Process of creating, sharing, using and managing the knowledge and information of an organization
Knowledge management (KM) is the collection of methods relating to creating, sharing, using and managing the knowledge and information of an organization.[1] It refers to a multidisciplinary approach to achieve organizational objectives by making the best use of knowledge.[2]
Many large companies, public institutions, and non-profit organisations have resources dedicated to internal KM efforts, often as a part of their business strategy, IT, or human resource management departments.[6] Several consulting companies provide advice regarding KM to these organizations.[6]
The most complex scenario for knowledge management may be found in the context of supply chain as it involves multiple companies without an ownership relationship or hierarchy between them, being called by some authors as transorganizational or interorganizational knowledge. That complexity is additionally increased by industry 4.0 (or 4th industrial revolution) and digital transformation, as new challenges emerge from both the volume and speed of information flows and knowledge generation.[11]
In 1999, the term personal knowledge management was introduced; it refers to the management of knowledge at the individual level.[12]
In the enterprise, early collections of case studies recognised the importance of knowledge management dimensions of strategy, process and measurement.[13][14] Key lessons learned include people and the cultural norms which influence their behaviors are the most critical resources for successful knowledge creation, dissemination and application; cognitive, social and organisational learning processes are essential to the success of a knowledge management strategy; and measurement, benchmarking and incentives are essential to accelerate the learning process and to drive cultural change.[14] In short, knowledge management programs can yield impressive benefits to individuals and organisations if they are purposeful, concrete and action-orientated.
The ISO 9001:2015 quality management standard released in September 2015 introduced a specification for 'organizational knowledge' as a complementary aspect of quality management within an organisation.[15]
KM emerged as a scientific discipline in the early 1990s.[16] It was initially supported by individual practitioners, when Skandia hired Leif Edvinsson of Sweden as the world's first chief knowledge officer (CKO).[17] Hubert Saint-Onge (formerly of CIBC, Canada), started investigating KM long before that.[2] The objective of CKOs is to manage and maximise the intangible assets of their organizations.[2] Gradually, CKOs became interested in practical and theoretical aspects of KM, and the new research field was formed.[18] The KM idea has been taken up by academics, such as Ikujiro Nonaka (Hitotsubashi University), Hirotaka Takeuchi (Hitotsubashi University), Thomas H. Davenport (Babson College) and Baruch Lev (New York University).[3][19]
In 2001, Thomas A. Stewart, former editor at Fortune magazine and subsequently the editor of Harvard Business Review, published a cover story highlighting the importance of intellectual capital in organizations.[20] The KM discipline has been gradually moving towards academic maturity.[2] First, is a trend toward higher cooperation among academics; single-author publications are less common. Second, the role of practitioners has changed.[18] Their contribution to academic research declined from 30% of overall contributions up to 2002, to only 10% by 2009.[21] Third, the number of academic knowledge management journals has been steadily growing, currently reaching 27 outlets.[22][23]
Multiple KM disciplines exist; approaches vary by author and school.[18][24] As the discipline matured, academic debates increased regarding theory and practice, including:
Techno-centric with a focus on technology, ideally those that enhance knowledge sharing and creation.[25][26]
Organisational with a focus on how an organisation can be designed to facilitate knowledge processes best.[6]
Regardless of the school of thought, core components of KM roughly include people/culture, processes/structure and technology. The details depend on the perspective.[29] KM perspectives include:
The practical relevance of academic research in KM has been questioned[36] with action research suggested as having more relevance[37] and the need to translate the findings presented in academic journals to a practice.[13]
Different frameworks for distinguishing between different 'types of' knowledge exist.[10] One proposed framework for categorising the dimensions of knowledge distinguishes tacit knowledge and explicit knowledge.[33] Tacit knowledge represents internalised knowledge that an individual may not be consciously aware of, such as to accomplish particular tasks. At the opposite end of the spectrum, explicit knowledge represents knowledge that the individual holds consciously in mental focus, in a form that can easily be communicated to others.[18][38]
Ikujiro Nonaka proposed a model (SECI, for Socialisation, Externalisation, Combination, Internalisation) which considers a spiraling interaction between explicit knowledge and tacit knowledge.[39] In this model, knowledge follows a cycle in which implicit knowledge is 'extracted' to become explicit knowledge, and explicit knowledge is 're-internalised' into implicit knowledge.[39]
Hayes and Walsham (2003) describe knowledge and knowledge management as two different perspectives.[40] The content perspective suggests that knowledge is easily stored; because it may be codified, while the relational perspective recognises the contextual and relational aspects of knowledge which can make knowledge difficult to share outside the specific context in which it is developed.[40]
Early research suggested that KM needs to convert internalised tacit knowledge into explicit knowledge to share it, and the same effort must permit individuals to internalise and make personally meaningful any codified knowledge retrieved from the KM effort.[6][41]
Subsequent research suggested that a distinction between tacit knowledge and explicit knowledge represented an oversimplification and that the notion of explicit knowledge is self-contradictory.[12] Specifically, for knowledge to be made explicit, it must be translated into information (i.e., symbols outside our heads).[12][42] More recently, together with Georg von Krogh and Sven Voelpel, Nonaka returned to his earlier work in an attempt to move the debate about knowledge conversion forward.[4][43]
A second proposed framework for categorising knowledge dimensions distinguishes embedded knowledge of a system outside a human individual (e.g., an information system may have knowledge embedded into its design) from embodied knowledge representing a learned capability of a human body's nervous and endocrine systems.[44]
A third proposed framework distinguishes between the exploratory creation of "new knowledge" (i.e., innovation) vs. the transfer or exploitation of "established knowledge" within a group, organisation, or community.[40][45] Collaborative environments such as communities of practice or the use of social computing tools can be used for both knowledge creation and transfer.[45]
Knowledge may be accessed at three stages: before, during, or after KM-related activities.[32] Organisations have tried knowledge capture incentives, including making content submission mandatory and incorporating rewards into performance measurement plans.[46] Considerable controversy exists over whether such incentives work and no consensus has emerged.[7]
One strategy to KM involves actively managing knowledge (push strategy).[7][47] In such an instance, individuals strive to explicitly encode their knowledge into a shared knowledge repository, such as a database, as well as retrieving knowledge they need that other individuals have provided (codification).[47] Another strategy involves individuals making knowledge requests of experts associated with a particular subject on an ad hoc basis (pull strategy).[7][47] In such an instance, expert individual(s) provide insights to requestor (personalisation).[33] When talking about strategic knowledge management, the form of the knowledge and activities to share it defines the concept between codification and personalization.[48] The form of the knowledge means that it's either tacit or explicit. Data and information can be considered as explicit and know-how can be considered as tacit.[49]
Hansen et al. defined the two strategies (codification and personalisation).[50] Codification means a system-oriented method in KM strategy for managing explicit knowledge with organizational objectives.[51] Codification strategy is document-centered strategy, where knowledge is mainly codified as "people-to-document" method. Codification relies on information infrastructure, where explicit knowledge is carefully codified and stored.[50] Codification focuses on collecting and storing codified knowledge in electronic databases to make it accessible.[52] Codification can therefore refer to both tacit and explicit knowledge.[53] In contrast, personalisation encourages individuals to share their knowledge directly.[52] Personification means human-oriented KM strategy where the target is to improve knowledge flows through networking and integrations related to tacit knowledge with knowledge sharing and creation.[51] Information technology plays a less important role, as it only facilitates communication and knowledge sharing.
Generic knowledge strategies include knowledge acquisition strategy, knowledge exploitation strategy, knowledge exploration strategy, and knowledge sharing strategy. These strategies aim at helping organisations to increase their knowledge and competitive advantage.[54]
Other knowledge management strategies and instruments for companies include:[7][27][33]
Knowledge sharing (fostering a culture that encourages the sharing of information, based on the concept that knowledge is not irrevocable and should be shared and updated to remain relevant)
Make knowledge-sharing a key role in employees' job description
Inter-project knowledge transfer
Intra-organisational knowledge sharing
Inter-organisational knowledge sharing
Knowledge retention also known as Knowledge Continuation: activities addressing the challenge of knowledge loss as a result of people leaving[55][56][57]
Mapping knowledge competencies, roles and identifying current or future predicted gaps.
Defining for each chosen role the main knowledge that should be retained, and building rituals in which the knowledge is documented or transferred on, from the day they start their job.
Transfer of knowledge and information prior to employee departure by means of sharing documents, shadowing, mentoring, and more,
Proximity & architecture (the physical situation of employees can be either conducive or obstructive to knowledge sharing)
Storytelling (as a means of transferring tacit knowledge)
Knowledge mapping requires the organization to know what kind of knowledge organization has and how is it distributed throughout the company, and how to efficiently use and re-use that knowledge. (a map of knowledge repositories within a company accessible by all)
Workflow systems—Systems that allow the representation of processes associated with the creation, use and maintenance of organisational knowledge, such as the process of creating and utilise forms and documents.
Content management and document management systems—Software systems that automate the process of creating web content and/or documents. Roles such as editors, graphic designers, writers and producers can be explicitly modeled along with the tasks in the process and validation criteria. Commercial vendors started either to support documents or to support web content but as the Internet grew these functions merged and vendors now perform both functions.
Enterprise portals—Software that aggregates information across the entire organisation or for groups such as project teams.
eLearning—Software that enables organisations to create customised training and education. This can include lesson plans, monitoring progress and online classes.
Telepresence—Software that enables individuals to have virtual "face-to-face" meetings without assembling at one location. Videoconferencing is the most obvious example.
Semantic technology such as ontologies—Systems that encode meaning alongside data to give machines the ability to extract and infer information.[59]
These categories overlap. Workflow, for example, is a significant aspect of content or document management systems, most of which have tools for developing enterprise portals.[7][60]
Proprietary KM technology products such as HCL Notes (Previously Lotus Notes) defined proprietary formats for email, documents, forms, etc. The Internet drove most vendors to adopt Internet formats. Open-source and freeware tools for the creation of blogs and wikis now enable capabilities that used to require expensive commercial tools.[37][61]
KM is driving the adoption of tools that enable organisations to work at the semantic level,[62] as part of the Semantic Web.[63] Some commentators have argued that after many years the Semantic Web has failed to see widespread adoption,[64][65][66] while other commentators have argued that it has been a success.[67]
Just like knowledge transfer and knowledge sharing, the term "knowledge barriers" is not a uniformly defined term and differs in its meaning depending on the author.[68] Knowledge barriers can be associated with high costs for both companies and individuals.[69][70][71]
Knowledge barriers appear to have been used from at least three different perspectives in the literature:[68]
1) Missing knowledge about something as a result of barriers for the share or transfer of knowledge.
2) Insufficient knowledge based on the amount of education in a certain field or issue.
3) A unique individual or group of humans' perceptual system lacks adequate contact points or does not fit incoming information to use and transform it to knowledge.
Knowledge retention is part of knowledge management. It helps convert tacit form of knowledge into an explicit form. It is a complex process which aims to reduce the knowledge loss in the organization.[72] Knowledge retention is needed when expert knowledge workers leave the organization after a long career.[73] Retaining knowledge prevents losing intellectual capital.[74]
According to DeLong(2004) [75] knowledge retention strategies are divided into four main categories:
Human resources, processes and practices
Knowledge transfer practices
Knowledge recovery practices
Information technologies used to capture, store and share knowledge.
Knowledge retention projects are usually introduced in three stages: decision making, planning and implementation. There are differences among researchers on the terms of the stages. For example, Dalkir talks about knowledge capture, sharing and acquisition and Doan et al. introduces initiation, implementation and evaluation.[76][77] Furthermore, Levy introduces three steps (scope, transfer, integration) but also recognizes a "zero stage" for initiation of the project.[73]
A knowledge audit is a comprehensive assessment of an organization's knowledge assets, including its explicit and tacit knowledge, intellectual capital, expertise, and skills. The goal of a knowledge audit is to identify the organization's knowledge strengths and gaps, and to develop strategies for leveraging knowledge to improve performance and competitiveness. Knowledge audit helps ensure that an organization's knowledge management activities are heading in the right direction. It also reduces the making of incorrect decisions. Term knowledge audit is often used interchangeably with information audit, although information audit is slightly narrower in scope.[78][79]
The requirement and significance of a knowledge audit can vary widely among different industries and companies. For instance, within the software development industry, knowledge audits can play a pivotal role due to the inherently knowledge-intensive nature of the work. This contrasts with sectors like manufacturing, where physical assets often take more important role. The difference arises from the fact that in software development companies, the skills, expertise, and intellectual capital, often overshadow the value of physical assets.[80]
Knowledge audits provide opportunities for organizations to improve their management of knowledge assets, with the goal of enhancing organizational effectiveness and efficiency. By conducting a knowledge audit, organizations can raise awareness of knowledge assets as primary factors of production and as critical capital assets in today's knowledge economy. The process of a knowledge audit allows organizations to gain a deeper understanding of their knowledge assets. This includes identifying and defining these assets, understanding their behavior and properties, and describing how, when, why, and where they are used in business processes.[80]
Knowledge protection refers to behaviors and actions taken to protect the knowledge from unwanted opportunistic behavior for example appropriation or imitation of the knowledge.[81]
Knowledge protection is used to prevent the knowledge to be unintentionally available or useful for competitors. Knowledge protection can be for example a patent, copyright, trademark, lead time or secrecy held by a company or an individual.[82]
There is various methods for knowledge protection and those methods are often divided into two categories by their formality: formal protection and informal protection.[83][84][85][86] Occasionally a third category is introduced, semi-formal protection, which includes contracts and trade-secrets.[85][86][87] These semi-formal methods are also usually placed under formal methods.
Organizations often use a combination of formal and informal knowledge protection methods to achieve comprehensive protection of their knowledge assets.[86] The formal and informal knowledge protection mechanisms are different in nature, and they have their benefits and drawbacks. In many organizations, the challenge is to find a good mix of measures that works for the organization.[84]
Formal knowledge protection practices can take various forms, such as legal instruments or formal procedures and structures, to control which knowledge is shared and which is protected.[83] Formal knowledge protection methods include for example: patents, trademarks, copyrights and licensing.[83][85][88]
Technical solutions to protect the knowledge fall also under the category of formal knowledge protection. Formal knowledge protection from technical viewpoint includes technical access constraints and protection of communication channels, systems, and storage.[84]
While knowledge may eventually become public in some form or another, formal protection mechanisms are necessary to prevent competitors from directly utilizing it for their own gain.[84] Formal protection methods are particularly effective in protecting established knowledge that can be codified and embodied in final products or services.[88]
Informal knowledge protection methods refer to the use of informal mechanisms such as human resource management practices or secrecy to protect knowledge assets. There is notable amount of knowledge that cannot be protected by formal methods, and for which more informal protection might be the most efficient option.[89]
Informal knowledge protection methods can take various forms, such as: secrecy, social norms and values, complexity, lead-time and Human resource management.[83][88][90][89]
Informal knowledge protection methods protect knowledge assets for example by making it difficult for outsiders to access and understand the knowledge within the boundaries of the organization.[90] Informal protection methods are more effective for protecting knowledge that is complex or difficult to express, articulate, or codify.[90][89]
Balancing knowledge protection and knowledge sharing
The balance between knowledge sharing and knowledge protection is a critical dilemma faced by organizations today.[91][84] While sharing knowledge can lead to innovation, collaboration, and competitive advantage, protecting knowledge can prevent it from being misused, misappropriated, or lost.[91][84][92] Thus, the need for organizational learning must be balanced with the need to protect organisations' intellectual property, especially whilst cooperating with external partners.[91][93] The role of information security is crucial in helping organisations protect their assets whilst still enabling the benefits of information sharing.[84][92] By implementing effective knowledge management strategies, organizations can protect valuable intellectual property while also encouraging the sharing of relevant knowledge across teams and departments.[91] This active balancing act requires careful consideration of factors such as the level of openness, the identification of core knowledge areas, and the establishment of appropriate mechanisms for knowledge transfer and collaboration.[91] Finding the right balance between knowledge sharing and knowledge protection is a complex issue that requires a nuanced understanding of the trade-off's involved and the context in which knowledge is shared or protected.[91][93]
Protecting knowledge cannot be considered without its risks. Here are listed four of the major risks associated with knowledge protection:
Overprotection: One of the major risks of knowledge protection is overprotection. Overprotection occurs when intellectual property rights are too broad or too strict, preventing others from building upon existing ideas and stifling innovation. As noted by Rouyre and Fernandez,[94] overprotection can have a chilling effect on follow-on innovation, which is particularly problematic in fields where innovation is cumulative.
Misappropriation: Another risk associated with knowledge protection is misappropriation. Misappropriation refers to the unauthorized use or theft of intellectual property. This can occur when confidential information is leaked, trade secrets are stolen, or patents are infringed upon. According to the World Intellectual Property Organization,[95] misappropriation can result in significant financial losses for individuals and organizations.
Infringement claims: Intellectual property owners can also face risks associated with infringement claims. Infringement occurs when someone uses intellectual property without permission or authorization, and the owner of the intellectual property files a lawsuit. Infringement claims can be costly and time-consuming and can result in damage to an individual's or organization's reputation. As noted by Law Insider's Knowledge of infringement Sample Clauses,[96] infringement claims can also result in financial penalties and even criminal prosecution.
Inadequate protection: Inadequate protection of intellectual property is also a significant risk. This occurs when intellectual property owners fail to properly protect their knowledge, such as by failing to obtain patents, trademarks, or copyrights. Inadequate protection can result in the loss of intellectual property rights and can make it difficult for individuals and organizations to enforce their rights in court. As noted by the WIPO,[95] inadequate protection can also make it easier for others to copy or steal intellectual property.
In conclusion, protecting knowledge is crucial to promote innovation and creativity, but it is not without its risks. Overprotection, misappropriation, infringement claims, and inadequate protection are all risks associated with knowledge protection. Individuals and organizations should take steps to protect their intellectual property while also considering the potential risks and benefits of such protection.
^ abcNonaka, Ikujiro (1991). "The knowledge creating company"(PDF). Harvard Business Review. 69 (6): 96–104. Archived(PDF) from the original on 2020-08-03. Retrieved 2019-08-30.
^ abNonaka, Ikujiro; von Krogh, Georg (2009). "Tacit Knowledge and Knowledge Conversion: Controversy and Advancement in Organizational Knowledge Creation Theory". Organization Science. 20 (3): 635–652. doi:10.1287/orsc.1080.0412. S2CID9157692.
^ abMcInerney, Claire (2002). "Knowledge Management and the Dynamic Nature of Knowledge". Journal of the American Society for Information Science and Technology. 53 (12): 1009–1018. CiteSeerX10.1.1.114.9717. doi:10.1002/asi.10109. S2CID1859117.
^Rosner, D.; Grote, B.; Hartman, K.; Hofling, B.; Guericke, O. (1998). "From natural language documents to sharable product knowledge: a knowledge engineering approach". In Borghoff, Uwe M.; Pareschi, Remo (eds.). Information technology for knowledge management. Springer Verlag. pp. 35–51.
^ abBray, David (2007-05-07). "SSRN-Knowledge Ecosystems: A Theoretical Lens for Organizations Confronting Hyperturbulent Environments". SSRN984600.
^ abBontis, Nick; Choo, Chun Wei (2002). The Strategic Management of Intellectual Capital and Organizational Knowledge. New York: Oxford University Press. ISBN978-0-19-513866-5.
^Ferguson, J. (2005). "Bridging the gap between research and practice". Knowledge Management for Development Journal. 1 (3): 46–54. doi:10.1080/03057640500319065. S2CID145246146.
^ abAndriessen, Daniel (2004). "Reconciling the rigor-relevance dilemma in intellectual capital research". The Learning Organization. 11 (4/5): 393–401. doi:10.1108/09696470410538288.
^ abcHayes, M.; Walsham, G. (2003). "Knowledge sharing and ICTs: A relational perspective". In Easterby-Smith, M.; Lyles, M.A. (eds.). The Blackwell Handbook of Organizational Learning and Knowledge Management. Malden, MA: Blackwell. pp. 54–77. ISBN978-0-631-22672-7.
^ abBray, David A. (December 1, 2005). Exploration, Exploitation, and Knowledge Management Strategies in Multi-Tier Hierarchical Organizations Experiencing Environmental Turbulence. North American Assoc. for Computational Social and Organizational Science (NAACSOS) Conference. SSRN961043.
^Benbasat, Izak; Zmud, Robert (1999). "Empirical research in information systems: The practice of relevance". MIS Quarterly. 23 (1): 3–16. doi:10.2307/249403. JSTOR249403. S2CID3472783.
^Bakke, Sturla; ygstad, Bendik (May 2009). "Two emerging technologies: a comparative analysis of Web 2.0 and the Semantic Web". CONF-IRM 2009 Proceedings (28). Archived from the original on 2017-09-06. Retrieved 2017-09-05. Our research question is: how do we explain the surprising success of Web 2.0 and the equally surprising non-fulfillment of the Semantic Web. Building on a case study approach we conducted a in depth comparative analysis of the two emerging technologies. We propose two conclusions. First, traditional top-down management of an emerging global technology has proved not to be effective in the case of the Semantic Web and Web 2.0, and second, the success for such global technologies is mainly associated with bootstrapping an already installed base.
^Grimes, Seth (7 January 2014). "Semantic Web business: going nowhere slowly". InformationWeek. Retrieved 5 September 2017. SemWeb is a narrowly purposed replica of a subset of the World Wide Web. It's useful for information enrichment in certain domains, via a circumscribed set of tools. However, the SemWeb offers a vanishingly small benefit to the vast majority of businesses. The vision persists but is unachievable; the business reality of SemWeb is going pretty much nowhere.
^Cagle, Kurt (3 July 2016). "Why the Semantic Web has failed". LinkedIn. Archived from the original on 19 January 2022. Retrieved 5 September 2017. This may sound like heresy, but my personal belief is that the semantic web has failed. Not in "just give it a few more years and it'll catch on" or "it's just a matter of tooling and editors". No, I'd argue that, as admirable as the whole goal of the semantic web is, it's just not working in reality.
^Zaino, Jennifer (23 September 2014). "The Semantic Web's rocking, and there ain't no stopping it now". dataversity.net. Archived from the original on 5 September 2017. Retrieved 5 September 2017. Make no mistake about it: The semantic web has been a success and that's not about to stop now. That was essentially the message delivered by W3C Data Activity Lead Phil Archer, during his keynote address celebrating the semantic web's ten years of achievement at last month's Semantic Technology & Business Conference in San Jose.
^Skyrme, David (2001). Capitalizing on Knowledge. Routledge. ISBN9780750650113.
^Malekolkalami, Mila; Sharif, Atefeh (2022). "A Systematic Review of Knowledge Audit Models during 2016 to 2020". International Journal of Information Science and Management. 20 (3): 227–244.
^ abHand, P. (2019). Knowledge assets and knowledge audits. Bingley, England: Emerald Publishing.
^Norman, Patricia (2002). Protecting Knowledge in Strategic Alliances: Resource and Relational Characteristics. doi:10.1016/S1047-8310(02)00050-0.
^Sofka, Wolfgang; Edlira, Shehu; de Faria, Pedro (2014). "Multinational Subsidiary Knowledge Protection - Do Mandates and Clusters Matter?". Research Policy. 43 (8): 1320–1333. doi:10.1016/j.respol.2014.05.006.