twitter
rss


Mapping knowledge management

Mapping knowledge management, what do you think the first time? Not possible? Or just, perhaps, but how? Manejemen knowledge mapping is a long path "to explore the ability of individuals".
Let's change our mindset, do not feel they have no ability whatsoever. Because the actual knowledge of the things owned by each individual. Let's try to dig it up, follow the steps below:

  1. Understand the individual capabilities

Maybe for someone who has never made the identification of individuals, must have felt at a loss to understand the individual's ability. Perhaps the example we will better understand.
Example:
I have a hobby around the streets, then I have the ability to understand the various ways in Jakarta.

  1. 2.  Write down all the individual's ability

Do not be afraid to write all the individual skills both formal and non formal. Because not only acquired knowledge formally.
Example:
Cooking skills, writing skills, or ability to dance can be a long as we want to share your knowledge with others

 3.Classify the level of individual ability and Write
Once we write the individual's ability, we can write the level of ability. Both are rated by individuals, and judged as a group. When assessed individually secraa we can see a variety of certification assessments made by independent parties. As an institution that is tasked to make the certification.
Example:
Della: ability. Level, Medium Ms. Office, based on an assessment of LM institutions Patra
Group: Della Ms.Office technically less well when compared with Azizah

After the above steps, you can see examples of my individual knowledge mapping by clicking the link 

While the example of the comparison level of my ability when compared to the group can be viewed at the link below:

while for the understanding of knowledge in inter-class friends, you can see perbandigan knowledge with the link below:


6.3 PROCESSES, PROCEDURES, AND PRACTICES MATRIX
If we create a matrix in which the rows are KM Processes and the columns KM Procedures and Practices, and in which the ordering, top to bottom and left to right is roughly in chronological or developmental order, and we check which process a practice or procedure is primarily designed to serve, the matrix looks like:

That matrix reveals several interesting things. Almost everything one does in KM is designed to help find information and knowledge. However, if we assume that the main goal of KM is to share knowledge and even more importantly to develop new knowledge, then the Knowledge Audit and the Tags, Taxonomies and Content Management stages are the underpinnings and the tools. It is the knowledge sharing and knowledge creation of one on one communications enabled by expertise locators, and the communal sharing and creation of knowledge enabled by communities of practice toward which KM development should be aimed.



6.2 KM IN PRACTICE - PROCEDURES AND PRACTICES

6.2.1 KNOWLEDGE AUDIT
The idea of an information auditory much predates KM as we have defined KM here. Accompanying, or more accurately a component of, the Information Resources Management (IRM) movement of the 1970’s was a strong emphasis upon the information or knowledge audit. The foremost exponent of the information or knowledge audit was Forrest (Woody) Horton. Some of the reasons for and benefits of an information audit include:
·         First of course, the elucidation of what information the organization possesses: where it is located? how is it organized? how can it be accessed? who is responsible for it? etc.
·         The identification of duplicate or partially duplicated information and information gathering and maintenance, with the potential realization of cost savings.
·         The identification of information being gathered and maintained that is no longer salient or necessary, with the potential realization of cost savings.
With the development of KM, there ensued a shift to amuch greater emphasis upon knowledge embodied in people. Indeed, Moulton, L. [2008] advocates a three-stage process for a knowledge audit that starts with people and emphasizes knowledge embodied in people.
The first stage focuses on people, “their knowledge and expertise and their connections to others” [Moulton, L., 2008, p. 80]. The ideal result is a “map” of:
  • ·         Who is connected to whom, formally and informally?
  • ·         What are their formal roles and job descriptions, and informal relationships and roles?
  • ·         Where do expertise, methods, differing views of the organization reside?
  • ·         What are the successful knowledge sharing engagements and practices?
  • ·         What are the barriers to information and knowledge transfer?
  • ·         What are the cultural behaviors that are dictating successes or failures to share and leverage knowledge?


Clearly, the techniques used in creating a knowledge audit or knowledge map are those borrowed from social network analysis and anthropology, and appropriately so, since Knowledge Management is interdisciplinary by nature, spanning boundaries of thought and interests.
The second stage focuses on programs, projects, and products. How does information flow in and around them? Are there communities of practice even if interest groups are not so named? The third stage focuses on documentation and how information is captured explicitly. The KM era notion of an information audit, in contrast with the earlier IRM era, is definitely focused on people first. In fact, Moulton’s third stage of the knowledge audit is essentially the traditional information audit, with a Stage one and a Stage two added in front. Powell,T. [2004b] provides a “Knowledge Matrix” that serves as a very useful checklist for a knowledge audit.

6.2.2 TAGS, TAXONOMIES, AND CONTENT MANAGEMENT
The KM field call a taxonomy a classification scheme, or a classificatory or syndetic structure. But most writers in the KM domain come from the business world and are unaware of that terminology, and use the word “taxonomy” that they remember from their high school and college science courses.) Stage III of the development of KM, described above, can well be called the Taxonomy Stage.
The tag and taxonomy stage of KM consists primarily of assembling various information resources in some sort of portal-like environment and making them available to the organization. This can include internally generated information, including lessons learned databases and expertise locators, as well as external information, the open web and also deep web information subscribed to by the organization. The area of managing content is still in its early days and will clearly expand and develop as organizations see the need for preserving, organizing, and re-using knowledge objects.
The obvious consequence of this plethora of data and information from multiple sources is great terminological inconsistency and confusion, and that, in turn, drives the appeal of syndetic data structures and taxonomies that can assist the user in locating information or knowledge and result in better and more effective searching. There is now an industry sector whose role is to provide software and expertise to  assist organizations in developing their taxonomic systems. Most of those organizations are represented among the vendors at the KM World Conference.KM World, a controlled circulation, i.e., free, magazine publishes a very useful annual compilation of vendors and products, particularly in the CMS domain, but including KM broadly as well.

6.2.3 LESSONS LEARNED DATABASES
Lessons Learned databases are databases that attempt to capture and to make accessible knowledge that has been operationally obtained and typically would not have been captured in a fixed medium (to use copyright terminology). In the KM context, the emphasis is typically upon capturing knowledge embedded in persons and making it explicit. The lessons learned concept or practice is one that might be described as having been birthed by KM, as there is very little in the way of a direct antecedent.
Early in the KM movement, the phrase typically used was “best practices,” but that phrase was soon replaced with “lessons learned.” The reasons were that “lessons learned” was broader and more inclusive, and because “best practice” seemed too restrictive and could be interpreted as meaning there was only one best practice in a situation. The major international consulting firms were very aware of this and led the movement to substitute the new term. “Best Practices” succeeded by “Lessons Learned” was the most common hallmark phrase of Stage I of KM development.
A wonderfully instructive example of a “lesson learned” is recounted by the KM consultant Mazzie,M. [2003]. The story derives from his experience in the KM department at Wyeth Pharmaceuticals. Wyeth had recently introduced a new pharmaceutical agent primarily for pediatric use. They expected it to be a substantial success because, unlike its competitors, it needed to be administered only once a day, which would make it much easier for the caregiver to ensure that the child followed the drug regimen. Sales of the drug started well but soon turned disappointing. One sales rep (what the pharmaceutical industry used to call detail men), however, discovered the reason for the disappointing sales and the solution. The problem was that kids objected strenuously to the taste of the drug, and caregivers were reporting to prescribing physicians that they couldn’t get their kid to continue taking the drug. The solution was orange juice. A swig of orange juice quite effectively masked the offensive taste. If the sales rep informed the physician that the therapy should be conveyed to the caregiver as the pill and a glass of orange juice taken simultaneously first thing in the morning, then there was no dissatisfaction and sales were fine. There are also lessons learned in this story about motivation for information sharing (discussed later).
The implementation of a lessons learned system is complex both politically and operationally. Many of the questions surrounding such a system are difficult to answer. Who is to decide what constitutes a worthwhile lesson learned? Are employees free to submit to the system unvetted? Most successful lessons learned implementations have concluded that such a system needs to be monitored and that there needs to be a vetting and approval mechanism before items are mounted as lessons learned. How long do items stay in the system? Who decides when an item is no longer salient and timely? Most successful lessons learned systems have an active weeding or stratification process. Without a clearly designed process for weeding, the proportion of new and crisp items inevitably declines, the system begins to look stale, and usage and utility falls. It is the same phenomenon that school librarians have observed for decades. Materials need to be current and relevant. Deletion, of course, is not necessarily loss and destruction. Using stratification principles, items removed from the foreground can be archived and moved to the background, but still be available.

6.2.4 EXPERTISE LOCATION
If  knowledge resides in people, then one of the best ways to learn what an expert knows is to talk with one. Locating the right expert with the knowledge you need, though, can be a problem. The basic function of an expertise locator system is straightforward, it is to identify and locate those persons within an organization who have expertise in a particular area. Such systems were commonly known as “Yellow Page” systems in the early days of KM, the name coming from the telephone book yellow pages, the section of the phone book, or a separate volume of the phone book, organized for subject search. In recent years, the term expertise locator or expertise location has replaced yellow pages as being rather more precise. After all the yellow pages metaphor with its implication of subject search could apply to many areas of KM, such as for example lessons learned and content management.
There are now three areas which typically supply data for an expertise locator system, employee resumes, employee self identification of areas of expertise, typically by being requested to fill out a form online, or by algorithmic analysis of electronic communications from and to the employee. The latter approach is typically based on email traffic, but it can include other social networking electronic communications such as Twitter and Facebook. Commercial packages to match queries with expertise are available. Most of them have load-balancing schemes so as not to overload any particular expert. Typically, such systems rank the degree of presumed expertise and will shift a query down the expertise ranking when the higher choices appear to be becoming overloaded. Such systems also often have a feature by which the requester can flag the request as a priority, and the system will then try to match higher priority requests with higher presumed (calculated) expertise rank.


6.2.5 COMMUNITIES OF PRACTICE (COPS)
Communities of Practice (CoPs) are groups of individuals with shared interests that come together in person or virtually to tell stories, discuss best practices, and talk over lessons learned [Wenger, E., 1998a,Wenger and Snyder, 1999].Communities of practice emphasize the social nature of learning within or across organizations. Conversations around the water cooler are often taken for granted, but organizations find that when workers give up a company office to work out of their home, that the natural knowledge sharing that occurs in social spaces must be replicated in an online form.
As an alternative, workers are called in for periodic meetings for the express purpose of learning from each other [McInerney, C., 2000], or they’re encouraged to participate on online forums. In an information society where knowledge is considered an important resource for individuals and organizations, processes to share knowledge should be considered integral to any strategic or tactical plan. Many large firms, especially those in the pharmaceutical industry, have adopted internship and leadership programs for the express purpose of helping promising new associates learn about how the company operates and to teach them that today, learning is an ongoing part of work.
In the context of KM, CoPs are generally understood to mean electronically linked communities. Electronic linkage is not essential of course, but since KM arose in the consulting community from the awareness of the potential of Intranets to link geographically dispersed organizations, this orientation is understandable and inevitable.
The organization and maintenance of CoPs is not a simple and easy undertaking. As Durham, M. [2004] points out, there are several key roles to be filled, which she describes as manager, moderator, and thought leader. They need not necessarily be three separate people, but in some cases they will need to be. For a CoP, some questions that need to be thought about are:
  • ·       Who fills those roles? manager, moderator, and thought leader.
  • ·       How is the CoP managed?
  • ·       Are postings open, or does someone vet or edit the postings?
  • ·       How is the CoP kept fresh and vital?
  • ·       When and how (under what rules) are items removed?
  • ·       How are those items archived? (Stratification again)
  • ·      Who reviews the CoP for activity? Identifies potential for new members, or suggests that the CoP may have outlived its usefulness?

 source:

Knowledge Management (KM)
Processes in Organizations
Theoretical Foundations and Practice




Knowledge management or knowledge sharing manifest themselves in many ways in the workplace; that may include ordinary events, such as facilitated meetings or informal conversations or more complex interactions that require information and communication technology. Since building knowledge may require the analysis and synthesis of information, the lines between working with information and working with knowledge or knowledge artifacts easily become blurred.

6.1       KM IN PRACTICE – PROCESSES
A very useful way of thinking is to conceptualize KMas the actualization of what Powell,T. [2001a] calls the “Knowledge Value Chain.” The chain is straightforward, a pyramid, in fact, leading from Data at the bottom through Information, Knowledge, Intelligence, Decision, and Action, to Value. The notion is simple, but the explication is sophisticated and complex. Value to the organization is ultimately what KM is about.

6.1.1 FINDING INFORMATION ANDKNOWLEDGE
Finding information and knowledge refers to processes that allow organizations to make sense and make use of data, information, and knowledge objects that may be present but are not codified, analyzed, nor accessible to members. Knowledge exists in all organizations, but all knowledge may not be explicit. Knowledge objects or artifacts are entities that represent knowledge existing within organizational members [McInerney, C., 2002].
One aspect of finding and dissemination of information is the organization of knowledge objects so that they can be found easily. Assigning index terms, tagging or, in the case of an intranet and theWeb, metadata, allows ease of retrieval [Learn, L., 2002]. Digitally recorded presentations, brochures, reports of lessons learned, and best practices can all be made accessible through careful indexing and intelligent information architecture [Morville, P.,2005,Rosenfeld and Morville,2002].
Another example of finding knowledge is a situation where vendor information is available, but no one in a firm has evaluated vendors nor kept a record of the evaluations and lessons learned about working with vendors, nor has made explicit some of the vagaries of a specific vendor’s organizational and decision making structure. The person who deals with vendors may have extensive knowledge about them, but when he or she leaves the firm, the knowledge goes away [Davenport and Prusak, 1998a].When a staff member intentionally and systematically compiles a database of vendors with accompanying details in a relational database, reports can be produced that allow managers to see a pattern of purchasing, turn-around time, and staff ratings of vendors. Trends can be examined and analyzed so that new understandings of procurement practices and purchasing can be made explicit. The knowledge that once existed only within one person can be used (at least to some degree) by others who find it represented, codified, and organized in electronic form.

6.1.2 SHARING INFORMATION AND KNOWLEDGE
Sharing of information for knowledge development is the most traditional collection of processes, easily understood, but often overlooked in a systematic knowledge management program. Sharing refers to the willingness and ability of the knowledgeable to share what they know to help others expand their own learning and knowing.Teaching and learning activities, such as online universities in industry, mentoring programs, apprenticeships, and training programs all serve as opportunities for individuals to share knowledge.

The principals therefore wanted the person who needed the information or knowledge to have to come to them, so that the two contexts could be discussed and the applicability properly understood. The principles were, in general, quite willing to have it be broadcast that they had a lesson learned in a particular area, but in many cases, they did not want so much to be revealed that someone else would feel that they knew enough about that lesson to take it and run with it without consultation first.

6.1.3 DEVELOPMENT OFKNOWLEDGE
Knowledge development takes place when individuals work to create new understandings, innovations, and a synthesis of what is known already together with newly acquired information or knowledge. Although individuals can intentionally develop their own knowledge through seeking opportunities to be creative and learn, the development of knowledge is often a social process. Meetings, teleconferences, planning sessions, knowledge cafes, and team think tank sessions all serve to help workers develop knowledge together. The synergies brought about by effective meetings can encourage the development of new knowledge.

source:
Knowledge Management (KM)
Processes in Organizations
Theoretical Foundations and Practice


5.1 QUESTION ASKING AND ANSWERING
Question asking and answering is a foundational process by which what people know tacitly becomes expressed, and hence, externalized as knowledge. To support such a view, we borrow from speech acts theory [Searle, J., 1969] that amongst others categorizes question asking as a form of a speech act. In adapting the theory, Hirschheim et al. [1995] describe types of speech acts that pertain to aspects of either Knowledge Management (KM), or Information Management (IM). For example, Boahene and Ditsa [2003] suggest that Information Management systems target a base of expressive speech acts by mainly supporting the recall of meaning-attribution while Knowledge Management systems target regulative and constantive speech acts primarily to support the organization
and management of dynamic complexity.
They reason that IM addresses questions such as ‘Where,’ ‘Who,’ ‘When,’ and ‘What,’ while KM targets problems involving dynamic complexity, addressing solutions to questions such as ‘How’ and ‘Why.’ Quigley and Debons [1999] adopted a similar stance that considers information as texts that primarily answer ‘informative’ questions such as who, when, what, or where while knowledge is considered as texts that answer more ‘explanatory’ or ‘meaning related’ questions such as why or how.
Another category of questions, “What-if,” will also fall in the domain of knowledge activity. Since such questions necessitate predicting and prioritizing outcomes, attempts to address such “what-if ” questions will require integrating understanding of “what” with “why” and “how” to arrive at reasonable resolution.Thus, what-if questions, primarily seen in the decision making domain, will likely call for exhaustion of all possible scenarios in order to arrive at any “best” alternative.

5.2 POSTING CONTENT TO REPOSITORIES
Contributing content such as lessons-learned, project experiences, and success stories is another approach to knowledge sharing. The capturing of best practice has often been highlighted as a form of externalized knowledge. O’Dell and Jackson [1998] point out the importance of frameworks for classifying information.
For many professionals who are used to online communication and accessing databases and discussion lists, we could argue that it is quicker and easier for the professionals to make the contribution themselves. Nick et al. [2001], noting the importance of learning by experience, point out that experience bases can be developed using case-based reasoning as the underlying concept. However, they also note that experience repositories require continuous maintenance and updating in order to handle continuous streams of experience.
Selvin and Buckingham [2002] describe a tool, Compendium, that claims to support rapid knowledge construction.They ground their claim on an empirical case study of its use in a corporate contingency planning situation by demonstrating the creation of knowledge content in a real time ‘on-the-fly’mode of content authoring, complemented by collaborative validation.
The developed content is then made available to others for (re)use, or, for re-combination, to support newinstances of knowledge creation. Richter et al. [2004] describe a functionally similar tool, TAGGER, designed and operationalized as allowing knowledge acquisition discussions to be “tagged” in real time with the relevant concepts so as to lessen the burden on documentation. As awareness increases for the importance of making knowledge explicit, more and more products will appear to help with creating knowledge bases and decision recommendations, but it is a mindset open to using, sharing, and creating knowledge that will make a difference in creating an organizational knowledge culture.

5.3 (RE)USING KNOWLEDGE
Desouza et al. [2006] assert that the decision to consume knowledge can be framed as a problem of risk evaluation, with perceived complexity and relative advantage being identified as factors relating to intentions to “consume” knowledge. However, it is essential that the knowledge consumer is able to reasonably frame his or her knowledge needs. Belkin et al. [1982] found that during problem articulation, users have anomalous states of knowledge, and they may not be able to specify their information needs accurately. Since the publication of this seminal work legions of researchers have worked on systems that will help people formulate effective questions that will retrieve relevant formation.McMahon et al. [2004], studying team work involving engineering design, suggest that both codification and personalization approaches to knowledge reuse are relevant. They recognize the notion of information value, allowing for the matching of information to the knowledge needs of the user. They propose that good representations of both information characteristics and user characteristics are essential.

5.4 KNOWLEDGE-BASED DECISION MAKING
In general, decision making involves identifying alternatives, projecting probabilities and outcomes of alternatives, and evaluating outcomes according to known preferences and implications for stakeholders. Choo, C. [2002] suggests that decision making activity requires the establishment of shared meanings and the assumption of prior knowledge.
Shared meanings and purposes as well as newknowledge and capabilities, converge on decision making as the activity leading to the selection and initiation of action.Shared meanings, agendas, and identities select the premises, rules, and routines that structure decision making. New knowledge and capabilities make possible new alternatives and outcomes, expanding the range of available organizational responses [Choo, C., 2002, p. 86]. Choo further proposes that information flows are a central process that bridges knowledge creation and decision making activity. Information flows continuously between sense making, knowledge creating, and decision making, so that the outcome of information use in one mode provides the elaborated context and the expanded resources for information use in the other modes [Choo, C., 2002, p. 85].
Information used in one activity that results in new knowledge will, in turn, be used to guide selection of alternatives in future tasks that involve decision making. Codified rules and routines would be relied on to support evaluation of alternatives and selection of action decisions. Choice of alternatives, and decision outcomes then provide the backdrop upon which sense making, or justification, of decision rationale occurs. Such decision rationale, and its associated sense making can then be codified for (re)use in other contexts, applied to future activities that draw on it to create new instances of knowledge.

source
Knowledge Management (KM)
Processes in Organizations
Theoretical Foundations and Practice


4.4 COMMUNITY-BASED MODELS
The Information Systems literature points to an abundance ofKMstrategies in the category of Computer Mediated Communication (CMC). Such systems provide the infrastructure for enabling the interactions needed for a group’s knowledge synergies and interactive activities [Maier, R., 2002] and may include bulletin boards, electronic meeting/conferencing, or online chat.
Further, such CMC interactions allow for the creation of persistent records [Robins, J., 2002] of the interactions. Chat and other kind of social media transcriptions can be preserved too as another example. To the extent that discourse occurs through such interactions, the dialectics can be archived for future reference and subsequent “reuse.” However, as Hislop, D. [2002] points out, while technology may provide the tools for interaction and communication, the application of technology alone may not be a sufficient condition for sustaining the creation and sharing of knowledge.
Group Decision Support Systems (GDSSs) were originally conceived of as collaborative tools where groups came together, participated in brainstorming and then, through human facilitation, voted on items and issues important to the organization.These systems allowed for anonymous voting that moved decisions along rapidly by prioritizing topics more easily than trying to do so without the system’s assistance. Participants’ knowledge and experience contributed to the democratic process.
Another advantage of Group Decision Support Systems, in general, is the ability for each person to speak (through entering opinions via a keypad, or original ideas via a keyboard) anonymously without fear of being politically incorrect or worrying about speaking in opposition to the manager. Contributions could be confidential with the shy on an even plane with the extroverts.
Other dependable DSSs have used the expertise of meteorologists to predict storms, knowledge of cattle managers to give advice on culling herds, or the know-how of environmentalists on managing water resources. No doubt, these systems will be replaced by others as technology advances, and their capabilities and functionality will increase.

4.5 REPOSITORY MODEL
The knowledge management repository, a space to store and retrieve knowledge objects has long been a standard in KM programs. It is a model that emphasizes the creation of quality knowledge content in online repositories with re-use as a goal. Markus, M. [2001] argues that the purpose and content of knowledge records in repositories often differ depending on who needs the documentation: the content producer, similar others, or dissimilar others.
A great deal of effort is required to produce quality content, and, as such, part of the burden of documenting and packaging knowledge objects can be transferred to intermediaries, saving time and energy of the organization’s staff. In addition, adding context is also another aspect of making content more usable. Proposes the roles of human intermediaries in what she terms as “repurposing” of repositories to make them more appropriate for use by others.
Examples of activities that could be performed include abstracting, indexing, authoring, and sanitizing or scrubbing content. Because of the costs involved in repackaging and making repository knowledge content more usable to the knowledge seeker,Markus looks to an expanded role for technological support of core competencies of librarians, archivists, data curators, and other information professionals.

4.6 ACTIVITY-BASED MODELS
While there has been significant work done in terms of Information Systems support for the coordination of work [Winograd,T., 1988], the next logical progression would be to link knowledge production and capture with work processes. For example, Blackler, F. [1995] considers knowledge in organizations as socially distributed collective activity systems, and emphasizes the significance of incoherence and dilemma as the key issues in social systems. Similarly, Engeström, Y. [1999] research, using activity systems as cycles of expansive learning in work practices, also points to the importance of activities as providing the necessary context for grounding organizational knowledge.
Based on such a historical-cultural perspective of activity, Hasan, H. [2003] proposed rudiments of a KM system influenced by activity-based models that would link work activities with people and content. Continued development of the model would focus on the motivation of people to contribute content and the meaningfulness of information and knowledge that can be extracted from the contents of such an activity-based system. Incorporating workflow support with a knowledge repository, Kwan and Balasubramanian [2003] take the notion a step further; they propose the design of a KMsystem they call KnowledgeScope that provides integrated workflow support to capture and retrieve knowledge as an organizational process within the context it is created and used.
They also propose a meta-model knowledge structure called Knowledge-In-Context that specifies relationships among processes. The model was implemented with limited workflow functions at a global telecommunications company.While repositories and workflow support have largely developed with limited integration, designs such as this, grounded in case implementations, provide some empirical validity as to the appropriateness and value of incorporating activity as context for knowledge reuse. This emphasis upon context can be seen as part of the maturation of KM as described above in the discussion of stage IV of KM development.

end chapter 4
source:
Knowledge Management (KM)
Processes in Organizations
Theoretical Foundations and Practice


4.1 GATE KEEPERS ,INFORMATION,  STARS, AND BOUNDARY SPANNERS

In the context of KM, this tradition relates very directly to the development of Communities of Practice (CoP). Given the relative non-alignment of organizational structure and information flowand sharing,CoPs can be seen as the setting up of an alternative structure to facilitate information flow and sharing.
The seminal work was that of Thomas J. Allen of MIT [Allen and Cohen, 1969, Allen,T., 1977] who conducted a number of studies relating to information flow in industrial and corporate R&D laboratories. Allen’s most ingenious contribution to the field was to seize upon the phenomenon that in many cases in the context of military R&D and procurement, the same contract is awarded to two different organizations to achieve the same end, typically in the case of a critical component of a larger system. Duplicative development contracts may, in fact, be very worthwhile insurance against the failure of a key component of a system. This duplication provided a wonderfully robust context in which to examine information flows and what distinguished the information flows in the more successful projects from the less successful.
The terminology is understandable, given that context, but a bit misleading just the same, and rather too narrow, for the gatekeepers did much more. They were also the channels for information sharing and exchange within the organization and within the project. Allen himself, in fact, in developing and explicating the role of gatekeepers introduces and explains his gatekeepers with the term “sociometric stars.” “Information stars” a term emerging later [Tushman and Scanlan, 1981a,b],
Furthermore, the “information stars” were central to information flow both within the organization at large, and within their project or projects. The characteristics that distinguished these stars were:
·         extensive communication with their field outside of the organization
·         greater perusal of information sources, journals, etc., information mavens
·         a high degree of connectedness with other information stars, one can infer that their utility was not just having more information at their fingertips, but knowing to whom to turn within the organization for further information
·         an above average degree of formal education compared to their project teammates

These characteristics of information stars were further corroborated by Mondschein, L. [1990] in a study of R&D activities across several industries.

Another finding was that the information flow structure was not at all closely related to the formal organizational structure, and that the information stars did not map onto any consistent pattern of organizational placement or level. The relationship between formal organizational structure and the information flow structure also seems to be in part a function of the larger corporate culture.
For example, Frost andWhitley [1971] adopted Allen’s techniques to examine information flow in R&D labs in the U.K., and they found a somewhat higher overlap between formal organizational structure and the information flow structure than Allen had found in the U.S. There is a suggestion here that the more rigid the organizational hierarchy, the more the information flow structure is constrained to adapt itself to the formal organizational structure.
Tushman, M. [1977], Tushman and Scanlan [1981a,b] further extended the Allen tradition. Tushman examined development activities, both at the departmental level and at the project level, at a medical instruments company, and very much confirmed Allen’s conclusions. He introduced and added the concept of “boundary spanning” or boundary spanner to describe verymuch the same phenomenon that Allen described as gatekeeping He extended Allen’s work by distinguishing between two types of communication stars, “internal communication stars” and “external communication stars,” and defining boundary spanners as those who were both internal and external communication stars.The emphasis is clearly directed to projects and project management, and the “take home” theme is that boundary spanners should be recognized, utilized, and nurtured for facilitating project success.

4.2 RESEARCH PRODUCTIVITY AND KNOWLEDGE
The study is compelling because of the high face validity of the measure of success, the successful introduction of new pharmaceutical agents, since that is what pharmaceutical companies are about after all, and because of the statistical robustness of the results, a consequence of the fact that the more successful companies were found to be not just twenty or thirty percent more productive than the not so successful companies, they were two or three hundred percent more productive. The more productive companies were characterized by:
·         A relatively egalitarian managerial structure with unobtrusive status indicators in the R&D environment,
·         Less concern with protecting proprietary information,
·         Greater openness to outside information, greater use of their libraries and information centers, specifically, greater attendance by employees at professional meetings,
·         Greater information systems development effort,
·         Greater end-user use of information systems and more encouragement of browsing and serendipity. Increased time spent browsing and keeping abreast

4.3  LACK OF RECOGNITION OF THESE FINDINGS IN THE BUSINESS COMMUNITY
a subset of an even larger problem - the lack of recognition of or even obtuseness to the importance of information and information related managerial actions in the business community. For example, one major study that reviewed a large corpus of work on R&D innovation, [Goldhar et al., 1976], concluded that there are six characteristics of environments that are conducive to technological innovations. The three most important characteristics are all related to the information environment and information flow – specifically: 1) easy access to information by individuals; 2) free flow of information both into and out of the organizations; 3) rewards for sharing, seeking, and using “new” externally developed information sources. Note the ‘flow in and out’ and the ‘sharing, seeking, and using’. Number six is also information environment related, 6) the encouragement of mobility and interpersonal contacts. Yet in a remarkable oversight, the studies’ authors never remarked on the dramatic win, place, and show finish of information and knowledge factors.
Another similarly rigorous study [Orpen, C., 1985] examined productivity in R&D intensive electronics/instrumentation organizations. analyzed various aspects of the behavior of research project managers as perceived by their staff and team members, and it found that in the more productive organizations (as defined by rates of growth and return on assets), the managers were perceived to be significantly more characterized by three aspects of their behavior, all information related: 1) they routed literature and references to scientific and technical staff, 2) they directed their staff to use scientific and technical information (STI) and to purchase STI services, and 3) they encouraged publication of results and supported professional meeting attendance and continuing education. Particularly striking was the finding that not only did information related management behavior trend.

next post... 

source : 
Knowledge Management (KM)
Processes in Organizations
Theoretical Foundations and Practice

Part 4: Result my opinion


        Iran is a country led by a great president Mahmoud Ahmadinejad.Iran is islamic state in the middle east region. When the other middle eastern countries are Trying to shut the eye of a series of events Carried out by Israel and other Zionist, iran is a country That dared to oppose them. Why Iran can do this? 
Lets check this out from multiple sources ^ _ ^.

          Iran’s nuclear program is one of the most polarizing issues in one of the world’s most volatile regions. While American and European officials believe Tehran is planning to build nuclear weapons, Iran’s leadership says that its goal in developing a nuclear program is to generate electricity without dipping into the oil supply it prefers to sell abroad, and to provide fuel for medical reactors.

Most of the "world" know that nuclear development is prohibited unless conducted by the U.S. and Israel. Maybe some already know that They are the holder of the world today.

A lot of work done by the Zionist state to develop nuclear deter conducted by Iran, one of them by the oil embargo to the United States. With the hope of thwarting all threats of nuclear proliferation by Iran.

          As a result of the embargo, starting with the rise in world oil prices. And Indonesia have an indirect effect of the war. As I know that the State of Iran and east amid a global oil producer. With the oil embargo caused suppky bernbagai State to increase, one of Indonesia. Actual nuclear development is the development of science, for real. In the presence of nuclear development, will advance human knowledge. Starting from the source of energy to food technology.
However, any bias to be a nuclear threat when it used the wrong way. While the oil embargo by the United American is a great way to challenge indirectly the development of science. cause had been united merupaka iran science center and began to try to change it, then there is a variety of wars, threats by the United States.





Part 3:  tensions increased over Iran’s nuclear program

A Scientist’s Death Deepens Fury at Israel and the U.S.

The head of Iran’s Atomic Energy Organization, a top nuclear scientist who narrowly avoided an assassination attempt less than two years ago, has been given a new post as the commander for nuclear and radioactive emergencies, the Iranian military announced Tuesday
Dr. Abbasi is well known among United Nations nuclear experts, who consider him a major figure in Iran’s nuclear program, which the Iranians have insisted is peaceful but which Western nations suspect is a cover for possible weapons development. He is on a Security Council blacklist under sanctions that have penalized Iran for refusing to halt all uranium enrichment.
He is perhaps best known for having escaped death on Nov. 29, 2010, by a motorcycle assassin in Tehran who slapped a magnetized bomb on his vehicle. Dr. Abbasi was wounded; another top Iranian nuclear scientist was assassinated in an identical Tehran bomb attack the same day. Iranian leaders said the double bombing was an act of terrorism carried out by agents of Israel, which considers Iran its most dangerous enemy and has made no secret of its desire to subvert Iran’s nuclear ambitions.
The Iranian military’s announcement that Dr. Abbasi had been given a new title, commander of the Crisis Management Center for Nuclear and Radiation Accidents, was reported by Iran’s semi-official Fars News Agency. It was not clear from the announcement why Dr. Abbasi had been chosen for the new responsibility or whether it means he will relinquish his existing position.
On Jan. 11, as tensions increased over Iran’s nuclear program and belligerence toward the West mounted, Iran reported that an Iranian nuclear scientist died in what was termed a “terrorist bomb blast” in northern Tehran when an unidentified motorcyclist attached a magnetic explosive device to the scientist’s car. It was the fourth such attack reported in two years and, as after the previous incidents, Iranian officials indicated that they believed the United States and Israel were responsible.

The next day, Iran expressed deepening fury at Israel and the United States over the scientist’s death, and signaled that its Islamic Revolutionary Guards Corps might carry out revenge assassinations.

News of the killing dominated Iran’s state-run news media, which were filled with vitriolic denunciations both of Israel, seen in Iran as the main suspect in his death, and the United States, where top officials have gone out of their way to issue strongly worded denials of responsibility.

Israeli officials, who regard Iran as their country’s main enemy, have not categorically denied any role in the killing, which came against a backdrop of growing pressure on Iran over its disputed nuclear program.


Part 3 : Speculation Rises About an Israeli Attack

Iran has defended its nuclear program as peaceful and has defiantly pursued uranium enrichment through years of international pressure and sanctions. Israel’s increasingly urgent warnings on the need to halt Iran’s nuclear progress, before it gets much closer to being able to build a bomb, have prompted concerns that Israel might unilaterally mount a military strike — and have added to the implacable enmity between the two.
Speculation that Israel might attack Iran has intensified in recent months as tensions between the countries have escalated.

Tensions flared in February when Israeli officials blamed Iran in two separate attacks. On Feb. 13, Israeli Embassy personnel were targeted by bombers in the capitals of Georgia and India, injuring four people, including an Israeli diplomat’s wife. The embassy blasts used methods that were similar to attacks on Iranian nuclear scientists in recent years, for which Iran has blamed Israel. The next day, a series of explosions rocked a residential neighborhood in Bangkok, wounding several people. Thai authorities found a cache of bombs in a rented house and captured two men who carried Iranian passports. Evidence was accumulating that the bombings were part of a single plot, for which Israel has blamed Iran. Iranian officials have denied any involvement.


Should Israel decide to launch a strike on Iran, its pilots would have to fly more than 1,000 miles across unfriendly airspace, refuel in the air en route, fight off Iran’s air defenses, attack multiple underground sites simultaneously — and use at least 100 planes.

That was the assessment of American defense officials and military analysts close to the Pentagon, who said that an Israeli attack meant to set back Iran’s nuclear program would be a huge and highly complex operation. They described it as far different from Israel’s “surgical” strikes on a nuclear reactor in Syria in 2007 and Iraq’s Osirak reactor in 1981.

In a sign of rising American concern, Tom Donilon, the national security adviser, met with Prime Minister Benjamin Netanyahu of Israel in Jerusalem on Feb. 19, and Gen. Martin E. Dempsey warned on CNN that an Israeli strike on Iran right now would be “destabilizing.” Similarly, the British foreign secretary, William Hague, told the BBC that attacking Iran would not be “the wise thing” for Israel to do “at this moment.”
In November 2011, Israeli officials would not confirm or deny multiple reports in the Israeli news media that Israeli Defense Minister Ehud Barak and Prime Minister Benjamin Netanyahuwere pressing for a decision on whether to strike a uranium enrichment facility at Natanz, the centerpiece of Iran’s known nuclear-fuel production, and related sites across the country.

But in January 2012, seeking to lower the tone of nervous discourse as the United States and European Union imposed sanctions on Iran, Mr. Barak said that any decision to attack Iran because of its nuclear program was “very far off.”

Part 2: Oil Embargo in iran


In an effort to thwart Iran’s nuclear program, the United States and the European Union took significant steps to cut Iran off from the international financial system, announcing coordinated sanctions aimed at its central bank and commercial banks. In addition, the United States also imposed sanctions on companies involved in Iran’s nuclear industry, as well as on its petrochemical and oil industries, adding to existing measures that seek to weaken the Iranian government by depriving it of its ability to refine gasoline or invest in its petroleum industry.

In retaliation for the sanctions, Iran vowed to block the Strait of Hormuz, a vital oil transit point. Gen. Martin E. Dempsey, the chairman of the Joint Chiefs of Staff, said that the United States would “take action and reopen the strait,” which could be accomplished only by military means, including minesweepers, warship escorts and potentially airstrikes.

By February 2012, the sanctions imposed by the West appeared to be taking a toll. Iran’s economy was showing further signs of strain, with the government looking for ways to avoid the use of dollars in international oil trade, new reports of problems importing food, and a Gallup poll suggesting a majority of Iranians were worried about financial pain from the penalties already imposed. In addition, a flurry of aggressive gestures — attacks on Israelis attributed to Iran; President Mahmoud Ahmadinejad’s renewed posturing over Iran’s latest nuclear advance; and the threats of cutting off oil sales from six European countries — suggested that Iranian leaders were responding frantically,
 and with increasing unpredictability, to the sanctions.

On Feb. 19, Iran’s government ordered a halt of oil exports to Britain and France, in what may be only an initial response to the European Union’s decision to cut off Iranian oil imports and freeze central bank assets beginning in July. However, Britain and Francedepend little on Iranian oil, so their targeting may be a mostly symbolic act, a function of the strong positions the two nations have taken in trying to halt Iranian nuclear enrichment. Also, the government signaled that it might expand the ban on oil shipments to other members of the 27-nation European Union.

As a result of the embargo, starting with the rise in world oil prices. And Indonesia have an indirect effect of the war. As I know that the State of Iran and east amid a global oil producer. With the oil embargo caused suppky bernbagai State to increase, one of Indonesia. Actual nuclear development is the development of science, for real. In the presence of nuclear development, will advance human knowledge. Starting from the source of energy to food technology.