P. 1
Knowledge Management Issues

Knowledge Management Issues


|Views: 392|Likes:
Major issues in Knowledge management ,
Information over load,security,culture are addressed
Major issues in Knowledge management ,
Information over load,security,culture are addressed

More info:

Published by: Vijay kumar Gupta .C on Dec 09, 2008
Copyright:Attribution Non-commercial


Read on Scribd mobile: iPhone, iPad and Android.
download as PPT, PDF, TXT or read online from Scribd
See more
See less





Major Issues in Knowledge Management

International School of Information Management University of Mysore MYSORE - 006

9th December,2008

KM strategy in organizations
“KM is a concept in which an enterprise gathers,
organizes, shares, and analyzes the knowledge of individuals and groups across the organization in ways that directly affect performance” - Robert S. Seiner

sources of Knowledge
Internal information resources:
• • • • People — Correspondence — Data Records — Graphic materials — Oral communication Mail, memoranda Files on activities, Operations, Personnel, etc. Maps, Charts, Diagrams, etc.

External information resources:
• • • • • People outside the organization Internal information resources of other organization Published information — books, journals, reports, etc Mass media — News Electronic databases and data banks

Major issues in KM
• • • • • • • • Social Networking Analysis Security Version control Information Overload Communities of Practice Psychological aspects KM practices Culture etc.

• • • • What knowledge required to do jobs ? If so, at what cost? If not what’s cost ? who should get what knowledge-priority? Methods of acquisition, storage, organization and delivery processes • What system would be best? – cost factor • Alternatives • Balance between manual and computer systems

Three issues of KM
• Information Overload • Security • Culture

Information Overload
• ‘Information value chain’ from handling information and data to converting pre-processed information into knowledge and action • Examining the generic relationship between information and the actual or potential user of that information • Directly related to the development of technologies for collecting, organizing and distributing information and interpersonal communication

• • • • • • • Volume Comprehension Integration Location Access Relevance Verification

• • • • • • • • Document management Work flow Intranet & Internet Database integration Group ware and collaboration tools Project management Communication tracking Knowledge creation and representation tools

• Skills-based approaches • Technologies • Corporate Information Policy • Portals & Intranet • Search engines and directories • Knowledge Management Products

• Access control • Trust management and Negotiation • securing a knowledge management system • Validity of the data • Right information-Right person-right time

• • • • Secure Tools for knowledge sharing Security policy based framework Role Based access control Secure knowledge management architecture • Trust rules for collaboration

Cultural Issues…
• • • • • Different Levels of the Socio-Cultural Context Globalization vs. Localization Conflict of motives Individual and social barriers Core cultures:
• • • • Control Core Culture Competence Core Culture Collaboration Core Culture Cultivation Core Culture

• Create shared need – share knowledge • Reward key contributors • Design & roll out of various KM modules • Developing culture of virtual environments • cultural awareness and cultural diversity as an important and necessary skill • Adopt the sense-making approach in human resource practices

Balance the values and the conflicts of cultural diversity

• value cultural diversity knowledge-intellectual capital

Reuters Ltd. (1996). Dying for information?. An investigation into the effects of information overload in Singapore andworldwide(1996).London. Entin, E.E., Freeman, J., Serfaty, D, & Cohen, M. (1997). Information management: Understanding and coping with information overload. Proceedings of the Human Factors and Ergonomics Society 41st Annual Meeting, pp. 565-68 R. Sandhu, E. Coyne, H. Feinstein, and C. Youman, “Role-based access control models,” Computer, vol. 29, no. 2, pp. 38–47, Feb. 1996. Walsham, G. (2001). Making a world of difference: IT in a global context. Chichester, UK: John Wiley & Son Ltd. • • • • http://www.yahoo.com http://www.google.com http://www.pdfzone.com/products/software/tool_DocFather.html http://cais.isworld/articles/1-7/article

Thank you

You're Reading a Free Preview

/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->