Week 4: KM Tools, Techniques, and Technology
In times of recession, organizations may cut costs by terminating employees. Do you think this can seriously affect organizations’ repositories of tacit knowledge? Earlier in this course, you read about tacit knowledge and explicit knowledge. Tacit knowledge is the knowledge ingrained in individuals, which translates into explicit knowledge when shared and exchanged through direct contact. Explicit knowledge can be shared through peer-assist meetings, training, and project-specific meetings. Knowledge shared is knowledge gained. Consider the fate of an organization if its senior employees leave without transferring their knowledge to new hires. On the other hand, consider an organization that uses a knowledge management (KM) approach and captures information loss through various technological means by using information communication technology.
This week, you will understand how technology can help in developing tacit knowledge and explicit knowledge. You will learn how information technology (IT) is used extensively in organizations as a natural medium for the flow of knowledge. In addition, you also will learn about the various constraints in the widespread use of technology in KM programs.
The purpose of this report is to help you to connect the lessons that you have learned in your Internet Web site evaluation assignments with KM theories. By engaging in this process, you will be refining the lessons learned, corroborating, validating, and codifying them. This process is the essence of the KMCI Knowledge Life Cycle, as outlined in McElroy (2002).
This report should be:
Part I: Listing and Explaining Key KM Lessons Learned
List and explain the key common or shared lessons learned about KM from the Web site evaluations and Discussion area posting assignments in Weeks 1–3. List at least five common lessons learned about KM. If there are not at least five common lessons that are shared, complete the list of five lessons by using lessons discovered by individuals that are of greatest importance to each person. Explain why you believe each lesson is critical for the practice of KM in modern organizations.
Part II: Connecting Key Lessons Learned to Theories
Every lesson learned is an example of a specific case of a more general principle. For each lesson learned, explain the more general principle about KM practice that it represents.
Once you have stated the principle, explain the implications of this principle for KM practice. For example, you may have discovered that the process of knowledge integration involves many complexities regarding how the meaning of the content you have shared with others is interpreted by them. The key lesson may be to keep things simple when sharing knowledge or to get feedback from those who are viewing the information to ensure that the way things are being interpreted is the way that was intended.
Collison, C., & Parcell, G. (2004).Learning to fly: Practical knowledge management from leading and learning organizations(Updated ed. with free CD-ROM). West Sussex, UK: John Wiley & Sons Limited/Capstone Publishing Limited.
This article familiarizes you with first- and second-generation KM. The article suggests that unlike first-generation KM, which was technology driven, second-generation KM is more inclusive of people, processes, and social initiatives. The article also provides a description of the life cycle of KM and elaborates on the basic differences between first- and second-generation KM.
This article provides an industry-standard reference model of KM and explains the critical differences between information management and KM. In addition, some examples of common KM initiatives are cited.
Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.Read more
Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.Read more
Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.Read more
Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.Read more
By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.Read more