Case Studies in Knowledge Management

(Michael S) #1
Developing a Knowledge Management Strategy 127

Copyright © 2005, Idea Group Inc. Copying or distributing in print or electronic forms without written

a working group comprised of its database managers to address issues of data
accuracy, replication transparency, and report validity.


  1. Establish a task force to improve the capture of tacit knowledge from CoP
    designated experts. Each CoP has its own set of expert and tacit knowledge that
    should be captured and put in the organization’s knowledge repositories. The
    pervasive dilemma is that expert knowledge is the most difficult to obtain because
    it is often ill-defined (knowledge holders do not know what they should be
    contributing) and difficult to provide (experts are usually too busy to provide this
    knowledge). Every CoP has its novices, apprentices, masters, and gurus. Each of
    these experience levels has an expectation for the knowledge that is required to
    perform work. An effective KM system should capture knowledge from the top of
    the experience pyramid and pass that knowledge down and across the CoP.
    Learning tools, such as the Virtual Schoolhouse, could provide training to knowl-
    edge workers on how to determine what constitutes value-added knowledge. The
    second important aspect of this recommendation is how to influence the collection
    of this kind of subjective knowledge. It is important that this not be viewed as an
    additional duty but as a routine and fundamental part of the job. Performance
    metrics should include contributions to the knowledge base. Technical equipment
    (e.g., electronic notes and journals) or personal whiteboards may make it easier to
    contribute.

  2. Develop a plan for reducing restricted access to data and data repositories. An
    effective KM system is open to all participants. Though we are all familiar with the
    phrase “knowledge is power,” many organizations have cultures that treat knowl-
    edge as political capital—something to be hoarded and shared only when it is
    deemed advantageous. If KM is to flourish, that cultural value needs to change
    from “having knowledge” to “sharing knowledge.” Therefore, AFMC should
    review internally imposed firewalls and password protections to determine those
    that are needed for security or sensitive data reasons. AFMC should also consider
    using software that reduces the need for blanket restrictions.

  3. Create a metadata-tagging plan to improve AFMC’s ability to search and retrieve
    stored knowledge. AFMC currently uses user profile metadata to improve ease
    of access to Web-enabled search engines. However, user profiles are limited if the
    desired data files are not also tagged. It is relatively easy to issue a policy that
    requires all new data files to be appropriately marked. The real question is, “How
    much of the legacy data can AFMC afford to retroactively tag?” This raises the
    economic questions of return on investment. AFMC should create a plan that
    provides the necessary guidelines for tagging data files.

  4. Require each AFMC CoP to develop a collaboration plan. Knowledge-based
    activities related to innovation and responsiveness are highly collaborative. The
    attention that AFMC pays to collaboration can be attributed to its role in leveraging
    the expertise that is often distributed throughout the organization. Frequently, a
    CoP—the epitome of a collaborative body—cuts across formal organizational
    boundaries. A CoP often extends across departments and into other organizations,
    including customers, allies, partners, and sometimes competitors. The range of
    collaboration-enabling technology can present a daunting task to the people
    responsible for selecting the best solution for their organizations. Additionally,

Free download pdf