web browsers directly.
sightful to model mnemonic processes in the same manner as To preserve the consistency and actuality of the knowledge
business processes. For the sake of brevity we describe only repository different maintenance processes are implemented.
mnemonic usage processes here. The use of existing knowl- Mainly, the successful integration of new knowledge can be
edge is significant for an effective company’s performance in checked by monitoring the use of knowledge. Further examples
changing environments. The quality of decisions and prob- are the prevention of data loss through backup functionalities.
lem solutions is influenced by its abilities to search and retrieve For a proper assistance of the agents an explicit user manage-
[39]. Hence it is important to provide effective means to access ment is put into action.
knowledge directly through suitable storage structures. Morri- A background archive is used to swap out aged knowledge
son [12] describes techniques like “asking an expert”, query-
ing, filtering, guided exploration, subscriptions, and navigation
as effective strategies in different usage contexts. Workflow-
based systems introduced the process of task-specific pushing
of information [19, 35]. O’Leary [38] adds the idea of connect-
ing people and knowledge to the idea of knowledge conversion
modes introduced by Nonaka and Takeuchi [31]. In table III we
assign the mnemonic processes related to search & retrieval to
the knowledge flows described by O’Leary.
B. G RAECULUS Architecture
The G RAECULUS architecture is based on a client-server con-
cept. Both, data storage and implementation are realized on a
central server. The resulting advantage is a single, non redun-
dant data storage with no need for replication. To realize persis-
tent storage and efficient access, a relational database manage-
ment system is deployed. We used a public domain multi-user,
multi-threaded SQL server. Fig. 3. G RAECULUS Architecture
6. propriate task. It has to be emphasized that through the creation
New 1. Request 2. Commitment
Process of new knowledge G RAECULUS can derive knowledge about
Coordinator
expertise, i.e. implicit knowledge. An agent can profit from
Performer
Process
per-
formedt
knowledge profiles of other agents and further knowledge about
4. Evaluation 3. Performance
Speech-act Oriented Workflows executed processes which is implicitly generated by G RAECU -
Verifier
Trisection of Process Performance
LUS (cf. section III-D).
2. Commitment
to performe
The interrelation between the knowledge base and the daily
3. Performance
+ Request for
Performer verifying
work through the workflow component of G RAECULUS pre-
1. Request for Newr
performance Process serves the validity of the stored knowledge. Invalid or incon-
sistent information is detected and corrected immediately by
per-
formedt agents performing processes.
Koordinator
Process
6. Evaluation
4. Commitment
to verify D. An Application of the Environment: Knowledge Maps
5. Verifying
Verifier
It is really important for organizations to know who has which
knowledge because transparency of knowledge is increased by
Fig. 4. G RAECULUS Workflow Approach recognizing deficits in certain areas or assign competences to
certain tasks. Even if an employee has left an organization, it
is important to realize how much knowledge has left also. An
that would lead to inconsistencies with the current knowledge. visualization of these facts is possible through use of so called
Aged knowledge will not be deleted because even former knowl- knowledge maps. Existing approaches include knowledge to-
edge about process performance may provide useful information pographies, geographic information systems, knowledge matri-
about history and development of the organization. To retrieve ces, and knowledge source maps.
aged knowledge, it can be reconstructed from the archive. However, creation and management of such knowledge maps
C. Integration with Daily Work are costly. G RAECULUS creates and manages such maps (ref-
erences to user meta knowledge, cf. figure 3) automatically by
G RAECULUS is embedded in the daily work activities. Thus, storing and analyzing traces of its use. Every time people are us-
the actuality of stored knowledge is ensured and the assets of ing the functionalities of the system, the models in the database
G RAECULUS are used in performing tasks directly. Still, the are instantiated. By querying the tables a knowledge profile of
system should accompany the agents in performing their tasks an employee will be generated online as a new HTML page.
without restricting their functioning. G RAECULUS does not pre- In extreme, such profiles include all the business processes and
vent the agents’ creativity and ability of learning which would mnemonic processes employees have performed but the queries
prevent process performance improvement. can be parameterized to cut down result sizes of the queries. It
We found a trisection of a typical process performance which is possible to query if an employee have accessed objects more
involves three agent roles. As shown in figure 4, an agent initi- than 10 times which could be determined as a criterion to be an
ates a new task, whereby he adopts the role of a coordinator. He expert for those objects.
delegates the execution and the subsequent verification of the The following query formulated in SQL leads to the dynami-
task to other agents and concludes it after these steps. cally generated HTML page in figure 5 (all readable information
To support this approach, a speech-act oriented workflow in German), where type discriminates the users role in objects,
model [41] has been expanded to map the business and e.g. expert for “WORD letter template”.
mnemonic processes on workflows which can be supported by
G RAECULUS. This model is based on the language/action per- SELECT AgentFulfilOMSObjectRole.Type,
spective [42] and describes the communicative relationships be- OMSObject.Name,
tween a customer who asks for an action, and a supplier who OMSObject.Description,
fulfills this work. OMSObject.Type
The processing of tasks will be referred through the neces- FROM AgentFulfilOMSObjectRole,
sary communicative procedure. Concerned agents will be sup- OMSObject
ported in performing their tasks through a workflow component WHERE AgentID = "Sylvia"
which accompanies them through task performance according && AgentFulfilOMSObjectRole.OMSObjectID
to his role and offers them additional information with regard to = OMSObject.ID
the performed tasks. The component is implemented by means
of deterministic automata and uses structured email to establish
IV. D ISCUSSION
communication with agents. More assets are gained through
the ability to monitor the process performance by means of the To show the abilities of G RAECULUS, we present an exam-
system’s logging facilities. The status of a process and the re- ple from the company in which the system is currently oper-
sponsible agent can be indicated at any time. ational. As shown in section III this is a real world example.
Furthermore, the agents can directly improve the knowledge An employee receives the order to create a new standard text
repository through their new knowledge, gained through the ex- letter to send invitations for a workshop. This will be done by
ecution of the task, and interrelate this knowledge with the ap- a coordinator with the workflow component of G RAECULUS.
7. when they realized to be an essential part of the system. The use
of acquisition results in a knowledge growth by 50 objects (25
%) in the remaining 5 weeks.
The primary effects observed through the deployment of
G RAECULUS are the following:
1. G RAECULUS has been used by new employees to work in
the company’s core processes.
Since the work load of staff is very high new employees will not
be acquainted with the company’s activities by other employees
but have to do this independently. With G RAECULUS they learn
about the company’s processes more efficiently and also profit
from added experiences.
2. G RAECULUS facilitates all employees in performing unfa-
miliar tasks.
For most company’s tasks are not assigned to certain employees
Fig. 5. Dynamically Created Knowledge Map (Window Dump) but will be performed by everyone, G RAECULUS is also used to
clarify uncertainties about task performance.
In structured interviews we evaluated the rapid knowledge de-
The instructed employee learns by navigating the business pro- ployment approach to knowledge management.
cess “create a standard text letter” that he requires a certain let- 1. The system was brought to the knowledge not vice versa.
ter template. Unfortunately, he does not know, where the tem- By installing the system there was no additional effort for new
plate file is stored, whereupon he performs “asking an expert”. personnel. All knowledge agent roles have been filled by the
G RAECULUS is now searching for an agent who is explicitly staff. There was no need for a knowledge engineer. The knowl-
denoted as an expert in templates, or someone who is using edge administrator’s role has been filled by the system adminis-
templates frequently. If both search runs fail, the result of the trator.
request will be the knowledge creator of the template and there- 2. The users liked the rapidity of knowledge deployment.
fore, the agent who created this template. Here, G RAECULUS The bootstrapping period has been followed by a bi-monthly im-
creates a link between fully independent processes. Now, a pre- plementation period in which most of the system’s components
pared email tool is invoked automatically to establish a contact have been realized by one programmer. After that period, all of
to the knowledge creator. Simultaneously, the employee can ini- the externalized knowledge was at their disposal. They have got
tiate an acquisition process and assign the knowledge creator to an almost immediate feedback for taking part in the bootstrap-
complete the lacking information in G RAECULUS. ping process.
The example demonstrates how an input on the operational 3. The users got a feeling about the usefulness of knowledge
level is able to cause effects on the modeling level. This clari- management.
fies, how the OM-based workflow environment can be deployed After a short initial period filled with fear and uncertainty the
directly through interrelating business and mnemonic processes. system’s processes have been accepted and the users feel em-
We evaluated early use in a period covering roughly 3 months powered in their roles. They understand that they are not only
by means of the I/S success model developed by DeLone and performing business processes but also enhancing the corporate
McLean [43]. After the bootstrapping process of about 2 months knowledge of the company.
which turned out about 200 objects, search and retrieval pro-
cesses of G RAECULUS are made available to half of the com- V. S UMMARY AND O UTLOOK
pany’s staff. The workflow and the knowledge acquisition com- We have presented a OM-based workflow environment with
ponent were added later. Thus, the users could get familiar with the explicit integration and interrelation of mnemonic processes
G RAECULUS by starting with the part which adduced most ad- which are used to create, access, and maintain an explicit rep-
vantages. resentation of an organizational memory together with a boot-
The usage evaluation process was twofold. For evaluating the strapping method for a rapid knowledge deployment. The sys-
amount of G RAECULUS use we utilized its logging mechanism. tem has been implemented and evaluated in a small knowledge-
For evaluation of user satisfaction with G RAECULUS, we have intensive company under controlled conditions.
integrated a survey form into G RAECULUS and performed struc- We choose an experimental approach by introducing tech-
tured interviews with the users. nology into an organization and then observing the use. By
In the evaluation phase of G RAECULUS the users performed combining qualitative and quantitative data gained from these
80 logins which generated 1518 web pages. The mnemonic pro- observation processes we then develop the next generation of
cesses have been adopted by the users very soon. Especially IS support. Although, this approach is limited through the
search functionalities - guided search more than full-text or in- time-consuming intensity of long-time experiments. The re-
dex search - have been used frequently. sults presented here are limited through the short evaluation
The acquisition component has been added in the mid of the period. Efforts are under way to study the use of our ap-
period. It has been used with a little delay because users feared proach in more organizations. Besides the operational func-
to acquire false or useless knowledge. But these fears vanished tional characteristics of G RAECULUS the approach has also
8. analytical capabilites as shown in [44]. We use the ap- tional Journal of Information Management, vol. 16, no. 5, pp. 329 – 340,
proach for comparative studies between engineering and cul- 1996.
[23] S. Decker, M. Erdmann, and R. Studer, “A unifying view on business
tural science projects. A community web site to study pat- process modelling and knowledge engineering,” in Proceedings of 10th
terns of knowledge organisation and communication in cultural Knowledge Acquisition Workshop, Banff, Canada, pp. 34/1–34/16, Uni-
science is operational under http://www-i5.informatik.rwth- versity of Calgary, 1996.
[24] M. S. Ackerman and T. W. Malone, “AnswerGarden: A tool for growing
aachen.de/lehrstuhl/research/projects/FKMedien/. organizational memory,” in Proceedings of the ACM Conference on Office
Information Systems, Cambridge, Mass., pp. 31 – 39, 4 1990.
ACKNOWLEDGMENTS [25] N. Glance, D. Arregui, and M. Dardenne, Information Technology for
Knowledge Management [2], ch. Knowledge Pump: Supporting the Flow
The authors thank Matthias Jarke and Franz-Josef Stepprath and Use of Knowledge, pp. 35–51. Berlin et al.: Springer-Verlag, 1998.
for their support. [26] R. v. Kaathoven, M. A. Jeusfeld, M. Staudt, and U. Reimer, “Organiza-
tional memory supported workflow management,” in “Electronic Busi-
R EFERENCES ness Engineering”, Proceedings 4. Internationale Tagung Wirtschaftsin-
[1] G. De Michelis, E. Dubois, M. Jarke, F. Matthes, J. Mylopoulos, M. Pa- formatik 1999 (A.-W. Scheer and M. N¨ ttgens, eds.), (Heidelberg), pp. 543
u
pazouglou, J. W. Schmidt, C. Woo, and E. Yu, “A three-faceted view of – 563, Physica-Verlag, 1999.
information systems: The challenge of change,” Communications of the [27] A. Abecker, A. Bernardi, and M. Sintek, “Enterprise information infras-
ACM, pp. 64 – 70, 12 1998. tructures for active, context-sensitive knowledge delivery,” in ECIS’99
[2] U. M. Borghoff and R. Pareschi, eds., Information Technology for Knowl- Procs. of the 7th European Conf. on Information Systems, 1999.
edge Management. Berlin et al.: Springer-Verlag, 1998. [28] S. Staab and H. Schnurr, “Knowledge and Business Processes: Approach-
[3] W. Starbuck, “Learning by knowledge intensive firms,” Journal of Man- ing an Integration,” in OM99 - Proceedings of the International Workshop
agement Studies, vol. 29, no. 6, pp. 713 – 740, 1992. on Knowledge Management and Organizational Memory (at Int. Joint
[4] K. Krippendorf, “Some principles of information storage and retrieval in Conf. on Artificial Intelligence, 1999), 1999.
society,” General Systems, vol. 20, pp. 15 – 35, 1975. [29] C. Wargitsch, T. Wewers, and F. Theisinger, “An organizational-memory-
[5] J. P. Walsh and G. R. Ungson, “Organisational memory,” Academy of Man- based approach for an evolutionary workflow management system - con-
st
cepts and implementation,” in Proceedings of the 31 Annual Hawai’i In-
agement Review, vol. 16, no. 1, pp. 57 – 91, 1991.
[6] M. S. Ackerman and C. Halverson, “Reexamining organizational mem- ternational Conference on System Sciences (HICSS-31) (J. R. Nunamaker,
ory,” Communications of the ACM, vol. 43, no. 1, pp. 59 – 64, 2000. ed.), vol. I, (Los Alamitos, CA), pp. 174 – 183, IEEE Computer Society
[7] E. W. Stein and V. Zwass, “Actualizing organizational memory with infor- Press, 1 1998.
mation technology,” Information Systems Research, vol. 6, no. 2, pp. 85 – [30] P.-A. Persson, “Creating the organization’s bootstrap: the organizational
memory function in a military organization,” in Proceedings of the 30 th
117, 1995.
[8] C. Argyris and D. Sch¨ n, Organizational Learning II: Theory, Method and
o Annual Hawai’i International Conference on System Sciences (HICSS-
Practice. Reading, Mass.: Addison-Wesley, 1996. 30), (Los Alamitos, CA), IEEE Computer Society Press, 1997.
[9] F. Burstein, H. Linger, E. Stein, and M. Jennex, “Researching organisa- [31] I. Nonaka and H. Takeuchi, The Knowledge-Creating Company. Oxford:
tional memory systems,” in Presentation at the 31st Annual Hawai’i In- Oxford University Press, 1995.
ternational Conference on System Sciences, Task Force on Organizational [32] M. Jarke and S. Kethers, “Regionale Kooperationskompetenz: Prob-
Memory (HICSS-31), 1 1998. leme und Modellierungstechniken,” Wirtschaftsinformatik, vol. 41, no. 4,
[10] S. Schlaphof, “Design, implementation, and validation of a task-based or- pp. 316 – 325, 1999.
ganizational memory system based on formal business process models (in [33] J. Mylopoulos, A. Borgida, M. Jarke, and M. Koubarakis, “Telos - a
German),” Master’s thesis, RWTH Aachen, Fachgruppe Informatik, 12 language for representing knowledge about information systems,” ACM
1998. Transactions on Information Systems, vol. 8, no. 4, pp. 352 – 362, 1990.
[11] B. Ramesh, “Towards a meta-model for representing organizational mem- [34] M. Jarke, R. Gallersd¨ rfer, M. Jeusfeld, M. Staudt, and S. Eherer, “Con-
o
ory,” in Proceedings of the 30th Annual Hawai’i International Conference ceptBase - a deductive object base manager for meta data management,”
on System Sciences (HICSS-30), (Los Alamitos, CA), IEEE Computer So- Journal of Intelligent Information Systems, vol. 4, no. 2, pp. 157 – 192,
ciety Press, 1997. 1995.
[35] R. Klamma, P. Peters, and M. Jarke, “Workflow support for failure man-
[12] J. Morrison, “Organizational memory information systems: Character-
th st
agement in federated organizations,” in Proceedings of the 31 Hawai’i
istics and development strategies,” in Proceedings of the 30 Annual
Hawai’i International Conference on System Sciences (HICSS-30), (Los Conference on System Sciences (R. W. Blanning and D. R. King, eds.),
Alamitos, CA), IEEE Computer Society Press, 1997. vol. IV, pp. 302 – 311, IEEE Computer Society Press, 1998.
[36] R. Klamma and M. Jarke, “Driving the organizational learning cycle: The
[13] F. Wijnhoven, “Designing organizational memories: Concept and
method,” Journal of Organizational Computing and Electronic Commerce, case of computer-aided failure management,” in Proceedings of the 6th Eu-
vol. 8, no. 1, pp. 29 – 55, 1998. ropean Conference on Information Systems (ECIS’98), Aix-En-Provence,
France (W. R. J. Baets, ed.), vol. 1, (Granada), pp. 378 – 392, Euro-Arab
[14] K. North, Knowledge Oriented Management: Adding Value by Knowledge
Management School, 6 1998.
(in German). Wiesbaden: Gabler, 1998.
[37] R. Klamma, P. Peters, and M. Jarke, “Networked improvement manage-
[15] A.-W. Scheer, Business Process Engineering - Reference Models for In-
ment (in German),” Wirtschaftsinformatik, vol. 42, no. 1, pp. 15 – 26,
dustrial Companies. Berlin et al.: Springer-Verlag, 2. ed., 1994.
2000.
[16] W. Mellis and D. Stelzer, “Das R¨ tsel des prozeßorientierten Software-
a
[38] D. O’Leary, “Knowledge-management systems: Converting and connect-
qualit¨ tsmanagement,” Wirtschaftsinformatik, vol. 41, pp. 31 – 39, 2 1999.
a
ing,” IEEE Intelligent Systems, pp. 30 – 33, 5 1998.
[17] T. W. Malone and R. J. Laubacher, “The dawn of the e-lance economy,” in
[39] E. W. Stein, “Organizational memory: Review of concepts and recommen-
“Electronic Business Engineering”, Proceedings 4. Internationale Tagung
dations for management,” International Journal of Information Manage-
Wirtschaftsinformatik 1999 (A.-W. Scheer and M. N¨ ttgens, eds.), (Hei-
u
ment, vol. 15, no. 1, pp. 17 – 32, 1995.
delberg), pp. 13 – 24, Physica-Verlag, 1999.
[40] J. Hunter and W. Crawford, Java Servlet Programming. Sebastopol, CA:
[18] T. Malone, K. Grant, K. Lai, R. Rao, and D. Rosenblitt, “Semistructure
O’Reilly & Associates, 1998.
messages are surprisingly useful for computer-supported coordination,”
[41] R. Medina-Mora, T. Winograd, R. Flores, and C. Flores, “The action work-
ACM Transactions on Office Information Systems, vol. 5, no. 2, pp. 115
flow perspective to workflow management technology,” in Proceedings of
– 131, 1987.
the 4th CSCW Conference, Toronto, Canada, pp. 281 – 288, 1992.
[19] M. S. Ackerman and E. Mandel, “Memory in the small: An application [42] F. Flores, M. Graves, B. Hartfield, and T. Winograd, “Computer science
to provide task-based organizational memory for a scientific community,”
in Proceedings of the 28th Annual Hawai’i International Conference on
and the design of organizational interaction,” ACM Transactions on Office
Information Systems, vol. 6, no. 2, pp. 153 – 172, 1988.
System Sciences (HICSS-28), pp. 323–332, 1 1995. [43] W. H. DeLone and E. R. McLean, “Information systems success: The
[20] J. Hosseini, “Business process modeling and organizational memory sys- quest for the dependent variable,” Information Systems Research, no. 3,
tems: A case study,” in HICSS28, (Los Alamitos, CA), pp. 363 – 371, pp. 60 – 95, 1992.
IEEE Computer Society, 1995. [44] R. Klamma and M. Jarke, “Knowledge management cultures: A com-
[21] P. Peters, Planning and Analysis of Information Flows in Quality Manage- parison of engineering and cultural science projects,” in ECSCW-
ment. PhD thesis, RWTH Aachen, 1996. Workshop XMWS’99, Beyond Knowledge Management: Managing Exper-
[22] C. Choo, “The knowing organization: How organizations use information tise, 13.9.99, Kopenhagen, Denmark, 1999.
to construct meaning, create knowledge, and make decisions,” Interna-