1 / 66

Knowledge Management and information systems: two case studies Hazel Hall School of Computing, Napier University

argus
Download Presentation

Knowledge Management and information systems: two case studies Hazel Hall School of Computing, Napier University

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


    1. Knowledge Management and information systems: two case studies Hazel Hall School of Computing, Napier University

    2. Two case studies Can information systems promote knowledge sharing? Can information systems encourage knowledge creation? Social computing/informatics focus of “information system” examples: Intranet, online community (Yahoo newsgroup). (Other tools for KM focus on knowledge discovery, e.g. databases deployed for data mining etc.)

    3. Case study 1 Can information systems promote knowledge sharing?

    4. Intranets in large, information-intensive organisations are useful are used are “successful” … but often fail to deliver on exactly what is expected of them

    5. Recent work identifies that companies implement sub-optimal systems make suggestions on how to avoid this e.g. Huysman & De Wit (2002); Newell, Scarbrough, Swan & Hislop (2000)

    6. Previous work numerous difficulties of introducing new technologies into large, distributed firms specific problems with changing established work practice related to knowledge sharing staff pre-occupied with billable client work staff reluctant to share “currency” for future career success Orlikowski (1996)

    7. Early work operation and enhancement of computer implementations are compromised by complexities of shifting social and technical relationships Kling & Scacchi (1982)

    21. 7 roles of the intranet - some intended by firm 1. Furnish individuals with special projects 2. Demonstrate status 3. Connect people for the purposes of knowledge sharing 4. Focus corporate attention on knowledge sharing 5. Inhibit knowledge sharing 6. Provide career direction 7. Measure engagement with KM initiatives

    22. 7 roles of the intranet - some tie to previous research 1. Furnish individuals with special projects 2. Demonstrate status 3. Connect people for the purposes of knowledge sharing 4. Focus corporate attention on knowledge sharing 5. Inhibit knowledge sharing 6. Provide career direction 7. Measure engagement with KM initiatives

    23. 7 roles of the intranet - some novel 1. Furnish individuals with special projects 2. Demonstrate status 3. Connect people for the purposes of knowledge sharing 4. Focus corporate attention on knowledge sharing 5. Inhibit knowledge sharing 6. Provide career direction 7. Measure engagement with KM initiatives

    24. 7 roles of the intranet 1. Furnish individuals with special projects 2. Demonstrate status 3. Connect people for the purposes of knowledge sharing 4. Focus corporate attention on knowledge sharing 5. Inhibit knowledge sharing 6. Provide career direction 7. Measure engagement with KM initiatives

    25. Accounting for multiple roles, i.e. not just/even knowledge sharing Shared perceptions of appropriate technology use within specific environments differ. For example - intranet deployed to demonstrate status of organisation, role determined internally for benefit of external constituency.

    26. Accounting for failure of system to deliver as anticipated Actor power of those charged with the implementation assigned by others assigned to themselves

    27. Case study 2 Can information systems encourage knowledge creation?

    28. Communities of practice enhance collaborative work within single organisations across networks of organisations in non-organisational groupings and are dependent on knowledge sharing practice

    29. Incentives for knowledge sharing provision of rewards hard soft provision of infrastructure social technological boundary

    30. Incentives for knowledge sharing provision of rewards hard soft provision of infrastructure social technological boundary

    34. Identification of Fermat’s last theorem (not Fermat’s last theorem) holding a clue. Marginal note: Cubem autem in duos cubos, aut quadratoquodratum in duos quadratoquadratos, et generaliter nullam in infinitum ultra quadratum potestatem in duos eiusdem nominis fas est dividere. Cuius rei demonstrationem mirabilem sane detexi hanc marginis exiguitas non careret.

    35. Fermat’s marginal note as key text for letter counting: (1) cubemauteminduoscubosautquadratoquodratu (41) minduosquadratoquadratosetgeneraliternul (81) lamininfinitumultraquadratumpotestatemin (121)duoseiusdemnominisfasestdividerecuiusrei (161)demonstrationemmirabilemsanedetexihancma (201)rginisexiguitasnoncareret

    36. Fermat’s marginal note as key text for letter counting: (1) cubemauteminduoscubosautquadratoquodratu (41) minduosquadratoquadratosetgeneraliternul (81) lamininfinitumultraquadratumpotestatemin (121)duoseiusdemnominisfasestdividerecuiusrei (161)demonstrationemmirabilemsanedetexihancma (201)rginisexiguitasnoncareret 109 182 6 11 88 214 74 77 = plaifair

    37. Fermat’s marginal note as key text for letter counting: (1) cubemauteminduoscubosautquadratoquodratu (41) minduosquadratoquadratosetgeneraliternul (81) lamininfinitumultraquadratumpotestatemin (121)duoseiusdemnominisfasestdividerecuiusrei (161)demonstrationemmirabilemsanedetexihancma (201)rginisexiguitasnoncareret Plaifair cipher es el proximo nivel. La palabra secreta es Illiad.

    42. Research approach “Content analysis” E-mail survey - questionnaire to sample of membership In-depth interviews Simon Singh Code breakers

    43. Demographics Male Under 40 Beginners

    44. Motivation to participate - learning Gain knowledge of code-breaking in general to solve a particular problem Gain information on others’ progress benchmarking

    48. Motivation to participate - social contact In VCs Individuals seek friendship instant access to on-going relationships with a large number of people Groups of enthusiasts seek sense of “belonging” shared identities, relationships, commitments

    49. Motivation to participate - social contact In VCs Individuals seek friendship instant access to on-going relationships with a large number of people Groups of enthusiasts seek sense of “belonging” shared identities, relationships, commitments

    50. Low importance of social relationships Topic of the discussions Clarity of the group’s purpose Passion and interest for the topic Demographics of membership Prospects for interaction in the real world

    51. Motivation to participate - social contact Encouragement (Public) one-to-one Community

    53. Motivation to participate - social contact Community encouragement

    54. Knowledge sharing and capital created

    59. Knowledge sharing and capital created

    61. Knowledge capital?

    65. Main conclusions of interest to business applications The values of community membership determine the power of incentives employed to encourage active participation. The breadth of topic focus determines levels/type of activity and associated need for social support. Community size matters: inclusion for individual learning, exclusion for knowledge creation.

    66. References Huysman, M. & De Wit, D. (2002). Knowledge sharing in practice. London: Kluwer. Kling, R. & Scacchi, W. (1982). The web of computing: computer technology as social organization. Advances in Computers, 21, 1-90. Newell, S., Scarbrough, H., Swan, J., & Hislop, D. (2000). Intranets and knowledge management: decentred technologies and the limits of technological discourse. In C. Prichard, R. Hull, M. Chumer & H. Willmott (Eds.), Managing knowledge: critical investigations of work and learning (pp. 307-323). Basingstoke. MacMillan. Orlikowski, W. J. (1996). Learning from notes: organizational issues in groupware implementation. In R. Kling (Ed.), Computerization and controversy: value conflicts and social choices (2nd ed.).San Diego, CA: Academic Press.

    67. CipherChallenge material The book Singh, S. (1999). The code book. London: Fourth Estate. The solutions Almgren, F., Andersson, G., Granlund, T., Ivansson, L., & Ulfberg, S. (2000). How we cracked the code book ciphers, [Online]. Available: http://answers.codebook.org/codebook_solution.pdf The e-group http://groups.yahoo.com/group/CipherChallenge

More Related