Knowledge Management in Practice
Knowledge Management in Practice
Anthony J. Rhem
CRC Press
Taylor & Francis Group
6000 Broken Sound Parkway NW, Suite 300
Boca Raton, FL 33487-2742
This book contains information obtained from authentic and highly regarded sources. Reasonable efforts
have been made to publish reliable data and information, but the author and publisher cannot assume
responsibility for the validity of all materials or the consequences of their use. The authors and publishers
have attempted to trace the copyright holders of all material reproduced in this publication and apologize to
copyright holders if permission to publish in this form has not been obtained. If any copyright material has
not been acknowledged please write and let us know so we may rectify in any future reprint.
Except as permitted under U.S. Copyright Law, no part of this book may be reprinted, reproduced,
transmitted, or utilized in any form by any electronic, mechanical, or other means, now known or hereafter
invented, including photocopying, microfilming, and recording, or in any information storage or retrieval
system, without written permission from the publishers.
For permission to photocopy or use material electronically from this work, please access
www.copyright.com (http://www.copyright.com/) or contact the Copyright Clearance Center, Inc. (CCC),
222 Rosewood Drive, Danvers, MA 01923, 978-750-8400. CCC is a not-for-profit organization that
provides licenses and registration for a variety of users. For organizations that have been granted a
photocopy license by the CCC, a separate system of payment has been arranged.
Trademark Notice: Product or corporate names may be trademarks or registered trademarks, and are used
only for identification and explanation without intent to infringe.
Also, I dedicate this book to my wife Tanya and to my son Jaren and daughter
Jasmine, who remain my inspiration to continuously strive to be the best I can be
every single day!
And … for all of those who have a dream and the will to pursue it!
Contents
Foreword
Preface
Acknowledgments
Author
1 Introduction
Overview
The Case for Implementing Knowledge Management (Chapter 2)
Being Social: Knowledge Management and Social Media (Chapter 3)
Dude, “Where’s My Car?”: Utilizing Search in Knowledge Management
(Chapter 4)
The Age of Discovery: Knowledge Management in Research Institutions
(Chapter 5)
“Where Have All My Experts Gone?”: Knowledge Management in Human
Resources and Talent Management (Chapter 6)
“Sound the Alarm!”: Knowledge Management in Emergency and Disaster
Preparedness (Chapter 7)
Happily Ever After: Knowledge Management in Mergers and Acquisitions
(Chapter 8)
“Is There a Doctor in the House?”: Knowledge Management in Healthcare
(Chapter 9)
“Show Me the Money!”: Knowledge Management for Financial Services
(Chapter 10)
“Are You in Good Hands?”: Knowledge Management in Insurance
(Chapter 11)
“Sign Right Here!”: Knowledge Management in the Legal Profession
(Chapter 12)
“A Mind is a Terrible Thing to Waste!”: Knowledge Management
Education (Chapter 13)
“Big Knowledge!”: Knowledge Management and Big Data (Chapter 14)
“What Have You Done for the War Fighter Today?”: Knowledge
Management in the Military (Chapter 15)
Drinking the Knowledge Management Kool-Aid: Knowledge Management
Adoption (Chapter 16)
Failure Is Not an Option: Why Do Knowledge Management Programs and
Projects Fail? (Chapter 17)
Summary (Chapter 18)
Outline of the Book
Structure of Each Chapter
15 “What Have You Done for the War Fighter Today?”: Knowledge
Management in the Military
Continuing KM Challenge of BRAC
Department of Defense Knowledge Management Structure
KM Principles
KM Strategies in the US Army
Army KM Principles
Army Knowledge Online
Current Army KM Direction
KM Strategies in the US Air Force
Air Force KM Goals and Objectives
Air Force Knowledge Now
KM Strategies in the US Navy
Navy Knowledge Online
KM and BRAC
Summary of Contributing Factors
Addressing the BRAC Problem
Missed KM Opportunity of BRAC
Key Learnings
Tips and Techniques
18 Summary
Social Media
Education Programs
Emergency and Disaster Preparedness
Customer Service
M&A Transactions
Big Data
The Future of KM
Technology Services Industry Association Research
State of KM Survey
Global View of KM
Future Edition of Knowledge Management in Practice
KM Impact on Customer Service
More on KM and Big Data
Internal KM
KM in Politics
KM and CRM
Personal KM and Wearable Technology
Closing Statement
Appendix A
Appendix B
References
Index
Foreword
Larry R. Medsker
Research Professor in Physics and Data Science
The George Washington University
Washington, DC
Preface
An in-depth synopsis of each chapter and an overall introduction to the book are
included in Chapter 1. The concluding chapter (Chapter 18) provides a summary
of the book and an insight into what’s next for KM.
Anthony J. Rhem
A.J. Rhem & Associates, Inc.
Chicago, Illinois
Acknowledgments
I thank the many people who have influenced my career in KM, particularly Dr.
Larry Medsker and Dr. Jay Liebowitz. I have had the pleasure of knowing both
these distinguished men for nearly 20 years. They have been my mentors,
friends, colleagues, and advisors.
I also thank the many corporations and brilliant people I have had the pleasure
to work with since 1998, implementing KM strategies, programs, projects and
systems, and without this valuable experience, this book would not be possible.
Special thanks go to Sydney Torain who served as my research assistant
throughout the completion of this book.
Author
Dr. Anthony J. Rhem serves as the president and principal consultant of A.J.
Rhem & Associates, Inc., a privately held knowledge management (KM)
consulting, training, and research firm located in Chicago, Illinois. Dr. Rhem is
an information systems professional, with over 30 years of experience, a
published author, and an educator. He has presented papers on the application
and theory of software engineering methodologies, knowledge management, and
artificial intelligence.
As a KM consultant, Dr. Rhem consistently serves as a KM advisor, KM
strategist, information architect, and KM governance strategist. He has played an
integral role in the successful implementation of KM systems, KM methods, and
KM strategies in several industries, including financial services, insurance, retail,
telecommunications, and military.
Dr. Rhem has conducted research in the knowledge engineering domain since
2004. His research experience includes conducting webinars through the
Principal Investigators Association addressing various research problems and
issues; Dr. Rhem received an Small Business Innovation Research (SBIR) phase
I grant award for his work on a process to capture and codify tacit knowledge in
which he holds a patent. He has also participated in several research projects,
playing an integral role in successfully commercializing software methodologies
and software products.
In his advisory work, as a member of the Gerson Lehrman Group Technology
Council of Advisors, Dr. Rhem consults with venture capitalists and investment
firms specifically as they pertain to technology innovations, best practices, and
trends. Dr. Rhem’s current advisory work also includes Board of Trustees at the
Knowledge Systems Institute, Industry Advisory Board—International
Conference on Software Engineering and Knowledge Engineering (SEKE),
International Bar Association (IBA) Law Firm Management Sub-Committee on
Knowledge Management and IT, Advisory Board for American University
Professional Science Master’s Degree Program, Member of the National Science
Foundation Research Review Panel, and Corporate Advisory Board of the ASCII
Group Inc.
Chapter 1
Introduction
Have you ever wondered about all the fuss concerning knowledge management
(KM)? What is KM anyway? At its core, KM is about sharing and collaborating
what you know, capturing what you know, and reusing that knowledge so as to
not reinvent the wheel and/or to combine with other ideas to foster innovation. A
KM meeting that I attended, conducted by the American Productivity and
Quality Center (APQC) (APQC’s January 2011 KM Community Call), included
representatives from Conoco Phillips, Fluor, IBM, GE, and Schlumberger; I
returned from this meeting understanding that it is necessary to have KM part of
an organization’s culture. I believe that this is important because we do not want
KM to be “another task to complete on the checklist,” but the way we conduct
business. This includes the business between the various individuals and entities
within our corporations as well as with our customers. Talking, listening,
capturing, and applying what we learn from each other is a constant, never
ending, and always evolving process.
Knowledge Management in Practice provides KM professionals and those
undergoing training in KM a practical examination on how KM is being applied.
Specifically, this book leverages the experience gained while practicing KM to
solve some of the more pressing KM problems faced in organizations today.
This book addresses challenges such as search engine optimization, content
categorization and searching, building taxonomies and ontologies, capturing and
managing tacit and explicit knowledge, KM adoption, and failure of KM
projects. In addition, this book examines how KM is being applied to specific
industries, including insurance, healthcare, legal, human resources and talent
management, military, research institutions, and finance.
Overview
This book will provide detailed information on applying KM practices,
procedures, and techniques to solve real-world problems. The applications of
KM that will be examined include social media; content management; search
engine optimization; capturing and codifying tacit and explicit knowledge; KM
in disaster preparedness, action, and reaction; KM adoption process in an
organization; the reason for failure of KM projects, and specific industry KM
applications. This book will contribute to the advancement in application of KM
principles, practices, and procedures, as well as the systems that support KM.
Each chapter will include key learnings as well as tips and techniques for
those who are currently instituting KM in projects and/or programs. The
following sections contain a synopsis of each chapter in this book:
This chapter will include a template for presenting your organization’s business
case for KM as well as some proven tips and techniques to enable your business
to be approved!
Content identification
Content analysis
Stakeholder/management engagement
Knowledge repository design
Taxonomy, content types, and metadata mapping
Training
Content migration
Staff reductions: More often than not, it means job losses. Cost savings are
realized from reducing the number of staff members from departments
across the organization(s).
Economies of scale: As we all know size matters, it is no surprise that a
larger company placing the orders can save more on costs. Mergers often
translate into improved purchasing power to buy equipment or office
supplies. When placing larger orders, larger companies (i.e., Wal-Mart,
Microsoft, and Boeing) have a greater ability to negotiate prices with their
suppliers.
Acquiring new technology: To stay competitive, companies need to stay on
top of technological developments and their business applications. By
buying a smaller company with unique technologies, a large company can
maintain or develop a competitive edge.
Improved market reach and industry visibility: Companies buy companies
to reach new markets and grow revenues and earnings. A merge may
expand two companies’ marketing and distribution, giving them new sales
opportunities. A merger can also improve a company’s standing in the
investment community: bigger firms often have an easier time raising
capital than smaller ones.
More often than not, understanding the synergies or the lack thereof when it
comes to personnel is absent. Understanding the personnel challenges of a
merger/acquisition will be the key to the success of the transaction and the
ongoing operation of the new entity.
This understanding will be enhanced by applying the KM principles leveraged
within human capital management (see Chapter 6). In this chapter, the specifics
of mergers and acquisitions and the application of KM (more precisely human
capital management) to improve the process and outcomes as it pertains to
retaining staff, conducting staff reductions, identifying key knowledge holders,
and understanding knowledge gaps are examined.
In this chapter, the focus will be on how law firms manage their vast array of
explicit and tacit knowledge. In addition this chapter presents an understanding
of how explicit and tacit knowledge when used together can provide the law firm
with a distinct advantage over its competition. This chapter will specifically
examine how law firms are leveraging precedent development, legal research,
competitive intelligence, training lawyers (talent management), intranet
deployment, project management, and client support, all in relation to instituting
KM within their legal institutions.
“What Have You Done for the War Fighter Today?”: Knowledge
Management in the Military (Chapter 15)
KM in the US military has been implemented using a top-down approach that is
resonated through each branch, command, directorate, division, group, battalion,
and so on. The US military has established a culture of KM that leverages its
personnel, processes, and systems to facilitate a consistent flow of knowledge
and the mechanisms to execute and make decisions from this knowledge.
It is widely acknowledged that KM strategy is a desired precursor to
developing specific KM initiatives. The US military has established KM
strategies from the top down in every branch. As this strategy is propagated and
aligned through the organization, it is often a difficult process due to a variety of
influences and constraints. These KM influences and constraints include
understanding, conflicts with IT organizations, funding, technology usage and
configuration, and outsourcing.
Any discussion of KM in the military should include a discussion of the Army
Knowledge Management (AKM) principles, which were signed out by the army
chief of staff (General Casey) and the secretary of the army in 2008. The AKM
principles still are in effect and have served as a basis for KM efforts in the army
and the federal KM arena at large.
Each US military branch works to overcome barriers in KM adoption. To this
effort, an establishment of processes and tools, which involves providing
approaches and solutions for knowledge sharing, has influenced a change in
people’s habits. This change will drive values to move US military organization
culture to father overall KM adoption. In support of the US military in its
knowledge sharing efforts, CoP have become an integral method of sharing and
distributing knowledge across all branches of the military. In addition, enterprise
web search capabilities have been implemented to increase “findability” of key
content, which is the leverage for decision making at all levels of command.
In my examination of KM in the military, I will take a holistic approach. This
approach will not only begin with an examination of the AKM but also look at
what each branch is doing from strategy through tactical implementation of KM
programs, systems, and initiatives down to the command level. I will look at the
synergies between the branches and identify tips, techniques, and best practices.
In addition, I will leverage my own experiences as well as the experiences of
others whom I have interviewed in the process of understanding the practice and
execution of KM within the various military branches.
KM initiatives are essential to a corporation’s growth and are more than just the
cost of doing business. Successful KM initiatives once completed and funded
correctly will increase a corporation’s profitability, and enhance the quality of
work and overall value of the corporation.
Problem statement
The problem statement is the identification of the problem or business
opportunity being addressed by the KM initiative. A problem statement is
clear, concise, and to the point and is often the compass to keep the team
focused on delivering an outcome that solves the intended
issue(s)/opportunity being addressed.
KM Solution Analysis
The KM solution analysis involves analyzing how KM will be leveraged to
address the problem or business opportunity.
Needs Analysis
In the needs analysis (also called “requirements definition”) phase, one begins
documenting the business opportunity (or problem). Any issue can be looked
upon as a problem or an opportunity. In writing business cases, I have found that
you get a much warmer reception if you frame things in a positive light, that is,
as opportunities, rather than as problems. In defining the opportunity, one needs
to first be clear in identifying the objectives. Objectives are the measurable
outcomes that one wants to achieve upon the completion of the proposed KM
initiatives. Identifying the objectives and being clear on why they make business
sense is very important. Objectives should be tied to outcomes from the strategic
assessment phase, for example, the current and/or desired states of the business
and the current business needs. Objectives are normally classified as first-order
(critical), second-order (important), and third-order (nice to have).
Figure 2.1 KM business case structure.
Software Methodologies
When implementing a KM solution that is driven out by a specific KM initiative
within the overall program (or as part of a standalone initiative), a standard
software methodology (Iterative, Agile/Scrum, OpenUP, or Knowledge
Acquisition Unified Framework [KAUF]) (Rhem, 2011) should be utilized. The
following sections briefly describe these methodologies.
Agile/Scrum
Agile/Scrum KM initiative management is an agile software development
process. Scrum models allow KM initiatives to progress via a series of iterations
called “agile sprints” (see Figure 2.3). Each sprint is typically 2–4 weeks, and
sprint planning in the agile methodology and Scrum process are essential.
Although the agile/Scrum methodology can be used for managing any KM
initiative, the agile/Scrum process is ideally suited for KM initiatives with
rapidly changing or highly emergent requirements such as software (Cohn,
2013).
The agile sprint itself is the main activity of Scrum KM initiative
management. The agile methodology and Scrum process is iterative and
incremental, so the KM initiative is split into a series of consecutive sprints.
Each is timeboxed, usually to between 1 week and a calendar month. One survey
found that the most common sprint length of a Scrum agile process is 2 weeks.
During this time, the Scrum team does everything to take a small set of features
from idea to coded and tested functionality (Cohn, 2013).
OpenUP Methodology
OpenUP is a lean Unified Process that applies iterative and incremental
approaches within a structured life cycle (see Figure 2.4). OpenUP embraces a
pragmatic, agile philosophy that focuses on the collaborative nature of software
development. It is a tools-agnostic, low-ceremony process that can be extended
to address a broad variety of KM initiative types.
Risk Assessment
The risk assessment analyzes the risk involved in implementing the agreed upon
KM solution as well as the risk of doing nothing.
Value Analysis
The value analysis examines closely the value gained by the organization when
implementing the KM solution. An analysis on the achievable ROI, including a
timeline for when that would be realized, is also presented.
Figure 2.5 Knowledge acquisition unified framework (KAUF).
ROI for KM
From the outset, one must realize that making the case for a KM effort and
calculating an ROI is not easy when compared to making the business case for a
new piece of equipment, such as new computer color photocopier or office
furniture, in a more traditional situation. Investing in a piece of equipment can be
directly tied to increases in product quality and/or quantity through multiple
metrics (e.g., lower defect rates and finished products per hour). However,
calculating the ROI for investments in KM efforts is not that simple or direct.
It is my experience that ROI for KM is measured by how well it supports the
mission and/or objectives of the organization. Taking this into account, at the
end of the day, what matters is whether the KM initiative increased the
performance of its users or how well did it support the strategic mission of the
organization.
When we are looking at achieving a return on our KM initiatives historically,
it can take a considerable amount of time to show results or visible ROI for an
organization. However, there is an approach by Mark Clare to estimate the value
of the intangible benefits of KM (Clare, 2002). This approach, the knowledge
value equation (KVE), simply states that the value created from managing
knowledge is a function of the costs, benefits, and risks of the KM initiative. It
can be mathematically stated as follows: KM value = F (cost, benefit, and risk),
which equals total discounted cash flow created over the life of the KM
investment (Clare, 2002). This formula attempts to quantify the intangible
impacts of KM relating it back to cash flow. This includes improved problem
solving, enhanced creativity, and improved relationships with customers and
other performance-related activities.
The following are the three common indicators of the viability of the KM
initiative: net present value (NPV), internal rate of return (IRR), and the payback
period. NPV helps us normalize future cash flows (both the cash we intend to
spend and the cash we expect to receive) into their present value. As a general
rule, if the NPV of a KM initiative is greater than zero, then you invest in the
KM initiative. If the NPV is negative, you should not invest in the KM initiative.
The reason for this is simple, the future cash flows, do not justify the present
investment. The IRR is the discount rate (also called “investment yield rate”) for
the KM initiative. It is the rate at which the NPV for a KM initiative is equal to
zero. When comparing two KM initiatives, the one with the higher IRR is
preferred. Another option to the IRR is to present the ROI. This value represents,
as the name implies, the savings (benefit) one will derive out of the KM
initiative for the investment (cost) outlays.
The payback period helps one estimate how quickly the investment will be
recouped. Put in another way, it is the time required for the savings to equal the
cost. When comparing two nearly similar alternatives, a rational person will
choose the KM initiative with the shorter payback period. The important thing to
bear in mind is that no single financial metric will be adequate for evaluating a
KM initiative’s feasibility or its value proposition in comparison to other uses of
the funds. Metrics are best used in conjunction with each other, as each one
provides a slightly different value perspective.
Unlike traditional (e.g., manufacturing) KM initiatives, financial analysis for a
KM initiative has two more complications. First, much of the benefits derived
from a KM initiative will be based on soft facts; that is, KM lead to changes in
behaviors, approaches, and methods that, on their own, may not have direct
bottom-line impacts. However, when these are mapped and traced to
organizational processes, the impacts can be measured and articulated. Needless
to say, this is often a more time-consuming and creative effort than simply
measuring direct impacts, as in the case of outcomes from a new piece of
manufacturing equipment. Equally important is that there is a lag time between
when one invests in a KM effort and when one witnesses outcomes that result in
payoffs. Accounting for this lag time is not easy, yet it is essential to building an
adequate business case.
Investing in KM is akin to a group as a whole investing in a common effort.
Consider the case of investing in initiatives such as the prevention of global
warming by reducing greenhouse gas emissions or the promotion of fair trade
practices. Most people agree that preventing global warming or increasing the
adoption of fair trade practices benefits society. The challenge arises when we
ask who wants to take responsibility for investing in these efforts. If taxes were
raised to support these efforts, would you be happy? Rational individuals often
want others to bear the cost of these common efforts and gladly enjoy the
benefits, yet hesitate to initiate responsibility. A similar predicament faces KM
efforts. Departments within an organization want their peers’ units to invest in a
common effort. Each department might see KM as an effort someone else should
put up resources for and hence defers spending its own resources. In some
organizations, KM efforts might be viewed as a “tax” levied.
Information Currency
This is a measure of how up to date the information stored within the system is.
The importance of this measure will depend on the nature of the information
being published, and how it is used. The best way to track this is using the
metadata stored within the content management system, such as publishing and
review dates. By using this, automated reports showing a number of specific
measures can be generated:
The KM system will allow variable review periods (or dates) to be specified,
depending on the nature of the content. This metric is a tool for ongoing
knowledge article (KA) and FAQ management.
User Feedback
A feedback mechanism will be established for the KM system. Use of such a
feedback system is a clear indication that staff is using the knowledge in the
knowledge base. Although few feedback messages may indicate the published
KA/FAQ to be entirely accurate, it is more likely that the system is not being
accessed, or that the feedback mechanism is not recognized as useful.
Alternatively, although many feedback messages may indicate poor-quality
information, it does indicate strong staff use. It also shows they have sufficient
trust in the system to commit the time needed to send in feedback.
Distributed Authoring
The extent to which the business as a whole takes responsibility for keeping
content up to date is a metric in itself. At the most basic level, the number of KM
system authors can be tracked against a target. A more rigorous approach uses
statistics from the workflow capabilities to determine the level of activity of each
author.
Transaction Costs
A process analysis activity can also determine costs involved in completing
tasks. This allows direct cost savings made by implementing and leveraging the
KM system. Multiplied out by the number of times the activity is completed in a
year, the whole-of-business savings can be determined. This could be substantial
in a large organization such as state farm.
Key Learnings
The following are some key lessons learned from this chapter:
Social media brings the power of sharing and collaboration to the masses.
Whether it’s Facebook, Twitter, or YouTube and leveraging any of the myriad of
mobile devices, knowledge sharing and collaboration have become a way of life.
At the core of knowledge management (KM) is knowledge sharing and
collaboration, and social media tools have business and government taking
notice.
Social media offers organizations the opportunity of connecting with potential
customers at virtually no cost. It is possible to set goals and get return on
investments (ROI); however, you have to know where you’re going and what
you want to achieve. Once you have this information, you can allocate your
resources wisely. Typically, a social media strategy will enable the organization
to know where to start and what social sites to concentrate. When you know the
lay of the land, it’s much easier to plot a path to your destination. A social media
strategy will be your organization’s roadmap to plot this destination.
To reach your public successfully, you need to start telling your stories
directly, and do it in a way that sparks conversations, interest, and action. The
value proposition of social media is sustained conversations that shape
perceptions and attract customers to purchase your products and services, and
participate in the activities (blog, Twitter, forums, surveys, etc.).
The use of social media does not represent a onetime application, but a
holistic environment to promote programs, events, communicate ideas, solicit
thought, and to connect the institution to its customers (and potential customers)
within the community. These customers represent our constituents and partners
to engage in communication and feedback. Including a participatory
communication cycle (see Figure 3.1) in your overall social media strategy will
give you a clear direction and knowledge of your communication capacity,
communication activities, which will be of most benefit, as well as the
communities, which should be monitored and evaluated.
Figure 3.1 Participatory communication cycle.
LinkedIn
LinkedIn is the premier business-oriented social networking site. The LinkedIn
Group is the organization’s environment where we can collaborate to exchange
ideas and points of interest with our current students, faculty, alumni, employees,
and other interested parties. LinkedIn has more than 75 million registered users
in 200 countries and territories worldwide and provides an excellent platform to
educate the business community about the value that the institution brings to the
communities it serves. The following are the guidelines for posting and
interacting in the LinkedIn Group.
1. Group members are personally responsible for the content they publish in
the LinkedIn Group.
2. Be mindful that whatever you publish will be public for a long time—
protect your privacy and take care to understand the terms of service of a
site.
3. Identify yourself—your name and, when relevant, role at your
organization—when you discuss your organization-related matters, such
as products or services.
4. You must make it clear that you are speaking for yourself and not on
behalf of your organization.
5. If you publish content online relevant to your organization in your
personal capacity, use a disclaimer such as this: “The postings on this site
are my own and don’t necessarily represent the organization’s positions,
strategies or opinions.”
6. Respect copyright, fair use, and financial disclosure laws. Don’t provide
your organization’s or another’s confidential or other proprietary
information and never discuss business or other sensitive matters publicly.
7. Don’t cite or reference clients, partners, or suppliers without their
approval.
8. When you do make a reference, link back to the source.
9. Don’t publish anything that might allow inferences to be drawn, which
could embarrass or damage you or anyone.
10. Respect your audience. Don’t use ethnic slurs, personal insults, obscenity,
or engage in any conduct that would not be acceptable in any situation.
11. You should also show proper consideration for others’ privacy and for
topics that may be considered objectionable or inflammatory—such as
politics and religion.
12. Be aware of your association with online social networks. If you identify
yourself as a student, employee, or alumni, then ensure that your profile
and related content is consistent with how you wish to present yourself
with colleagues.
13. Don’t pick fights, be the first to correct your own mistakes.
14. Try to add value. Provide worthwhile information and perspective. Your
organization’s brand is best represented by its people and what you
publish may reflect on your organization’s brand.
15. Don’t use logos or trademarks unless you are approved to do so.
Twitter
Twitter is the premier microblogging service enabling its users to send and read
other users’ messages called “tweets.” Tweets are text-based posts of up to 140
characters displayed on the user’s profile page. Tweets are publicly visible by
default; however, senders can restrict message delivery to their friends’ list.
Users may subscribe to other author tweets, this is known as “following,” and
such subscribers are known as “followers.” As of late 2009, users can follow
lists of authors instead of just following individual authors. Twitter has gained
popularity worldwide and currently has more than 100 million users.
Twitter has the ability to call into action a massive amount of people in a
limited amount of time for any cause or purpose. It can also be harmful by
propagating negative and erroneous information that is difficult to recover from.
Information dissemination on this platform must be used wisely. This power to
share must be handled with a sense of privilege and responsibility. From a
negative perspective, we have seen more and more often that our tweets have
caused loss of jobs, lawsuits, and some cases public outrage. However, the
positive aspects such as increased awareness, promoting ideas, launching
careers, entertaining, and bringing people together for a cause have outweighed
the negative impacts of Twitter, and it has become a major part of many
organizations social media strategy.
Twitter is and always shall be a means to listen to your customers, clients,
colleagues, industry leaders, and anyone else who might comment on your
product or business. It is about networking and knowledge sharing. The uses for
Twitter are limitless. You just have to find your niche. You have to ask, “What
are the benefits of being on Twitter?” Some will share knowledge, whereas
others will just use Twitter as a way of being available to customers. Either way,
as long as you are actually listening and staying engaged, you will benefit.
One of the best things Twitter can do for a company is simply to humanize it.
Allowing a real person to put a voice to an otherwise impersonal entity can give
a new dimension to your organization’s relationships with clients, which is
otherwise not possible. Some of the more successful brands on Twitter allow and
encourage a multitude of voices from within the corporate walls to twitter, not
only engaging clients but also each other.
Before you actively try to build an audience, post a few tweets to familiarize
yourself with the process, and spend some time reading what others in your
industry are talking about on Twitter. Use the “Find People” search function at
the top of your Twitter page to look for people you know will want to follow you
back: people within your company, current clients, and colleagues. Send a few
@ replies out to people who are following you. Respond to things they are
talking about. When they in turn respond to you with and @ reply, the people
following them will take notice of you and may choose to follow as well.
It’s also a good idea to look at whom the people you know are following. That
can give you ideas about whom you want to search for. Use the Twitter search
function to find subjects relative to your industry and see who’s talking about
them. Remember that conversation is very important. If all you do is post your
thoughts and ideas without engaging anyone in conversation, you’re just a
broadcaster. Eventually, if you are a well-known brand, and if you do things
right on Twitter, new people will start following you every day.
Facebook
Facebook has become the world’s leading social media site for individuals,
groups, and families (businesses are beginning to see its value) to share their
world with their friends and followers and to keep in touch with extended family
members. Now, more than ever, organizations are creating a presence on
Facebook to extend their reach to the growing number of potential (and younger)
customers. Facebook users can share news stories, videos, and other files with
friends. Personal notes can also be written and shared with friends. When
sharing an item, users can attach the item to their Wall for all to see, or can tag
individual people that they think would be most interested in seeing the item.
When a user is tagged, they receive an e-mail notification.
These options for sharing and collaborating are what makes Facebook a
powerful tool for your organization. Here are some numbers to support this: 1.15
billion users, 700 million daily users, average time per Facebook visit is 20 min
and 8.3 h is the average amount of time each user spends per month, 70% of
monthly active Facebook users in the United States are engaged and connected
to a local business (Wallace, 2013).
Although many businesses are yet to experience the full potential of
Facebook, the capabilities are finding their way into many organizations.
Listen to Conversations
Social media will allow tapping into various synergistic communities to get an
understanding of what their educational needs are, how programs align with
those needs, and how to position programs to meet those needs. Specifically, to
execute this, part of the strategy must focus on:
Do people use a generic description of what we do, or do they talk about our
course offerings or activities specifically?
Are the comments positive or negative? What is the ratio of positive to
negative?
Are key messages appearing in these conversations? If not, what content is
trending?
How are our competitors faring in these conversations?
The context of your organization’s content in a competitive set shows how your
brand stacks up against your competitors online. Your organization’s share of
voice leads to an increase in the market share. This increased market share will
be supported by an increase in student enrollment. Establishing and tracking of
share of voice is becoming an important part of social media. A gain in share of
voice is an important measurement for social media programs.
Identify the bloggers who talk about our industry, courses, and/or activities.
Monitor blog posts (i.e., Google Blog Search) to see who is writing on a
certain key topic.
Track mentions of your brand and generic keywords that describe what your
organization does in social news sites such as Digg, Newsvine, Kirtsy, and
StumbleUpon.
Track content about your industry, courses, and/or activities in social
network sites (i.e., Facebook and Twitter).
Create and Develop Content Once the content strategy, based on solid
research is developed, bright ideas will naturally flow about what to create and
how to deliver this content. Experimenting with a Facebook page and a Twitter
feed isn’t enough. You will need to create supporting content, for example, a
company blog, an interactive website, interesting articles, images, and videos.
Good content not only sparks conversations, but it also builds links. People
will share the content, and they’ll link to it from blog posts and tweets. This can
raise search visibility and drive a lot of traffic to our content.
Engaging Your Audience Followers and traffic are good and well, but are
they engaging with you? Ninety-three percent of the Internet users active in
social media say that they expect a company to have a social media presence to
be able to actively engage with that company. The Forrester Research report
“Social Media Playtime Is Over” clearly shows that dabbling or experimenting is
not enough. You have to deliver genuinely interesting and valuable content that
meets the needs of your audience and actively engages them.
Facilitate the Conversations Word of mouth has long been the “holy grail”
of marketing. Peer reviews, opinions, and comments are now the number one
influencer prior to purchase or decision online. Not only do you want them to be
engaged with you, but you also want them to be talking positively about you to
each other. Facilitating these conversations should be our ultimate goal. An
organization must make things easy for visitors or users of your website by
providing excellent content, which they desire to share and discuss. And then
give them tools to make it easy to do this—send to a friend button, share this,
bookmark this, subscribe, discuss, and comment.
Measure Results
Why measure?
If you can’t measure it, you can’t manage it. It’s that simple. You need to
know where you are when you start, what needs to be achieved, and as you
move along the path, you have to have tools to measure your progress. This
way you can see if you are on track and adapt fast if things go awry. Your
measurement has to be based on business objectives—and those objectives
have to be set as measurable goals. Just setting up attributes to track on a
dashboard is not enough.
What to measure?
What you are going to measure will depend on what goals you have set in
the initial part of your strategy. Based on listening and research, you should
have determined what actions you need to focus on in social media.
Measure what you did and what impact it had, and then you can see what
result it had.
Return on engagement
There are many tools available today to track engagement—how many
people clicked a link in a blog post? How many times was the message
retweeted? How many followers does the person who retweeted you have?
Track the growth of your share of voice
Compare the number of articles, posts, tweets, videos, or images where a
brand and its competitors are mentioned. Calculate how many times brand
is mentioned the most, relative to its competitors, and by what margin.
Track your growth in the share of voice.
Track your share of conversation
Share of conversation is the degree to which a brand is associated with the
problem or need that it is setting out to help with.
Social strategist:
– Responsibilities:
• Development of the overall strategy/program, including ROI
• Executing initial identified initiatives
• Developing social media roadmap and project plan
• Interacting with agreed upon social media sites (Twitter, LinkedIn,
and Digg)
Community manager:
– Responsibilities:
• Customer facing role—interacting with social media participants
• Manage content to be leveraged on social media sites
• Manage presence on social media sites (Twitter, LinkedIn, and Digg)
Content manager:
– Responsibilities:
• Development of the overall content (look-n-feel) of social media sites
• Manage content to be leveraged on social media sites
• Interacting with agreed upon social media sites (Twitter, LinkedIn,
and Digg)
Develop a Content Strategy
Success in social media depends on the quality of your content. It’s about
engaging people, and the key to engagement is good content. In social media,
people are creating, reading, saving, tagging, and sharing content. Your
organization must produce the kind of content they value and desire to share.
Telling your story online in the right place to the right people will give you your
intended results, and establishing a well-thought-out content strategy, which
leverages existing content and builds new content when needed based on solid
research, will deliver these results.
Measuring Results
When measuring results, it is important to evaluate the data and conclude if you
need to tweak or expand your program. You need to tell your story to customers,
potential customers, employees, potential employees, business partners, and
specifically to all those whom you interact with and who you wish to interact
with.
Key Learnings
Establish your organization’s roles and responsibilities to handle your social
media presence and monitor and respond (if necessary) to the communication
about your organization. The following is a sample of the roles and
responsibilities you should consider for you social media strategy.
Have you ever experienced a situation when you just could not find that
document on your content management system or a specific job aid, standard
operating procedure, or knowledge article in your knowledge repository? You
may have known part of the title or what some of the contents were, but you
couldn’t put your finger on it. You executed the latest search mechanisms on the
site, and you had to weed through several pages of content searching for that
elusive piece of information or knowledge. Then, finally after a period of time
(who knows how long) you either find it (OH Yea!) or give up in frustration
(Arrrg!!). A contributing cure for your dilemma, as well as mine and countless
others, is to implement an information architecture (IA) that will drive a user-
centric taxonomy, metadata, and associated keywords to enable the “findability”
of your content (information and knowledge).
Information Architecture
Has been described in many ways by many scholars and practitioners alike.
Usability. Gov states that “Information architecture (IA) focuses on organizing,
structuring, and labeling content in an effective and sustainable way.” Downey
and Banerjee offer another definition of IA which states “IA is the art and
science of organizing information so that it is findable, manageable and useful”
(Downey and Banerjee, 2011, p. 25). Finally, I offer my definition of IA: IA
connects people to their content (information and knowledge) that includes the
high-level rules that govern the manner in which information concepts are
defined, related, realized, and managed by the enterprise.
IA focuses on everything you can define about a solution without specifying
the underlying system (the raw plumbing) or specifying the particular user
interface that will be employed to deliver and manipulate the information. IA is
implementation and system independent. It is concerned about the architecture of
how information is used, how it flows, and how it fits within the user’s world (its
context). This leads to developing systems that will be intuitive to its users.
The outcome of a comprehensive IA implementation is a systematic
description of the content of a given product, service, or environment. This type
of detail contributes to the understanding and documenting of the complexities
of system design to enable intricate solutions to be functional, transparent, and
user-friendly. IA also forces clarity upward into the user interface and downward
into the system architecture, contributing to simplifying design, development,
and implementation. The IA in essence creates a common ground between
designers and developers by bridging the gap between the user interface and
underlying systems or technologies.
A well-defined IA not only helps you expand the function of your designs, but
it can also inform consistent experiences and paths for the evolution of future
designs across many variants within a family of products, services, or
environments.
IA consists of several elements. The elements of focus here include
information organization (information or content model, taxonomy, and
metadata schema), information access, governance, and user experience. These
items work hand-in-hand to deliver the following benefits of IA:
Content Model
A content model provides the framework for organizing your content, so that it
can be delivered and reused in a variety of innovative ways. Once you have
created the content model (sometimes referred to as an “ontology”) for your
content repository, you will be able to label information in ways that will
enhance search and retrieval, making it possible for authors and users to find the
information resources they need quickly and easily (see Figure 4.2). The content
model shows the content types (“Car in Service”), it’s metadata fields (Car ID,
Date Entered, and Service) as well as relationships to other content types (“is a”
→ Unpowered Car, “is a” → Powered Car).
Creating your content model requires analysis, careful planning, and a lot of
feedback from your user community. The analysis takes you into the world of
those who need and use information resources every day. The planning means
talking to a wide range of stakeholders, including both individuals and groups
who have information needs and who would profit from collaboration in the
development of information resources. Getting feedback requires that you test
your content model with members of your user community to ensure that you
have not missed any content types, domains, relationships, or other perspectives.
The content model is typically developed from working with your
business/content subject matter experts (SMEs). In working with your SMEs,
business rules about the information relationships are established, and this
greatly contributes to the construction of the content model. The content model
will support the search process through establishing relationships between the
content and describing how this information behaves (via metadata).
Figure 4.2 Example of a content model.
Difficult to determine how to get from the home page to the information
you’re looking for.
Links do not retrieve the intended page.
Navigating to what you need brings you further away rather than closer.
Scrolling through a long alphabetic list of all the articles ever written on a
particular subject with only the title to guide you.
When a content model is clearly defined and established, the users of the various
systems who implement the content model will be on track to finding, retrieving,
and using the content they need. A great method for flushing out and validating
your content model is to perform a card sort exercise (you more than likely will
have to conduct several card sorts). For more information, review the section on
card sorts as well as the box “How to Conduct a Card Sort.”
Taxonomy
Taxonomy is a hierarchical classification or framework for information retrieval.
Taxonomies represent an agreed vocabulary of topics arranged around a
particular theme. Taxonomies can have either a hierarchical or nonhierarchical
structure. However, typically taxonomies are presented in a hierarchical fashion
as illustrated with taxonomies such as in libraries, biology, or military
organizations (see Figure 4.3).
Hierarchical taxonomies are a tree-like structure with nodes branching into
sub-nodes, where each node represents a topic with a few descriptive words.
This way of classifying information becomes more important as the number of
items increases and people have more trouble remembering what they have and
where to find it. This is critical as we move into Big Data, which represents the
immense volume of information available to organization and the public through
the vast array of social media sites and throughout the Internet.
Content types and metadata along with a solid taxonomy will greatly enhance
your search to return what you are looking for. Taxonomies are the basis of
classification schemes and indexing systems in information management (see
Figure 4.4). Information professionals and librarians rely on classification and
controlled vocabularies to aid precision search; abstract and index publishers
make investments in indexing and thesauri to add value to their products. Many
organizations are experimenting with semantic technologies, hoping to
automatically extract the meaning inherent in documents and supplementing, or
even replacing, the human editorial process.
Taxonomies of entities for search engines are designed to improve relevance
in vertical search. Vertical search content area may be based on topicality, media
type, or genre of the content. Common verticals include shopping, the
automotive industry, legal information, medical information, scholarly literature,
and travel. Examples of vertical search engines include Trulia.com and Yelp.
However, general web search engines attempt to index large portions of the
web’s content by using a web crawler, whereas vertical search engines typically
use a focused crawler that attempts to index only web pages that are relevant to a
topic or set of topics. Vertical search can be viewed as similar to enterprise
search where the domain of focus is the enterprise, such as a company,
government, or other organization.
Metadata
Metadata is an important aspect of the IA and in particular the content model.
Metadata is primarily used for labeling, tagging, or cataloging information or
structuring descriptive records. Metadata (fields and attributes) are assigned to a
content type to provide a means to describe it and provide the means in which to
find content once it becomes part of a system. The metadata attributes and values
that are embedded in each content type (sometimes referred to as an “object”)
within the content model make it possible for the person searching for a flight
reservation, a vehicle to purchase, and a multitude of other items within a system
to find what they are looking for.
The creation of metadata has generally been approached in two ways:
professional creation and author creation. In libraries and other organizations,
creating metadata, primarily in the form of catalog records, has traditionally been
the domain of dedicated professionals working with complex, detailed set of
rules and vocabularies. The primary problem with this approach is scalability
and its impracticality for the vast amounts of content being produced and used,
especially on the World Wide Web. The apparatus and tools built around
professional cataloging systems are generally too complicated for anyone
without specialized training and knowledge. A second approach is for metadata
to be created by authors.
Metadata Fields
The metadata fields describe the primary dimensions of a content type. Metadata
fields are the individual items of metadata stored within a content type. There are
two types of metadata fields:
Required metadata: This includes fields that are required to describe the
content type.
Custom metadata: This can be configured by an administrator to any values
required by the site or installation.
It is important to note that the same metadata fields can be used in multiple
metadata groups and each metadata field has a setting associated with it. The
following settings are common to most metadata fields:
Default value: Enter an optional default value for the field. Depending on
the data type, this can be a checkbox or a specialized value entry such as a
date, a time code value, or even two values.
Lookup values: Choose a lookup from this list to display the metadata field
as a pop-up menu with a set of values. Only the lookups with the same data
type are displayed. See for details on creating lookups.
Date only: This is a checkbox that forces only dates to be entered.
Scale numbers: This is a checkbox that scales numbers to three digits (999
maximum) with the appropriate suffix. For example, 1000 becomes 1K.
Don’t format numbers: This is a checkbox that forces the metadata field to
use raw numbers without formatting, such as commas separating groups of
thousands.
Multiline: This is a checkbox that allows multiple lines of text to be entered
in the metadata field.
Metadata Attributes
The metadata attributes describe the individual instances of a content type.
Metadata attributes further define the behavior of content by describing their
accessibility to other content. Since search engines are explicitly designed to
recognize predefined keywords, metadata values are extremely important. Once
you determine the information a user will want to look for within a document
and what data should be extracted, you will need to assign those values as
metadata attributes. Whenever possible, standard metadata attributes should be
used. These attributes provide a wide range of options for storing your
document’s metadata. Users can restrict searching to specific attributes, and so it
is important that you use standard metadata attributes whenever possible.
Simple attributes: Simple attributes are those whose values can be stored in a
single database column.
List attributes: A list attribute is one that can have a set of values, where each
value is a simple one and all the values are of the same type.
Metadata Schema
A metadata schema establishes and defines data elements and the rules
governing the use of data elements to describe a resource. A metadata schema is
used to define the metadata fields that need to be filled out on particular content
type. Each schema defines the fields and their type, whether it is required, the
default value of the field, whether it can be edited (see Figure 4.5). You can
create as many metadata schemas as you may need for the system. Metadata will
not only enable designers to gather and rearrange the information to suit their
requirements, but the information developers would also have many ways to
organize the information.
Figure 4.5 Example of a metadata schema.
Card Sort
Card sorting is a method used to help design or evaluate the IA. In a card sorting
session, participants organize topics into categories that are sensible to them and
reflect the categorizations of content that they work and communicate with. To
conduct a card sort, you can use actual cards, pieces of paper, or one of several
online card-sorting software tools (see box “How to Conduct a Card Sort”).
Card sorting will help you understand your users’ expectations and
understanding of your topics. It is often most useful once you have done some
homework to find out about your users and understand your content. Knowing
how your users group information can help you:
Depending on your needs, you may choose to do an open or closed card sort:
Open card sort: Participants are asked to organize topics from content within
your website/repository into groups that make sense to them and then name
each group they created in a way that they feel accurately describes the
content. Use an open card sort to learn how users group content and the
terms or labels they give each category.
Closed card sort: Participants are asked to sort topics from content within
your website/repository into predefined categories. A closed card sort
works best when you are working with a predefined set of categories, and
you want to learn how users sort content items into each category.
Card sorting will not provide you with all of the answers to develop the final
structure of your IA and user-experience design, it can help you answer many
questions you will need to tackle throughout the information design phase. In
many cases, there will likely be some areas that users disagree on regarding
groupings or labels. In these cases, card sorting can help identify the following
trends:
Do the users want to see the information grouped by subject, process,
business group, or information type?
How similar are the needs of the different user groups?
How different are their needs?
How many potential main categories within a certain navigation are there?
What should those groups be called?
You may find yourself conducting several card sorts with a varying degree of
scope. This will better equip you to come to an agreement to the questions stated
above as well as enable you to better address the information design phase.
Search Facets
Faceted search offers remarkable potential for putting the search experience in
the hands of the user. It provides a flexible framework by which users can satisfy
a wide variety of information needs, ranging from simple lookup and fact
retrieval to complex exploratory search and discovery scenarios.
With faceting, search results are grouped under useful headings, using tags
you apply ahead of time to the documents in your index. For example, the results
of a shopping query for books might be grouped according to the type of book
and the price.
After you analyze the data from card sorting, you should have useful
information for structuring the information architecture of the site. You
should use the results of your card sort to help you define the navigation of
your site.
Source: http://www.usability.gov/
Each time the user clicks a facet value, the set of results is reduced to only the
items that have that value. Additional clicks continue to narrow down the search
—the previous facet values are remembered and applied again.
Faceted search results provide an easy-to-scan, browsable display that helps
users quickly narrow down each search. The faceting tags that you store with
your documents provide a way to add your own taxonomy to directly control the
presentation of search results. In the end, it’s about helping the user find the right
information. Faceted search gives a user the power to create an individualized
navigation path, drilling down through successive refinements to reach the right
document. This more effectively mirrors the intuitive thought patterns of most
users. Faceted search has become an expected feature, particularly for commerce
sites.
Faceted search is performed in several parts:
Index: To each document in the index, add tags to specify a value for each
facet. For example, for each book in the index, tag it with the type of
material and the price range.
Search results: For every search, the server returns a count of how many
matching documents were tagged with each value within each facet. For
example, if the query was for “books,” you might find out that in the facet
“type of material,” your index contains 13 science fiction books, 15
romance novels, and 10 cookbooks; and in the price facet, there are 5 books
under $10,200 books from $10–$19.99, and so on.
Query: You can include facet values as query criteria. For example, you can
write a query that returns only the romance novels under $10.
Web page: Use the facets and document counts returned by the server to
create a set of facet links on your web page. Then construct queries to be
activated by each facet link, passing in the appropriate values.
Store the facets and facet values as metadata by adding tags to documents in
your system.
After you have tagged documents, the server will start to show faceting data in
the results it returns for search requests. For example, if you search for books
about France, you might get results like the following:
French History
France Travel
French Art
You can filter a search by using facet values. This is similar to using document
variables. Before you start implementing faceting, take some time to decide on
the facets and values that make sense for your index. When you consider how to
categorize information, all sorts of interesting questions can arise. Depending on
the size of your index and whether you are working in a large enterprise, you
might need to hold a few meetings involving key people such as website
designers, product managers, information architects, and others. The goal of
your design phase is to arrive at a scheme, which will define the facets and their
values.
Search Intent
The search intent is another aspect of search where the IA is very valuable.
Using the IA’s user-provided metadata and keywords, the intent of the search
being performed by the user can be determined. Search queries are
informational, navigational, or transactional. As part of this process,
characteristics are defined for the different types of queries. For example, use of
question words (i.e., “ways to,” “how to,” and “what is”), queries containing
informational terms (e.g., list and playlist), and queries where the searcher
viewed multiple results pages. Some of the steps to determine search intent
include: the selection of keywords, capturing a list of the top site URLs that
return from each search, identifying the best search terms and keywords,
leveraging the meta keywords identified in the keywords metadata field, and
sorting the keywords and phrases in descending order of their perceived
importance.
Your environment should be modeled based on the taxonomy to provide
functionalities to the end users in form of site navigation, branding, and search.
Taxonomy planning is important for the long-term adoption of any system
because it provides the framework by which users find the content (information
and knowledge).
Tools
There are many tools and possible solutions available to solve our search
dilemma. The following are a few tools to consider if we ever hope to not only
find information on our knowledge repositories but also to provide solutions to
our inquiries.
Knowledge Management Suite for SharePoint 2010 from Layer2 is focused on
improved content tagging and discovery. Although this product has not been
rated with any reviews, it promises to deliver many features that a taxonomy
structure will be able to take advantage of. These features include the following:
Creates the model of links and structure between language elements that can
drive a new user experience.
Holds any term “metadata” to drive or enhance connected applications.
Ontology Manager is designed to allow multiple users to create, enhance,
and browse several types of semantic model, which include Lists,
Controlled vocabularies, Taxonomies, Thesauri, and Ontologies.
Key Learnings
The following are some key learnings gathered from this chapter:
It is not just the search tool that will enable users to find content, but a well-
formed IA along with the search tool will also render the best search results.
When developing an IA, it is best to leverage a checklist (see Figure 4.1;
Downey and Banerjee, 2011). This checklist ensures all aspects of the IA
are covered.
When constructing a content model follow the steps in order to provide a
consistent structure and approach.
Limit the number of cards. Do not attempt to sort “ALL” of your content,
and be mindful of participant fatigue. It’s recommend that 30–40 cards at
the absolute outside be used, especially for an open sort.
Randomize the order of presentation, so that each piece of content has a
chance to be sorted earlier in the session.
Provide the participants with a time box of how long the card sort will take
before beginning the session to help them better gauge the required time and
effort.
For an open sort, consider requiring users to sort the cards, and not to label
them, since that might be the more challenging part of the task, provided
that you have limited your items as suggested in point 1.
Consider an open sort as part 1 and a closed sort as part 2 of your process.
Part 1 allows you to learn what goes together, whereas part 2 allows you to
really test out your labels to see if they are intuitive to your participants.
Chapter 5
Research institutions are critical to innovation and new product creation. The
speed to market for new products is essential to stay ahead of the competition.
Knowledge Management (KM) plays a central role not only from the perspective
of knowing what has been done and/or what is being done in other areas of
research, but also from the collaboration and knowledge sharing among
researchers contributing to new ideas that produce innovative products for the
marketplace.
Research institutions and research departments that use KM effectively have
an advantage over their peers who do not use KM by developing better products,
having improved processes to deliver products to market more efficiently,
increasing the level of innovation at their organizations, and establishing an
environment of empowerment through collaboration for research professionals.
KM adoption and effectively using KM are challenging, and this chapter
addresses the challenge of equipping research professionals with the necessary
tips, tools, and techniques that will accelerate the use of KM. This accelerated
use of KM will enable research institutions to realize the benefits KM offers to
compete effectively in their respective industries.
As identified from the above challenges, KM adoption (see Chapter 16 for more
details concerning KM adoption) and effectively using KM are the primary
challenges. This chapter addresses the challenge of equipping research
professionals with the necessary tips, tools, and techniques that will help
accelerate innovation through the use of KM. Specifically, there will be five key
take-away items that the research professional will be able to gleam from this
chapter, and they are as follows:
The case for KM in this area addresses situations where duplication of effort
occurs, not having the right team in place to perform the research to bring
the product innovation to market successfully and in a timely manner,
always reinventing or starting from “square one,” difficulty in locating
current and/or historical corporate information/knowledge on a specific
topic(s), and expertise leaving the organization, thereby creating a
knowledge gap.
Duplication of effort
Nonavailability of an appropriate team to perform the research
Always reinventing or starting from “square one”
Difficulty in locating current and/or historical corporate
information/knowledge on a specific topic
Expertise leaving the organization, thereby creating a knowledge gap
Executive Summary
This section briefly reveals to your reader the present situation of your company,
the likely future of the organization, and the need to implement a KM strategy.
The executive summary should highlight the strengths of your overall plan and
therefore be the final section you write.
KM Vision Statement
The KM vision statement takes into account the current status of the
organization and serves to point the direction of where KM in the organization is
heading toward. As a means of setting a central goal that the organization will
aspire to reach, the vision statement helps to provide a focus for the mission.
KM Mission Statement
The KM mission statement serves as a guide to the actions of the organization as
it pertains to KM, spell out its overall goal, provide a path, and guide decision-
making. It provides the framework or context within which the company’s KM
Strategy is formulated and aligns with the KM vision (Note: the KM Vision and
Mission are often combined).
Dependencies
This section will detail critical dependencies such as the availability of key
personnel, approval of budgets, and available technologies to initiate the KM
strategy. This section will also analyze the effect of not executing the KM
strategy at all.
On-Going KM
On-going support, which describes the on-going execution of the KM strategy,
includes:
Tools
This section details the necessary tools and how they will be used to deliver the
KM research strategy.
An AAR
Makes learning conscious and explicit.
Identifies valuable lessons that may be helpful to future teams.
Enhances team openness and cooperation.
Allows closure at the end of the project.
Some AAR facts include the following:
Participants: An AAR is conducted by the persons who participated in the
activity being reviewed. Formal AARs may be conducted by a
facilitator, but the participants should be those persons who were
actually involved, not their representatives or off-site supervisors
The AAR is conducted
• At the end of a project.
• At the end of a particular phase in a project.
• At the end of a conference.
• At the end of a procurement action.
• Immediately following a significant event or action.
The types of AARs include the following:
Formal: Formal AARs are generally conducted at a more extended break
in the activity being reviewed; they may take a full day and result in a
detailed report.
Informal: While an activity is in progress, or for an activity of short
duration, most of the AARs in which our associates are likely to
participate will be informal, consisting perhaps of an hour-long
discussion at the end of a day. More likely to result in a mid-course
correction than a policy shift, informal AARs enable teams to identify
what is working—and what needs work.
AAR steps: These describe the general steps in conducting an AAR and their
significance. The specific steps taken in conducting an AAR will depend on
how much time you have allotted, outside resources needed and/or
available, the complexity of your operation, and what is expected to be
accomplished (Table 5.2).
Communities of practice: CoPs are groups of people who share a common
interest in a particular domain area, and who interact regularly to learn how
perform aspects of the discipline better. CoPs are formed by people who are
engaged in a collective learning experience, who usually interact often to
learn, share, and to better perform their craft.
A CoP
• Can exist online via discussion boards, wiki’s, news groups or in real
life via meet-ups or other group settings.
• CoPs consist first and foremost of practitioners; specialists who
perform the same job or collaborate on a shared task.
• CoPs often form spontaneously, driven by the need of the members for
operational knowledge.
• CoPs are also deliberately encouraged where knowledge transfer is
necessary.
Big picture questions To follow up on what went well/what could have gone
include: better, ask participants to assign a numerical rating to
• What went well, and by an action. Subsequent discussion on how to improve
what standard? the rating may lead to the kinds of details that will
• What could have gone enable the team to improve overall performance.
better?
• More detailed questions
may address:
• Why actions were
taken?
• How associates
responded to situations?
• When actions were
taken relative to other
events?
• What alternative actions
might have achieved
better results?
• What is required to
replicate good
performance?
5. Record results: List the Some of the observations of the AAR will need to be
associates who shared with higher and lower levels of the
participated, what organization.
learning was achieved,
what changes are
planned, and what
practices will be
strengthened.
6. Establish the As a group activity, the AAR can promote group
expectation of AARs as cohesiveness and identity. Through repetition, it
a regular, re-occurring makes individuals more reflective practitioners.
feature of your
organization’s
operations. They should
not be considered a sign
of failure.
7. AAR pitfalls that must
be avoided:
• Allowing performance
critiques
• Lecturing
• Over-analyzing
minutiae
• Griping, complaining,
and general negativity
• Allowing stronger
personalities to
dominate the review,
keeping others from
participating
In cultivating CoPs, Etienne Wenger points out three characteristics that make
a CoP:
Domain: The domain represents a shared membership of interest.
“Membership therefore implies a commitment to the domain and
therefore a shared competence that distinguishes members from other
people.”
Community: The community is represented by members engaging in joint
activities and discussions, helping each other, and sharing information.
They build relationships that enable them to learn from each other.
Practice: A CoP is not merely a community of interest, for example,
people who like certain kind of dog. Members of a community of
practice are practitioners. They develop a shared repertoire of resources:
experiences, stories, tools, and ways of addressing problems. A Practice
takes time and sustained interaction.
For CoPs, see Figure 5.2.
An open plan and other design features (e.g., high-traffic staircases) that
encourage accidental interactions.
More common areas than are strictly necessary—multiple cafeterias and
other places to read and work that encourage workers to leave confined
offices.
Emphasis should be laid on areas that hold two or more people, rather than
single-occupancy offices.
Creation of purpose-free generic “thinking” areas in open-plan spaces,
which will encourage workers think in the presence of other people, rather
than thinking alone.
Figure 5.2 Cultivating communities of practice: A quick reference guide.
(Courtesy of Etienne Wenger.)
Innovation Techniques
Having initiatives that stimulate innovation is another key ingredient of the KM
research strategy. The following represents techniques to stimulate innovation:
Applying the Medici effect will enable intersectional ideas to flourish once you
step into that intersection of different disciplines and cultures.
Knowledge Map
A knowledge map is a graphic representation of interconnected knowledge
sources. This organized knowledge involves large bodies of interconnected facts.
It is useful for organizing related knowledge/knowledge holders in a structured
manner that facilitates comprehension by showing the connections between the
various pieces.
A knowledge map is usually the results of a knowledge audit. The knowledge
audit is an investigation into the organizations knowledge assets, where they are,
who interacts with them, and how to access them. A typical knowledge audit
looks at the following:
The knowledge map example shown here is the result of a knowledge audit for
A.J. Rhem & Associates, Inc., a small management and software development
consulting firm (see Figure 5.4). The A.J. Rhem & Associates’ Corporate
Knowledge Map is a visualization representing the flow of knowledge within the
organization. An analysis of the knowledge map indicates the following:
Key Learnings
The following are some key learnings from this chapter:
The knowledge audit is usually the first major step of a KM initiative. It’s
used to provide a sound investigation into the company or organization’s
knowledge “health.”
A knowledge audit looks at problems and puts the information in the
context of the problem. The reason a knowledge audit is so vital is because
it gives an organization a comprehensive picture of its strengths and
weakness, allowing it to focus its efforts in the right direction.
To get quickly started using KM in your research efforts follow these quick tips:
Role-Based Knowledge
Role-based knowledge focuses on the specific knowledge needed to perform in a
given role. It identifies the activities that are needed to be performed as well as
the work products that are needed to be produced.
Talent Management
Talent management is a set of integrated organizational HR processes designed
to attract, develop, motivate, and retain productive, high-performing employees.
As opposed to HCM where there is an emphasis on the management of
employees. Susan Heathfield (2016) in her article “What Is Talent Management
—Really?” states “Talent management is an organization’s commitment to
recruit, retain, and develop the most talented and superior employees available in
the job market.”
Talent management (from John Hopkins University, Office of Talent
Management and Organization Development)—includes the following:
“Total rewards” is capped on the end of this center section. Throughout the
employee life cycle, it is critical that employees are rewarded appropriately.
Once an employee is hired or moved into a new role (the learning curve)
By the data from performance management reviews (strengths and
weaknesses)
As a result of an employee’s career aspirations (progression)
As necessary to fulfill a succession plan in some period (readiness)
The pillars or bookends of the framework are essential for keeping all of the
moving parts connected. “Organization and governance” ensure alignment,
oversight, accountability, and follow-through, whereas “business metrics and
analytics” are defined to determine how effective the talent programs are,
collectively. As an essential piece of the framework, the “talent infrastructure”
ensures that data and processes are aligned, integrated, and accessible. The
infrastructure “maps” the processes, so that integration points are clear and
provide the systems for enhancing the processes (Bersin et al., 2010).
Key Learnings
The following are some key learnings from this chapter:
Introduction
During a time of crisis (such as national disasters, pandemics, and acts of
terrorism), relevant information is usually not received by the individuals or
group of individuals that need it the most. For instance, many times first
responders are not able to respond quickly and effectively without the right
information during a crisis situation. The lack of timely and correct information
increases level of confusion, resulting in their ineffectiveness that may cause a
loss of life.
Our current emergency broadcast systems are ineffective. This ineffectiveness
is due to the lack of timely accurate and meaningful information delivered to the
correct recipient during emergencies. This prevents first responders, key
leadership, and the public from preparing for imminent danger, compromises the
ability to make informed decisions, and enacts the proper emergency
preparedness operations.
There is a problem delivering first responders the appropriate data,
information, and knowledge in a timely manner to effectively execute during an
emergency/crisis event. So what are the contributing factors? The following
table outlines the contributing factors related to the lack of available knowledge
and the effect on what knowledge management (KM) would bring to first
responders.
A summary of contributing factors
# Contributing Factors Effect on Users
1 Current alert systems do Lack of planning and execution around preparedness,
not align with a response, and recovery activities will lead to a lack of
cohesive strategy for injured being treated in a timely manner and prolong
preparedness, response, timeline and cost associated with response and
and recovery activities recovery
during an
emergency/crisis event
2 Many alert systems do Collaborative alert systems will enable pertinent and
not integrate with comprehensive alert information to be received down
national, state, and to the local level and enable local authorities to
local alert systems respond quickly to a crisis event preventing additional
injuries and lose of life
3 Current alert systems do Alert systems that leverage services such as weather,
not leverage geospatial, and intelligence services will potentially be
information services able to provide information on impending
such as weather, emergency/crisis events that will lead to improved
geospatial, and preparedness, response, and recover activities,
intelligence services contributing to saving lives and decreasing the amount
of injured people
4 Many alerting systems do Emergency officials and first responders are unable to
not enable two-way make informed decisions concerning emergency
communication preparations and responses
between all relevant
emergency officials
and first responders
5 Current alerting systems During emergencies affected individuals are unable to
do not enable two-way request and obtain immediate assistance
communication
between emergency
officials and the public
6 Current alerting systems Alert volume and speeds are limited to the capacity of
require dedicated dedicated resources provided
hardware, software,
and interfaces to the
telecommunication
providers in order to
send emergency
messages
7 Ineffective information The public does not receive effective warnings during
feeds to broadcast emergencies
alerting systems
(television and radio)
delays the
dissemination of
critical information to
the public
First-Responder KM Strategy
Creating a KM strategy presents a holistic approach to leveraging knowledge
and implementing technology to increase the effectiveness of first responders
(see Figure 7.1). The KM strategy reflects several key aspects in delivering
knowledge throughout an organization. The KM strategy suitable for execution
by first responders should align with the National Incident Management System
(NIMS), which according to NIMS (2008, p. 3)) “provides a consistent
nationwide template to enable federal, state, tribal, local governments,
nongovernmental organizations (NGOs), and the private sector to work together
to prevent, protect against, respond to, recover from, and mitigate the effects of
incidents, regardless of cause, size, location, or complexity.” The KM strategy
for first responders will specifically address disaster preparedness, response, and
recovery including the technology that must be leveraged to support this
strategy.
Figure 7.1 First-responder knowledge management strategy process.
Types of KM Strategies
Three types of KM strategies, namely Codification (Technological) (Haggie and
Kingston, 2003; Nicolas, 2004; Smith, 2004), Personalization (Nicolas, 2004;
Smith, 2004), and Socialization (Nicolas, 2004), as identified in the literature,
will be examined further to ascertain the best-suited KM strategy for first
responders.
Codification (Technological) KM Strategy
A Codification or Technological KM strategy focuses on collecting tacit and
explicit knowledge, storing it in a knowledge repository, knowledge base, and/or
electronic library, and providing it in an explicit codified form (Haggie and
Kingston, 2003; Nicolas, 2004; Smith, 2004). This strategy is designed to
transition individual knowledge to organizational knowledge. This type of KM
strategy is supported by individuals making their tacit knowledge explicit in
order for it to be transferred and codified. Furthermore, this strategy is associated
with the externalization aspects of Nonaka and Takeuchi’s SECI model to
transition knowledge from tacit to explicit and also includes Nonaka and
Takeuchi’s combination aspects of the SECI model to transition the explicit
knowledge into an electronic format (as mentioned earlier), which can be
accessed and reused by anyone in the organization.
Personalization KM Strategy
A Personalization KM strategy uses technology to assist in the process of people
communicating sharing their knowledge (Nicolas, 2004; Smith, 2004). This type
of KM strategy manages knowledge that is tied to or associated with a person
and is commonly shared directly via person-to-person contact (Smith, 2004). In
addition, this KM strategy facilitates and manages knowledge that is centered on
learning through shared experience (Nicolas, 2004). The technology leveraged in
this strategy consist of CoP, Web 2.0 technologies (i.e., Facebook, Twitter, and
LinkedIn), and other knowledge networks and discussion boards, with the
objective to transfer, communicate, and exchange knowledge (Nicolas, 2004;
Smith, 2004). This strategy is associated with the socialization aspects of
Nonaka and Takeuchi’s SECI model, which details tacit-to-tacit knowledge
exchange.
Socialization KM Strategy
A Socialization KM strategy combines both the Codification or Technological
KM strategy and the Personalization KM strategy (Nicolas, 2004). This strategy
manages knowledge generated by individuals and groups. Nicolas states that
these groups inhabit the same knowledge space and interact through
relationships both individual and within and between groups (Nicolas, 2004).
This strategy is designed to exchange and pool knowledge (Nicolas, 2004). In
combining both the Codification and the Personalization KM strategies, the
Socialization KM strategy combines the externalization aspects of Nonaka and
Takeuchi’s SECI model to transition knowledge from tacit to explicit; the
combination aspects of the SECI model to transition explicit to explicit forms of
knowledge for electronic storage and reuse; and the socialization aspects of
Nonaka and Takeuchi’s SECI model, to facilitate individual and group tacit to
tacit knowledge exchange.
Knowledge Audit
A is usually conducted as a precursor to introducing a KM strategy (Crilly et al.,
2005). The KA typically has three components: an examination of the sources of
data, information, and knowledge that are available, how they are used, and what
are the gaps that exist, if any (Crilly et al., 2005). A complete KA will examine
the key knowledge holders and existing knowledge systems, and determine how
they support the functions and needs of the organization. The KA will examine
the knowledge gaps and determine whether the intellectual capital exist currently
in the organization to fill the gap or if new knowledge has to be acquired (Crilly
et al., 2005).
The AAR discussion is a process of discovery, as all team members share their
perspectives on what happened and why. The shared observations of the newest
interns through the senior-most associates are essential to piece together how and
why some objectives were met and others were not (United States Agency
International Development [USAID], 2006).
Conclusion
Knowledge is an organization’s most valuable resource. Although people,
process, and technology can give an organization a competitive edge, the
improper management of that knowledge to build, organize, and leverage its
people, process, and technology will be to the detriment of that organization
(Smith, 2004).
Constructing a KM strategy for the Fire Department and the first responders
they deploy must be consistent from station to station, whether the station serves
urban or rural areas, and the demographics of the community in which it serves.
The KM strategy must contain elements of, codification, personalization and
socialization. Based on this research and understanding the complexities of the
KM strategy for Fire Department first responders, a KM strategy that
incorporates the key areas of quick and decisive decision making, collaborative
communication, and situational analysis, acquiring EMS-specific knowledge,
being able to quickly act to change, perform task planning, event monitoring,
distribute knowledge, perform knowledge recognition, needs assessment and
allocation, feedback and evaluation, ECP, command and control, and learning
and knowledge transfer; understanding the types of knowledge that must be
captured; and the associated NIMS policies, procedures, and protocols will be
successful.
In addition, the research that contributed to this chapter has uncovered that the
KM strategy must align with the business strategy of the organization. Although
the focus of this research is on developing and delivering a KM strategy for Fire
Departments and the first responders they deploy, an in-depth study of the
business strategies deployed by Fire Departments are warranted.
Furthermore, the alignment of those business strategies with Fire Department
KM strategies will facilitate the process of institutionalizing KM, thereby
making it a part of the culture of the Fire Department and the first responders
they deploy. This alignment will also provide insight on the methods,
technologies, policies, procedures, and protocols that should be used to provide a
holistic strategic approach that will bring for the people who deliver services to
the various communities, the Fire Department as a business to improve its
overall operations and increase business value to its communities, and the people
of the communities who depend on a timely, efficient, and effective service to be
delivered by the Fire Department no matter where they live or the situation that
may arise.
Key Learnings
The following are some key learnings from this chapter:
During these challenging economic times, many corporations are facing the
prospect of merging with other firms to not only survive but also to have a
sustainable and viable business in the future.
According to a November 2015 CNBC article by Catherine Boyle, mergers
and acquisitions (M&A) have hit the US$4 trillion mark and could reach record
highs. Recent mergers include leading microchip maker Intel agreeing to buy
Altera in a deal worth US$16.7 billion; pharmaceutical giant Pfizer agreeing to
buy Hospira in a deal worth approximately US$ 17 billion; and
telecommunications giant Charter Communications agreeing to merge with Time
Warner Cable for US$78.7 billion, creating one of the largest cable television
and broadband Internet providers in existence. In these cases and in all M&A,
there is a need to identify the key knowledge holders in order to ensure the
success of the merger and/or acquisition.
The effect of these mergers will and often leads to a loss of valuable
knowledge from both sides of the merger/acquisition equation. This loss of
knowledge is due to positions being consolidated and/or eliminated, other
personnel taking early retirement package or other financial incentives. The
question is how do we identify who the key knowledge holders are and what
knowledge do they hold? Also, has it been determined that this is viable
knowledge to the “new” organization going forward and what is our plan to
retain, capture, or acquire this knowledge?
All of these questions can be answered with a comprehensive knowledge
management (KM) strategy that includes a human capital management
component, geared to identify viable initiatives that will address these questions.
One such initiative will be to develop a knowledge map of the organization to be
acquired. A knowledge map is a mechanism used to identify key knowledge and
the knowledge holders of the organization. Once these maps are completed,
further analysis is needed to determine the process, procedures, and initiatives
necessary to prioritize, retain, and/or acquire knowledge that may leave. Often,
organizational knowledge is the reason certain mergers happen. KM is the
mechanism to transit individual knowledge to corporate knowledge and
facilitates its availability for all employees.
People are at the core of any merger and acquisition, and these transactions
thrive and survive on the strength of how corporate cultures and its people can
be meshed together. Understanding who the critical knowledge holders are and
their relationships as well as their roles, responsibilities, and work products are
all components of sound human capital management.
This understanding will lead to determining which positions and personnel
perform duplicate functions, which will lead to an understanding of the
employees that should be terminated (better yet receive a package and convinced
to leave!). Not only do you have to determine which personnel perform duplicate
functions, but also who is more valuable through his/her experience, education,
and importance to the organization going forward. The human capital
management component of the overall KM strategy (see Chapter 6) is also an
investment in employee selection and development. This contributes to the
organization meeting its goals and objectives of not only the merger but also for
the new organization on an ongoing basis. In addition, we must keep in mind
that executing a KM strategy with a human capital management component can
be the catalyst to increased adaptability, enhanced worker performance, and with
the current economic climate, having the ability to do more with your existing
personnel resources.
Horizontal merger: Two companies that are in direct competition and share
the same product lines and markets.
Vertical merger: A customer and company or a supplier and company. Think
of a cone supplier merging with an ice cream maker.
Market-extension merger: Two companies that sell the same products in
different markets.
Product-extension merger: Two companies selling different but related
products in the same market.
Conglomeration: Two companies that have no common business areas. There
are two types of mergers that are distinguished by how the merger is
financed. Each has certain implications for the companies involved and for
investors:
Purchase merger: As the name suggests, this kind of merger occurs when one
company purchases another. The purchase is made with cash or through the
issue of some kind of debt instrument; the sale is taxable. Acquiring
companies often prefer this type of merger, because it can provide them
with a tax benefit. Acquired assets can be written-up to the actual purchase
price, and the difference between the book value and the purchase price of
the assets can depreciate annually, reducing taxes payable by the acquiring
company.
Consolidation mergers: With this merger, a brand new company is formed
and both companies are bought and combined under the new entity. The tax
terms are the same as those of a purchase merger.
Reverse merger: A reverse merger occurs when a private company that has
strong prospects and is eager to raise financing buys a publicly listed shell
company, usually one with no business and limited assets. The private
company reverse merges into the public company, and together they
become an entirely new public corporation with tradable shares. Regardless
of their category or structure, all M&A have one common goal: They are all
meant to create synergy that makes the value of the combined companies
greater than the sum of the two parts. The success of a merger or acquisition
depends on whether this synergy is achieved.
Acquisitions
An acquisition may be only slightly different from a merger. In fact, it may be
different in name only. Like mergers, acquisitions are actions through which
companies seek economies of scale, efficiencies, and enhanced market visibility.
Unlike all mergers, all acquisitions involve one firm purchasing another, and
there is no exchange of stock or consolidation as a new company. Acquisitions
are often amiable, and all parties feel satisfied with the deal. Other times,
acquisitions are more hostile. In an acquisition, as in some of the merger deals
we discussed above, a company can buy another company with cash, stock, or a
combination of the two. Another possibility, which is common in smaller deals,
is for one company to acquire all the assets of another company. Company X
buys all of Company Y’s assets for cash, which means that Company Y will
have only cash (and debt, if they had debt before). Of course, Company Y
becomes merely a shell and will eventually liquidate or enter another area of
business. Another type of acquisition is a reverse merger, a deal that enables a
private company to get publicly listed in a relatively short time period.
Determining Synergies
Synergies are the magic force that allows for enhanced cost efficiencies of the
new business. Synergy takes the form of revenue enhancement and cost savings.
By merging, the companies hope to benefit from the following:
Staff reductions: As every employee knows, mergers tend to mean job losses.
Consider all the money saved from reducing the number of staff members
from accounting, marketing, and other departments. Job cuts will also
include the former CEO, who typically leaves with a compensation
package.
Economies of scale: Yes, size matters. Whether it’s purchasing stationary or a
new corporate IT system, a bigger company placing the orders can save
more on costs. Mergers also translate into improved purchasing power to
buy equipment or office supplies—when placing larger orders, companies
have a greater ability to negotiate prices with their suppliers.
Acquiring new technology: To stay competitive, companies need to stay on
top of technological developments and their business applications. By
buying a smaller company with unique technologies, a large company can
maintain or develop a competitive edge.
Improved market reach and industry visibility: Companies buy other
companies to reach new markets and grow revenues and earnings. A merger
may expand two companies’ marketing and distribution, giving them new
sales opportunities. A merger can also improve a company’s standing in the
investment community: bigger firms often have an easier time raising
capital than smaller ones.
That said, achieving synergy is easier said than done: It is not automatically
realized once two companies merge. Sure, there ought to be economies of
scale when two businesses are combined, but sometimes a merger does just
the opposite. In many cases, one and one add up to less than two. Sadly,
synergy opportunities may exist only in the minds of the corporate leaders
and the deal makers. Where there is no value to be created, the CEO and
investment bankers—who have much to gain from a successful M&A deal
—will try to create an image of enhanced value. The market, however,
eventually sees through this and penalizes the company by assigning it a
discounted share price.
Synergies can also be uncovered among the knowledge held by the organizations
involved. Understanding who are the key knowledge holders, what they know,
and the importance of what they know as it pertains to the objectives of the
“new” organization is critical to the merger/acquisition being a success or not.
Employees
Employees become naturally fearful when M&A are rumored. Will the
employees retain their jobs? Even if they do, will it be the kind of jobs that they
are used to? They are all too aware that the executives exiting from their
company, once it is acquired, will receive sweetened deals in the forms of
settlements, a responsible position in the new organization, or a combination of
both. But where are employees left?
In the not-for-profit credit union world, it is standard to retain employees for
at least 2 years after a credit union merger. In some cases, these employees are
“tried out” in the new organization—and if they do well, they are retained for a
long term. The key here for both the acquiring and the acquired organizations is
to know what exactly is going to happen to the employees on both sides of the
merger—and to be transparent and tell them. At least, one merger was so
incredibly “stealth” that it took a major lawsuit and several extra years of
employee and management maliciousness before the organization got through it.
Boards
Who is going to sit on the board after a merger or acquisition completes? Often,
the acquired organization gets at least one seat on the acquiring company’s
board. For the CEO, this can be easier said than done. Do you alter your board
organization to include more seats? How will the votes be distributed? Will all
board positions be voting positions? Are incumbent board members replaced?
Because of potential political fallout and a need to retain the highest caliber
talent on the board, this should be a major political line item in any merger or
acquisition evaluation.
Operations
Most organizations know how important it is to get IT in on early evaluations for
potential mergers or acquisitions, because different organizations invariably have
different systems, and at some point, these systems must come together.
However, it is equally important to pay the same amount of attention to daily
operations. How similar are both business and IT governance standards (and
work ethics) between the two organizations? Are operations in manufacturing,
sales, and the back office sufficiently similar, so that work processes do not have
to be redefined and employees retrained?
Communication
Communication can help employee to manage the merger syndrome, because it
informs them of the changes in their environment, thus reducing uncertainty and
ambiguity. Communication is the most valuable commodity for the successful
implementation of a merger or acquisition. The specific communication
objectives change for every phase of integration. As the deal moves through its
phases, information changes and the circle of knowledge grows. Nothing is a
secret for long, and leaders must be prepared, not only for what they know is
coming but also for the unexpected. Leaders should follow a phased approach to
communication, in which planning is sensitive to continuing information flowing
from multiple organizational levels about the progress of integration. Again, if
resources or expertise is lacking, leadership can seek out help.
Information flow in a company is one of the most important aspects of a
merger that must be understood and consistently adhered to. The trust level in
the organization must not deteriorate. An environment must be maintained where
people feel they can be straightforward and share information/knowledge with
other colleagues. When this environment is compromised, people will often feel
that they are afraid to disagree with higher management, let alone new
management.
Communication is a requirement for financial success, because low morale,
high turnover, direct costs in workers’ compensation and healthcare
expenditures, and lowered productivity will all have consequences for the level
of return on investment. Leaders cannot assume they can and will know
everything. But they do have a responsibility to put into place the structures that
will maximize their awareness as they go forward. Leaders who confront change
effectively are rewarded with superior business performance on the part of their
employees. When employees believe their employer is effectively managing
change, it is perceived as a gain for shareholders. Conversely, when employees
believe their employer is not effectively managing change, it is perceived as a
loss for shareholders. Avoiding the human issues in M&A is essential for
success. Proper planning for the management of people issues in a merger or
acquisition should be a top priority.
Productivity
The potential loss in productivity goes beyond mere wasting of time in worry
and water cooler talk. After a merger or acquisition, employees who feel
uncertain about their job security and mistrustful of leadership regarding the sale
may be unmotivated and averse to risk. They will not come forward with new
ideas, communicate with leadership, or be creative. The tendency is to try to
maintain a low profile and do the minimum, staying “under the radar.”
Planning for those employees who will continue on after the merger or
acquisition is a key ingredient for success. More often than not, however, this
planning is limited to a narrow fixation on payroll and percentages; a shrinking
in the employment rolls is often part of the plan, not only in a merger where
synergies are expected but also in an acquisition as part of the striving for
efficiencies. Formulating a retention plan, leveraging information uncovered as
the result in creating a knowledge map will change the typical focus of to a small
handful of top people, a few people at the middle and lower levels, creating a
climate where valuable staff are vulnerable to poaching by competitors.
An acquisition or merger can create conditions in which a company is at risk
for losing those people who may be critical to immediate and longer term
business success by virtue of their management skills, knowledge of business
systems and processes, and intellectual capital. This can have consequences, not
only downstream but also for the transaction itself. Organizations considering
mergers or acquisitions should have these “people centric” line items on their
M&A checklists—but many do not. The political fallout from a corporate move
such as this can be major, which is why organizations that perform their due
diligence with attention to people as well as to markets and numbers succeed
most often.
The need to make the most of organizational knowledge—to get as much value
from it as possible—is greater now than in the past. Companies are finding
themselves with piles of information within multiple channels, locked away in
silos—different systems, different departments, different geographies, and
different data types, making it impossible to connect the dots and make sense of
critical business information. New computing models such as cloud and social
business are exacerbating organizations’ ability to collect, analyze, and process
data. The data is there, but it isn’t being harnessed in the right way to increase
our collective knowledge. And it is our collective organizational knowledge that
gives us the edge over our competition.
For a potential merger, understanding the value of the organization to be
acquired is critical to positioning a price that is both equitable and acceptable to
the acquired company. If your organization is positioning itself to be sold,
understanding how KM can increase the overall value of the company is
essential to obtaining a fair price. So, how do we leverage KM to understand the
value of the organization? One such way is to apply the concepts presented in
the knowledge value equation (see Figure 8.1) by Mark Clare (2002). This
equation aligns with the third method/tool used when assessing a company
(stated above), which examines the use of DCF and presents an equation: KM
value = F (cost, benefit, and risk) = Total DCF created over life of KM
investment. The equation states that the value created from managing knowledge
is a function of the costs, benefits, and risks of the KM investment (project or
strategy) in leveraging and protecting the knowledge (Clare, 2002).
Knowledge Mapping
At a time when organizations need to “know what they know” and use that
knowledge effectively, the size and geographic reach of many of them, along
with the proliferation of data, make it especially difficult to locate existing
knowledge and get it to where it is needed. Knowledge mapping first detailed in
Chapter 5 serves as the basis for locating knowledge and knowledge holders
anywhere it exist in the organization. Understanding the key knowledge holders
within the organizations is essential to knowing who should be terminated and
who should continue with the “new” organization. In addition, a knowledge map
will serve as a tool to unlock the knowledge in your organization to enable the
proper valuation and importance to the organization.
Once you let employees leave, you run the risk of pertinent knowledge leaving
with them. The focus of the knowledge mapping effort should center on the
employees of the organizations involved. The knowledge mapping deliverable
will be an extension of the people side analysis of the M&A transaction.
Before starting to develop the knowledge map (see Figure 8.3), ensure the
intentions are clear. This includes understanding the purpose and scope of the
knowledge map. The thing to keep in mind is that there is never a single map for
every purpose. Knowledge mapping is about relationships (people-to-people and
people-to-content), and how these relationships interact within the organization.
Knowledge Profile
A knowledge profile (KP) (see Figure 8.4) records skills, tools, practices, and
social networks; it highlights competencies, identifies gaps, helps with learning
programs to address deficits, realizes opportunities, and heightens awareness for
the owner and colleagues. A KP will provide detailed information about each
knowledge holder associated in a knowledge map.
KPs may focus on the individual where they form a key part of your personal
KM system or aimed at a “collective” view of a team, group, community, or
firm. Profiles may be constructed via manual or automatic means, highly
structured, or very informal, maintained by the end user or compiled from test
batteries and questionnaires by expert profilers and competency specialists.
A KP goes beyond determining information needs, guiding information
seeking behavior, and considers the adoption and use of tools, the condition and
functioning of (personal) social networks, and learning desires. Successful KPs
focus on the future; they reflect current skills and activities above past positions,
awards, and educational achievements, providing some indication of where and
how the person can best contribute to organizational and team goals.
KPs are often a key element in knowledge mapping, knowledge audits, and
customer relationship management, and play an increasing role in advanced
search, expertise location, agent-based work assignments, customer selling
strategies, and portal user-interfaces. Related information is found in yellow
pages, expertise directories, and academic resumes, but the KP is distinguished
by a list and evaluation of relationships (promotes flow), preferences and
proficiencies with communication systems/tools, and applicable tacit knowledge
strengths.
Figure 8.4 Knowledge profile example.
Key Learnings
The following are some key learnings from this chapter:
Planning for those employees who will continue on after the merger or
acquisition is a key ingredient for success. Therefore, when planning
employee and/or business function consolidation (or elimination), an
understanding of what knowledge is needed and the key knowledge holders
is essential. Constructing a knowledge map is useful tool in this analysis.
Before conducting a knowledge mapping initiative, it is important that all
employees complete a KP. This will provide the necessary details of the
employees in order for the knowledge map to accurately reflect the “key”
knowledge holders of the organization.
Plenty of mergers don’t work; it’s not as simple as just combining computer
systems, merging a few departments, eliminating redundant suppliers, and
the merged company will be more profitable than ever! Yes, do your
homework!
Data collection: At this point of the process, all the data that was taken during
the intake process is collected and sent to the healthcare facilities’ database.
The collection of healthcare data involves a diverse set of public and private
data collection systems, including health surveys, administrative enrollment
and billing records, and medical records, used by various entities, including
hospitals, clinics, physicians, and health plans. This suggests the potential
of each entity to contribute data, information, and knowledge on patients or
enrollees. As it stands now, a fragmentation of data flow occurs because of
these silos of data collection. One way to increase the flow of data,
information, and knowledge is to integrate them with data from other
sources. However, it should be noted that a substantial fraction of the U.S.
population does not have a regular relationship with a provider who
integrates their care (Beal et al., 2007).
Decision support system: This area of the healthcare delivery process involves
integrating the clinical decision support systems (CDSSs). The CDSS will
enable the standardization and sharing of clinical best practices and
protocols with staff, patients, and partners on demand, anywhere, and on
any device. Physicians, nurses, and other healthcare professionals use a
CDSS to prepare a diagnosis and to review the diagnosis as a means of
improving the final result. Data mining (which will be examined later in
this chapter) is conducted to examine the patient’s medical history in
conjunction with relevant clinical research. Such analysis will provide the
necessary knowledge to help predict potential events, which can range from
drug interactions to disease symptoms. Some physicians may use a
combination of a CDSS and their professional experience to determine the
best course of care for a patient.
There are two main types of CDSSs. One type of CDSS uses a knowledge
base (expert system), which applies rules to patient data using an inference
engine and displays the results to the end user. Systems without a
knowledge base, on the other hand, rely on machine learning to analyze
clinical data. The challenge here is that for a CDSS to be most effective, it
must be integrated with the healthcare organizations clinical workflow,
which is often very complex. If a CDSS is a standalone system, it will lack
the interoperability needed to provide the necessary knowledge for
healthcare professionals to determine the best course of care for a patient.
However, the sheer number of clinical research and medical trials being
published on an ongoing basis makes it difficult to incorporate the resulting
data (Big Data). Additionally, incorporating Big Data into existing systems
could cause a significant increase in infrastructure and maintenance.
Diagnosis and treatment: Making a diagnosis is a very complex process,
which includes cognitive tasks that involves both logical reasoning and
pattern recognition. Although the process happens largely at an unconscious
level, there are two essential steps where knowledge can be captured and
applied.
In the first step, the healthcare professional will enumerate the diagnostic
possibilities and estimate their relative likelihood. Experienced clinicians
often group the findings into meaningful clusters and summarize in brief
phrases about the symptom, body location, or the organ system involved
(Richardson et al., 2002).
In the second step, the healthcare professional would incorporate new data,
information, and/or knowledge to change the relative probabilities, rule
out some of the possibilities, and ultimately, choose the most likely
diagnosis. For each diagnostic possibility, the additional knowledge
increases or decreases its likelihood (Richardson et al., 2002). At this
point, the diagnosis and treatment is rendered by the healthcare
professional and the patient records are updated.
Patient closeout/patient discharge: In the case of a simple patient closeout
from a routine/scheduled physician visit or simple visit to the local clinic,
the patient receives medication (if applicable), sets follow-up appointments,
if necessary, and finalizes payment arrangements and the patient records are
updated. However, if you have had a hospital stay, the discharge process
can be quite involving. In the case of a discharge, a set series of tasks must
occur prior to discharging a patient. These tasks include examination and
sign-off by appropriate providers and patient education. For each patient,
the time of discharge and the tasks that need to be performed will be
provided 1 day ahead of time. This allows for everyone involved in the
discharge to self-organize to get the work done within the window
necessary to meet the scheduled discharge time (Institute for Health
Improvement, 2015). At the conclusion of the discharge, patients receive
information and instructions for continued care and follow up; in addition,
all patient records should be updated.
Patient-Centered Approach
Some of the keys to patient care are the ability to evaluate a large amount of data
and information, which includes the use of medical informatics. These are the
keys to deliver medical knowledge to the right people, at the right time, in the
right context. Electronic health records, data warehouses, laptops, and other
mobile devices now provide access to information and knowledge at the point of
care. This access facilitates a continuous learning environment in which lessons
learned can provide updates to clinical, administrative, and financial processes.
Given these advancements, it is imperative that data, information, and
knowledge are managed for effective healthcare.
An understanding of how patients fit into the evidence-based medical practice
is critical because patients, more than ever, are equipped with a wealth of tacit
knowledge about their health needs. Such tacit knowledge can have a dual
connotation on healthcare delivery by either promoting or obstructing the
acceptance of medical expertise based mainly on explicit knowledge and clinical
experience. Incorporating patients’ needs, values, and expectations rigorously in
medical practice has many benefits. It holds the potential to deal with
inappropriate tacit knowledge that patients may have on their health conditions,
while at the same time, reinforcing appropriate knowledge that can promote their
health. Marginalization of patients’ tacit knowledge in the evidence-based
equation can easily spell the doom for the healthcare industry. This is because
effective healthcare delivery is based not only on rigorous scientific knowledge
but also on clinically relevant experience as well as patients’ values. Patients’
values take into cognizance the unique preferences, concerns, and expectations
each patient brings to the clinical encounter. These are values that must be
integrated into clinical decisions if they are to serve the patient. In order to
ensure optimal clinical outcomes, therefore, there is the need for an effective
integration of the three elements espoused by the evidence-based medical
paradigm—scientific knowledge of doctors, clinical experience, and patients’
values.
Applying principles of KM will/has become the catalyst for quality healthcare
delivery and management, and these operational elements will provide the
mechanisms to execute a broader healthcare KM strategy. In this chapter, the
focus will be to provide a detailed understanding of the practice of KM within
the healthcare industry. The content includes critical aspects of healthcare
operations, knowledge strategies for healthcare operations, essential knowledge
elements for healthcare, knowledge mapping and medical informatics,
knowledge creation and discovery in medical informatics, applying KM to
healthcare, and knowledge tools and techniques for healthcare.
Applying KM to Healthcare
A critical function in healthcare organizations and more especially for healthcare
workers is decision making. In most healthcare organizations, decision making is
not structured in a way that follows a consistent healthcare model, as presented
in the healthcare delivery process depicted in Figure 9.1. Not only is it important
at all times, to ensure that germane knowledge is being extracted during the
course of delivering healthcare, but it is also essential that KM does provide a
sustained advantage. This necessitates a long-term rather than a single-focus silo
approach to capturing, cataloging, using/reusing, and enriching your healthcare
knowledge.
Integrated healthcare knowledge that flows between the various areas and
systems within the healthcare delivery process is at the confluence of physical,
informational, and cognitive domains. The backbone of integrated healthcare
operations is the continuous extraction and flow of germane knowledge and
pertinent information to all who require it anytime, anywhere throughout the
system, so that superior decision making can take place.
It is important that as the knowledge flows within and between the areas of the
healthcare delivery process, a proper conceptualization of knowledge occurs.
The conceptualization of knowledge within healthcare provides an integrated
view of various sources of knowledge that permeate through healthcare
organizations. It can also provide access to the latest medical research
knowledge as well as locate and identify key areas of knowledge and expertise
within the healthcare organization. This can mean the difference between life
and death, accurate and inaccurate diagnosis, and between early intervention and
prolonged and costly hospital stays, as well as contributing to enabling the
delivery and improved patient experience.
WebMD
As stated on their website, WebMD provides valuable health information, tools
for managing your health, and support to those who seek information. You can
trust that our content is timely and credible. In addition, WebMD provides
credible information, supportive communities, and in-depth reference material
about various health subjects that matter to consumers. WebMD is a source for
original and timely health information as well as material from well-known
content providers. The website also indicates that the WebMD content staff
blends expertise in journalism, content creation, community services, expert
commentary, and medical review to give consumers a variety of ways to find
what they are looking for. This includes the following: health news for the
public; creating and maintaining up-to-date medical reference content databases;
medical imagery, graphics, and animation; communities; live web events; and
interactive tools. Please note that WebMD does not provide medical advice,
diagnosis, or treatment.
Yahoo Health
As stated on their website, Yahoo Health is powered by Healthline.com. This
site provides consumers with some of the best and latest health-related content
and information available on the Internet. Yahoo Health indicates that it is your
ultimate source for healthy-living information and inspiration. This site contains
a litany of advertisements from various healthcare-related companies to support
and promote a healthy lifestyle. Please note that Yahoo Health does not provide
medical advice, diagnosis, or treatment.
MedicineNet.com
As stated on their website, MedicineNet.com was founded in 1996 and has had a
highly accomplished, uniquely experienced team of qualified executives in the
fields of medicine, healthcare, Internet technology, and business to bring to the
consumer the most comprehensive, sought-after healthcare information
anywhere. In addition, it is indicated that MedicineNet.com brings nationally
recognized, doctor-produced (a network of more than 70 U.S. board-certified
physicians) trusted sources to their online environment. Please note that
MedicineNet.com does not provide medical advice, diagnosis, or treatment.
Expert Systems
Expert systems offer benefits in many areas of healthcare. They provide an
environment for experts to develop and test disease models, and this research can
provide valuable answers to complex health problems. To this end, expert
systems for healthcare services are widely used where accuracy of diagnosis and
efficiency for various services are needed. The cooperation of all parties in the
healthcare delivery process is crucial in analyzing and managing the data of
patients to detect abnormal patterns in order to provide an advance treatment;
expert systems are an essential tool in providing this analysis. Expert systems
often take the form of CDSSs. A CDSS is an application that analyzes data to
help healthcare providers make clinical decisions. It is an adaptation of a
decision support system commonly used to support business management.
Data Mining
Data mining is used during the knowledge discovery process and aims to analyze
a set of given data or information in order to identify patterns (i.e., decision
trees, artificial neural networks, and algorithms). Traditional data mining tools
help companies establish data patterns and trends by using a number of complex
algorithms and techniques. Some of these tools are installed on the desktop to
monitor the data and highlight trends, whereas others capture information
residing outside a database. Most data mining tools are able to handle any data
using online analytical processing or a similar technology.
Text Mining
Data mining and text mining techniques have been applied to different areas of
biomedicine, ranging from patient record management to clinical diagnosis. Text
mining aims to extract useful knowledge from textual data or documents. It is
called text mining because of its ability to mine data from different kinds of text.
This includes from Microsoft Word and Acrobat PDF documents to simple text
files. These text mining tools scan content and convert the selected data into a
format that is compatible with the tool’s database, thus providing users with an
easy and convenient way of accessing data without the need to open different
applications. Scanned content can be unstructured (i.e., information is scattered
almost randomly across the document, including e-mails, Internet pages, audio,
and video data) or structured (i.e., the data’s form and purpose is known, such as
content found in a database). Capturing these inputs can provide healthcare
organizations with a wealth of information that can be mined to discover trends,
patterns, and anomalies in the patient’s health history.
Communities of Practice
CoPs support collaborative networks of individuals and organizations working
together to improve their own operations and provide improved patient care. By
sharing knowledge, concerns, and passions, healthcare providers can use CoPs as
tools to facilitate the sharing of knowledge throughout the healthcare delivery
process. The knowledge base of a healthcare organization is the result of many
interactions with colleagues and mentors.
Some examples of CoPs in healthcare organizations include clubs,
committees, associations, academies, study groups, coalitions, social network
discussion threads, medical staffs of local hospitals, and community-oriented
primary care groups. CoPs can exist in many different forms and professions, but
all CoPs share three key dimensions: a domain of knowledge, a community, and
a shared interest or practice.
1. Technological advancements
The proliferation of new technology is transforming the entire healthcare
industry. The two areas of opportunity and concern are wearable
technology (specifically wearable tracking devices) and data security.
• Wearable tracking devices: It is estimated that nearly 70 million
people in the United States are using wearable tracking devices to
monitor their physical activity, sleep patterns, calorie consumption,
and much more. This new frontier presents a great deal of potential to
improve patient care. Only time will tell the impact this trend has on
improved patient care.
• Data security: Patient privacy issues (including concerns about data
breaches) will continue to be top-of-mind for providers, payers, and
consumers, especially with ongoing data breaches in the news.
Providers and payers will need to step up data security to avoid the
type of HIPAA violations that can negatively impact an organization.
2. Collaboration between healthcare providers
Owing to the changes in healthcare laws and the strain on healthcare
organizations due to difficult financial climate, it has put a premium on
the importance of partnerships and collaboration when it comes to
providing value-based healthcare. This will not be changing anytime
soon. This is evident by the following recent examples of healthcare
partnerships:
• Trinity Health System joined forces with Heritage Provider Network
to deliver population health management in select markets throughout
the country.
• Anthem Blue Cross Blue Shield of Wisconsin joined forces with
Aurora Healthcare and its Aurora Accountable Care Network. They
agreed upon a shared-risk program to support value-based
reimbursement payment models.
• Allina Health formed a dozen Citizen Health Action Teams (called
CHATs) to bring community members together to discuss
neighborhood health issues and come up with solutions.
• Henry Ford Health System is seeking ways to “hardwire the safety
net.” It is pursuing more seamless integration between itself and the
various navigators and volunteers it deploys to address community
engagement. The safety net program alone required the participation
of more than 30 community partners, including competing health
systems in the Detroit region.
3. Patient-centered care
A significant change in the healthcare industry’s approach to providing
care is underway—putting the patient at the center of care. The goal is to
improve patient satisfaction scores and engagement. The healthcare
industry as a whole is starting to look into ways to engage with patients
outside of a traditional office visit. This includes tapping into social
media to build relationships with their customers. This will continue to
be essential in gaining new customers, as patients begin to shop for
healthcare online, including through social media interactions; this
includes searching for patient reviews and comparing prices.
4. Need for Big Data
Researchers, clinicians, and administrative leaders are leveraging for data
to develop new drugs, improve patient diagnosis, make decisions, and
guide their planning. Access to Big Data resources is becoming essential
to create this competitive advantage. Access to Big Data resources is key
to overcoming the current data challenges. As demands for access to
high-quality, accurate Big Data sources continue to grow, healthcare
organizations will want better analytics tools, so they can improve care
and reduce costs.
5. Population health management
Population health management is a proactive application of strategies and
interventions to defined cohorts of individuals across the continuum of
healthcare delivery in an effort to maintain and/or improve the health of
the individuals within the cohort at the lowest necessary cost. As the risk
for a population of patients shift based on demographics (age, due to
people living longer, and the baby boomer population increasing the
elderly population) health systems need to know more about the patients
they serve and how to continue to provide improved healthcare services.
Key Learnings
The following are some key learnings from this chapter:
Technology
The increasing interest in KM was initially fostered by the IT industry.
Technically, it is now possible to extract information and knowledge from
employees in order to share it with others through the use, for example, of
knowledge bases/repositories, collaboration environments, business intelligence
tools, and decision support systems; tool vendors have positioned themselves as
KM solutions providers, offering a broad range of KM-supporting tools.
Banking KM Framework
A KM framework positioned to support banks and their various knowledge
needs must include the following: the ability to support knowledge intensive
processes across bank functions and departments; bank employee needs for
knowledge; the consumer needs for knowledge in order to execute self/help
capabilities; and business needs for bank knowledge as well as suppliers. Figure
10.4 depicts this framework on a broad level.
Figure 10.4 Banking knowledge management framework.
Knowledge-Intensive Processes
Processes have also become more knowledge intensive. Technology vendors
such as Microsoft, Oracle, and IBM have introduced a new technology to
automate/facilitate financial process management. In the financial industry, the
focus is now on attracting clients with new products and concepts. These
products need to be introduced faster than the competition can manage, and as
such time to market has decreased substantially.
Scarce Talent
Only 10 years ago, people had to apply at dozens of potential employers in the
hope that they would be invited for a job interview. Presently, when an employer
does not satisfy an employee’s career demands, the employee has more options
to move to another organization. It is vital that an employer keeps the knowledge
worker engaged, by providing an environment in which he or she can evolve and
is rewarded for the knowledge he or she provides in the organization. People
want to be rewarded for their added value, which stems from the contribution
they can make in sharing their knowledge with others.
Cost-Cutting Environments
Organizations in the financial sector have to deal with increasing pressure from
the outside environment. Financial results are very important; witness the
malaise in the financial markets and the disillusion affecting technology and
telecom businesses. This leads toward a stronger focus on short-term benefits
and often to large, company-wide cost-cutting programs. KM programs have to
respond to these trends. The focus should be on sharing best or better practices in
order to gain more efficiency in a company’s core processes.
Although KM is not new, the development of best practices is needed. The
success of KM ultimately depends on its users and their enthusiasm and
initiative. In practice, user indifference is the most common pitfall. Thus, users
need to experience an added value in their work and be (formally) rewarded for
knowledge usage and contributions. At the moment, most employees in the
financial industry are rewarded for attaining their (financial) targets, and not for
sharing valuable knowledge. In many cases, KM is viewed to be extra work.
Fear is also a common problem. Some people stick to the paradigm knowledge
is power and refuse to participate actively and share experiences, ideas, and
insights. But knowledge kept to oneself quickly becomes useless. Also, many
managers fear that by sharing their knowledge and encouraging their employees
to do so, they lose control of the flow of information and thereby their power.
Perhaps the rise of this type of manager depends heavily on their role in KM
activities (as laid out in their job description), reward structures, and strong
boardroom support. Only when you exchange knowledge with others can you be
of influence. There is a need to accept the fact that sharing of knowledge is
power.
Virtual Communities
Virtual communities can be thought of as a digital environment in which people
gather to exchange knowledge, experiences, and ideas relating to a common
interest. Virtual communities have radically changed the nature of traditional
ideas of communication within groups of people. They overcome time and place
barriers and synthesize the benefits of the codification (knowledge is made
explicit in documents, databases, etc.) and personalization (knowledge is shared
through a person-to-person interaction) approaches to managing knowledge.
Virtual communities are organic by nature; they are born, grown, and
eventually die. These processes are highly intertwined with and reflect the
development of the social networks that use the virtual communities. These
networks don’t necessarily have to follow organizational structures. In fact, they
tend to encompass people from different (functional) departments at different
echelons, and change in composition over time. A key characteristic of virtual
communities is that they mold themselves to the dynamics of these social
networks. Thus, unlike traditional meetings, they don’t impose a rigid structure
on the interaction in terms of subject (which topics are most important?),
participants (who may/can participate?), location (which place is convenient for
most people?), and time (what time is convenient for most people?).
Tool Selection
Implementing the right tool to do the job involves a deep analysis of the
expected size, usage, and growth of the community to prevent a mismatch
between the needed and actual tool properties. Also, the tool chosen should be
easy to implement on the existing IT platform of the organization (dedicated
servers, available bandwidth, integration with knowledge bases or CRM tools,
etc). Heavy involvement from the IT department is therefore necessary. In
addition, the selection of the desired functionalities of the community, such as e-
mail notification of new entries, anonymous access, and chat options are also
important. A clear understanding of management and user expectations and
needs is always necessary.
Cultural Dimension
The residing culture (the attitude and atmosphere) should support the transition
of social to virtual, informal networks. To respect the latent and sometimes
fragile structure of informal networks, there has to be an environment in which
KM initiatives are valued and encouraged. Clear management support and a
strong managerial vision are therefore keys. If these conditions are satisfied, and
the value of KM is clear, bottom-up community initiatives with a sufficient
social basis will emerge, or can be initiated in co-operation with enthusiastic
employees.
Key Learnings
The following are key learnings gained from this chapter:
Focusing on Customers
KM through its knowledge processes/architecture, governance, and technical
guidance will be the catalyst in delivering a consistent customer experience by
delivering knowledge and responding to the customer in a consistent voice and
message no matter where the insurance company engages with the customer
(contact centers, CSRs, mobile or Web) or with what media (online chat, e-mail,
postal service, help center, and/or frequently asked questions [FAQs]).
Efficient processes must be put in place to ensure that the right knowledge
is captured, managed, and kept up-to-date.
KM systems must be established to support these processes. These IT
systems are the core of a KM-based call center.
Meeting both these areas will ensure that you have the resources in place to
support frontline staff, and the processes to maximize their value. However,
more important than any IT system you may implement is the knowledge itself.
Identify the knowledge your tier 1 staff and customers require, and accumulate
it. Once you have the raw information, shape this into a structured and usable
knowledge repository. Only then will you be in a position to deliver a complete
KM solution.
Spend the necessary time to identify the actual data, information, and
knowledge requirements of your customers and staff. This will ensure that you
get the maximum benefit out of building your center’s knowledge resources.
There are a number of practical ways of identifying information needs:
Talk to both experienced and novice staff, to find out their requirements
first-hand.
Conduct an information review of the resources currently available (both
online and on paper).
Survey both call center staff and customers (if possible).
Talk to business and product representatives, to identify the areas they
would like highlighted to customers.
Examine the daily activities of frontline staff to identify key information
needs.
Analyze call logs and other statistics to find out areas of customer interest or
confusion.
Identify the typical questions and problems addressed by the help desk or
second-level support.
Evaluate whether sufficient documentation exists for frontline IT systems.
The end product of these efforts should be a long list of comprehensive call
center KM requirements. This list must be prioritized and implemented as part of
delivering the KM system.
Involve staff throughout the design process, to ensure that their needs are
identified.
Develop prototypes for new KM systems, and test these with real users.
Apply IA principles and methods to all information repositories. This will
determine appropriate groupings, menu items, and navigation.
Use card sorting to determine structure, to identify any missed categories
(see section “Card Sorting” in Chapter 4).
Ensure that your staff is fully trained to use KM systems and processes. Make
sure they are aware of the full range of information that is available to them.
Knowledge Repository
One such KM system focused on call centers is a knowledge repository. The
knowledge repositories in a call center are the primary (or sole) source of
information provided to your customers. As such, they warrant a substantial
amount of effort to ensure that they are both useful, and used.
Although this may be considered a large system effort, the payoff justifies the
benefits that can be realized. A knowledge repository will help to reduce call
handling times, and increase the consistency of knowledge provided to
customers. Call center staffs typically have only a minute to find the information
requested by their customer. Under this pressure, it is critical that staffs have
effective and efficient ways of locating answers.
A well-designed search engine is a necessary first step toward meeting this
goal. Spend time designing and configuring the search engine: It must be simple
to use, but still return a useful set of results. A search engine does not deliver the
complete solution. It is also important to provide staff with structured and
meaningful browsing and navigation methods. This ranges from ensuring the
correct items are on the main menu, to creating related links between pages. All
of this must be supported with comprehensive metadata, such as title,
description, and keywords. These combine to increase the effectiveness of both
searching and browsing.
Ensure that information provided via the IVR is consistent with the details
in your information repository.
Gather detailed breakdowns on the usage of the IVR. This will tell you the
areas your customers are interested in.
Document the exact script of the IVR for call center staff. This will assist
them to manage a clean handover when they answer calls.
IVR systems are normally only the first step in the customers’ interaction with a
call center, and they must be managed as such. There must be consistency across
all methods of information delivery.
Customer-Facing Resources
Many call centers now respond to online and e-mail queries, in addition to phone
calls. With this broadened responsibility, call centers must manage the additional
workload.
The call center knowledge repository can be used in a number of practical
ways:
Insurance KM Model
The insurance KM Model (see Figure 11.1) depicts the various stages of
knowledge and the areas within an insurance organization that must leverage
knowledge in order to effectively and efficiently execute their tasks. The
following describes each element of the insurance KM model:
Underwriting
Emerging technologies such as discussion databases, document management,
Internet search capabilities, case-based reasoning, rule-based systems, data
mining, and neural networks are powerful tools that can improve organizational
communications and decision-making performance. To be effective however,
technology must be aligned with and support the human and selected
management practices of the organization.
Claims
Insurance companies often have to validate claim information and enter it
manually before even starting the adjudication process. Delays are constant.
Multiple priorities must be balanced, including regulatory compliance,
fraudulent claim detection, invalid claim identification, and customer service. In
order to best serve all of these goals at once, processes must be optimized and
paired with technology designed to support a streamlined claims experience.
We can provide our wealth of domain expertise in insurance, process
management, and technology to provide your company with the following
benefits:
Big Data. Big Data. Big Data. Yeah … so what? What does Big Data have to do
with insurers? Just think about it. You sift and search and sort an incredible
amount of data—adjusters’ hand-written notes, data from fraud lists and the
information from claims management systems, and the National Insurance
Crime Bureau (NICB) claims database. Are you getting the most from that data?
With so many claims to handle, your adjusters don’t have time to sift through
all of that data to evaluate each claim. But they may not make the best decision if
they miss a valuable piece of information. That means many of their decisions
are based on experience, gut feeling and the limited information that is readily at
hand.
For this reason—and many others—Big Data analytics is playing an
increasingly important role in the insurance business. Working alongside
adjusters, analytics can flag claims for closer inspection, priority handling, and
more. Here are six areas where analytics can make a big difference:
Fraud: One out of 10 insurance claims is fraudulent. How do you spot those
before a hefty payout is made? Most fraud solutions on the market today are
rules-based. Unfortunately, it is too easy for fraudsters to manipulate and
get around the rules. Predictive analysis, on the other hand, uses a
combination of rules, modeling, text mining, database searches, and
exception reporting to identify fraud sooner and more effectively at each
stage of the claims cycle.
Subrogation: Opportunities for subrogation often get lost in the sheer volume
of data—most of it in the form of police records, adjuster notes, and
medical records. Text analytics searches through this unstructured data to
find phrases that typically indicate a subrogation case. By pinpointing
subrogation opportunities earlier, you can maximize loss recovery while
reducing loss expenses.
Settlement: To lower costs and ensure fairness, insurers often implement fast-
track processes that settle claims instantly. But settling a claim on-the-fly
can be costly if you overpay. Any insurer who has seen a rash of home
payments in an area hit by natural disaster knows how that works. By
analyzing claims and claim histories, you can optimize the limits for instant
payouts. Analytics can also shorten claims cycle times for higher customer
satisfaction and reduced labor costs. It also ensures significant savings on
things such as rental cars for auto repair claims.
Loss reserve: When a claim is first reported, it is nearly impossible to predict
its size and duration. But accurate loss reserving and claims forecasting is
essential, especially in long-tail claims such as liability and workers’
compensation. Analytics can more accurately calculate loss reserve by
comparing a loss with similar claims. Then, whenever the claims data is
updated, analytics can reassess the loss reserve, so you understand exactly
how much money you need on hand to meet future claims.
Activity: It makes sense to put your more experienced adjusters on the most
complex claims. But claims are usually assigned based on limited data—
resulting in high reassignment rates that effect claim duration, settlement
amounts, and ultimately, the customer experience. Data mining techniques
cluster and group loss characteristics to score, prioritize, and assign claims
to the most appropriate adjuster based on experience and loss type. In some
cases, claims can even be automatically adjudicated and settled.
Litigation: A significant portion of a company’s loss adjustment expense ratio
goes to defending disputed claims. Insurers can use analytics to calculate a
litigation propensity score to determine which claims are more likely to
result in litigation. You can then assign those claims to more senior
adjusters who are more likely to be able to settle the claims sooner and for a
lower amount.
Talent Management
The focus here is about addressing the specific needs of the insurance company
employee. In Chapter 6, a broader perspective on talent management was
detailed. Talent management must address the business costs and the impact of
employee turnover. Employee turnover can be grouped in four main categories:
Costs due to a person leaving (other employees must fill in for the person
leaving; the lost productivity of the employee; the cost of training the
company has provided; the cost of lost knowledge, skills, and contacts; and
the cost of lost customers the departing employee is taking with him).
Hiring costs (costs associated with identifying, recruiting, selecting, and
hiring a replacement, such as advertising, Internet posting, costs in terms of
time spent arranging the interviews, or calling references). These costs also
translate into lost productivity.
Training costs (the replacement person’s orientation, product knowledge,
industry knowledge, and on the job training).
Lost productivity costs (the new employee will go through a few stages
before becoming fully productive; his supervisor will spend time guiding
him or her and correcting his or her potential mistakes).
Given that companies are increasingly gaining competitive advantages from
intellectual assets rather than physical assets, organizations that do not
implement effective knowledge capturing strategies will face difficulties.
Role of Technology
The role of technology as it pertains to KM is that of a facilitator and enabler.
Technology enables the capture, catalog, and dissemination of knowledge to
occur. Technology facilitates the use/reuse of knowledge assets across the
organization. This is true for all organizations, including insurance companies,
when leveraging KM. The following provides awareness into a few technology
platforms that help insurance organizations achieve knowledge creation, storage
distribution and most importantly, knowledge application.
Underwriting KM Systems
The underwriting KM functionality will provide the underwriter with the
following:
Claims KM Systems
The claims KM functionality will provide the following:
Settling claims: Settling insurance claims is just one aspect of the claims
management process. The claims KM functionality will provide the necessary
knowledge to the claims processors to timely process a claim by
CRM System
Integration of your KM system with your organizations CRM system will enable
knowledge about customers to be directly tied to specific customer data. This
integration will improve services for customers; prioritize customers using their
purchase history, which allows a company to delineate which customers are
most important and target most of their efforts toward; and see and know the
customer’s complete history, which will enable employees to review customer
history and allow them to analyze customer activity that will aid in selling more
product or service to that customer.
Collaboration
Collaboration is a key benefit of any KM system. Integration with your
organization’s collaboration tools/environment with social media will empower
your organization to tap into the voice of the customer. This integration will
enable your organization to establish a better relationship with your customer by
responding quickly to issues, and to launch products and services that tie directly
to customer needs and being proactive about sharing pertinent news about your
organization.
E-Learning
Integration of your KM system with your organization’s e-learning platform will
address specific knowledge gaps your employees are experiencing and tie them
directly to training and learning opportunities that will fill those gaps. The e-
learning platform integrated with KM will improve training event management
(i.e., scheduling and tracking), skills and competencies management, skill gap
analysis, and delivering of an individual development plan.
Content Management/IA
Integration of your KM system with your organization’s content management
system powered by IA will provide all content (information and knowledge)
with a consistent organization structure, labeling, descriptive elements
(metadata), and consistent (improved) search experience.
Key Learnings
The following are key learnings from this chapter:
Some of the benefits KM has for legal professionals and firms are as follows:
Knowledge capture and transfer to prepare the law firm for when partners and/or
associates leave the firm, infusing knowledge sharing to continue building the
expertise of the firm, and improving learning through lessons learned,
assessments, and continual process improvement for better client service are all
valuable assets that KM will impart to the firm.
This chapter focuses on how law firms manage their vast array of explicit and
tacit knowledge. It also examines how law firms are leveraging precedent
development, legal research, talent management, expertise locator, LPM, and
client support, all in relation to instituting KM within their legal institutions to
provide the law firm with a distinct advantage over its competitors.
KM in LPM
Knowledge is generated throughout the execution of a project. KM within
projects is intended to make relevant knowledge available to the project team
throughout the execution of the project. Project management methodologies
usually define standard project phases, processes, templates, or actions that are
repeated in the course of different projects.
The LPM execution addresses why the project idea exists, the problem(s) it is
addressing, the products or the deliverables of the project, who will take part in
the project, and how will people working on the project be organized, as well as
the project location and deadlines. KM as a part of the LPM process will
document and share decisions and assumptions regarding resources, timelines,
quality requirements, and costs. KM will also document and share domain
knowledge: knowledge about the industry, technology, processes, current
situation, business products, and services (i.e., the software development life
cycle); institutional knowledge: knowledge that a project team or member has
about the organization (i.e., organization structure and reporting structure); and
process knowledge: knowledge about the project tasks, methodologies,
timelines, structure, deliverables, and processes (i.e., project plan), as well as
sharing and transferring knowledge through mentoring and lessons learned
(which are documented after every phase and at the end of the project).
According to Lisa Kellar Gianakos, director of KM at Pillsbury Winthrop
Shaw Pittman and the author of The Intersection of Knowledge and Legal
Project Management (2013, p. 1), “KM professionals understand the process of
law practice, project management, finance, and technology. They also tend to be
analytical and logical thinkers. Furthermore, in many firms the KM professionals
have already built bridges to both lawyers and multiple staff departments. Since
LPM is a collaborative effort, those bridges turn out to be very important in the
difficult LPM change management process” (Gianakos, 2013).
Gianakos also quotes Toby Brown. Brown is a well-known LPM evangelist
with a strong history in KM. “In his keynote on the Economics of Law and the
Future of KM, he discussed why, for KM to remain a vital function for firms, it
needs to be focused on solving the core challenges facing firms” (Gianakos,
2013, p. 1). KM applied to LPM is one of the vehicles for KM to remain in front
of law firms in the foreseeable future. The project development life cycle enables
many traditional KM goals to become closely aligned with those of LPM
(cultivating efficiencies, delivering better predictability, and improving
communications and processes). It is with this understanding that KM enables
project team members to reduce rework and squeezes the time that it takes to
plan project execution. Sharing lessons learned and advanced practices is key to
helping others excel in the LPM process and execution.
Legal Research
This section is not intended to provide an examination of legal research tools that
are available to legal professionals and law firms. It is intended, however, to
examine the role that legal research and the access to its resources plays in the
overall KM within law firms and for legal professionals.
In order to understand where to find the right content that is buried deep
within your firm’s thousands of research repositories and outside sources (such
as WestLawNext®, LexisNexis®, and VersusLaw®) and understand who in the
firm has a deep knowledge of specific content, in addition to wondering if what
you have in your repositories are up-to-date and relevant, you quickly realize
that KM is a challenge! Multiply that by the number of trial and appellate briefs,
memoranda, pleadings, depositions, e-mails, letters, and spreadsheets prepared
by inside and outside counsel alike and the challenge becomes even more
daunting. Without incorporating KM, your firm runs the risk of paying for
research over and over again.
During the early years of a lawyer’s career, research and document drafting
are the predominant professional activities that are being performed. Legal
research tools and sources are key resources to assist the early stage lawyers in
performing their tasks. The tools of legal research are considered KM tools that
help legal professionals locate the knowledge and analysis previously written by
judges, expert scholars, and lawyers for adaptation and use in the context
presented by a current client. LexisNexis research tools that include citation
tools, treatises by authors and competitive publishers, as well as integrated
search functionality are all delivered to the legal researchers via laptops, tablets,
and other mobile devices (Staudt, 2003).
Legal research tools benefit users by helping them improve their research
speed and accuracy and enable a precision of collaboration, which the
combination of research resources and tools makes possible. Realizing the
benefits that the various legal research tools bring to the law firm will depend in
large measure on the current structure of the firm’s internal data and on the past
and future ability of the firm’s data infrastructure to insure that the firm data is of
very high quality. A brief synopsis of three popular legal research platforms,
namely WestLawNext, LexisNexis, and VersusLaw, are presented subsequently.
WestLawNext
WestLawNext (see Figure 12.2) provides an authoritative content (primary law
and exclusive secondary law titles), attorney-editor expertise, with access to
primary law, analytical materials, practice area insights, litigation resources,
public records, and more. This platform enables users to build a legal research
page that’s ideal for the way you work, through organizing your favorite content
and legal research tools. It also provides access to legal encyclopedias, treatises,
legal periodicals, and law reviews that provide well-reasoned statements of the
law.
LexisNexis
LexisNexis (see Figure 12.3) is a global provider of content-enabled workflow
solutions, and is designed specifically for professionals in the legal, risk
management, corporate, government, law enforcement, accounting, and
academic markets. This platform originally pioneered online information with its
Lexis® and Nexis® services. It is part of RELX Group (London, UK) and serves
customers in more than 100 countries, with more than 15,000 employees
worldwide.
VersusLaw
VersusLaw (see Figure 12.4) was founded in 1985 as Timeline Publishing
Company (Minneapolis, MN). The company’s focus was originally to provide
the legal community with accurate, current, and in-depth information,
exclusively on one topic: professional liability. The company created a monthly
journal on legal ethics titled Lawyers Liability Review (LLR) and published the
first issue in February 1986.
In the early 1990s, Timeline began the electronic collection and distribution of
court opinions and other primary research materials. Timeline was an early
adopter of the Internet, and in August 1995, it was among the first web-based
legal content providers, carrying opinions from the US Supreme Court, the
Federal Circuit Courts of Appeals, and State appellate courts. Reflecting a new
direction and the company’s commitment to electronic distribution of legal
research materials, in 1996, Timeline Publishing changed its name to
VersusLaw, Inc. and launched a new website devoted exclusively to the
distribution of primary materials to the legal profession.
Today, VersusLaw continues to broaden its focus and mission: to provide all
legal practitioners access to current, in-depth, easy-to-use legal research,
regardless of the size of their firms, by using the power of technology.
Competitive Intelligence
As law firms mature in their use of knowledge and KM, incorporating the use of
CI to gain an advantage when serving clients is a logical next or synergistic next
step. KM and CI are about the process of gathering actionable knowledge on the
law firms’ competitive landscape. CI essentially means understanding and
learning what’s happening in the world outside your business, so you can be as
competitive as possible. It means learning as much as possible—as soon as
possible—about your industry in general and your competitors.
CI is the process of collecting and analyzing information about competitors’
strengths and weaknesses in a legal and ethical manner to enhance business
decision making. CI activities can be basically grouped into two main types: (1)
tactical, which is shorter term and seeks to provide input into issues such as
capturing market share or increasing revenues, and (2) strategic, which focuses
on longer term issues such as key risks and opportunities facing the enterprise.
CI is different from corporate or industrial espionage, which uses illegal and
unethical methods to gain an unfair competitive advantage.
KM infuses CI strategy through centering on a firm’s ability to expand
relationships with clients and make faster and more informed decisions that help
enhance the firm’s thought leadership position. CI initiatives leveraging KM will
aid in the intelligence-gathering process, empowering practice group initiatives,
while elevating the firm to the role of a trusted advisor providing knowledge of
industry trends, legislation, litigation, and other legal precedents.
Ann Lee Gibson states that although CI is indeed based on information, it is
created only when that information is analyzed, refined, and distilled into
something that has very clear implications for decision making. It offers the most
benefits to firms where important decisions and actions are being considered,
particularly the kinds with big upsides and downsides. In these settings, CI can
significantly reduce risk.
Information Architecture
Information architecture through the implementation of an understanding of
content relationships, taxonomies, and metadata (see Chapter 4) will improve
retrieval of case history and enable associations of related cases and rulings,
including locating knowledge resources (SMEs) needed for specific cases.
Creating/Modifying Taxonomy
The core benefit of KM is the ability to classify, retain, and find critical
knowledge. Navigation, taxonomy, and search are important for long-term
adoption and success of KM, because they are the framework by which users
find the information they are looking for when they do not know where it is
located. If users are unable to find the content they need, the value to the user is
almost entirely lost. The KM taxonomy can be changed based on
recommendation of the knowledge architect.
Creating/Modifying/Managing Metadata
Requests for Metadata Changes
Any user may suggest metadata changes. The knowledge architect administrator
is solely authorized to raise a request for metadata changes. This request needs to
be vetted and approved before moving ahead. Metadata reuse is highly
recommended. This means that metadata values should be enforced during the
artifact creation/check-in processes within the KM. It also means that
determining metadata values should not be a “one system/silo” view of values.
Critical metadata values will reflect the overall information architecture.
Governance of Law Firm Knowledge
KM governance ensures policy adherence and successful capture, cataloging,
reuse, monitoring, managing, and maintaining of explicit knowledge of the firm
(see Figure 12.6). The KM governance plan describes the policies, procedures,
roles, and responsibilities as it pertains to explicit knowledge. Effective
governance planning and the application of the governance plan are critical for
the ongoing success of the managing and maintaining of explicit knowledge.
Benefits of Governance
The following are some of the benefits of governance:
Governing Content
The governing of knowledge content must leverage the following best practices:
Use workflows and approval for content centers and site pages wherever
official content is stored.
Use version history and version control to maintain a history and the
authoritative source of the content.
Audit, manage, and maintain content repositories according to the content
life-cycle management.
Use site usage confirmation and deletion to manage site collection life
cycles.
Identify important corporate assets and sites that contain personally
identifiable information to be sure that they are properly secured and
audited.
Integrate the information architecture with the environment’s search
strategy. Take advantage of enterprise search features such as people search,
content sources, and connectors for external content.
Governing KM Effectiveness
Assessing Value with Metrics
Measuring effectiveness is a key component of governance and thus included
here. Metrics are a component to measuring overall adequacy and effectiveness
of the KM tool. Initial rollout of KM will take some time across the first
business area(s). Experience shows even then that adoption takes time.
Measurements at the beginning, middle (during adoption), and end (fully
matured) can be different.
Search—Tuning and Optimization
Site owners/administrators should constantly observe and evaluate effectiveness
of search results. Site administrators/owners oftentimes can get the “Search
Query and Search Result” reports from the search tools administrator
periodically (every two weeks). From these reports, they can analyze the type of
keywords users are searching for and the sites from which most of the search
queries are coming. Based on this, site administrators/owners can “tune” the
search for their sites. If any newly added metadata column needs to be available
in advanced search filters, then the search administrator will ensure this metadata
is configured.
Key Learnings
The following are some key learnings from this chapter:
This chapter will cover topics that include roles and responsibilities of
knowledge professionals, educational needs of these professionals, core KM
competencies, KM curriculum development and delivery, and KM education
programs and teaching methodologies.
Core KM Competencies
In determining core KM competencies (see Table 13.1), we must first understand
what it takes to perform in the various KM roles and execute their
responsibilities. The KM core competencies include connecting education and
strategic learning competencies with skill and ability in knowledge strategy
development and operationalization, collaboration, leadership and management
skills, in addition to technical competencies.
KM has both soft and hard competencies. The soft competencies include
ensuring that knowledge processing is aligned with the organization’s business
goals and objectives and is integrated into the organization’s everyday business
and work. It also includes software development, business and systems
architecture, and workflow management. The hard competencies include
elicitation and representation of knowledge (both tacit and explicit) and
structural knowledge in the form of business rules and business processes.
Client orientation
clients’ needs and concern
responds promptly and
effectively to client needs;
customizes services and
products as appropriate
• Leadership
• Excellent communicatio
• Time management/abilit
to prioritize
• Development or
management of informat
systems to support comp
business processes
• Project management of I
projects
• Significant knowledge a
use of relational databas
systems
• Survey design
• Finding, assembling, and
analyzing verbal and
numerical data from
Internet, databases, and
paper-based sources
• Dissemination of
information in a way tha
accessible, manageable,
and which supports the
work of individuals in an
organization
• Experience of working
effectively in a diverse
team, maintaining good
working relationships
• Experience of working
effectively in a diverse
team, maintaining good
working relationships
• Excellent information
technology skills, includ
relationship database
programming and/or
reporting skills
KM (systems) The KM administrator Responsibilities: The core competencies includ
administrator promotes, facilitates, understanding of KM
and supports the KM • Maintains the governance best practices, in
system within the knowledge configuration, system
organization, with repository administration, content
optimized outputs and • Can serve as a KM administration, and product-
process management. author specific knowledge of
The KM system • Subject matter expert implementing KM security
administrator is the (SME) for all policies.
person(s) with knowledge
administration rights repository upgrades,
and privileges within the capability issues,
specific knowledge and approved
repository. configuration
updates
The KM administrator
coordinates and
executes governance of
knowledge within the
knowledge repository.
Knowledge A knowledge engineer It is essential for a Knowledge engineers need in
engineer researches, designs, and knowledge engineer to depth competency as it
implements computer be highly detail- pertains to knowledge
software programs that oriented and organized. architectures as well as
can accomplish a wide When writing a new knowledge sharing,
variety of problem- program, he or she collaboration, and transfer
solving tasks. must be sure that no techniques and methods.
Professionals work with mistakes are made. A person who is interested in
knowledge-based Even a tiny error in a becoming a knowledge
systems (KBSs) that code can disrupt an engineer can look into
incorporate artificial entire program and bachelor’s degree program
intelligence into data mangle data output. accredited colleges and
mining, data entry, In addition, a knowledge universities. Relatively few
calculation tasks, and engineer must have the schools offer degrees
decision-making foresight to include specifically in knowledge
applications. They try to special instructions for engineering, but a program
formulate codes and the program that may computer science or softw
programs that operate in be overlooked by a less engineering can provide th
a similar fashion to a experienced appropriate training. Many
human expert on a given programmer. For future engineers decide to
task, such as solving example, he or she pursue master’s degrees or
complicated physics might be able to higher before looking for j
equations. Most prevent common data in the specialty. A new
knowledge engineers entry errors in a knowledge engineer usuall
are employed by spreadsheet application has the chance to work
software development by programming the alongside experienced
companies, though computer to recognize professionals for several
some work for private when one piece of data weeks or months to master
corporations and is very different from or her skills.
consulting groups. previous entries. If the
application detects that
a 100 was entered
instead of a 10, for
example, it could ask
the user if he or she is
sure that the entry is
correct.
KM liaison The KM liaison is the KM Responsibilities: KM liaison must have a gene
resource assigned to understanding of KM,
various teams across the • Executes KM including knowledge shari
organization that initiatives on behalf collaboration, and transfer
executes KM-specific of the specific KM techniques and methods.
duties for their teams on director
behalf of the KM • Serves as a
director. champion for the
KM and specific
KM director
• Serves as the
primary SME for the
specific KM director
area
KM specialist The KM specialist is KM specialist’s KM specialist need in depth
engaged in the support responsibilities include competency as it pertains t
of the KM policy, the following: knowledge architectures as
planning research, and well as knowledge sharing
metrics for KM. • Leads/contributes to collaboration and transfer
the development of a techniques and methods.
KM strategy and
associated
implementation plan
• Leads/contributes to
the development and
execution of the KM
governance plan
• Develops a
comprehensive
mapping of KM
information sources
and knowledge,
including processes
• Contributes to the
development and
ongoing
maintenance of the
KM system(s)
• Creates an approach
for guiding ongoing
analyses needed to
address observed
KM gaps and for
identifying
opportunities for
innovation, process,
procedure, and
policy
making/adjustments
• Oversees capacity
building and support
for internal
knowledge
acquisition,
management, and
sharing; ensures
relevant CoPs are
developed and
strengthened;
supports
development of
staff, consultants,
and key partners and
of all aspects of KM
Knowledge The knowledge architect is This person is charged Knowledge architects provid
architect a cross-organizational with the design of the tools and skills to help
and interdisciplinary dynamic systems of them design knowledge in
role. This role has knowledge creation the organization’s business
knowledge of and transfer, and the processes.
taxonomies and design of semantic Their core competencies incl
ontology structures that range understanding of knowledg
analysis/design/creation, from taxonomies to structures (tacit and explic
and understanding and models of knowledge and understanding of data
creating knowledge flows (explicit and modeling (structured data)
flows to capture tacit tacit) within an and content modeling
and explicit knowledge. organization. This (unstructured data focus).
The individual who person also deals with
oversees the development of
implementation of the those semantic
enterprise’s knowledge structures and designs
architecture, who leads them for their use and
the “knowledge application. A critical
architecture team” in part of creating these
identifying, organizing, designs is research into
and providing access to an organization’s
scattered, heterogeneous knowledge, the
information in digital knowledge contained
and paper form, and in the people of the
who leads the organization, and, the
knowledge audit to information/knowledge
determine and component of the
continually reevaluate activities of the
the specific knowledge organization.
needs of users and their
business processes. The
knowledge architect
defines knowledge
processes and identifies
the technology
requirements for
creating, capturing,
organizing, accessing,
and using knowledge
assets.
KM KM author/writer is the Responsibilities include KM author/writer must have
author/writer primary person(s) the following: experience in PLAID as w
involved in creating as linguistics. Also, the KM
knowledge within the • PLAID author must have a general
knowledge repository. • Collaboration with understanding of KM,
The KM author is a key SMEs including knowledge shari
member of the KM staff • Establish/maintain collaboration, and transfer
who applies plain adherence and techniques and methods.
language and governance of style
information design guide
(PLAID) to the
construction of
knowledge articles,
FAQs, and other content
being leveraged for KM.
KM analyst The KM analyst analyses KM analyst’s KM analyst’s core competen
and proposes responsibilities include include deep analysis
improvements to the the following: competency as it pertains t
overall effectiveness leveraging various KM
and efficiency of the • Implementing a methods. KM analysts
KM program at all range of methods provide means to
levels by applying and tools to capture communicate the business
advanced KM methods and document needs in a way that engine
and practices for all knowledge and architects can understa
users of KM at the • Contributing to the While this competency
organization. analysis and focuses on operations in
configuration of knowledge organizations,
knowledge also of value to business
maintenance professionals.
approaches and
practices
• Contributing to the
analysis and
configuration of
knowledge sharing
approaches and
practices
• Working closely
with other staff
members of the
specific KM director
and/or KM to ensure
that new elements of
KM using innovative
technology and
media are retained
and developed, and
advising on the
mechanisms for their
implementation
Figure 13.1 KM competency model.
The curriculum must not only focus on concepts and theories but also on
practical aspects (based on real-world implementation of KM), and how it is
implemented and used. The curriculum must also include the various methods,
tools, applications, and systems that are developed and utilized to enable KM to
be an actionable event. Another essential ingredient of KM curriculum
development and delivery for the twenty-first century would be to incorporate
the use of case studies, storytelling, affinity diagrams, knowledge cafés, and
similar experience-sharing mechanisms.
This is the type of education that will lead to KM career enhancement,
enrichment, and planning. Other curriculum “basics” as pointed out by the
KMEF to be included in KM are courses in measures and metrics, collaboration
techniques, networking, and organizational development and effectiveness.
Teaching Philosophy/Methodology
The KM professional must be able to learn knowledge concepts and apply them
in a variety of ways. KM education comes in a variety of forms to enable the
KM professional to speed up on a particular concept and apply it to meet a
specific need. Knowledge transfer, communities of practice (CoPs), capturing
tacit and explicit knowledge, and KM governance are only a few of the concepts
that today’s KM education must focus on to assist the KM professional in
execution of their jobs.
My goal of instruction delivery has always been to improve student
comprehension, application, and performance. It’s further based on the premise
that learning should not occur in a haphazard way but should be developed in
accordance with orderly processes, be specifically tailored to the target audience,
and have measurable outcomes. To accomplish the goals set forth in the delivery
of KM education, I have incorporated the use of Bloom’s Taxonomy of
Learning. As a KM professor, I recommend Bloom’s Taxonomy to be part of
any curriculum that teaches KM.
Figure 13.2 Bloom’s taxonomy for learning objectives. (R. Heer, A Model of
Learning Objectives based on A Taxonomy for Learning, Teaching, and
Assessing: A Revision of Bloom’s Taxonomy of Educational Objectives.
Center for Excellence in Learning and Teaching, Iowa State University,
Ames, Iowa.)
Applying: Use a Guidance is given to students Through the use of case studies,
concept in a new on approaches to analyze each student leverages the
situation or case studies that reflect knowledge gained through
unprompted use real-world problems. understanding of and the
of an abstraction. interpolation and extrapolation
Apply what was of concepts and apply them to
learned in the solve real-world problems.
classroom into
novel situations
in the work place.
KM Education Programs
Sometime ago, I had participated in a discussion and the associated comments on
KM education, which included university courses (master’s programs),
certification programs, and certificate programs. This discussion was hosted by
Art Schlussel in the CKO Forum at LinkedIn. This discussion inspired me to
elaborate on my thoughts concerning KM education. As I stated in my comments
to Art, for any education to be effective, it must be supported by practical
application, including having experienced mentors work with participants who
have recently completed any number of various KM training programs.
In this discussion, Art mentioned that a partnership between the US military
and a well-known accredited university to build a comprehensive KM training
program is in its preliminary stages. However, the major issue is what does or
will this training consist of and the fact that the US military wants it to follow
their KM competency model (see earlier).
I believe that the KM training should have a holistic approach, which will
cover the following:
Although this is not an exhaustive list, the approach must include planning,
strategies, and processes applied for KM as well as the software that will enable
and suport the execution of the KM program initiatives. The US army’s KM
competency model serves as a foundation to how the army will approach KM
and forms the basis of what KM will address from the army’s perspective. The
army’s enterprise KM competency model represents a holistic approach to
institutionalizing KM. I believe that a holistic approach to KM is where we must
begin in our training as well as our execution of KM at our organizations.
Columbia University
Columbia University’s MS in information and knowledge strategy (IKNS)
program (http://ce.columbia.edu/information-and-knowledge-strategy) prepares
individuals who are invested in the strategic potential of business-knowledge
strategy alignment, collaboration, and business analytics to expand or branch out
from their current roles, or become entrepreneurs of ventures in the knowledge
domain. Contact Columbia University for specific up-to-date information
regarding this program.
Drexel University
Drexel University’s online accredited master of science in library and
information science (MSLIS) program (http://online.drexel.edu/online-
degrees/information-sciences-degrees/ms-di/index.aspx) is an industry leader in
digital information management and is ranked top 10 among library science
programs nationally. Drexel’s College of Computing and Informatics, with the
MSLIS program in 2014, was named one of “America’s Best Graduate Schools”
by U.S. News & World Report. The College of Computing and Informatics offers
a concentration in competitive intelligence and knowledge management. In this
program, students will learn to apply commonly used techniques to identify and
evaluate an organization’s knowledge-based assets, design knowledge sharing
opportunities within organizations, design information services to meet
organizational information needs, relate business resources to real-world
situations and needs of individuals and institutions, and utilize competitive
intelligence activities to support strategic decision making in the organization.
Contact Drexel University for specific up-to-date information regarding this
program.
KM Certification Programs
KM certification programs are often designed for working professionals. These
programs are leveraged to provide the tools and methods for understanding and
implementing KM relatively quickly. More often than not, the participants have
specific issues in KM that they need to address and/or they are moved into a KM
role not fully understanding what KM is really about, or how to be effective in
their KM position. A good KM certification should be based on standards
disseminated by the industry and professional KM organizations. Once the
participant completes an in-class project and examination, it signifies that the
individual is certified to meet certain standards or competencies related to
successful implementation of KM, as prescribed by the profession. The
following are three such programs, but this does not represent an exhaustive list
of KM certification programs that are available:
RightAnswers
Although RightAnswers is a KM software vendor (I try and stay away from
endorsing any specific vendor and/or their products), they offer a unique KM
certification program (http://www.rightanswers.com/training/rightanswers-
knowledge-management-certification/) that focuses on knowledge-centered
support (KCS) and information technology infrastructure library (ITIL). The
program focuses on KCS principles and knowledge best practices, and how they
are applied within the RightAnswers platform.
RightAnswers has indicated that the participant will learn the following:
The content for this program is based, in part, on the ATD Competency Study
and helps in preparation for obtaining the Certified Professional in Learning and
Performance (CPLP) credential. Contact the ATD for specific up-to-date
information regarding this program.
Key Learnings
The following are some key learnings from this chapter:
User-Generated Data
Customers are sharing information about their experience with products and
services, what they like and don’t like, how it compares to the competition, and
many other insights that can be used for identifying new sales opportunities,
planning campaigns, designing targeted promotions, or guiding product and
service development. This information is available in social media, blogs,
customer reviews, or discussions on user forums. Combining all these data
contained in call center records and information from other back-office systems
can help identify trends, have better predictions, and improve the way
organizations engage with customers (Andreasen, 2014).
Figure 14.1 Knowledge management pyramid.
Public Data
Public information made available by federal, state, and local agencies can be
used to support business operations in human resources, compliance, financial
planning, and so on. Information from courthouse websites and other state
portals can be used for background checks and professional license verifications.
Other uses include monitoring compliance regulation requirements, bill and
legislation tracking, or in healthcare obtaining data on Medicare laws and, which
drugs are allowed per state (Andreasen, 2014).
Competitor Data
Information about competitors is now widely available by monitoring their
websites, online prices, press releases, events they participate in, open positions,
or new hires. This data allows better evaluation of the competition, monitor their
strategic moves, identify unique market opportunities, and take action
accordingly. As a retailer, for example, correlate this data with order transaction
history and inventory levels to design and implement a more dynamic pricing
strategy to win over your competition and grow the business (Andreasen, 2014).
Partner Data
Across your ecosystem, there are daily interactions with partners, suppliers,
vendors, and distributors. As part of these interactions, organizations exchange
data about products, prices, payments, commissions, shipments, and other
datasets that are critical for business. Beyond the data exchange, intelligence can
be gleaned by identifying inefficiencies, delays, gaps, and other insights that can
help improve and streamline partner interactions (Andreasen, 2014).
To comb through the various sources of user-generated data, public data,
competitor data and partner data leveraging KM analytics (data analysis,
statistics, and trend analysis), and content synthesis technology (technology that
categorizes, analyze, combines, extracts details, and reassess content aimed at
developing new meanings and solutions) will be necessary.
Degree Centrality
Social network researchers measure network activity for a node by using the
concept of degrees (the number of direct connections a node has). In the
following example, Chris has the most direct connections in the network, making
his node the most active in the network. He is a “connector” or “hub” in this
network. Are more connections better? This is not always true. What really
matters is where those connections lead to and how they connect the otherwise
unconnected. Here, Donald has connections only to others in his immediate
cluster—her clique. She connects with only those who are already connected to
each other (Figure 14.2).
Betweenness Centrality
Although Chris has many direct ties, Jason has few direct connections, yet he has
one of the best locations in the network. He is between two important
constituencies. He plays a broker role in the network. The good news is that he
plays a powerful role in the network; the bad news is that he is a single point of
failure. Without him, Chris, Elissa, Davis, and Mark would be cut off from
information and knowledge in Austin’s cluster. A node with high betweenness
has a great influence over what flows and does not flow in the network (Figure
14.3).
Closeness Centrality
Jason has fewer connections than Chris, yet the pattern of his direct and indirect
ties allows him to access all the nodes in the network more quickly than anyone
else. He has the shortest paths to all others, and closer to everyone else. He is in
an excellent position to monitor the information flow in the network and
therefore has the best visibility into what is happening in the network.
Let’s take a look at other social network measures that contribute to gaining
knowledge from the relationships in your networks. These include network
centralization, network reach, network integration, boundary spanners, and
peripheral players.
Network Centralization
Individual network centralities provide insight into the individual’s location in
the network. The relationship between the centralities of all nodes can reveal
much about the overall network structure.
A very centralized network is dominated by one or a very few central nodes. If
these nodes are removed or damaged, the network quickly fragments into
unconnected subnetworks. A highly central node can become a single point of
failure. A network centralized around a well connected hub can fail abruptly if
that hub is disabled or removed. Hubs are nodes with high degree and
betweenness centrality.
Network Reach
Not all network paths are created equal. In many instances, the shorter paths in
the network are more important (see Figure 14.4). It is also to be noted that
networks have horizons over which we cannot see, nor influence. In these cases,
the key paths in the network are 1 and 2 steps and on occasions, three steps to all
connections (direct and indirect). Therefore, it is important to know who is in
your network neighborhood, who you are aware of, and who can you reach
(network reach).
Network Integration
Network metrics are often measured using shortest paths. This measurement
makes the (often incorrect) assumption that all information and/or influence
flows along the network’s shortest paths only. However, networks operate via
direct and indirect, shortest, and near-shortest paths.
Boundary Spanners
Nodes that connect their group to others usually end up with high network
metrics. Boundary spanners such as Austin and Jason are more central in the
overall network than their immediate neighbors whose connections are only
local, within their immediate cluster. A boundary spanner occurs via your
bridging connections to other clusters or via your concurrent membership in
overlapping groups. Boundary spanners are well positioned to be innovators,
because they have access to ideas and information flowing in other clusters.
They are in a position to combine different ideas and knowledge, found in
various places, into new products and services.
Figure 14.4 Closeness centrality.
Peripheral Players
Most people would view the nodes on the periphery of a network as not being
very important. In fact, nodes such as Mark and David receive very low
centrality scores for this network. Because individuals’ networks overlap,
peripheral nodes are connected to networks that are not currently mapped. Mark
and David may be contractors or vendors that have their own network outside of
the company, making them very important resources for fresh information not
available inside the company.
The unit of analysis in network analysis is not the individual, but an entity
consisting of a collection of individuals and the linkages among them. Network
methods focus on dyads (two actors and their ties), triads (three actors and their
ties), or larger systems (subgroups of individuals, or entire networks), which
social media networks provide.
Big Data Sources and KM
The use of Big Data and its analysis is very closely driven by the available
technologies in the organization, and the tight integration between hardware and
software and other data generation mechanisms. A Big Data strategy requires the
ability to sense, acquire, transmit, process, store, and analyze the data to generate
knowledge that can be stored in a repository for later use.
Analyzing Big Data and understanding where KM can play a role start with
analyzing the data, information, and knowledge within enterprise-wide systems.
These systems include but are not limited to knowledge repositories/portals,
content management (CM), enterprise resource planning (ERP), customer
relationship management (CRM), material requirements planning (MRP),
product life cycle management (PLM), and product data management (PDM)
systems (see Figure 14.5).
The knowledge that can be gained from these systems include tacit (by
identifying the key knowledge holders of the content, which in this reference
includes information and knowledge) and explicit (through accessing the various
types of market, technology, procedural, customer, and competitor knowledge
that is captured and unstructured (see Table 14.1). Information and data are
exchanged on a continuous basis with these systems as the product and services
are being realized. The unconventional, unstructured information comes from
several sources such as simulation, sensors, blogs, employee experience, wikis,
and customer experience and it should be harnessed.
Figure 14.5 Enterprise view of Big Data sources and knowledge
management. (Based on Rajpathak, T. and Narsingpurkar, A.,
Manufacturing Innovation and Transformation Group (ITG), TCS,
Managing Knowledge from Big Data Analytics in Product Development.
http://www.tcs.com/resources/white_papers/Pages/Knowledge-Big-Data-
Analytics-Product-Development.aspx.)
Knowledge Classifications
Knowledge, in particular organizational knowledge, typically exists in large
volumes dispersed across the enterprise. This lends itself to the fact that
organizations need to find a way to discover, classify, capture, disseminate, and
reuse this knowledge. Once the knowledge sources are discovered, an essential
element to leverage KM in Big Data is to classify that knowledge.
Table 14.1 Mapping Knowledge Areas to Big Data Elements
Knowledge Volume Velocity Variety Value
Type
Market Customer data Direct interactions Market analysis High value
knowledge Competitor Social media Demographic Customer
data Surveys data data User-
User-generated Benchmarking generated
data data data
Public data Trends Competitor
Competitor data
data Partner data
Partner data
Human (tacit) Experience- Real-time decision Skill-based Heuristics
knowledge based making Experience-
collaborative based
Tacit knowledge
Technology Standards Real-time data Cost Patents
knowledge Usage Acquisition Reliability
Materials Packaging
Field data Ergonomics
Procedural Design Design knowledge Procedures Best
knowledge knowledge Knowledge Job-aids practices
Analysis repository/knowledge Workflows Process data
Verification, base Validation
testing, and data
validation
Knowledge
Source: Yuan, Q.F., Yoon, P.C., and Helendar, M.G., J. Knowl. Manag., 10, 6, 50–63, 2006.
According to Yuan, Yoon, and Helendar, knowledge areas are classified into
four types, collectively referred to as M-H-T-P: market knowledge, human
(tacit) knowledge, technology knowledge, and procedural (explicit) knowledge.
Based on these four knowledge areas, Table 14.1 depicts the mapping of
knowledge areas with elements of Big Data (Yuan et al., 2006).
Although a small part of this information flows back into the enterprise
systems, attempts should be made to capture this in a central repository, typically
a single data warehouse. A deliberate attempt must be made to keep the data
together, so that the data can be combined to create information, which can be
analyzed to generate knowledge that loops back to the knowledge repository and
into the organization.
Inclusion of additional types of data into the IA is needed. This includes semi-
structured data (i.e., data coming from sensors such as RFID, location
information coming from the mobile devices, information from web logs,
documents, and e-mails). These new data elements are often produced at much
higher rates compared to the classical transactional data. There is a lot more data
coming in at much higher rates and enterprises need to be able to manage these
new types of data and incorporate them into their overall IA framework. These
new types of data are one of the new characteristics of Big Data.
Key Learnings
The following represents some key learnings from KM and Big Data:
Don’t repeat solving the same problem. Perform root-cause analysis and
focus your analytics to solve the “right problem!”
The same principle that knowledge still exists within an organization’s data
still holds; however, the challenge is to manage the knowledge found by
breaking it down into smaller consumable chunks and then bringing them
together to form a complete picture.
There must be a cultural change to enable the belief that all of the
individuals in an organization are owners of both their own and the
company’s knowledge.
Workers today must be coached to manage, organize, and take
responsibility (or held accountable) for their content (information and
knowledge) that they create at every step of their work process.
Principles of KM are scalable as data grows.
The security, availability, scalability, and usefulness of the content can only
be achieved by executing a comprehensive content and data governance
strategy.
Leverage Big Data tools such as Apache’s Hive, Mahout, and Hadoop to
bring significant value to your Big Data analytics, which include but are not
limited to
Detecting abnormal behavior patterns
Detecting trends through social media activities
Detecting suspicious activities
Identifying discrepancies in records across systems
Aligning your organization’s tacit knowledge (experts) to content
(information and knowledge) through expertise locators, assignment of
authoritative voice as a metadata field/value is an essential part of extracting
knowledge from your Big Data sources
Incorporating in your Big Data knowledge extraction efforts the
understanding of the data, information and knowledge within your
enterprise-wide systems, and the specific knowledge types that are
important to your organization to capture
Creating a comprehensive IA structure in order to enable unstructured data
to be included into the mix of Big Data sources
Aligning IA elements with Big Data components to enable consistencies
when including unstructured data to the organization’s Big Data
environment
Chapter 15
KM Principles
The DoD understands that KM improves efficiency, effectiveness, and
innovation across the JS and throughout the DoD. The DoD also understands
that as a force, planning, training, operations, and engagement are
improved/enhanced when the principles encapsulated in KM are applied (see
Table 15.1).
Figure 15.1 Joint Chiefs of Staff US DoD organization structure.
The Army CIO/G-6 will issue policy to ensure an enterprise focus to KM efforts
with adherence to Army KM principles. Army commands and organizations will
develop KM practices and systems with an enterprise perspective with the
latitude to tailor KM practices to specific missions.
Army KM Principles
Any discussion of Army KM should include a discussion of the Army KM
principles that were signed by the Army Chief of Staff (General George W.
Casey, Jr.) and the Secretary of the Army in 2008. The AKM principles are still
in effect and have served as a basis for KM efforts in the Army and the Federal
KM arena at large.
The Army KM principles create a consistent framework, so that war fighters
and business stewards can innovate, evaluate alternate courses of actions within
context of local conditions, and act quickly and decisively. The Army KM
principles will help preserve tacit and explicit knowledge and accelerate learning
as units and personnel rotate in and out of theaters or organizations. In addition,
the Army KM principles anchor KM efforts as an Army-wide enterprise
function.
The following are the Army KM principles. These principles align closely to
the overall DoD KM principles.
Process
Principle 6: Protect and secure information and knowledge assets. The
intent is to deny adversaries access to key information that gives the US
and coalition forces the decisive advantage to securely communicate and
collaborate across geographic and organizational boundaries. This
includes balancing risks regarding need to know against need to protect
and requires leaders of knowledge communities to comply with relevant
information assurance regulations and policies.
Principle 7: Embed knowledge assets (links, podcasts, videos, documents,
simulations, wikis, etc.) in standard business processes and provide
access to those who need to know. The intent is to leverage digital media
to add context, understanding, and situational awareness to operations
and business activities. The Army insists that leaders creatively embed
and use digital media (podcasts, videos, simulations, wikis, etc.) in
training routines and operations to add to or leverage the existing
knowledge assets of the Army. Convert intellectual capital (ideas, best
known practices, etc.) to structural capital (anything that is digitized and
accessible and searchable by others). Verify content for legality and
desired outcome.
Principle 8: Use legal and standard business rules and processes across the
enterprise. The intent is to establish business rules and processes that are
repeatable, thus reducing learning curves and promoting consistent
quality products and services. The Army expects its leaders to follow
standard business rules and processes set by the Army and the DoD.
Modify and evolve business rules to meet the commander’s intent and
quickly adapt business processes to meet or anticipate emerging threats
or business opportunities (situational awareness). The Army and across
the DoD leverage lean six sigma and continuous process improvement
principles within the KM discipline.
Technology
Principle 9: Use standardized collaborative tool sets. The intent is to use
common collaborative software tool sets for training, which reduces
training and maintenance costs while creating a common platform for
data, information, and knowledge exchange in theaters and with other
partners and organizations. It reduces impediments to search for relevant
knowledge across the enterprise. This promotes the use of the approved
Army and DoD collaborative tool sets. Train and deploy with them.
Provide access to structural capital to accelerate learning curves and
adopt/modify best known practices.
Principle 10: Use open architectures to permit access and searching across
boundaries. The intent is to create seamless and ubiquitous service on
demand, when one client application requests one or more services for
another application that provides complimentary services. The goals
here are for KM applications to be designed and operated with an
enterprise focus, permitting access, and searching across systems and
organizations without technical or structural impediments.
Principle 11: Use a robust search capability to access contextual
knowledge and store content for discovery. With the exception of
classified information, the Army expects knowledge bases to be
accessible and searchable by search engines that deliver contextual
knowledge and information. As the Army delivers and operates its KM
systems, leaders through the use of appropriate content management
principles need to ensure that there are no organizational or technical
barriers blocking access to digital media residing in knowledge bases.
Principle 12: Use portals that permit single sign-on and authentication
across the global enterprise including partners. The Army will utilize
authentication across its enterprise portal for access to lessen confusion
for users and provide a standard process for accessing enterprise
knowledge assets while reducing total cost of ownership of other portals,
websites, or knowledge networks.
Comprehensive workshops
Online virtual collaboration and sharing
Robust document management
Expertise locators
Integrated e-learning
Search/discovery
Shared network folders
Threaded discussion forums
Validated practices library
According to Mr. Jim Knox, DON CIO KM team lead, the DON continues to
“support the use of KM principles and methodologies as an enabler to improve
war fighting and business processes. Though KM is driven by the specific
mission requirements and needs of individual commands, it is important to
continue to share KM know-how and lessons learned across the department. In
the current fiscally challenging environment, commands should recognize the
benefits of KM as an enabler to facilitate mission accomplishment” (Jaggers
2014).
Some of the guiding principles of KM established by the Navy include the
following:
KM and BRAC
The Congress established the 2005 BRAC Commission to ensure the integrity of
the base closure and realignment process. At the onset of a BRAC movement,
there will be many personnel who will not transition with the command as it
moves to their new location. Losing these personnel will cause a gap in both tacit
and explicit knowledge. Leveraging KM in support of BRAC movements will
provide a mechanism to capture and retain this knowledge for the command as it
transitions. This paper will focus on the KM principles, practices, and techniques
to transition knowledge from individuals and make it available as a corporate
knowledge asset that can be retrieved, examined, and leveraged by the entire
command.
A BRAC move has to synchronize people, the information systems they use
and the knowledge they have. The organization (command) experiencing the
BRAC must carefully manage the change and the transition with precise
planning and attention to detail. There must be a realization of what
roles/positions are and are not transitioning along with an understanding of the
effect of what losing knowledge would do for the command and how this will be
addressed.
One of the objectives of the BRAC is to transition and execute change
management without an interruption or dilution of mission services and/or
activities. An essential component of this is the personnel and the knowledge
they possess to effectively carry out the missions of the command. Capturing,
cataloging, and retaining critical knowledge of the command before it leaves
during a BRAC move are at the core of applying KM to BRAC movements. The
problem occurs because the loss of knowledge will have an adverse effect on the
missions and the activities of the command that can be detrimental to the
personnel in theater. The solution will be to apply KM as a mechanism to
capture and retain this knowledge for the command and make it available as a
corporate knowledge asset that can be retrieved, examined, and leveraged by the
entire command. This knowledge should continue to be updated after the BRAC
is completed.
Summary of Contributing Factors
Table 15.2 outlines the key contributing factors related to the
opportunity/problem the BRAC presents.
The KM program for the command will optimize the organization, exchange,
currency, and accessibility of knowledge so that personnel spend less time
looking for what they need in order to make critical decisions and complete the
mission. The KM efforts and initiatives will add value by
Table 15.3 BRAC Chart Showing Possible KM Needs, Goals, and Objectives
for Stakeholders
Any KM program will need to concentrate on developing the following practices
among individuals and groups, and must be reflected in management processes
and behaviors, becoming an integral part of the organizational culture:
Key Learnings
The following are some key learnings from this chapter:
One of the takeaways from this chapter is about how the military structures
KM to be aligned to the overall DoD principles and structure, with a focus
on the individual KM principles of each branch. KM by design is given a
strategic alignment with a specific tactical focus depending on the needs of
the particular branch of the military.
All organizations can learn from the DoD structure of KM and apply it by
aligning KM to the overall corporate strategy, enabling KM through senior
leadership support (C-suite executive support), and aligning specific KM
strategies and tactical implementations across departments to the overall
policies and objectives stated in the organization’s enterprise KM strategy.
Communication Channels
The following channels should be leveraged for communicating the KM
program and need to be detailed in the communications plan:
Adoption Activities
In an effort to socialize and adopt your KM program inclusive of its policies,
practices, methods, and systems, there are certain activities that will impact in a
positive way on the success of your adoption efforts. The following is a
representation of some of these activities:
Lunch-n-learn: At its simplest, a learning at lunch program is a training (or
learning) event scheduled during the lunch hour. The attendees bring their
lunches and eat them during the presentation session. The training is usually
less formal and less structured than normal. This promotes a comfortable
atmosphere where the attendees feel free to not only learn from the
presenter but also share knowledge among themselves.
Knowledge café (see Chapter 5): A knowledge café is a means of bringing a
group of people together to have an open, creative conversation on a topic
of mutual interest to surface their collective knowledge, to share ideas and
insights, and to gain a deeper understanding of the subject and the issues
involved. As a KM tool, a knowledge café is used to share tacit knowledge.
The knowledge café can be used within teams, communities of practice
(CoP), across several teams both colocated and distributed, to help facilitate
learning from others and gain a deeper collective understanding of a subject
through interactive conversation.
Business social: Business social represents utilizing social media
capabilities within the organization. Social media has become an important
consequence to organizational communication processes because social
media concepts and tools afford behaviors that were difficult or impossible
to achieve in combination before these new technologies entered the
workplace (Treem & Leonardi, 2012). These technologies speak to the way
people interact outside of the corporation and enable a familiar and effective
way to promote awareness of the KM program and positively influence its
adoption.
Unclear KM strategy
Lack of personal return on investment (ROI)
Lack of organizational culture
Lack of organizational commitment
Failure to communicate effectively
Poor maturity of tool deployed
In this chapter, an examination of the communication and marketing efforts to
support adoption will be presented in detail. Also, implementation strategies,
cultural barriers, and other adoption challenges will be examined. In addition, a
demonstration of how the task–technology fit (TTF) model can be applied to
increase adoption of the KM program and its various components will be
detailed.
Communication Messaging
The recommendation for communicating about KM and setting the expectations
is a two-prong approach: (a) The executive management and KM program
leadership share similar messaging as it pertains to implementing the KM
program. They will be expected to push the messaging down through their
organizations. (b) KM champions or key management for an area will
communicate the same message with their subordinates as they work to adopt
aspects of the KM program.
Sample Messaging
XYZ Company is rolling out an enterprise KM program (EKMP). We listen to
your concerns and needs for such a program and are asking your support to
enable the EKMP to realize its vision and achieve its mission: “Deliver the right
knowledge, to the right people, in the right context, and at the right time.”
Critical to successful KM is the depth and breadth of the knowledge available.
We expect (appreciate?) your support in transferring all pertinent knowledge
assets into the enterprise KM system, making it the single location for corporate
intellectual capital.
We’ve received the questions concerning when the new knowledge sharing
methods (KSM) will be available. To eliminate silos of information/knowledge,
a news brief and calendar indicating availability of knowledge sharing
technology is now available to everyone via the corporate intranet.
Thanks for your support in changing the way we work together. A timeline for
understanding KM impacts in your area will be provided by your KM champion.
Table 16.1 indicates sample communication audience, channels, and message
points
Table 16.1 Sample Communication Audience/Channels
Audience Channel Messages Target Dates
Executive Executive-level Goals of KM program Established in
leadership meetings Rollout and adoption communications
progress and the role calendar
of the executive
KM program Program leadership Expectations during Established in
leadership meetings KM program communications
operationalization calendar
Company News article, news Vision for KM Established in
associates briefs, town hall program communications
meetings Rollout and adoption calendar
status
KM Specific Vision for KM Established in
administrators communications program communications
from KM program Features of the KM calendar
leadership system (if available)
News article, news Rollout and adoption
briefs status
KM Specific Established in
champions/KM communications communications
team from KM program calendar
leadership
News article, news
briefs
Adopting KM Systems
To succeed in executing your KM strategy, it is imperative that the adoption of
the system within the user base is achieved. The focus of the implementation and
socialization of the KMS should be on increasing and maintaining the usage of
the system in terms of the number of users participating, increasing the number
of transactions on the system, and improving the quality of the transactions.
Failure in meeting adoption translates into slow growth and an underutilized
and ineffective KMS. We will focus on two primary areas (a) key adoption
challenges faced by organizations and (b) a framework to guide project teams to
overcome these challenges.
The recommended approach to adoption followed critical elements of
technology transfer, which included taking into consideration the input from the
user community concerning their KMS needs, providing assurances of
confidence and trust that the knowledge and content contained in the KMS was
relevant and up-to-date, messaging changing attitudes from a silo organization to
an open accessible organization when it came to sharing, and the ability to obtain
knowledge and its associated content.
TTF Model
The examination of the TTF theory by Huang and Lin (2008) is predicted to be a
significant precursor to KMS usage (Huang & Lin, 2008). The Huang and Lin
study has shown that the TTF theory is suitable for understanding the specific
KMS needs of the group by determining and prioritizing their technology needs
(Huang & Lin, 2008; Simmons, 2013). The significance of Huang and Lin’s
study determines that the TTF theory can be applied to examine the motivation
of users to leverage a KMS to perform their organizational tasks and that
applying the TTF theory to the KM program can have a positive effect on the
success of the KM program.
In addressing the application of the TTF theory and how it could be applied to
a KM program, the first step is an examination of the components of a KM
program. According to an article by Robert Simmons on implementing a KM
program, he points out eight specific steps as follows:
Organizational Culture
Understanding the culture of your organization will mitigate cultural resistance
to KM adoption. Knowing if your organization’s culture is knowledge hoarders
or knowledge sharers, resistant to change or welcomes change, adoption leaders,
or adoption laggards will play a significant role on the messaging, activities, and
objectives that are placed on adoption initiatives.
Hsu, Lawson, and Liang state that diverse enterprise cultures and leadership
styles may lead enterprises to a different management pattern. Three primary
factors affect the adoption of KM: senior management support, a knowledge-
friendly culture, and a clear strategy for managing knowledge (Hsu, Lawson, &
Liang, 2007).
Important to the adoption of KM is the organizational culture regarding the
importance and use of knowledge. This may be the most difficult component to
fully mitigate (Davenport & Prusak, 1999). The enterprise culture represents a
company’s values, which become the norms of its employees’ activities,
opinions, and conduct. A method to mitigate an organization’s cultural barrier to
KM is to take an individual knowledge and attitude approach toward KM
adoption. Changing user perceptions and attitudes is the key to a user’s
participation.
In numerous studies, top management support and high-ranking management
positive participation have been found to be crucial to the successful adoption of
KM by an organization’s employees (Hsu, Lawson, & Liang, 2007).
Key Learnings
The following are some key learnings from this chapter:
In adopting a KMS, it is important that the user’s knowledge needs are met
and trust that the knowledge and content contained in the system is relevant
and up-to-date.
The TTF theory can also contribute to the group enhancing the KM program
roadmap as it pertains to the alignment of technology to the specific roles
within your organization.
In measuring value and rate of adoption of the KMS, it is similar to other
software implementations. However, it has a significant difference. Instead
of quantitative measures to value a KMS such as the number of
contributions or number of uses, “measures of KMS success are rather
related to intention to use (end users) and intention to contribute
(contributory users) and can be assessed with the help of the perceived
benefit model.” (see Figure 16.2; Baloh, 2007).
The TTF is leveraged to analyze the context through an analysis of the
characteristics of knowledge needs (instead of tasks) where task and
technology contingencies are internally consistent and aligned. Baloh also
indicates that “the more technology is aligned to knowledge needs, the
greater their intentions to contribute and use KMS will be” (Baloh, 2007).
Figure 16.2 Perceived benefit model.
Chapter 17
People—those who create, organize, apply, and transfer knowledge; and the
leaders who act on that knowledge
Processes—methods of creating, organizing, applying, and transferring
knowledge
Technology—information systems used to put knowledge products and
services into organized frameworks
Key Learnings
The following are some key learnings deduced from this Chapter:
Plan for success by executing a KM strategy that incorporates/champion these
components into your organization:
People—those who create, organize, apply, and transfer knowledge; and the
leaders who act on that knowledge
Processes—methods of creating, organizing, applying, and transferring
knowledge
Technology—information systems used to put knowledge products and
services into organized frameworks
We must keep in mind that successful KM initiatives once completed and funded
correctly can increase the organization’s profitability, enhance the quality of
work, encourage and stimulate innovation, and increase the value of the
organization through an increase valuation and accountability of knowledge
assets.
To decrease the probability of failure (and thus increasing the success rate!),
the following must be resolved:
Summary
Social Media
Chapter 3 presented social tools and mediums such as blogs, wikis, Twitter,
Facebook, and LinkedIn that represent the mechanisms to enable people to
engage and share openly. These social tools put knowledge-sharing power in the
hands of the users themselves, and this power has business and government
taking notice. In this chapter, social media as it pertains to the key principles of
KM were examined. These key principles included knowledge sharing,
knowledge capture, and knowledge reuse. This chapter included a template for
developing your organization’s social media strategy as well as some proven tips
and techniques to successfully execute this strategy.
Education Programs
Acknowledging that KM is a professional area of practice and to begin a formal
discussion of the educational foundation needed to support this area of
professional practice was the focus of Chapter 13. This chapter presented KM
education delivery and options within universities and colleges as well as in KM
certification organizations. This chapter covered topics that included strategic
roles and responsibilities of knowledge professionals in organizations today and
the educational needs of these professionals, standard KM competencies, KM
curriculum development and delivery, and teaching methodologies.
Customer Service
KM in customer service continues to be the focus of many organizations. This is
evident especially within the insurance and financial sectors as presented in
Chapters 10 and 11. When KM is applied to customer service, we saw that it led
to a faster speed to answer customer questions, which has been directly linked to
higher satisfaction rates, better long-term loyalty, higher degrees of trust, and
higher levels of revenue. In addition, some of the soft benefits included better
engagement and a higher likelihood to recommend your organization to other
potential customers.
M&A Transactions
The impact of KM on M&A transactions specifically when it comes to
understanding who the key knowledge holders are and to properly give a
valuation to a firm’s knowledge is an essential value addition for applying KM
to M&A transactions. We found in Chapter 8 that the effect of mergers will and
often leads to a loss of valuable knowledge from both sides of the
merger/acquisition equation. The question that was addressed is how do we
identify who the key knowledge holders are and what knowledge do they hold?
Also, has it been determined what knowledge is viable to the new organization
going forward? In this chapter a discussion of implementing a comprehensive
KM strategy with a human capital management component that would address
the many intellectual capital issues that are caused by a merger/acquisition was
examined.
Big Data
Big data continue to make an impact and present a challenge in the industry,
which specifically points to how KM will be positioned to gleam knowledge
from the various repositories of structured and unstructured data contained
within the organization. As we read in Chapter 14, infusing big data with KM
will provide organizations with a competitive edge to not only bring about
significant innovations, but deliver knowledge across the enterprise to the right
people at the right time and in the right context.
However, an examination of KM in practice would not be complete without
adding an examination of KM adoption (Chapter 16) as well as why KM
programs and projects fail (Chapter 17). In order to apply the principles,
practices, and methods presented in this book, I also highlighted tips and
techniques and key learnings. All these will provide a jump start to executing
KM at your organization.
The Future of KM
One of the major areas in which KM will make an impact is within the customer
service industry. Customer service is the area in which most customers will have
their only connection and interaction with your organization. It is this area where
customers will form their opinions about the organization and determine if they
remain a customer or move on to another competitor. Because of this scenario
(and others), organizations invest a major portion of their revenue and attention
to improving their customer service.
In an August 2014 Harvard Business Review article titled, “The Value of
Customer Experience, Quantified,” Peter Kriss states that “Intuitively, most
people recognize the value of a great customer experience. Brands that deliver
them are ones that we want to interact with as customers that we become loyal
to, and that we recommend to our friends and family.” Also, he notes that the
“value of delivering such an experience is often a lot less clear, because it can be
hard to quantify.” Delivering consistent and concise knowledge to provide
answers to customer inquiries in an efficient way leads to providing value to the
customer and improving the overall customer experience.
In support of this trend of KM in customer service, the author of Forrester’s
“Top Trends for Customer Service in 2015,” Kate Leggett, highlights in trend 4
KM’s impact when she states “Knowledge will evolve from dialog to cognitive
engagement. Organizations will look at ways to reduce the manual overhead of
traditional knowledge management for customer service. They will start to
explore cognitive engagement solutions, interactive computing systems that use
artificial intelligence to collect information, automatically build models of
understanding and inference, and communicate in natural ways. These solutions
have the potential to automate knowledge creation, empower agents with deeply
personalized answers and intelligence, scale a company’s knowledge capability,
and uncover new revenue streams by learning about customer needs.”
IBM Watson is playing a significant role in the evolution of applications that
automate knowledge creation by providing deeply personalized answers and
intelligence. This technology will affect customer service as well as a multitude
of industries with its capability to extract knowledge from big data sources. The
IBM Watson ecosystem will provide deep content analytics and intensive
scientific discovery that will lead to improved cognition contributing to an
organization’s knowledge capabilities. This supports Kate Leggett’s research and
points out that KM will continue to play a significant role in delivering
knowledge and decision-making capabilities to the customer service industry for
the foreseeable future.
State of KM Survey
In the State of Knowledge Management survey of customer experience, which
was conducted in order to better understand how they’re using KM, Esteban
Kolsky and IntelliResponse indicate the following:
Global View of KM
In reviewing the 2015 Global Knowledge Management Observatory Report,
David Griffiths, Abi Jenkins, and Zoe Kingston-Griffiths state “The Knowledge
Management function in many organizations is in a state of general decline.”
This, as they indicate, is due to the following factors:
Solutions that address many of the findings of the 2015 Global Knowledge
Management Observatory Report have been presented in this book; they include
producing a comprehensive KM strategy, KM education options, adopting KM
programs, project and systems, and why KM programs/projects fail. The
findings in this report present a tremendous opportunity for growth in the KM
field.
Speed to answer: Customers want answers fast. Customers are not likely to
wait long for answers, even less in a social media setting. The
overabundance of channels has made it impossible for organizations to
deliver proper answers via all channels fast. However, the rise of self-
service using KM has led to great results in speed and accuracy of answers.
As customers find the answers on their own (assisted in part by knowledge
bases, but also via social media communities), the need for fast answers is
met by better use of technology powered by KM.
Customer satisfaction: This is a byproduct of faster speed to answer. By
providing the right answer quickly, customer satisfaction is increased. In
order to meet customer expectations for the right knowledge, at the right
time, in the right context, KM is used as a critical tool. Not having access to
the right knowledge is the most critical time wasted in preparing any answer
for a customer. If the knowledge is not available quickly, it is nearly
impossible to deliver against expectations. Using KM appropriately to fulfill
the need for the right knowledge leads to meeting customer expectations.
Churn: Among the leading reasons for employees churning in any job is
lack of proper tools, and this is even more prevalent in customer service.
Having to hunt for knowledge among different systems, tools, and channels
causes churn. In addition, as customers take to more channels and processes
become automated, only complex processes will be left to be resolved by
customer service, and, in those cases, the right tools can make a difference
between a resolution and a frustrated caller that needs to be escalated to yet
further service levels. Finding the right knowledge is a key to delivering the
right answer to the customer. When customer service representatives have
the right access to the right knowledge, they will more happily answer the
interactions fast and effectively eliminate the chances for churn.
Internal KM
Internal KM focuses inward within the organization. This inward focus is aimed
at maximizing the intellectual capital found in the organization. This intellectual
capital resides both within the organization’s human capital and within the
various systems (i.e., knowledge repositories, portals, wikis, blogs, CRMs, and
collaborative environments). Internal KM specifically supports the
organization’s flow of substantive expertise and is aimed at improving
operational efficiency. An organization’s KM framework must support its
internal knowledge needs. This support will yield improved quality and
efficiency of staff, outside consultants, and project teams.
Internal KM will enable your organization to gain the advantage of leveraging
all existing knowledge resources available through your organization’s entire
network of available explicit and tacit (people) knowledge. Enabling and
improving the mechanisms that deliver internal KM will continue to be prevalent
as KM matures within an organization. This is a key reason for examining this
area of KM in a future edition of Knowledge Management in Practice.
KM in Politics
KM as a political activity, made by and instituted by political leaders, will be the
subject of this chapter. The research is interesting because given that we live in a
knowledge society, in the information era, it is more or less obvious that the
political leaders should also do KM. Illustrating the ideas of KM implementation
and use with the example of President Obama and other politicians has
incorporated KM in executing their political strategy. KM always was and
nowadays is pervasive in the activity of political leaders.
Incorporating the use of blogs, YouTube, and other social networking sites
(Facebook, Twitter, and LinkedIn), President Obama’s team was able to push
out the latest news, information, and knowledge about every aspect of his
campaign. This increased the involvement of every supporter enabling them to
feel a part of the campaign from start to finish. Supporters received text
messages and emails at every turn encouraging them to hold parties with friends
to get out the vote and donate their time and yes their money.
Leveraging the internet in a precise strategic manner that supports the mission
of political campaigns is exactly how all organizations leveraging KM (getting
the right knowledge to the right people at the right time) are positioning
themselves in this evolving paradigm. I believe that many politicians and
political organizations will utilize KM, and undoubtedly this will become a new
trend in American politics.
KM and CRM
The business environment is transforming from product centric to customer
centric. CRM as a customer-oriented business approach is considered as one of
the powerful capabilities in organizations that help transform themselves to a
customer-centric environment. The utilization of CRM is directly related with
increase in customer knowledge, which in turn has a positive effect on customer
satisfaction. By using KM, companies can improve their relationship with their
valuable customers, thus creating loyal customers and obtaining a competitive
advantage.
Organizations can create new ideas and provide improved and new services by
the help of KM and the knowledge originating from CRM. The customer
knowledge as an integral element of relationship between KM and CRM could
help organizations to tailor their products and services and even the entire
relationship with customers to increase customer satisfaction and finally
economic profitability.
Closing Statement
The goal of this edition of Knowledge Management in Practice was to provide
the reader with specific key learnings, along with tips and techniques that will
enable the KM practitioner to be more productive in their application of KM,
and provide those who are being educated in KM with an understanding of the
pertinent issues KM is solving across a variety of industries. In future editions, I
will continue to present the evolution of KM, its importance, and how it can be
of leverage for a competitive advantage. In summary, it is my hope that
Knowledge Management in Practice will be a definitive KM reference for
anyone entering into the field and/or currently practicing KM.
Appendix A
Executive Summary
Summarize each of the sections in this document concisely by outlining the
following:
Problem or opportunity
Solution alternatives
Recommended solution
Implementation approach
Business Problem
Environmental Analysis
Outline the core aspects of the business environment that were instrumental for
this KM initiative to take place. These may include the following:
Business Problem
Provide a summary of the core business problem, including:
Available Options
This section provides a full listing of all solution options, their benefits, costs,
feasibility, risks, and issues. Options suggested may include doing nothing or
doing something that will achieve a better result than the current state.
Costs and Funding Plan Describe the tangible and intangible costs to the
company upon implementation of the solution. The costs of the actual KM
initiative should be included as well as any negative impact to the business
resulting from the “delivery” of the KM initiative. Complete the following table:
To ensure that the feasibility ratings are accurate, use all appropriate methods
possible to identify the likely feasibility of the solution. For example, when
adopting a new KM technology, develop a small prototype and test it to see if
the resultant benefits match those expected from the exercise.
Risks Summarize the most apparent risks associated with the adoption of this
solution. Risks are defined as any event which may adversely affect the ability of
the solution to produce the required deliverables. Risks may be strategic,
environmental, financial, operational, technical, industrial, competitive, or
customer related. Complete the following table:
Issues Summarize the highest priority issues associated with the adoption of
this option. Issues are defined as any event which currently adversely affects the
ability of the solution to produce the required deliverables. Complete the
following table:
Upon approval of the business case, each issue should be formally recorded and
tracked using an issue management process, forms, and register.
Assumptions List the major assumptions associated with the adoption of this
option. Examples include the following:
Recommended Option
This section compares the key characteristics of each solution option and
recommends a preferred solution option for implementation.
Implementation Approach
This section provides an overview of the general approach undertaken to deliver
the preferred solution option and derive the resultant business benefits.
Consequence: (Describe the impact of this issue, i.e., why and how did this issue create
a problem)
Action 1:
Action 2:
Action 3:
Alternatively, choose appropriate themes and describe results of the analysis of the
themes:
THEME I:
THEME II
THEME III:
THEME IV:
Lessons Learned
Describe lessons learned that could be applied by this and other groups, teams, etc. in
the future
Remaining Issues
(Describe any issues or problems that were not resolved, their importance, their
impact if not resolved, and any recommendations to resolve the issues)
Recommendations to the Management
This section could outline recommendations that the AAR team would like to make
to management. Many if not all of these recommendations should already be
documented in previous sections; therefore, a summary table of action items could go
here.
Conclusion
In this section, reflect on the event being reviewed and provide general
recommendations on how the next similar event should be conducted/managed.
Source: Adapted from the General Services Administration—PBS Knowledge Management AAR Guide.
Chapter 1
Tjaden, T. (2010). Legal Research and Writing, 3rd Edition. Irwin Law, Toronto, Canada.
Chapter 2
Clare, M. (May/June 2002). Solving the knowledge value equation: How to estimate the value of the
intangible benefits of KM. Knowledge Management Review, 5(2), 14–15.
Cohn, M. (2013). What is scrum methodology. http://www.mountaingoatsoftware.com/topics/scrum.
Accessed on December 8, 2013.
Project management book of knowledge (PMBOK). http://www.pmi.org/pmbok-guide-and-
standards/pmbok-guide.aspx. Accessed on April 25, 2016.
Rhem, A. (2011). Knowledge acquisition unified framework (KAUF). The knowledge management depot.
http://theknowledgedepot.blogspot.com/2011_06_01_archive.html. Accessed on September 15, 2012.
Wiley, A. (2012). Iterative software development approach.
https://wiki.nci.nih.gov/display/CommonProjects/Iterative+Software+Development+Approach. Accessed
on September 8, 2013.
Chapter 3
Allen, A. (2012). The impact of social media on knowledge management. Accessed on July 2, 2013.
http://knowledgebird.com/the-impact-of-social-media-on-knowledge-management/.
Corbett, J. (2010). Participatory Mapping and Communication: A Guide to Developing a Participatory
Communication Strategy to Support Participatory Mapping. International Fund for Agricultural
Development (IFAD), Washington, DC.
Palmert, C. (2012). Knowledge management in the social media era. tcworld 7/2012.
http://www.tcworld.info/e-magazine/content-strategies/article/social-media-in-the-coffee-corner/.
Accessed on March 3, 2014.
Pirkkalainen, H. and Pawlowski, J. (2013). Global social knowledge management: From barriers to the
selection of social tools. The Electronic Journal of Knowledge Management, 11(1), 03–17. Available at
www.ejkm.com.
Chapter 4
U.S. Department of Health and Human Resources. www.usability.gov.
Downey, L. and Banerjee, S. (2011). Building an information architecture checklist. Journal of Information
Architecture, 2(2) Available at http://journalofia.org/volume2/issue2/03-downey/. Accessed on April 16,
2016.
Usability.Gov (n.d.). What and Why of Usability. http://www.usability.gov/what-and-why/information-
architecture.html.
Chapter 5
Clare, M. (2002). Solving the knowledge value equation (part one): How to estimate the value of the
intangible benefits of KM. Knowledge Management Review, 5(2): 14–17, Melcrum Publishing Ltd.
http://www.fastcompany.com/1651431/work-smart-brainstorming-techniques-boost-creativity. Accessed on
January 2, 2014. Fast Company.
Johansson, F. (2014). The Medici Effect. What Elephants and Epidemics Can Teach Us About Innovation,
Harvard Business School Publishing, Boston, MA.
Lasseter, J. (2012). Pixar Headquarters and the Legacy of Steve Jobs,
http://officesnapshots.com/2012/07/16/pixar-headquarters-and-the-legacy-of-steve-jobs/. Accessed on
January 30, 2014.
Office snapshots blog—Pixar headquarters and the legacy of Steve Jobs.
http://officesnapshots.com/2012/07/16/pixar-headquarters-and-the-legacy-of-steve-jobs/. Accessed on
January 30, 2014.
Passuello, L. (2008). The Medici Effect Mind Map, http://www.biggerplate.com/mindmaps/d182919/the-
medici-effect.
Robitaille, D. Surviving root cause analysis. http://www.thecqi.org/Knowledge-Hub/Resources/The-
Quality-Survival-Guide/Surviving-root-cause-/. Accessed on January 4, 2014.
Trapani, G. (2010). Work Smart: Brainstorming Techniques to Boost Creativity. Wenger, E. (n.d.).
Communities of practice: A brief introduction. http://www.fastcompany.com/1651431/work-smart-
brainstorming-techniques-boost-creativity. Accessed on June 20, 2014.
Chapter 6
Bersin, J. (2010). A new talent management framework. http://www.bersin.com/blog/post/2010/05/A-New-
Talent-Management-Framework.aspx. Accessed May 24, 2016.
Bersin, J., Harris, S., Lamoureux, M., and Mallon, D. (2010). The talent management framework: Executive
summary. Bersin & Associates Research Report V.1.0.
Heathfield, S. (2016). What is talent management—Really!
http://humanresources.about.com/od/successionplanning/g/talent-management.htm. Accessed March 30,
2016.
Kilburg, R. R. (2000). Executive Coaching: Developing Managerial Wisdom in a World of Chaos,
American Psychological Association, Washington, DC, pp. 65, 67.
Chapter 7
Anderson et al. (2008). http://www.fema.gov/media-library-data/20130726-1824-25045-
1942/national_incident_management_system_2008.pdf.
Baker, F. (2008). Fireground Strategies & Tactics: Understanding the capabilities and limitations of the fire
department, Professional Safety, February 2008.
Balogun, O., Balogun E., Ntuen, C., Turner, A. (2006). Supporting command and control training functions
in the emergency management domain using cognitive systems engineering. Egonomics, 49 (12–13),
1415–1436. Taylor & Francis, New York.
Bartczak, S.E., England, E.C., and Turner, J.M. (2008). Challenges in Developing a Knowledge
Management Strategy: A Case study of the Air Force Materiel Command. IGI Publishing, Hershey, PA.
Bohmann, T., Greiner, M.E., and Krcmar, H. (2007). A strategy for knowledge management. Journal of
Knowledge Management, 11(6): 3–15. ABI/INFORM Global.
Burstein, F., Mitchell, S., Owen, J. (2004). Knowledge reuse and transfer in a project management
environment. Journal of Information Technology Cases and Applications (JITCA), 6(4), Ivy League
Publishing, Marietta, GA.
Coleman, R.J. (2007). Guessing the role of EMS & fire is no game. Fire Chief, 9, 28–36.
Crilly, T., Lusignan, S.D., Rowlands, G., Shaw, A., and Wells, S. (2005). A knowledge audit of the
managers of primary care organizations: Top priority is how to use routinely collected clinical data for
quality improvement. Medical Informatics and the Internet in Medicine, 30(1), 69–80. Taylor & Francis
Group, New York.
Department of Homeland Security. (2008). National Incident Management System.
http://www.fema.gov/national-incident-management-system.
Ekionea, J. and Swain, D. (2008). Developing and aligning a knowledge management strategy: Towards a
taxonomy and a framework. International Journal of Knowledge Management, 4(1), 29–45. IGI
Publishing, Hershey, PA.
Elearn Training Company. (2007). Making Sense of Data and Information. Elsevier Philadelphia, PA.
Faraj, S., Xiao, Y. (2006). Coordination in fast-response organizations. Management Science, (2006), 15,
1155–1169.
General Services Administration – PBS Knowledge Management AAR Guide. (2010).
http://www.pbsworks.com/documentation/support/PBSProUserGuide10.4.pdf.
Haggie, K and Kingston, J. (2003). Choosing Your Knowledge Management Strategy, Journal of
Knowledge Management Practice, 4 (June, 2003), http://www.tlainc.com/jkmpv4.htm.
Kruger, J. and Snyman, R. (2004). The interdependence between strategic management and strategic
knowledge management. Journal of Knowledge Management, 8(1): 5–19. ABI/INFORM Global.
Leeson, P.T., Sobel, R. S. (2007). The use of knowledge in natural-disaster relief management, The
Independent Review, Spring 2007, 14, 519–532.
McLaughlin, S. (October/November 2007). Managing knowledge for success. Engineering Management,
17(5), 42.
Nicolas, R. (2004). Knowledge management impacts on decision making process. Journal of Knowledge
Management, 8(1), 20. ABI/INFORM Global.
NIMS. (2008). http://www.fema.gov/media-library-data/20130726-1824-25045-
1942/national_incident_management_system_2008.pdf. Accessed on 28 June, 2014.
Nonaka, I. and Takeuchi, H. (1995). The Knowledge-Creating Company. Oxford University Press, New
York.
Rhem, A.J. (2006). UML for Developing Knowledge Management Systems. Taylor and Francis Group. Boca
Raton, FL.
Riege, A. (2005). Three-dozen Knowledge-sharing barriers managers must consider. Journal of Knowledge
Management. 9(3), 18. ABI/INFORM Global.
Smith, A.D. (2004). Knowledge management strategies: A multi-case study. Journal of Knowledge
Management, 8(3): 6–16. ABI/INFORM Global.
Turoff, M., Carver, L. (2007). Human-computer interaction: The human and computer as a team in
emergency management information systems. Communications of the ACM, 6, 33–38.
United States Agency International Development (USAID). (2006). After-Action Review Technical Guide.
Washington, DC.
Walker, S. (2006). 12 steps to a successful KM program. KM Review, 9(4), 8–9.
Chapter 8
Apple market cap. https://ycharts.com/companies/AAPL/market_cap. Last accessed April 23, 2016.
Braverman, M. (2007). The human side of due diligence: Protecting the M&A investment.
http://www.bravermangroup.com/services/OrgConsult/text/The%20Human%20Side%20of%20M%26A.pdf
Accessed on June 2, 2014.
Clare, M. (May/June 2002). Solving the knowledge value equation. Knowledge Management Review, 5(2),
14–17. Melcrum Publishing Ltd.
Coveo. (2013). Measuring Return on Knowledge in a Big Data World. Coveo, San Mateo, CA.
http://www.coveo.com/~/media/Files/WhitePapers/Coveo_Measuring_Return_on_Knowledge_in_a_Big_Data_World.ashx
Accessed on June 2, 2014.
Brown, C. (2002). Contextual intelligence (CI): The key to successful consulting.
http://headinthegame.net/resources/library/contextual-intelligence-ci-the-key-to-successful-consulting/.
Accessed on June 2, 2014.
Investopedia. (2010). The basics of mergers and acquisitions.
http://www.investopedia.com/university/mergers/. Accessed on June 2, 2014.
Khanna, T. (2014). Contextual Intelligence. https://hbr.org/2014/09/contextual-intelligence. Accessed on
December 1, 2014.
Rhem, A. (2010). Leveraging knowledge management (KM) for mergers and acquisitions.
http://EzineArticles.com/4791792. Accessed on June 2, 2014.
Robert, S. (2012). Why half of all M&A deals fail and what you can do about it.
http://www.forbes.com/sites/forbesleadershipforum/2012/03/19/why-half-of-all-ma-deals-fail-and-what-
you-can-do-about-it/. Accessed on June 2, 2014.
Chapter 9
Beal, A.C., Doty, M.M., Hernandez, S.E., Shea, K.K., and Davis, K. 2007. Closing the divide: How medical
homes promote equity in health care: Results from The Commonwealth Fund 2006 Health Quality
Survey. The Commonwealth Fund, New York.
Bordoloi, P. and Islam, N. (2012). Knowledge management practices and healthcare delivery: A
contingency framework. Electronic Journal of Knowledge Management, 10(2), 110–120.
Chauhan, B., George, R., and Coffin, J. (November–December 2012). Social media and you: What every
physician needs to know. Journal of Medical Practice Management, 28(3), 206–209.
Institute for Healthcare Improvement. (September 2, 2015). Schedule the discharge to improve the flow.
Retrieved from http://www.ihi.org/resources/Pages/Changes/ScheduletheDischarge.aspx.
Lambert, K.M., Barry, P., and Stokes, G. (2012). Review risk management and legal issues with the use of
social media in the healthcare setting. Journal of Healthcare Risk Management, 31(4), 41–47.
Lusignan, S. and Tringali, M. (2005). Foundations of a healthcare knowledge management application
system. American Medical Informatics Association Annual Symposium Proceedings.
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC1560470/. Accessed date October 9, 2015.
Richardson, W.S., Wilson, M., and Guyatt, G. (2002). The Process of Diagnosis. American Medical
Association, University of California, San Francisco, CA.
Chapter 10
J.D. Power McGraw-Hill Financial. http://www.jdpower.com/industry/financial-services. Accessed on
February 2, 2013.
Chapter 11
Davenport, T.H. and Prusak, L. (2002). Working Knowledge How Organizations Manage What They Know.
Harvard Business School Press, Boston, MA.
Dimension Data’s 2015 Global Contact Centre Benchmarking Report, © Dimension Data 2009–2015.
https://www.dimensiondata.com/Global/Downloadable%20Documents/2015%20Global%20Contact%20Centre%20Bench
Accessed on November 1, 2015.
Chapter 12
Gianakos, L.K. (2013). The intersection of knowledge and legal project management.
https://info.legalsolutions.thomsonreuters.com/signup/newsletters/practice-innovations/2013-
mar/article4.aspx.
Palomaki, S. and Wagner, F. (2011). Legal project management from the inside: 10 things law firm leaders
need to know about implementing legal project management. Law Practice Today.
www.lawpracticetoday.org. American Bar Association.
Precedent/Case Law. http://new.justcite.com/kb/editorial-policies/precedence-3/.
Rhem, A. (2012). Knowledge management in law firms.
http://theknowledgedepot.blogspot.com/2012/03/knowledge-management-in-
legal.html#!/2012/03/knowledge-management-in-legal.html. Accessed on September 1, 2013.
Solomon, M. http://www.forbes.com/sites/micahsolomon/2014/02/04/transform-your-law-firms-client-
service-starting-today-a-five-step-legal-industry-client-service-initiative/.
Staudt, R.W. (2003). Perspectives on Knowledge Management in Law Firms. Miamisburg, OH,
LexisNexis®.
Chapter 13
Green, A. (2011). Webinar, PLANT the Right Seeds to GROW: A Harvest of Knowledge
http://kmef.iwiki.kent.edu/KMEFwebinar03152001.
R. Heer, A Model of Learning Objectives based on A Taxonomy for Learning, Teaching, and Assessing: A
Revision of Bloom’s Taxonomy of Educational Objectives. Center for Excellence in Learning and
Teaching, Iowa State University, Ames, Iowa.
KMEF. (2011). http://kmef.iwiki.kent.edu/.
Yunginger, D. (2013). Knowledge management challenges top the CEO agenda.
http://www.lminfo.us/blog/knowledge-management-challenges-top-the-ceo-agenda/. Accessed on
February 4, 2014.
Chapter 14
Andreasen, S. (2014). Big data delivering big knowledge. KM World.
http://www.kmworld.com/Articles/Editorial/Viewpoints/Big-Data-Delivering-Big-Knowledge-
95057.aspx. Accessed April 18, 2015.
Downey, L., & Banerjee, S. (2011). Building an Information Architecture Checklist. Journal of Information
Architecture. Vol. 2, No. 2. [Available at http://journalofia.org/volume2/issue2/03-downey/].
Erickson, S. and Rothberg, H. Big Data and knowledge management: Establishing a conceptual foundation.
The Electronic Journal of Knowledge Management, Volume 12, Issue 2, pp. 108–116. Available at
www.ejkm.com.
Gartner Press Release (Sept 17, 2014). Gartner Survey Reveals That 73 Percent of Organizations Have
Invested or Plan to Invest in Big Data in the Next Two Years.
http://www.gartner.com/newsroom/id/2848718.
LoPresti, M. (2014). The long tail of knowledge: Big data’s impact on knowledge management.
http://www.econtentmag.com/Articles/News/News-feature/The-long-tail-of-knowledge-big-datas-
impact-on-knowledge-management-96285.htm. Accessed February 4, 2015.
Rajpathak, T. and Narsingpurkar, A. Manufacturing Innovation and Transformation Group (ITG), TCS.
Managing Knowledge from Big Data Analytics in Product Development.
http://www.tcs.com/resources/white_papers/Pages/Knowledge-big-data-analytics-product-
development.aspx. Accessed March 2015.
Yuan, Q.F., Yoon, P.C., and Helander, M. G. (2006). Knowledge identification and management in product
design. Journal of Knowledge Management, Volume 10, Issue 6, pp. 50–63.
Chapter 15
Army Knowledge Management Principles. A4 Doc 1 AKM Principles, June 25, 2008.
Chairman of the Joint Chiefs of Staff Instruction, Charter of the Knowledge Management Cross-Functional
Team. (2013). DOM/SJS, CJCSI 5124.01, Distribution: A, C, https://archive.org/stream/Charter-of-the-
Knowledge-Management-Cross-Functional-Team-12-Apr-
2013/Charter%20of%20the%20Knowledge%20Management%20Cross-
Functional%20Team,%2012%20Apr%202013_djvu.txt. Accessed December 2, 2014.
Communication and Information: Knowledge Management. Air Force Instruction 33–96, November 7,
2014.
Department of the Army US Army Corps of Engineers. (2015). Knowledge Management Strategic Plan.
Department of the Army U.S. Army Corps of Engineers, Washington, DC.
Henriques, J. (2014). Use of unmanned drones for military and civilian use.
http://www.globalresearch.ca/unmanned-aerial-vehicles-uav-drones-for-military-and-civilian-
use/5374666.
http://www.doncio.navy.mil/ContentView.aspx?id=4980.
Senior Airman Jamie Jaggers, Air Force Public Affairs Agency Operating Location-P. (2014). Knowledge
management centers roll out Air Force-wide.
http://www.af.mil/News/ArticleDisplay/tabid/223/Article/484529/knowledge-management-centers-roll-
out-air-force-wide.aspx. Accessed on December 2, 2014.
Chapter 16
Baloh, P. (2007). The role of fit in knowledge management systems: Tentative propositions of the KMS
design. Journal of Organizational and End User Computing, 19(4), 21, 22–41.
Boyer, E.L. (1990). Scholarship Reconsidered: Priorities of the Professoriate. The Carnegie Foundation
for the Advancement of Teaching, New York.
Buckland, B.K., and Zigurs, I. (1998). A theory of task/technology fit and group support systems
effectiveness. MIS Quarterly 22(3) 313–334.
Cane, S., and McCarthy, R. (2009). Analyzing the factors that affect information systems use: A task-
technology fit meta-analysis. The Journal of Computer Information Systems, 50(1) 108–123.
Davenport, T.H., and Prusak, L. (1999). Working Knowledge—How Organizations Manage What They
Know. Harvard Business School Press, Boston, MA.
Goodhue, D.L., and Thompson, R.L. (1995). Task-technology fit and individual performance. MIS
Quarterly, 19(2) 213–236.
Hsu, R.-C., Lawson, D., and Liang, T.-P. (2007). Factors affecting knowledge management adoption of
Taiwan small and medium-sized enterprises. International Journal of Management and Enterprise
Development, 4(1), p. 1.
Huang, C.-C., and Lin, T.-C. (2008). Understanding knowledge management system usage antecedents: An
integration of social cognitive theory and task technology fit. Information Management, 45(6) 410–417.
Kim, D. (2009). Adoption of personal information system: Innovation diffusion theory and task-technology
fit. Proceedings of the Academy of Information and Management Sciences, 13(2) 50–55.
Reh, F.J. Learn a Lunch. A Program to help Employees Grow
http://management.about.com/od/trainingsites/a/LunchandLearn.htm. Accessed on February 3, 2015.
Rogers, E.M. (2003). Diffusion of Innovations, 5th Edition. The Free Press, New York.
Simmons. R. (2013). 8 Steps to Implementing a Knowledge Management Program at Your Organization.
Forsythe, Skokie, IL.
Treem, J.W., and Leonardi, P.M. (2012). Social media use in organizations: Exploring the affordances of
visibility, editability, persistence, and association. Communication Yearbook, 36, 143–189.
Chapter 17
Chong, S.C. and Choi, Y.S. (June 2005). Critical factors in the successful implementation of knowledge
management. Journal of Knowledge Management Practice, available at:
http://www.tlainc.com/articl90.htm.
Davenport, T.H., De Long, D., and Beer, M.C. (1998). Successful knowledge management projects. Sloan
Management Review, 39(2), 43–57.
Davenport, T.H. and Prusak, L. (2000). Working Knowledge: How Organizations Manage What They
Know. Harvard Business School Press, Boston, MA.
Davenport, T.H. and Volpel, S. (2001). The rise of knowledge towards attention management. Journal of
Knowledge Management, 5(3), 212–221.
Frost, A. (2014). A synthesis of knowledge management failure factors, available at:
http://www.knowledge-management-tools.net/.
Liebowitz, J. (2009). Knowledge Retention: Strategies and Solutions. CRC Press, Boca Raton, FL.
Simmons, R. (2013). 8 Steps to Implementing a Knowledge Management Program at Your Organization.
Forsythe, Skokie, IL.
Singh, M.D. and Kant, R. (2008). Knowledge management barriers: An interpretive structural modeling
approach. International Journal of Management Science and Engineering Management, 3(2), 141–150.
Weber, R.O. (2007). Addressing failure factors in knowledge management. Electronic Journal of
Knowledge Management, 5(3), 333–346, available at: www.ejkm.com/issue/download.html?
idArticle=117.
Wu, J., Du, H., Li, X., and Li, P. (2010). Creating and delivering a successful knowledge management
strategy: in M. Russ (Ed.), Knowledge Management Strategies for Business Development. Business
Science Reference, Hershey, PA, pp. 261–276.
Chapter 18
Griffiths, D., Jenkins, A., Kingston-Griffiths, Z. (2014). The 2015 Global Knowledge Management
Observatory Report. K3-Cubed Ltd. Edinburgh, UK.
Kolsky, E. (2015). The State of Knowledge Management: A Special Report. IntelliResponse Systems Inc.
Toronto, ON, Canada.
Kriss, P. (2014). The value of customer experience quantified. https://hbr.org/2014/08/the-value-of-
customer-experience-quantified/. Accessed on February 6, 2015.
Leggett, K. (2014). Forrester’s top trends for customer service in 2015.
http://blogs.forrester.com/kate_leggett/14-12-17-forresters_top_trends_for_customer_service_in_2015.
Accessed on February 6, 2015
Ragsdale, J. (2014). The current state of knowledge management culture.
http://blog.tsia.com/blog/infographic-the-current-state-of-knowledge-management-culture. Accessed on
March 1, 2015.
Index
Note: Page numbers followed by f and t refer to figures and tables, respectively.
A
Acquisitions, 127–128
Action plan, 121–123
Activity, insurance claim, 185
Add cards, 64
Administration Air Force Specialty Code (AFSC), 282
Adoption, KM
activities, 298–300
business social, 299
challenges, 299
communications and adoption approach, 300
component of success, 300
knowledge café, 299
lunch-n-learn, 299
factors, 309
and implementation strategy, 303–305
business objectives and success metrics, 303
champion program, 303
community development and prepopulation strategies, 303
incentive management, 304
integration, 304
lunch-n-learn programs, 304
metrics measurement, reporting, and ROI, 305
project discovery, 303
tactics for culture change, 304–305
training, 304
usage optimization, 305
After action review (AAR), 79–83, 121–123
CoP, 80, 82–83
facts, 80
steps, 81t–82t
types, 80
Agency KM systems, 188
Agile/Scrum software development process, 24, 25f
Agile sprints, 24
Air Force KM
goals and objectives, 283–284
portal main page, 285f
strategies in, 282–283
Air Force Knowledge Now (AFKN), 285–286
A.J. Rhem & Associates’ corporate knowledge map, 90, 90f
Allen, April, 38
“America’s Best Graduate Schools,” 250
Analyzer business strategy, 119
Army KM (AKM)
goals of, 277–278
principles, 278–281
Army Knowledge Online (AKO), 281, 281f
Association of Talent Management (ATD), 253
Autonomy (HP Company), 258
Auto Tagger, 69
B
Banking institution, KM leveraged by, 163–166
core principles, 164, 166
factors to KM success, 164
increased sales through customer satisfaction, 166
KM model, 164–166, 165f
Banking KM framework, 167–170
benefits of virtual communities, 169–170
cost-cutting environments, 168
cultural dimension, 170
knowledge-intensive processes, 168
scarce talent, 168
tool selection, 170
virtual communities, 169
Base realignment and closure (BRAC), 274
addressing problem, 290–294
chart for stakeholders, 292t–293t
continuing KM challenge of, 274–275
KM and, 289–290
missed KM opportunity of, 294–295
Basla, Michael, 283
Bersin & Associates’ Talent Management Framework®, 104–106
Betweenness centrality, Big Data, 261, 261f
Big Data, 57, 184, 255, 333
analysis, 184–185, 259, 264
applying KM to, 255, 258–259
aspects defining, 255
characteristics of, 267
data, information, and knowledge, 256
competitor data, 257
partner data, 257
public data, 257
user-generated data, 256–257
to derive benefit from, 267
elements, mapping knowledge areas to, 266t
KM and, 338
SNA, 259–264
betweenness centrality, 261, 261f
closeness centrality. See Closeness centrality, Big Data
degree centrality, 260, 260f
graph/knowledge map, 263
social media networks, 263–264
sources and KM, 264–271
enterprise view, 265f
IA and Big Data, 267–271, 268t–270t
knowledge classifications, 265–266
strategy, 264
Bloom’s taxonomy of learning, objectives of, 243–246, 244f, 245t–246t
Bottom-up approach, 199
Boundary spanners, 262–263
Boyle, Catherine, 125
Brainstorming session
creating opportunities for, 87–88
creating root cause analysis, 87
Braverman, Mark, 129
Brokerage institution KM model, 161–163
Brokerage organization KM framework, 161, 162f
Brown, Charles, 136
Brown, Toby, 202
Budgeting and cost expectations, inadequate, 318
“Build it yourself” approach, 201
Business, KM
case structure, 21, 22f
goal of sustaining, 173
healthcare business intelligence, 153–154
managing effectively, 174–175
objectives and success metrics, 303
social, 299
strategy, 119
C
CACI (company), 258
Call center, insurance, 175–176
applying KM to, 176–177
aspects to KM to cover in, 176
benefits of KM to, 176
challenges, 176
inbound, 176
knowledge repository, 180
operators, 178
staffs, 178
Call logging systems, 179
Card sorting method, 61–67
closed, 61, 64
open, 61, 64
physical, 63, 65
search facets, 62–67
steps to conduct, 63–65
analyzing data, 65
lead session, 64
online, 63
paper, 63
prepare cards, 63
remote sorting sessions, 64–65
set-up session, 63
Cartography, 89
Case law knowledge, 206
Centralization, organizations, 326
Certification programs for education, KM, 251–253
ATD, 253
KMI, 251–252
RightAnswers (software vendor), 252
Certified Professional in Learning and Performance (CPLP), 253
Champion program, 303
Civil law judges, 206
Clare, Mark, 28, 77
Client support, law firms, 206–207
Clinical decision support system (CDSS), 145, 152
Closed card sorting method, 61, 64
Closeness centrality, Big Data, 261–263, 262f
boundary spanners, 262–263
network centralization, 261–262
network integration, 262
network reach, 262
peripheral nodes, 263
Cloud, collaboration technology, 187
Codification/technological KM strategy, 116–117, 119
Collaboration technologies, 187, 190
Collaborative office space, 83
Columbia University, KM, 250
Combination, SECI model, 112
Commercial property underwriter, 183
Communication(s), 297
and adoption approach, 300
channels, 298
messaging and town halls, 301–302
plan, 300
Communities of practice (CoP), 80–83, 286
cultivating, 82, 84f
key dimensions, 154
NKO CoP program, 288
Community development and prepopulation strategies, 303
Comparative ratios, 132–133
Competency model, KM, 217–241, 235f
details, 236t–241t
KM roles, responsibilities, and, 218t–234t
Competitive intelligence (CI), 193, 207–208
Competitor data, 257
Conceptual knowledge, 243
Conglomeration, 127
Consolidation merger, 127
Contact center KM systems, 188
Content access, 271
Content consumption, 267
Content generation, 267, 271
Content governance, 271
Content management system, 31
Content model, 54–57
characteristics, 56
example, 55f
signs, 56
steps involved in construction, 56–57
Content organization, 271
Content quality of service, 271
Content synthesis technology, 257
Contextual intelligence, 136
Contributing factors, KM, 109–111
Corporate broadcast messaging, 298
Corporate culture, KM and, 325–326
Cost-cutting environments, financial service, 168
Cost expectations, inadequate budgeting and, 318
Coveo Corporation eBook, 135
Criminal Law, 198
Culture change, tactics for, 304–305
Customer-facing resources, KM, 180
Customer relationship management (CRM) system, 179, 190
KM and, 339
Customer satisfaction, 337
Customer service, 333
KM impact on, 337–338
Customer service representatives (CSRs), 173, 185–186
collaboration platform, 187
and KM systems, 179
Customer service self-help, 188
Customers, focusing on, 174
Custom metadata, 59
D
Data, 256
analyzing, 65
Big Data. See Big Data
collection (healthcare), 145
competitor, 257
partner, 257
public, 257
raw data into information, 282
security, 155
semi-structured, 271
user-generated, 256–257
Data Harmony software, 70–71
Data mining
in healthcare, 152–153
techniques, 185
Decision-making process, 182
Decision support system, 145
Defender business strategy, 119
Degree centrality, Big Data, 260, 260f
Department of Defense (DoD) KM structure, 275
Department of Engineering Management and Systems Engineering (EMSE), 249
Department of the Navy (DON), 286–287
Dewey decimal hierarchical structure, 57f
Discounted cash flow (DCF), 77–78, 133
Diversity/inclusion, 102
Domain of knowledge, CoP dimension, 154
Dover Air Force Base, 283
Drexel University, KM, 250–251
“Drinking the KM Kool-Aid,” 297
Dual degree options, KM, 249
E
ECM/IA tools, 187
Education in KM, 215–216
certification programs, 251–253
ATD, 253
KMI, 251–252
RightAnswers (software vendor), 252
dual degree options, 249
at institutions of higher education, 247–251
Columbia University, 250
Drexel University, 250–251
George Mason University, 248–249
The George Washington University, 249
The Hong Kong Polytechnic University, 251
Kent State University, 249–250
KSI, 248
NDM University, 250
knowledge professionals, roles and responsibilities, 217–242
core KM competencies. See Competency model, KM
curriculum development and delivery, 242
MS concentration in, 247–249
programs, 247, 332
teaching philosophy/methodology, 242–246
and understanding, 320–321
E-learning, KM, 187, 190
Emergency and disaster preparedness, 332
Emergency Medical Service (EMS) knowledge, 114
Employees in insurance industry, 175
turnover, 186
Enterprise Content Management (ECM), 187
Enterprise KM program (EKMP), 301–302
Enterprise-value-to-sales ratio (EV/sales), 133
Environment for knowledge exchange, 326
Executive coaching, talent management, 101
Expertise coordination practice (ECP), 115
Expertise locator system, 197–198, 198f
Expert systems in healthcare, 151–152
Externalization, 112
F
Facebook, 42
Faceted search, 62–67
Factual knowledge, 243
Failure of KM programs/projects. See KM programs/projects, failure
Fast-track process, 185
Feedback mechanism, 31
Financial services
arguments for KM, 166–167
banking KM framework, 167–170
cost-cutting environments, 168
cultural dimension, 170
knowledge-intensive processes, 168
scarce talent, 168
tool selection, 170
virtual communities, 169–170
empowering employees to satisfy customers, 160
KM leveraged
by banking institutions, 163–166
by brokerage companies, 161–163
technology, 167
First-responder KM strategy, 111–112
firefighter, 120–121
support
assessment and allocation feedback, 115
command and control structure, 115–116
EMS knowledge, 114
evaluation, 115
expertise coordination practice, 115
knowledge recognition, 115
learning and knowledge transfer, 116
quick and decisive decision making, 114
Five W’s, business case structure, 21
Focused crawler, 57–58
Formal AARs, 80
Formalization, organizations, 326
Formal knowledge transfer, 121
Fraudulent, insurance claims, 184
Frequently asked questions (FAQs), 174, 179
Frontline professionals, 183
G
George Mason University, KM, 248–249
The George Washington University, KM, 215, 249
Gianakos, Lisa Kellar, 202
Gibson, Ann Lee, 208
Gilligan, John M., 285
Global Contact Centre Benchmarking Report, 175
Global social KM, 39f
Governance of law firm knowledge, 210–212
archiving, 212
benefits of, 211
content, 212
enforcing metadata quality, 212
IA, 210f, 211
KM effectiveness, 212
policies and standards, 211
Graph theory, 263
Griffiths, David, 336
H
Hard competencies, KM, 217
Healthcare
applying KM to, 148
delivery process, 142f, 143–146
data collection, 145
decision support system, 145
diagnosis and treatment, 146
patient closeout/discharge, 146
patient intake process, 143, 145
informatics and KM, 150–151
KM model for, 144f, 146–148
knowledge construction, 148–150
MedicineNet.com, 150
patient-centered, 150
WebMD, 149
Yahoo Health, 149–150
knowledge tools and techniques, 151–155
business intelligence and analytics, 153–154
CoP, 154
data mining, 152–153
expert systems, 151–152
social networks, 154–155
text mining, 153
patient-centered approach, 147–148
trends in KM for, 155–156
collaboration between healthcare providers, 155–156
need for Big Data, 156
patient-centered care, 156
population health management, 156
technological advancements, 155
Heathfield, Susan, 100
Hierarchical taxonomies, 57
High-impact talent management framework, 104–106
High-level process, 307, 314
The Hong Kong Polytechnic University, KM, 251
Horizontal merger, 127
Human capital, defined, 98
Human Capital Management (HCM), 98–100
talent acquisition and planning, 98–99
workforce
management, 99
optimization, 99–100
Human (H) knowledge, 266
I
IA. See Information architecture (IA)
IBM, 258
Implementation approach, 346
Inadequate technology, 319
Inbound call centers, 176
Inbound links, 45
Incentive management, 304
Index, search facets, 66
Information, 256
currency, 31
Information and knowledge strategy (IKNS) program, 250
Information architecture (IA), 51–54, 208–210
benefits, 52
and Big Data, 267, 268t–270t
checklist, 53t
content management and, 187, 190
creating/modifying/managing metadata, 210
creating/modifying taxonomy, 208–210
Data Harmony tools, 70–71
implementing, 306
metadata. See Metadata, IA
organizational, 52–53, 57
principles, 177
role of architect, 67–68, 67f
search intent, 68–69
tools, 69–71
Wordmap Taxonomy Management Software, 70
Information architecture and knowledge management (IAKM), 249
Informal AARs, 80
Institutional logic, 149
Institutions of higher education, KM, 247–251
Columbia University, 250
Drexel University, 250–251
George Mason University, 248–249
The George Washington University, 249
The Hong Kong Polytechnic University, 251
Kent State University, 249–250
KSI, 248
NDM University, 250
Insurance, KM in, 173
accurate and up-to-date, 178
business challenges, 174
call center, 175–176
applying KM to, 176–177
benefits of KM to, 176
claims, 183–185, 189
collaboration, 187, 190
content management/IA, 187, 190
CRM systems and, 179
customer-facing resources, 180
e-learning, 187, 190
element of, 181
employees in industry of, 175
focusing on customers, 174
integrate help desk and, 179
integrate IVR and, 180
knowledge repository, 178–179
knowledge workers, developing, 185–186
managing business effectively, 174–175
model, 180–181, 182f
role of technology, 186–187
sales and marketing, 189
structuring knowledge, 177–178
talent management, 186
underwriting, 181–183, 188–189
Insurance knowledge management systems (IKMS) framework, 187–188, 188f
Intangible asset, 163
Intangible book value, 135
Integrated healthcare knowledge, 148
Integration, KM, 304
Interactive voice response (IVR) system, 180
Internalization, 112
Internal KM, 338
Internal rate of return (IRR), 29
The Intersection of Knowledge and Legal Project Management, 202
Investment yield rate, 29
Iowa State University Center of Excellence in Learning and Teaching (2012), 243
Iterative software development methodology, 23–24, 24f
J
Jackson, Robert, 282–283
Jenkins, Abi, 336
Jobs, Steve, 83
Johansson, Frans, 85–86
Joint Chiefs of Staff DoD, 275, 276f
Joint Staff (JS) KM process, 275
Judges, civil law, 206
K
Kent State University, 215, 249–250
Key performance indicator (KPI), 37
customer satisfaction, 30
knowledge use, 30–31
edits required, 31
links created, 31
number of users, 30
user rankings, 31
and ROI, 77–78
search engine usage, 30
Khanna, Tarun, 136
Kingston-Griffiths, Zoe, 336
KM. See Knowledge management (KM)
KM business case template, 341–346
available options, 342–345
assumptions, 345
benefits, goals, and measurement criteria, 342–343
costs and funding plan, 343
description, 342
feasibility, 344
issues, 345
risks, 344–345
business problem, 341–342
business opportunity, 342
environmental analysis, 341
problem analysis, 342
implementation approach, 346
reasons for recommended option, 345
recommended option, 345
KM programs/projects, failure
components into organization’s environment, 314
environment for knowledge exchange, 326
governance plan, 328
inadequate budgeting and cost expectations, 318
inadequate processes and technology, 319–320
KM
and corporate culture, 325–326
poorly measuring impact of, 326–327
roles, 320–325
lack of
executive leadership/sponsorship, 316–317
knowledge and resources, 320
monitoring and controls, 327–328
need for
education and understanding of KM, 320–321
organizational participation, 318–319
Simmons steps, 314–315
KM strategy
alignment
with business strategy, 119
with NIMS, 112
ECP protocols, 115
firefighter first-responder, 120–121
first-responder, 111–112
selection, factors influencing, 117–118
template elements, 123
types, 116–117
codification (technological), 116–117
personalization, 117
socialization, 117
KM World (magazine), 256, 258
Knowledge, 256
in accounting and finance, 163
base, 91–92
to Big Data elements, 266t
classifications, 265–266
contributing factors to capture, 291t
data, information, and, 256
competitor data, 257
partner data, 257
public data, 257
user-generated data, 256–257
domains, 88–89
EMS, 114
exchange, environment for, 326
gap in organization, 95–96
map, 263
matrix, 113f
M-H-T-P, 266
portal, 91
repository, 91
and resources, lack of, 320
transfer planning, 121
types of, 243
workers, developing, 185–186
Knowledge Acquisition Unified Framework (KAUF), 26–27, 28f, 97
capture/catalog knowledge, 27
decompose domain knowledge, 26–27
define domain knowledge, 26
determine interdependency, 27
judgments in knowledge, 27
knowledge patterns, 27
perform conflict resolution, 27
Knowledge audit (KA), 89–91, 121
Knowledge-based organization, 259
Knowledge café, 86–87, 299
Knowledge capital, 88–91
Knowledge dimension, 243
Knowledge-intensive processes, 168
Knowledge management (KM), 37–38
additional tools, 70
and Big Data. See Big Data
business case structure, 21
core benefit of, 208
and CRM, 339
current environment, 77
customer satisfaction in banking, 166
distributed authoring, 32
education in. See Education in KM
for financial services. See Financial services
future of, 334
global social, 39f
global view of, 336–337
goal of, 255
healthcare. See Healthcare
impact on customer service, 337–338
in insurance. See Insurance, KM in
internal, 338
in law firms. See Legal professionals and law firms, KM
metrics and key performance indicators, 30–31
in military. See Military, KM in
mission statement, 76
on-going, 79
in politics, 338–339
practitioners, 215–216
professional, 242
pyramid, 256f
research institutions, 73–94
ROI for, 28–30
solution analysis, 21–22
solution implementation approach, 22–23
strategy, 32–33
transaction costs, 32
user feedback, 31
vision statement, 76
Knowledge Management Board (KMB), 275
Knowledge management cross-functional team (KM CFT), 275
Knowledge Management Education Forum (KMEF), 215–216, 242
Knowledge Management in Practice, future edition of, 337
Knowledge Management Institute (KMI), 251–252
Knowledge management maturity model (KMMM), 288
Knowledge management system (KMS), 319
adopting, 305
Knowledge map/mapping, 97–98, 126, 137–138
A.J. Rhem & Associates corporate knowledge map, 90, 90f
construction of representation of knowledge capital, 89
overview, 89–91
Knowledge professionals, roles and responsibilities of, 217–242
core KM competencies, 217–241
curriculum development and delivery, 242
Knowledge profile (KP), 138
Knowledge Systems Institute (KSI), 248
Knowledge value equation (KVE), 28, 133–134, 133f
Knowledge value tree, 78, 78f, 134, 134f
Kutz, Matthew, 136
L
Lasseter, John, 83
Law firm business model, 197
Lawyers Liability Review (LLR), 205
Leadership/sponsorship, lack of executive, 316–317
KM extension roles, 317t
success factors, 316–317
Leadership thought message, communication, 298
Learning and capability development function, 106
Legal assistants, 196
Legal professionals and law firms, KM
benefits for, 194–195
and client support, 206–207
competitive intelligence, 207–208
drivers for, 194–195
KM architecture in, 208–212, 209f
governance of law firm knowledge. See Governance of law firm knowledge
information architecture, 208, 210
KM software, 197
legal research, 203–205
LexisNexis, 204–205, 204f
tools, 203
VersusLaw, 205
WestLawNext, 203–204, 204f
precedent/case law knowledge, 206
search, 213
strategy, 193
talent management in, 195–197
lawyer/legal staff training, 195–196
legal secretaries/legal assistants/paralegals, 196–197
legal technology specialist, 197
Legal project management (LPM), 193, 199–203
KM in, 202–203
methodologies, 202
practice of, 201
techniques, 199
Legal secretaries, 196
LexisNexis research tool, 204–205, 204f
Life skills, lunch-n-learn program, 304
LinkedIn, 39–40
List attributes, 60
Litigation, insurance claim, 185
Loss reserve, insurance claim, 185
Lunch-n-learn programs, 299, 304
M
Machine Aided Indexer (M.A.I), 70
Maistro™, 70
Market-extension merger, 127
Marketing activity, 297
Market (M) knowledge, 266
Master of Science (MS) in KM, 247–248, 250
Master of Science in Library and Information Science (MSLIS) program, 250
M&A (merger/acquisition) transactions, 333
The Medici effect, 85–86, 86f
MedicineNet.com, 150
Merger of equals, 128
Mergers and acquisitions (M&A)
communication, 131
company valuation, KM leverage in, 132–134
contextual intelligence, 136
distinction between, 128
failure of, 139
knowledge and
economic value, 135
organizational culture, 135–136
knowledge mapping, 137–138
people side of, 129–131
boards, 130
customers and other stakeholders, 130
employees, 130
operations, 130–131
productivity, 131–132
synergy determination, 128–129
types (merger), 127
Metacognitive knowledge, 243
Metadata, IA, 58–61
attributes, 60
fields, 59–60
object, 58
schema, 60–61, 61f
specialized settings, 59–60
uses, 58
Metrics measurement, 305
M-H-T-P knowledge, 266
Microsoft SharePoint, 283
Military, KM in
AFKN, 285–286
AFSC, 282
AKM principles, 278–281
people and culture, 278–279
process, 279–280
technology, 280–281
AKO, 281, 281f
and BRAC, 289–290
addressing problem, 290–294
chart for stakeholders, 292t–293t
continuing challenge of, 274–275
missed KM opportunity of, 294–295
current Army KM direction, 281–282
DoD KM structure, 275
DON, 286–287
missed KM opportunity of BRAC, 294–295
NKO, 288
principles, 275, 277t
strategies
in the US Air Force, 282–283. See also Air Force KM
in the US Army, 277–278. See also Army KM (AKM)
in the US Navy, 286–288
use of unmanned aircraft, 273
warfare technology, 273
Mind mapping, 88
Monitor and evaluation (M&E) stage, 37
Monitoring and controls, lack of, 327–328
N
National alert system, 112
National Incident Management System (NIMS), 112, 114, 120
National Insurance Crime Bureau (NICB), 184
Navy Knowledge Online (NKO), 288
Needs analysis, 21–22
Net present value (NPV), 29
Network centralization, 261–262
Network integration, 262
News brief (communication channels), 298
Newsletter brief (communication channels), 298
NKO Community of Practice (CoP) program, 288, 289f
Notre Dame of Maryland (NDM) University, KM, 250
O
Onboarding process, 101–103
Online card sorts, 63
On-the-job training, 187
Ontology Manager, 70–71
Ontology software tool, 54, 70
Open card sort, 61, 64
OpenUP methodology, 24–26, 25f
Operators, call center, 178
Optimization process, 305
Organizational culture, 309
Organizational participation, 318–319
Organization Development & Knowledge Management Development (ODKM) program, 248–249
Organization’s environment, components into, 314
P
Palmert, Christopher, 38
Paper card sorts, 63
Paralegal, role of, 196
Participatory communication cycle, 36–37, 36f
KM and, 37–48
Partner data, 257
Patient-centered approach, KM model, 147–148
Perceived benefit model, 310, 310f
Performance management, 101, 103
Personal development, lunch-n-learn program, 304
Personalization KM strategy, 117, 119
Personal KM and wearable technology, 339–340
Physical card sort, 63, 65
Pixar, 83
Policy forms, underwriter, 189
Politics, KM in, 338–339
Population health management, 156
Price earnings ratio (P/E ratio), 132
Principles of KM, 275, 277t
AKM, 278–281
people and culture, 278–279
process, 279–280
technology, 280–281
banking institution KM model, 164, 166
brokerage institution KM model, 163
established by the Navy, 288
Problem statement, 21
Procedural (P) knowledge, 243, 266
Processes and technology, inadequate, 319–320
Product-extension merger, 127
Product training, lunch-n-learn program, 304
Professional development, lunch-n-learn program, 304
Program management method, 22–23
Project discovery, 303
Project Management Institute, 23
Project management, legal, 199–203
Project manager forum and mentoring sessions, 298
Projects failure, KM
components into organization’s environment, 314
environment for knowledge exchange, 326
governance plan, 328
inadequate budgeting and cost expectations, 318
inadequate processes and technology, 319–320
KM
and corporate culture, 325–326
poorly measuring impact of, 326–327
roles, 320–325
lack of
executive leadership/sponsorship, 316–317
knowledge and resources, 320
monitoring and controls, 327–328
need for
education and understanding of KM, 320–321
organizational participation, 318–319
Simmons steps, 314–315
Prospector business strategy, 119
Public data, 257
Purchase merger, 127
Q
Query, search facets, 66
R
Reader engagement, 45
Recognition programs, 102–103
Related Content Web Part, 69
Remote sorting sessions, 64–65
Replacement cost, 133
Repository, knowledge, 178
metadata quality in, 212
Required metadata fields, 59
Requirements definition, 21
Research institutions, challenges in implementing
case for implementing, 74–75
cataloging, 88–92
developing KM strategy, 75–79
challenges and knowledge needs, 77
components of research organization, 75–76
current KM environment, 77
dependencies, 78
establish research KM office, 79
executive summary, 76
KM mission statement, 76
KM vision statement, 76
KPI and ROI, 77–78
on-going KM, 79
R&D, 77
strategy details and key initiatives, 77
tools, 79
innovation techniques, 85–88
conducting knowledge café, 86–87
creating diversified teams, 85
creating opportunities for brainstorming, 87–88
creating root cause analysis sessions, 87
The Medici effect, 85–86, 86f
knowledge capital by knowledge map, 89–91
knowledge domains, 88–89
knowledge sharing techniques, 79–84
AAR, 79–83
working in collaborative settings, 83–84
locating research knowledge/expertise, 88–92
methods/tools for capturing, 88–92
research problems to KM initiatives, 76t
reusing, 88–92
Resources, lack of knowledge and, 320
Retention and reinsurance, underwriter, 189
Return on investment (ROI), 28–30, 35, 44, 77–78, 305
Reverse merger, 127
RightAnswers (software vendor), 252
Risk assessment, KM, 27
Risk selection, underwriter, 188
Role-based knowledge, 97, 103
Role knowledge base, 97
Root cause analysis, 87
S
Scarce talent, 168
Schlussel, Art, 247
School of Library and Information Science (SLIS), 249
Search engine, 178–179
Search intent, 68–69
Semi-structured data, 271
Sermo, 154
Settlement, insurance claims, 185, 189
Shared practice, CoP, 154
Share of voice, 43–44
SharePoint, 187
SharePoint 2010, 69
Simmons, Robert, 306, 314
Simple attributes, 60
Single sourcing, 180, 191
Skills training, lunch-n-learn program, 304
Smart Logic, 70
Socialization, 112
KM strategy, 117, 119
Socialization, Externalization, Combination, and Internalization (SECI) model, 112–113, 117
Social media, 37–38, 299, 332
guidelines, 38–39
networks, 263–264
policies, 38–39
procedures, 38–39
strategy, 42–47
create and develop content, 46
engage and facilitate conversations, 46
engaging audience, 46
facilitate conversations, 46
find and establish communities, 44
identify influencers, 44–45
listen to conversations, 43
results, 46–47
set goals and benchmarks, 44
share of voice, 43–44
tools, 45
strategy-roles and responsibilities, 47–48
Social network analysis (SNA), Big Data, 259–264
betweenness centrality, 261, 261f
closeness centrality. See Closeness centrality, Big Data
degree centrality, 260, 260f
graph/knowledge map, 263
social media networks, 263–264
Social structure, knowledge construction process, 150
Soft competencies, KM, 217
Software, KM, 197
Software methodologies, 23–26
Solution analysis, KM, 21–22
Solution implementation approach, 22–23
State of Knowledge Management survey, 335–336
Strategic plan/goal alignment, 101, 103
Subject matter experts (SMEs), 26, 31, 54
Subrogation, insurance claims, 184
Succession management, 102–103
Sustained management support, 316
Synergies, 128
T
Tacit knowledge, 96, 98
Tag Cloud Web Part, 69
Tag custom field, 198
Tag Directory Web Part, 69
Tag Navigation Web Part, 69
Tag Suggester, 69
Talent acquisition and planning, HCM, 98–99
Talent management, 100–106, 186
aspects of, 104–106
360-degree assessments, 101
career path/career development, 101–102
compensation, 102
competencies, 102
diversity/inclusion, 102
engagement, 102
executive coaching, 101
leadership development, 101
on boarding, 101
performance management, 101
professional development, 101
recognition programs, 102
recruiting, 101
retention, 102
strategic plan/goal alignment, 101
succession management, 102
workforce planning, 101
defined, 100
framework, high-impact, 104–106
KM influence on, 102–103
in law firms, 195–197
lawyer/legal staff training, 195–196
legal secretaries/legal assistants/paralegals, 196–197
legal technology specialist, 197
Task codes, 200–201
Task–technology fit (TTF) model, 306–309, 308f, 319
applying, 308–309
Simmons steps, 306–307
Taxonomy, 57–58
Bloom’s taxonomy of learning, 243–246, 244f, 245t–246t
creating/modifying, 208, 210
designing and constructing, 181
planning, 69
of policy information, 58f
Taxonomy Manager, 69
Teaching philosophy/methodology, KM, 242–246
Technology, 167
acquiring new, 7, 129
content synthesis, 257
in delivery of healthcare knowledge, 149
inadequate processes and, 319–320
legal technology specialist, 197
overreliance on, 320
personal KM and wearable, 339–340
role of, 186–187
technological KM strategy, 116–117
use of warfare, 273
vendors, 168
Technology (T) knowledge, 266
Technology Services Industry Association’s (TSIA) research, 334–335
Text mining in healthcare, 153
Thesaurus Master, 70
Timeline Publishing Company, 205
Town hall(s)
and communication messaging, 301–302
content, 301
meetings, 298
sample communication audience/channels, 302t
Transaction costs, 32
Trapani, Gina, 87
Triune Group, 285
Twitter, 40–42
be aware of your voice, 42
be personable, 41
don’t be complainer, 42
“Find People” search function, 41
people following, 40
stay away from discussing politics and religion, 42
tweets, 40–41
U
Underwriting, KM, 181–183
Unified process, 24
Unmanned aircraft, use of (KM), 273
USAID After-Action Review Technical Guide, 122
The US Air Force, 282–283
The US Army, 277–278
The US Army Corps of Engineers (USACE), 281–282
User-centric approach, 306
User-generated data, 256–257
User indifference, 168
User interface/user experience (UI/UX), 306
The US Navy, 286–288
V
Valuation: Measuring and Managing the Value of Companies (book), 134
Value analysis, 27
VersusLaw, Inc., 205
VersusLaw legal research, 205, 205f
Vertical merger, 127
Vertical search, 57–58
Virtual communities, 169
benefits, 169–170
characteristic of, 169
W
Warfare technology, 273
Wearable technology, personal KM and, 339–340
WebMD website, 149
Web page, search facets, 66
Weighted average costs of capital (WACC), 133
Wenger, Etienne, 82
WestLawNext legal research, 203–204, 204f
Wordmap Taxonomy Management Software, 70
Workforce life cycle management, 100f
Workforce management (WFM), 99
Workforce optimization, 99–100
World Wide Web, 59
Y
Yahoo Health, 149–150
Younger tech-savvy attorneys, 196