SlideShare une entreprise Scribd logo
1  sur  3
Integrated Intelligent Research(IIR) International Journal of Business Intelligent
Volume: 01 Issue: 01 June 2012,Pages No.1-3
ISSN: 2278-2400
1
An Analytical Study on Knowledge Sharing within
the Organization
R. Rameshkumar, C.Jothi Venkateswaran,
Research Scholar, Bharath university, Salaiyur, Chennai
Head, PG and Research Department of Computer Science,Presidency College (Autonomous), Chennai
ramesh116@hotmail.com
Abstract-The better management of knowledge within the
organization will lead to improved innovation and competitive
advantage. The main goal of the firm… better utilization of
internal and external knowledge. This core knowledge is found
in individuals, communities of interest and their connections. An
organization’s data is found in its computer systems but a
company’s intelligence is found, in its biological and social
systems. Though it is acclaimed as a good method, there are
some setbacks in the process of knowledge sharing[KS] among
the employees. This paper explores the possible ways to
establish organization using social computing tools to facilitate
Knowledge Sharing and create a social data mining among all
the members of organization. Social Data Mining Network
Analysis (SDMNA) techniques have been used to study KS
patterns which take place between employees and departments.
This SDMNA graph reveals the structure of social data mining
network highlighting connectivity, clustering and strength of
relationships between employees.
Keywords: Knowledge Management Knowledge sharing,
Social data mining Network Analysis.
I. INTRODUCTION
Knowledge Management (KM) is an important aspect in this
current business world which has been undergoing dynamic
changes from time to time. Many consultants push a technology
–driven approach. “ Buy our state -of-art knowledge storage
system and you will never again lose knowledge that is vital to
the company!”,they exclaim. Other consultants emphasize the
soft-side of knowledge Management. “Create a learning culture,
that rewards sharing, and knowledge management will take care
of itself!”, they postulate. The effective utilization of knowledge
and learning requires both culture and technology. An
organization’s real edge in the market place is often found in
complex, context –sensitive, knowledge, which is difficult, if not
often impossible to codify and store in ones, and zeros. Many
firm look for KM to find solution for such problems. KM
literature exposes the fact that there is strong relationship
between knowledge sharing and socialization.The SECI model
[6] states that KS is an integral aspect in KM and also the
process of converting new knowledge through sharing
experiences in day-to-day interactions. So, the development of
KS within the organization is concerned with providing a rich
and meaningful platform for Knowledge Sharing among all the
members in the learning environment. This paper proposes to
deploy social computing tools as part of organization to
encourage KS among fifteen employees. The remainder of the
paper is organized in the following section. In section 2, KM
definition, KM activities, role of social software in KS are briefly
explained. In section 3, we describe organizational Environment
and KS arrangement. Section 4 provides KS analysis and
discussion on the result obtained. In section 5, a snapshot of
graphical representation of KS pattern among the employees is
given. As a conclusion, the indication that the line of research
can be continued with other SDMNA metrics to get more
insights on KS pattern among the organizational employees.
II. KM – DEFINITION
Knowledge Management is a relatively new and a
multidisciplinary aspect. KM defined as the systematic activities
or process of identifying, capturing and sharing the knowledge
which people can use to improve social development outcomes.
2.1 KM Activities
KM core activities include the creation and integration of
knowledge, the accumulation and utilization of knowledge, and
the learning and sharing of knowledge and together, these
comprise knowledge management [8]. Among these, knowledge
sharing, or flow, or knowledge transfer is key to the success of
knowledge management[2][7].Knowledge sources are going to
be the primary force to determine new products, services and
approaches and growth of an organization. According to Nonaka
and Takeuchi [6] “everyone has become knowledge worker” and
they highlighted that everyone has the potential of fostering
knowledge sharing. We also agree with Kang, Morris, and Snell
[3] that it is important for learners to share their knowledge with
peer group. Several research studies have been conducted and
reported regarding the significance of knowledge sharing among
active and inactive employees.
2.2 Role Of Social Data Mining Software In KS
Until recently, most of the KS efforts were focused on the
creation of actionable knowledge repositories, encouraging
knowledge reuse and collaboration based on these repositories,
in a typical top-down approach where knowledge was seen as a
separate entity. The emerging Social Software offers a chance to
complement this approach with tools that are simpler and more
flexible. This type of software is actually not new at all –
Integrated Intelligent Research(IIR) International Journal of Business Intelligent
Volume: 01 Issue: 01 June 2012,Pages No.1-3
ISSN: 2278-2400
2
software applications having similar traits have been in use for
quite some time – but it is only recently that these have been
labelled as “Social Software”. Social Software is the term used to
designate, “the use of computing tools to support, extend, or
derive added value from social activity - Including weblogs,
instant messaging, music and photo sharing, mailing lists and
message boards, and online social networking tools” [4]. Social
software definitions also have a common focus on the
importance of creating networks and relations between people
and the support of group interaction and it can be defined as
software that enables communication through digital
technologies helping people connect, converse, collaborate,
manage content, and form online networks in a social and
bottom-up fashion.
III. ORGANIZATIONAL KNOWLEDGE SHARING
People are ready and willing to share information at any time We
effectively manage processes and share information across all
business functions. Our company's incentives encourage the
sharing of knowledge and expertise in the organization Our
research helps fill the void in the literature, providing a cross-
cultural, organizational-level model focusing on knowledge
sharing. The knowledge-based view of the firm focuses on
knowledge as the most important strategic asset of the firm’s
resources. Organizational knowledge sharing is a key component
of this view because researchers have found that knowledge
sharing is the key to organizational productivity (Almeida &
Kogut, 1999; Hansen, 2002; Kostova, 1999). Hence, with an
effective sharing process an organization can develop its
knowledge base and enhance its competitiveness (Andrews &
Deiahaye, 2000; McEvily & Chakravarthy, 2002). Unlike studies
focusing on individual characteristics, the knowledge-based view
of the firm is fundamentally concerned with the nature of
knowledge coordination within the firm (Grant, 1996). Because
valuing human knowledge and skills is a key principle in agility,
organizations with this strategy place a high priority on
managing and leveraging knowledge. Agility is closely aligned
with an organization's ability to integrate and use knowledge
(Hovorka & Larsen, 2006). Acquiring strategic agility requires
that an organization consistently identify, share, assimilate, and
exploit new knowledge more effectively than the competition
(Roth, 1996). Studies have shown that key capabilities for
workforce agility are the collaboration of employees across
functional boundaries and the ability of employees to effectively
transfer knowledge (Breu, Hemingway, Strathern & Bridger,
2002; Hovorka & Larsen, 2006). Knowledge networks, that
entail relationships among entities (individuals, teams,
organizations) working on a common mission, are becoming
increasingly popular because they embed the dynamism needed
for collective and systematic knowledge asset creation and
sharing.
3.1 Knowledge Sharing Arrangements
Employees could share, collaborate and other resources help
each other through the discussion forums available on the
learning platform, so that peer-to-peer knowledge sharing is
encouraged. Employees are encouraged to use this resource not
only to solve technical problems but also to exchange
suggestions and information or help each other while completing
the didactic activities assigned.
IV. KNOLWEDGE SHARING ANALYSIS AND
DISCUSSION
4.1 Matrix Representation
The use of discussion forum in the organization enables
employees to carry out significant amount of KS activities. It
also enables individuals form social relationships (contact) with
other individuals without geographical constraint. Discussion
between employees is usually logged and it provides an insight
into the knowledge exchanged between individuals. The use of
such data for identifying „the knowledge and the knowledgeable.
person is the main problem of interest in this research. The
frequency of knowledge shared by a learner is represented in
adjacency matrix and it is shown in Table 1. The row represents
number of times knowledge goes from employees and column
represents number of times knowledge received by employees.
The matrix is given below:
Table 1- Adjacency Matrix
4.2 KS Density
UCINET [1], a network analysis software, can be used to map
and measure of relationship and sharing among employees. It is a
method for visualizing our employees and connection power,
leading us to identify different patterns of knowledge sharing.
The results from UCINET show that the density value of KS
among 15 employees is 4.18 and standard deviation of 3.77. The
density value represents the average number of knowledge
shared by any pair of employees. With help of dichotomized
matrix representation one can easily know the percentage of
class involved in the task of sharing knowledge. The density
value is found to be 0.7633. This is a good density index for a
class size of 15 employees. This implies that arrangement made
in the web based learning environment facilitates higher level of
knowledge sharing among the employees.
4.3 Knowledge Flow
Integrated Intelligent Research(IIR) International Journal of Business Intelligent
Volume: 01 Issue: 01 June 2012,Pages No.1-3
ISSN: 2278-2400
3
In table 2, Employees In-degree and Out-degree are shown.
Employees out-degree (knowledge transferred) varies between 0
and 106 (M= 58.53, SD = 29.808) and in-degree ( knowledge
received) between 1 and 91 (M=58.3,SD = 26.58). Network
centralization (Out-degree) = 19.11% and In-degree=
13.07%.The most active employees and knowledge providers in
the space are L1 and L5, L4 and L10 receive the highest number
of knowledge. There are seven employees who have a very low
out degree, meaning that their contribution in knowledge sharing
was is not encouraging.
Table 2 : Knowledge Flow (In-degree, Out-degree)
4.4 Knowledge Brokers and Power
Between’s centrality helps to identify knowledge brokers and
gatekeepers within a network. It is a measure of the extent that a
network employees position falls on the geodesic paths among
other employees of a network. Thus, it determines whether a
employee plays a (relatively) important role as a broker or
gatekeeper of knowledge flows with a high potential for control
on the indirect relations of the other employees. Table 3 shows
that the Betweenness values vary from 0 to 10.33 (M=1.6,
SD=2.0). The calculation has been made after symmetrising the
adjacency matrix, through the minimum of the values (in this
way, strong ties are kept). The four highest values are those of
L1, L5, and L0. They are the gatekeepers and they can regulate
the flow of knowledge in the network. The lowest Between
values are for L2, L3,L4, L6, L8, L9,L7, L11, L12, L13, and
L14. They can be considered outsiders in knowledge sharing.
4.5 Structural Analysis
In order to study the structural analysis of the group, clique
analysis has been done. Clique is the maximum number of actors
who have all possible times present themselves. Cliques are
located by dichotomizing and symmetrizing the adjacency matrix
at level three. The SNA analysis by UCINET has found six
cliques.
1: L1 L3 L4 L5 L6
2: L0 L1 L3 L5
3: L1 L3 L5 L7
4: L1 L3 L4 L6 L10
5: L1 L5 L6 L13
6: L1 L6 L10 L13
The size of the cliques ranges from a clique with four members
to a clique with five members. There are a lot of inter-clique
connections. L1, in six ; L3,L5 and L6 in 4; L10,L13 in two; L0
and,L7 were in only one of these sub-groups
V. KS NETWORK WITHIN THE ORGANIZATION
In the WBE, there are 15 employees. Figure 1 is a KS Network
that shows the structure of the state of the network that evolved
from the WBLE. The nodes represent the learner (the names of
learners have been renamed L0 – L14 for reasons privacy and
anonymity reasons). When there is a line directly connecting two
nodes then these nodes are adjacent. When a node is one of a pair
of nodes defining the line then the node is incident to the line.
The number of lines that are incident with it is called nodal
degree [9]. In-degree is the number of lines that are incident to a
node while out-degree is the number of lines that are incident
from it. Nodes whose degree equals 0 are called isolates. The KS
network integrates all learners except for one isolate(L14)
VI. CONCLUSION
In this paper, an analysis of KS in WBE, using social network
analysis is presented. In addition, several common social
network analysis metrics, such as in-degree, out-degree,
betweenness, clique, and community are presented. Each metric
serves different purposes. For example, in-degree and outdegree
are used to measure one.s connection with others; betweenness is
used to measure a user.s importance in terms of bridging users
together; and clique metrics is used to identify like-minded
groups. In future, it is planned to extend the current study to
examine other centrality measures such as closeness and hub,
and their implications for the KS. Applying social network
analysis for understanding on-line educational systems is an
ongoing research area, and it is assumed that this study
contributes to its continued growth.
REFERENCES
[1] Borgatti, S. Everett, M. & Freeman, L.C. (1992), UCINET IV, Version
1.0,Columbia: Analytic Technologies
[2] Gupta, A. and Govindarajan, V. (2000) „Knowledge management's social
dimension: Lessons from Nucor Steel., Sloan Management Review, Fall,
pp. 71-8
[3] Kang, S., Morris, S. & Snell, S.A. (2003). Extending the human resource
architecture: Implications from social capital theory. Working paper
[4] Lawley, E. (2004). Blog research issues. Retrieved, from
http://www.corante.com/many/archives/2004/06/24/blog_research_issues.p
hp
[5] Nonaka, I. (1998). The Knowledge-Creating Company. Harvard Business
Review on Knowledge Management, Boston: Harvard Business School
Press
[6] Nonaka, I., & Takeuchi, H. (1995). The Knowledge- Creating Company.
New York: Oxford university Press
[7] Szulanski, G. (1996) „Exploring internal stickiness: Impediments to the
transfer of best practice within the firm., Strategic Management Journal,
vol. 17, pp. 27-43.
[8] Shieh-Cheih, F., Fu-Sheng, T. and Kuo-Chien, C. (2005) „Knowledge
sharing routines, task efficiency, and team service quality in instant service-
giving settings., The Journal of American Academy of Business, vol. 6, no.
1.
[9] Wasserman, S., & Faust, K. (1994). Social Network analysis and
applications. Cambridge: Cambridge University Press

Contenu connexe

Similaire à An Analytical Study on Knowledge Sharing within the Organization

Knowledge Sharing in Workplace: Motivators and Demotivators
Knowledge Sharing in Workplace: Motivators and DemotivatorsKnowledge Sharing in Workplace: Motivators and Demotivators
Knowledge Sharing in Workplace: Motivators and DemotivatorsIJMIT JOURNAL
 
Knowledge management in universities in uganda a social perspective
Knowledge management in universities in uganda a social perspectiveKnowledge management in universities in uganda a social perspective
Knowledge management in universities in uganda a social perspectiveAlexander Decker
 
1. integrated approach to knowledge management initiatives programme
1. integrated approach to knowledge management initiatives programme1. integrated approach to knowledge management initiatives programme
1. integrated approach to knowledge management initiatives programmeChe Maslina
 
Employees’ Perceptions towards the Knowledge Management Practices: An Empiric...
Employees’ Perceptions towards the Knowledge Management Practices: An Empiric...Employees’ Perceptions towards the Knowledge Management Practices: An Empiric...
Employees’ Perceptions towards the Knowledge Management Practices: An Empiric...AkashSharma618775
 
Knowledge Management
Knowledge ManagementKnowledge Management
Knowledge ManagementApex
 
Insight_in_the_gap
Insight_in_the_gapInsight_in_the_gap
Insight_in_the_gapIan Gordon
 
Conceptual Framework of Organisational Factors on Explicit and Tacit Knowledg...
Conceptual Framework of Organisational Factors on Explicit and Tacit Knowledg...Conceptual Framework of Organisational Factors on Explicit and Tacit Knowledg...
Conceptual Framework of Organisational Factors on Explicit and Tacit Knowledg...IOSRJBM
 
Are organizations likely to find better solutions to information o.docx
Are organizations likely to find better solutions to information o.docxAre organizations likely to find better solutions to information o.docx
Are organizations likely to find better solutions to information o.docxrossskuddershamus
 
An Exploratory Study on the Practices of Knowledge Management in Software Dev...
An Exploratory Study on the Practices of Knowledge Management in Software Dev...An Exploratory Study on the Practices of Knowledge Management in Software Dev...
An Exploratory Study on the Practices of Knowledge Management in Software Dev...ijcnes
 
Running head GLOBALIZATION AND KNOWLEDGE MANAGEMENT  .docx
Running head GLOBALIZATION AND KNOWLEDGE MANAGEMENT           .docxRunning head GLOBALIZATION AND KNOWLEDGE MANAGEMENT           .docx
Running head GLOBALIZATION AND KNOWLEDGE MANAGEMENT  .docxcowinhelen
 
Week Seven Managing KnowledgeInformation Resourc.docx
Week Seven  Managing KnowledgeInformation Resourc.docxWeek Seven  Managing KnowledgeInformation Resourc.docx
Week Seven Managing KnowledgeInformation Resourc.docxalanfhall8953
 
Knowledge mapping process in large organization
Knowledge mapping process in large organizationKnowledge mapping process in large organization
Knowledge mapping process in large organizationAlwi Yunus
 
Knowledge Management
Knowledge ManagementKnowledge Management
Knowledge ManagementSagar PATEL
 
Knowledge organiztion
Knowledge organiztionKnowledge organiztion
Knowledge organiztionSahil Jain
 
Knowledge organiztion
Knowledge organiztionKnowledge organiztion
Knowledge organiztionSahil Jain
 
Critical Review of Success Factors of Knowledge Management System (KMS) on Co...
Critical Review of Success Factors of Knowledge Management System (KMS) on Co...Critical Review of Success Factors of Knowledge Management System (KMS) on Co...
Critical Review of Success Factors of Knowledge Management System (KMS) on Co...ijsrd.com
 
A Model Examining the Knowledge Management Process in the Construction Organi...
A Model Examining the Knowledge Management Process in the Construction Organi...A Model Examining the Knowledge Management Process in the Construction Organi...
A Model Examining the Knowledge Management Process in the Construction Organi...inventionjournals
 

Similaire à An Analytical Study on Knowledge Sharing within the Organization (20)

Knowledge Sharing in Workplace: Motivators and Demotivators
Knowledge Sharing in Workplace: Motivators and DemotivatorsKnowledge Sharing in Workplace: Motivators and Demotivators
Knowledge Sharing in Workplace: Motivators and Demotivators
 
Knowledge management (2)
Knowledge management (2)Knowledge management (2)
Knowledge management (2)
 
Knowledge management in universities in uganda a social perspective
Knowledge management in universities in uganda a social perspectiveKnowledge management in universities in uganda a social perspective
Knowledge management in universities in uganda a social perspective
 
1. integrated approach to knowledge management initiatives programme
1. integrated approach to knowledge management initiatives programme1. integrated approach to knowledge management initiatives programme
1. integrated approach to knowledge management initiatives programme
 
Employees’ Perceptions towards the Knowledge Management Practices: An Empiric...
Employees’ Perceptions towards the Knowledge Management Practices: An Empiric...Employees’ Perceptions towards the Knowledge Management Practices: An Empiric...
Employees’ Perceptions towards the Knowledge Management Practices: An Empiric...
 
Knowledge Management
Knowledge ManagementKnowledge Management
Knowledge Management
 
Insight_in_the_gap
Insight_in_the_gapInsight_in_the_gap
Insight_in_the_gap
 
Conceptual Framework of Organisational Factors on Explicit and Tacit Knowledg...
Conceptual Framework of Organisational Factors on Explicit and Tacit Knowledg...Conceptual Framework of Organisational Factors on Explicit and Tacit Knowledg...
Conceptual Framework of Organisational Factors on Explicit and Tacit Knowledg...
 
Are organizations likely to find better solutions to information o.docx
Are organizations likely to find better solutions to information o.docxAre organizations likely to find better solutions to information o.docx
Are organizations likely to find better solutions to information o.docx
 
An Exploratory Study on the Practices of Knowledge Management in Software Dev...
An Exploratory Study on the Practices of Knowledge Management in Software Dev...An Exploratory Study on the Practices of Knowledge Management in Software Dev...
An Exploratory Study on the Practices of Knowledge Management in Software Dev...
 
knowledge management.pdf
knowledge management.pdfknowledge management.pdf
knowledge management.pdf
 
Running head GLOBALIZATION AND KNOWLEDGE MANAGEMENT  .docx
Running head GLOBALIZATION AND KNOWLEDGE MANAGEMENT           .docxRunning head GLOBALIZATION AND KNOWLEDGE MANAGEMENT           .docx
Running head GLOBALIZATION AND KNOWLEDGE MANAGEMENT  .docx
 
Week Seven Managing KnowledgeInformation Resourc.docx
Week Seven  Managing KnowledgeInformation Resourc.docxWeek Seven  Managing KnowledgeInformation Resourc.docx
Week Seven Managing KnowledgeInformation Resourc.docx
 
Knowledge mapping process in large organization
Knowledge mapping process in large organizationKnowledge mapping process in large organization
Knowledge mapping process in large organization
 
Knowledge Management
Knowledge ManagementKnowledge Management
Knowledge Management
 
Knowledge organiztion
Knowledge organiztionKnowledge organiztion
Knowledge organiztion
 
Knowledge organiztion
Knowledge organiztionKnowledge organiztion
Knowledge organiztion
 
Critical Review of Success Factors of Knowledge Management System (KMS) on Co...
Critical Review of Success Factors of Knowledge Management System (KMS) on Co...Critical Review of Success Factors of Knowledge Management System (KMS) on Co...
Critical Review of Success Factors of Knowledge Management System (KMS) on Co...
 
Knowledge Management solutions, mechanisms and infrastructure
Knowledge Management solutions, mechanisms and infrastructureKnowledge Management solutions, mechanisms and infrastructure
Knowledge Management solutions, mechanisms and infrastructure
 
A Model Examining the Knowledge Management Process in the Construction Organi...
A Model Examining the Knowledge Management Process in the Construction Organi...A Model Examining the Knowledge Management Process in the Construction Organi...
A Model Examining the Knowledge Management Process in the Construction Organi...
 

Plus de ijcnes

A Survey of Ontology-based Information Extraction for Social Media Content An...
A Survey of Ontology-based Information Extraction for Social Media Content An...A Survey of Ontology-based Information Extraction for Social Media Content An...
A Survey of Ontology-based Information Extraction for Social Media Content An...ijcnes
 
Economic Growth of Information Technology (It) Industry on the Indian Economy
Economic Growth of Information Technology (It) Industry on the Indian EconomyEconomic Growth of Information Technology (It) Industry on the Indian Economy
Economic Growth of Information Technology (It) Industry on the Indian Economyijcnes
 
An analysis of Mobile Learning Implementation in Shinas College of Technology...
An analysis of Mobile Learning Implementation in Shinas College of Technology...An analysis of Mobile Learning Implementation in Shinas College of Technology...
An analysis of Mobile Learning Implementation in Shinas College of Technology...ijcnes
 
A Survey on the Security Issues of Software Defined Networking Tool in Cloud ...
A Survey on the Security Issues of Software Defined Networking Tool in Cloud ...A Survey on the Security Issues of Software Defined Networking Tool in Cloud ...
A Survey on the Security Issues of Software Defined Networking Tool in Cloud ...ijcnes
 
Challenges of E-government in Oman
Challenges of E-government in OmanChallenges of E-government in Oman
Challenges of E-government in Omanijcnes
 
Power Management in Micro grid Using Hybrid Energy Storage System
Power Management in Micro grid Using Hybrid Energy Storage SystemPower Management in Micro grid Using Hybrid Energy Storage System
Power Management in Micro grid Using Hybrid Energy Storage Systemijcnes
 
Holistic Forecasting of Onset of Diabetes through Data Mining Techniques
Holistic Forecasting of Onset of Diabetes through Data Mining TechniquesHolistic Forecasting of Onset of Diabetes through Data Mining Techniques
Holistic Forecasting of Onset of Diabetes through Data Mining Techniquesijcnes
 
A Survey on Disease Prediction from Retinal Colour Fundus Images using Image ...
A Survey on Disease Prediction from Retinal Colour Fundus Images using Image ...A Survey on Disease Prediction from Retinal Colour Fundus Images using Image ...
A Survey on Disease Prediction from Retinal Colour Fundus Images using Image ...ijcnes
 
Feature Extraction in Content based Image Retrieval
Feature Extraction in Content based Image RetrievalFeature Extraction in Content based Image Retrieval
Feature Extraction in Content based Image Retrievalijcnes
 
Challenges and Mechanisms for Securing Data in Mobile Cloud Computing
Challenges and Mechanisms for Securing Data in Mobile Cloud ComputingChallenges and Mechanisms for Securing Data in Mobile Cloud Computing
Challenges and Mechanisms for Securing Data in Mobile Cloud Computingijcnes
 
Detection of Node Activity and Selfish & Malicious Behavioral Patterns using ...
Detection of Node Activity and Selfish & Malicious Behavioral Patterns using ...Detection of Node Activity and Selfish & Malicious Behavioral Patterns using ...
Detection of Node Activity and Selfish & Malicious Behavioral Patterns using ...ijcnes
 
Optimal Channel and Relay Assignment in Ofdmbased Multi-Relay Multi-Pair Two-...
Optimal Channel and Relay Assignment in Ofdmbased Multi-Relay Multi-Pair Two-...Optimal Channel and Relay Assignment in Ofdmbased Multi-Relay Multi-Pair Two-...
Optimal Channel and Relay Assignment in Ofdmbased Multi-Relay Multi-Pair Two-...ijcnes
 
An Effective and Scalable AODV for Wireless Ad hoc Sensor Networks
An Effective and Scalable AODV for Wireless Ad hoc Sensor NetworksAn Effective and Scalable AODV for Wireless Ad hoc Sensor Networks
An Effective and Scalable AODV for Wireless Ad hoc Sensor Networksijcnes
 
Secured Seamless Wi-Fi Enhancement in Dynamic Vehicles
Secured Seamless Wi-Fi Enhancement in Dynamic VehiclesSecured Seamless Wi-Fi Enhancement in Dynamic Vehicles
Secured Seamless Wi-Fi Enhancement in Dynamic Vehiclesijcnes
 
Virtual Position based Olsr Protocol for Wireless Sensor Networks
Virtual Position based Olsr Protocol for Wireless Sensor NetworksVirtual Position based Olsr Protocol for Wireless Sensor Networks
Virtual Position based Olsr Protocol for Wireless Sensor Networksijcnes
 
Mitigation and control of Defeating Jammers using P-1 Factorization
Mitigation and control of Defeating Jammers using P-1 FactorizationMitigation and control of Defeating Jammers using P-1 Factorization
Mitigation and control of Defeating Jammers using P-1 Factorizationijcnes
 
An analysis and impact factors on Agriculture field using Data Mining Techniques
An analysis and impact factors on Agriculture field using Data Mining TechniquesAn analysis and impact factors on Agriculture field using Data Mining Techniques
An analysis and impact factors on Agriculture field using Data Mining Techniquesijcnes
 
A Study on Code Smell Detection with Refactoring Tools in Object Oriented Lan...
A Study on Code Smell Detection with Refactoring Tools in Object Oriented Lan...A Study on Code Smell Detection with Refactoring Tools in Object Oriented Lan...
A Study on Code Smell Detection with Refactoring Tools in Object Oriented Lan...ijcnes
 
Priority Based Multi Sen Car Technique in WSN
Priority Based Multi Sen Car Technique in WSNPriority Based Multi Sen Car Technique in WSN
Priority Based Multi Sen Car Technique in WSNijcnes
 
Semantic Search of E-Learning Documents Using Ontology Based System
Semantic Search of E-Learning Documents Using Ontology Based SystemSemantic Search of E-Learning Documents Using Ontology Based System
Semantic Search of E-Learning Documents Using Ontology Based Systemijcnes
 

Plus de ijcnes (20)

A Survey of Ontology-based Information Extraction for Social Media Content An...
A Survey of Ontology-based Information Extraction for Social Media Content An...A Survey of Ontology-based Information Extraction for Social Media Content An...
A Survey of Ontology-based Information Extraction for Social Media Content An...
 
Economic Growth of Information Technology (It) Industry on the Indian Economy
Economic Growth of Information Technology (It) Industry on the Indian EconomyEconomic Growth of Information Technology (It) Industry on the Indian Economy
Economic Growth of Information Technology (It) Industry on the Indian Economy
 
An analysis of Mobile Learning Implementation in Shinas College of Technology...
An analysis of Mobile Learning Implementation in Shinas College of Technology...An analysis of Mobile Learning Implementation in Shinas College of Technology...
An analysis of Mobile Learning Implementation in Shinas College of Technology...
 
A Survey on the Security Issues of Software Defined Networking Tool in Cloud ...
A Survey on the Security Issues of Software Defined Networking Tool in Cloud ...A Survey on the Security Issues of Software Defined Networking Tool in Cloud ...
A Survey on the Security Issues of Software Defined Networking Tool in Cloud ...
 
Challenges of E-government in Oman
Challenges of E-government in OmanChallenges of E-government in Oman
Challenges of E-government in Oman
 
Power Management in Micro grid Using Hybrid Energy Storage System
Power Management in Micro grid Using Hybrid Energy Storage SystemPower Management in Micro grid Using Hybrid Energy Storage System
Power Management in Micro grid Using Hybrid Energy Storage System
 
Holistic Forecasting of Onset of Diabetes through Data Mining Techniques
Holistic Forecasting of Onset of Diabetes through Data Mining TechniquesHolistic Forecasting of Onset of Diabetes through Data Mining Techniques
Holistic Forecasting of Onset of Diabetes through Data Mining Techniques
 
A Survey on Disease Prediction from Retinal Colour Fundus Images using Image ...
A Survey on Disease Prediction from Retinal Colour Fundus Images using Image ...A Survey on Disease Prediction from Retinal Colour Fundus Images using Image ...
A Survey on Disease Prediction from Retinal Colour Fundus Images using Image ...
 
Feature Extraction in Content based Image Retrieval
Feature Extraction in Content based Image RetrievalFeature Extraction in Content based Image Retrieval
Feature Extraction in Content based Image Retrieval
 
Challenges and Mechanisms for Securing Data in Mobile Cloud Computing
Challenges and Mechanisms for Securing Data in Mobile Cloud ComputingChallenges and Mechanisms for Securing Data in Mobile Cloud Computing
Challenges and Mechanisms for Securing Data in Mobile Cloud Computing
 
Detection of Node Activity and Selfish & Malicious Behavioral Patterns using ...
Detection of Node Activity and Selfish & Malicious Behavioral Patterns using ...Detection of Node Activity and Selfish & Malicious Behavioral Patterns using ...
Detection of Node Activity and Selfish & Malicious Behavioral Patterns using ...
 
Optimal Channel and Relay Assignment in Ofdmbased Multi-Relay Multi-Pair Two-...
Optimal Channel and Relay Assignment in Ofdmbased Multi-Relay Multi-Pair Two-...Optimal Channel and Relay Assignment in Ofdmbased Multi-Relay Multi-Pair Two-...
Optimal Channel and Relay Assignment in Ofdmbased Multi-Relay Multi-Pair Two-...
 
An Effective and Scalable AODV for Wireless Ad hoc Sensor Networks
An Effective and Scalable AODV for Wireless Ad hoc Sensor NetworksAn Effective and Scalable AODV for Wireless Ad hoc Sensor Networks
An Effective and Scalable AODV for Wireless Ad hoc Sensor Networks
 
Secured Seamless Wi-Fi Enhancement in Dynamic Vehicles
Secured Seamless Wi-Fi Enhancement in Dynamic VehiclesSecured Seamless Wi-Fi Enhancement in Dynamic Vehicles
Secured Seamless Wi-Fi Enhancement in Dynamic Vehicles
 
Virtual Position based Olsr Protocol for Wireless Sensor Networks
Virtual Position based Olsr Protocol for Wireless Sensor NetworksVirtual Position based Olsr Protocol for Wireless Sensor Networks
Virtual Position based Olsr Protocol for Wireless Sensor Networks
 
Mitigation and control of Defeating Jammers using P-1 Factorization
Mitigation and control of Defeating Jammers using P-1 FactorizationMitigation and control of Defeating Jammers using P-1 Factorization
Mitigation and control of Defeating Jammers using P-1 Factorization
 
An analysis and impact factors on Agriculture field using Data Mining Techniques
An analysis and impact factors on Agriculture field using Data Mining TechniquesAn analysis and impact factors on Agriculture field using Data Mining Techniques
An analysis and impact factors on Agriculture field using Data Mining Techniques
 
A Study on Code Smell Detection with Refactoring Tools in Object Oriented Lan...
A Study on Code Smell Detection with Refactoring Tools in Object Oriented Lan...A Study on Code Smell Detection with Refactoring Tools in Object Oriented Lan...
A Study on Code Smell Detection with Refactoring Tools in Object Oriented Lan...
 
Priority Based Multi Sen Car Technique in WSN
Priority Based Multi Sen Car Technique in WSNPriority Based Multi Sen Car Technique in WSN
Priority Based Multi Sen Car Technique in WSN
 
Semantic Search of E-Learning Documents Using Ontology Based System
Semantic Search of E-Learning Documents Using Ontology Based SystemSemantic Search of E-Learning Documents Using Ontology Based System
Semantic Search of E-Learning Documents Using Ontology Based System
 

Dernier

Ch10-Global Supply Chain - Cadena de Suministro.pdf
Ch10-Global Supply Chain - Cadena de Suministro.pdfCh10-Global Supply Chain - Cadena de Suministro.pdf
Ch10-Global Supply Chain - Cadena de Suministro.pdfChristianCDAM
 
ROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.ppt
ROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.pptROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.ppt
ROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.pptJohnWilliam111370
 
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...Sumanth A
 
Levelling - Rise and fall - Height of instrument method
Levelling - Rise and fall - Height of instrument methodLevelling - Rise and fall - Height of instrument method
Levelling - Rise and fall - Height of instrument methodManicka Mamallan Andavar
 
Paper Tube : Shigeru Ban projects and Case Study of Cardboard Cathedral .pdf
Paper Tube : Shigeru Ban projects and Case Study of Cardboard Cathedral .pdfPaper Tube : Shigeru Ban projects and Case Study of Cardboard Cathedral .pdf
Paper Tube : Shigeru Ban projects and Case Study of Cardboard Cathedral .pdfNainaShrivastava14
 
CME 397 - SURFACE ENGINEERING - UNIT 1 FULL NOTES
CME 397 - SURFACE ENGINEERING - UNIT 1 FULL NOTESCME 397 - SURFACE ENGINEERING - UNIT 1 FULL NOTES
CME 397 - SURFACE ENGINEERING - UNIT 1 FULL NOTESkarthi keyan
 
TEST CASE GENERATION GENERATION BLOCK BOX APPROACH
TEST CASE GENERATION GENERATION BLOCK BOX APPROACHTEST CASE GENERATION GENERATION BLOCK BOX APPROACH
TEST CASE GENERATION GENERATION BLOCK BOX APPROACHSneha Padhiar
 
US Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionUS Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionMebane Rash
 
Turn leadership mistakes into a better future.pptx
Turn leadership mistakes into a better future.pptxTurn leadership mistakes into a better future.pptx
Turn leadership mistakes into a better future.pptxStephen Sitton
 
High Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMS
High Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMSHigh Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMS
High Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMSsandhya757531
 
Computer Graphics Introduction, Open GL, Line and Circle drawing algorithm
Computer Graphics Introduction, Open GL, Line and Circle drawing algorithmComputer Graphics Introduction, Open GL, Line and Circle drawing algorithm
Computer Graphics Introduction, Open GL, Line and Circle drawing algorithmDeepika Walanjkar
 
Research Methodology for Engineering pdf
Research Methodology for Engineering pdfResearch Methodology for Engineering pdf
Research Methodology for Engineering pdfCaalaaAbdulkerim
 
Prach: A Feature-Rich Platform Empowering the Autism Community
Prach: A Feature-Rich Platform Empowering the Autism CommunityPrach: A Feature-Rich Platform Empowering the Autism Community
Prach: A Feature-Rich Platform Empowering the Autism Communityprachaibot
 
Python Programming for basic beginners.pptx
Python Programming for basic beginners.pptxPython Programming for basic beginners.pptx
Python Programming for basic beginners.pptxmohitesoham12
 
multiple access in wireless communication
multiple access in wireless communicationmultiple access in wireless communication
multiple access in wireless communicationpanditadesh123
 
Gravity concentration_MI20612MI_________
Gravity concentration_MI20612MI_________Gravity concentration_MI20612MI_________
Gravity concentration_MI20612MI_________Romil Mishra
 
Engineering Drawing section of solid
Engineering Drawing     section of solidEngineering Drawing     section of solid
Engineering Drawing section of solidnamansinghjarodiya
 
Artificial Intelligence in Power System overview
Artificial Intelligence in Power System overviewArtificial Intelligence in Power System overview
Artificial Intelligence in Power System overviewsandhya757531
 
System Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event SchedulingSystem Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event SchedulingBootNeck1
 

Dernier (20)

Ch10-Global Supply Chain - Cadena de Suministro.pdf
Ch10-Global Supply Chain - Cadena de Suministro.pdfCh10-Global Supply Chain - Cadena de Suministro.pdf
Ch10-Global Supply Chain - Cadena de Suministro.pdf
 
ROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.ppt
ROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.pptROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.ppt
ROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.ppt
 
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
 
Levelling - Rise and fall - Height of instrument method
Levelling - Rise and fall - Height of instrument methodLevelling - Rise and fall - Height of instrument method
Levelling - Rise and fall - Height of instrument method
 
Paper Tube : Shigeru Ban projects and Case Study of Cardboard Cathedral .pdf
Paper Tube : Shigeru Ban projects and Case Study of Cardboard Cathedral .pdfPaper Tube : Shigeru Ban projects and Case Study of Cardboard Cathedral .pdf
Paper Tube : Shigeru Ban projects and Case Study of Cardboard Cathedral .pdf
 
CME 397 - SURFACE ENGINEERING - UNIT 1 FULL NOTES
CME 397 - SURFACE ENGINEERING - UNIT 1 FULL NOTESCME 397 - SURFACE ENGINEERING - UNIT 1 FULL NOTES
CME 397 - SURFACE ENGINEERING - UNIT 1 FULL NOTES
 
TEST CASE GENERATION GENERATION BLOCK BOX APPROACH
TEST CASE GENERATION GENERATION BLOCK BOX APPROACHTEST CASE GENERATION GENERATION BLOCK BOX APPROACH
TEST CASE GENERATION GENERATION BLOCK BOX APPROACH
 
US Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionUS Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of Action
 
Turn leadership mistakes into a better future.pptx
Turn leadership mistakes into a better future.pptxTurn leadership mistakes into a better future.pptx
Turn leadership mistakes into a better future.pptx
 
High Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMS
High Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMSHigh Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMS
High Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMS
 
Computer Graphics Introduction, Open GL, Line and Circle drawing algorithm
Computer Graphics Introduction, Open GL, Line and Circle drawing algorithmComputer Graphics Introduction, Open GL, Line and Circle drawing algorithm
Computer Graphics Introduction, Open GL, Line and Circle drawing algorithm
 
Research Methodology for Engineering pdf
Research Methodology for Engineering pdfResearch Methodology for Engineering pdf
Research Methodology for Engineering pdf
 
Prach: A Feature-Rich Platform Empowering the Autism Community
Prach: A Feature-Rich Platform Empowering the Autism CommunityPrach: A Feature-Rich Platform Empowering the Autism Community
Prach: A Feature-Rich Platform Empowering the Autism Community
 
Python Programming for basic beginners.pptx
Python Programming for basic beginners.pptxPython Programming for basic beginners.pptx
Python Programming for basic beginners.pptx
 
multiple access in wireless communication
multiple access in wireless communicationmultiple access in wireless communication
multiple access in wireless communication
 
Gravity concentration_MI20612MI_________
Gravity concentration_MI20612MI_________Gravity concentration_MI20612MI_________
Gravity concentration_MI20612MI_________
 
Engineering Drawing section of solid
Engineering Drawing     section of solidEngineering Drawing     section of solid
Engineering Drawing section of solid
 
Artificial Intelligence in Power System overview
Artificial Intelligence in Power System overviewArtificial Intelligence in Power System overview
Artificial Intelligence in Power System overview
 
System Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event SchedulingSystem Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event Scheduling
 
Designing pile caps according to ACI 318-19.pptx
Designing pile caps according to ACI 318-19.pptxDesigning pile caps according to ACI 318-19.pptx
Designing pile caps according to ACI 318-19.pptx
 

An Analytical Study on Knowledge Sharing within the Organization

  • 1. Integrated Intelligent Research(IIR) International Journal of Business Intelligent Volume: 01 Issue: 01 June 2012,Pages No.1-3 ISSN: 2278-2400 1 An Analytical Study on Knowledge Sharing within the Organization R. Rameshkumar, C.Jothi Venkateswaran, Research Scholar, Bharath university, Salaiyur, Chennai Head, PG and Research Department of Computer Science,Presidency College (Autonomous), Chennai ramesh116@hotmail.com Abstract-The better management of knowledge within the organization will lead to improved innovation and competitive advantage. The main goal of the firm… better utilization of internal and external knowledge. This core knowledge is found in individuals, communities of interest and their connections. An organization’s data is found in its computer systems but a company’s intelligence is found, in its biological and social systems. Though it is acclaimed as a good method, there are some setbacks in the process of knowledge sharing[KS] among the employees. This paper explores the possible ways to establish organization using social computing tools to facilitate Knowledge Sharing and create a social data mining among all the members of organization. Social Data Mining Network Analysis (SDMNA) techniques have been used to study KS patterns which take place between employees and departments. This SDMNA graph reveals the structure of social data mining network highlighting connectivity, clustering and strength of relationships between employees. Keywords: Knowledge Management Knowledge sharing, Social data mining Network Analysis. I. INTRODUCTION Knowledge Management (KM) is an important aspect in this current business world which has been undergoing dynamic changes from time to time. Many consultants push a technology –driven approach. “ Buy our state -of-art knowledge storage system and you will never again lose knowledge that is vital to the company!”,they exclaim. Other consultants emphasize the soft-side of knowledge Management. “Create a learning culture, that rewards sharing, and knowledge management will take care of itself!”, they postulate. The effective utilization of knowledge and learning requires both culture and technology. An organization’s real edge in the market place is often found in complex, context –sensitive, knowledge, which is difficult, if not often impossible to codify and store in ones, and zeros. Many firm look for KM to find solution for such problems. KM literature exposes the fact that there is strong relationship between knowledge sharing and socialization.The SECI model [6] states that KS is an integral aspect in KM and also the process of converting new knowledge through sharing experiences in day-to-day interactions. So, the development of KS within the organization is concerned with providing a rich and meaningful platform for Knowledge Sharing among all the members in the learning environment. This paper proposes to deploy social computing tools as part of organization to encourage KS among fifteen employees. The remainder of the paper is organized in the following section. In section 2, KM definition, KM activities, role of social software in KS are briefly explained. In section 3, we describe organizational Environment and KS arrangement. Section 4 provides KS analysis and discussion on the result obtained. In section 5, a snapshot of graphical representation of KS pattern among the employees is given. As a conclusion, the indication that the line of research can be continued with other SDMNA metrics to get more insights on KS pattern among the organizational employees. II. KM – DEFINITION Knowledge Management is a relatively new and a multidisciplinary aspect. KM defined as the systematic activities or process of identifying, capturing and sharing the knowledge which people can use to improve social development outcomes. 2.1 KM Activities KM core activities include the creation and integration of knowledge, the accumulation and utilization of knowledge, and the learning and sharing of knowledge and together, these comprise knowledge management [8]. Among these, knowledge sharing, or flow, or knowledge transfer is key to the success of knowledge management[2][7].Knowledge sources are going to be the primary force to determine new products, services and approaches and growth of an organization. According to Nonaka and Takeuchi [6] “everyone has become knowledge worker” and they highlighted that everyone has the potential of fostering knowledge sharing. We also agree with Kang, Morris, and Snell [3] that it is important for learners to share their knowledge with peer group. Several research studies have been conducted and reported regarding the significance of knowledge sharing among active and inactive employees. 2.2 Role Of Social Data Mining Software In KS Until recently, most of the KS efforts were focused on the creation of actionable knowledge repositories, encouraging knowledge reuse and collaboration based on these repositories, in a typical top-down approach where knowledge was seen as a separate entity. The emerging Social Software offers a chance to complement this approach with tools that are simpler and more flexible. This type of software is actually not new at all –
  • 2. Integrated Intelligent Research(IIR) International Journal of Business Intelligent Volume: 01 Issue: 01 June 2012,Pages No.1-3 ISSN: 2278-2400 2 software applications having similar traits have been in use for quite some time – but it is only recently that these have been labelled as “Social Software”. Social Software is the term used to designate, “the use of computing tools to support, extend, or derive added value from social activity - Including weblogs, instant messaging, music and photo sharing, mailing lists and message boards, and online social networking tools” [4]. Social software definitions also have a common focus on the importance of creating networks and relations between people and the support of group interaction and it can be defined as software that enables communication through digital technologies helping people connect, converse, collaborate, manage content, and form online networks in a social and bottom-up fashion. III. ORGANIZATIONAL KNOWLEDGE SHARING People are ready and willing to share information at any time We effectively manage processes and share information across all business functions. Our company's incentives encourage the sharing of knowledge and expertise in the organization Our research helps fill the void in the literature, providing a cross- cultural, organizational-level model focusing on knowledge sharing. The knowledge-based view of the firm focuses on knowledge as the most important strategic asset of the firm’s resources. Organizational knowledge sharing is a key component of this view because researchers have found that knowledge sharing is the key to organizational productivity (Almeida & Kogut, 1999; Hansen, 2002; Kostova, 1999). Hence, with an effective sharing process an organization can develop its knowledge base and enhance its competitiveness (Andrews & Deiahaye, 2000; McEvily & Chakravarthy, 2002). Unlike studies focusing on individual characteristics, the knowledge-based view of the firm is fundamentally concerned with the nature of knowledge coordination within the firm (Grant, 1996). Because valuing human knowledge and skills is a key principle in agility, organizations with this strategy place a high priority on managing and leveraging knowledge. Agility is closely aligned with an organization's ability to integrate and use knowledge (Hovorka & Larsen, 2006). Acquiring strategic agility requires that an organization consistently identify, share, assimilate, and exploit new knowledge more effectively than the competition (Roth, 1996). Studies have shown that key capabilities for workforce agility are the collaboration of employees across functional boundaries and the ability of employees to effectively transfer knowledge (Breu, Hemingway, Strathern & Bridger, 2002; Hovorka & Larsen, 2006). Knowledge networks, that entail relationships among entities (individuals, teams, organizations) working on a common mission, are becoming increasingly popular because they embed the dynamism needed for collective and systematic knowledge asset creation and sharing. 3.1 Knowledge Sharing Arrangements Employees could share, collaborate and other resources help each other through the discussion forums available on the learning platform, so that peer-to-peer knowledge sharing is encouraged. Employees are encouraged to use this resource not only to solve technical problems but also to exchange suggestions and information or help each other while completing the didactic activities assigned. IV. KNOLWEDGE SHARING ANALYSIS AND DISCUSSION 4.1 Matrix Representation The use of discussion forum in the organization enables employees to carry out significant amount of KS activities. It also enables individuals form social relationships (contact) with other individuals without geographical constraint. Discussion between employees is usually logged and it provides an insight into the knowledge exchanged between individuals. The use of such data for identifying „the knowledge and the knowledgeable. person is the main problem of interest in this research. The frequency of knowledge shared by a learner is represented in adjacency matrix and it is shown in Table 1. The row represents number of times knowledge goes from employees and column represents number of times knowledge received by employees. The matrix is given below: Table 1- Adjacency Matrix 4.2 KS Density UCINET [1], a network analysis software, can be used to map and measure of relationship and sharing among employees. It is a method for visualizing our employees and connection power, leading us to identify different patterns of knowledge sharing. The results from UCINET show that the density value of KS among 15 employees is 4.18 and standard deviation of 3.77. The density value represents the average number of knowledge shared by any pair of employees. With help of dichotomized matrix representation one can easily know the percentage of class involved in the task of sharing knowledge. The density value is found to be 0.7633. This is a good density index for a class size of 15 employees. This implies that arrangement made in the web based learning environment facilitates higher level of knowledge sharing among the employees. 4.3 Knowledge Flow
  • 3. Integrated Intelligent Research(IIR) International Journal of Business Intelligent Volume: 01 Issue: 01 June 2012,Pages No.1-3 ISSN: 2278-2400 3 In table 2, Employees In-degree and Out-degree are shown. Employees out-degree (knowledge transferred) varies between 0 and 106 (M= 58.53, SD = 29.808) and in-degree ( knowledge received) between 1 and 91 (M=58.3,SD = 26.58). Network centralization (Out-degree) = 19.11% and In-degree= 13.07%.The most active employees and knowledge providers in the space are L1 and L5, L4 and L10 receive the highest number of knowledge. There are seven employees who have a very low out degree, meaning that their contribution in knowledge sharing was is not encouraging. Table 2 : Knowledge Flow (In-degree, Out-degree) 4.4 Knowledge Brokers and Power Between’s centrality helps to identify knowledge brokers and gatekeepers within a network. It is a measure of the extent that a network employees position falls on the geodesic paths among other employees of a network. Thus, it determines whether a employee plays a (relatively) important role as a broker or gatekeeper of knowledge flows with a high potential for control on the indirect relations of the other employees. Table 3 shows that the Betweenness values vary from 0 to 10.33 (M=1.6, SD=2.0). The calculation has been made after symmetrising the adjacency matrix, through the minimum of the values (in this way, strong ties are kept). The four highest values are those of L1, L5, and L0. They are the gatekeepers and they can regulate the flow of knowledge in the network. The lowest Between values are for L2, L3,L4, L6, L8, L9,L7, L11, L12, L13, and L14. They can be considered outsiders in knowledge sharing. 4.5 Structural Analysis In order to study the structural analysis of the group, clique analysis has been done. Clique is the maximum number of actors who have all possible times present themselves. Cliques are located by dichotomizing and symmetrizing the adjacency matrix at level three. The SNA analysis by UCINET has found six cliques. 1: L1 L3 L4 L5 L6 2: L0 L1 L3 L5 3: L1 L3 L5 L7 4: L1 L3 L4 L6 L10 5: L1 L5 L6 L13 6: L1 L6 L10 L13 The size of the cliques ranges from a clique with four members to a clique with five members. There are a lot of inter-clique connections. L1, in six ; L3,L5 and L6 in 4; L10,L13 in two; L0 and,L7 were in only one of these sub-groups V. KS NETWORK WITHIN THE ORGANIZATION In the WBE, there are 15 employees. Figure 1 is a KS Network that shows the structure of the state of the network that evolved from the WBLE. The nodes represent the learner (the names of learners have been renamed L0 – L14 for reasons privacy and anonymity reasons). When there is a line directly connecting two nodes then these nodes are adjacent. When a node is one of a pair of nodes defining the line then the node is incident to the line. The number of lines that are incident with it is called nodal degree [9]. In-degree is the number of lines that are incident to a node while out-degree is the number of lines that are incident from it. Nodes whose degree equals 0 are called isolates. The KS network integrates all learners except for one isolate(L14) VI. CONCLUSION In this paper, an analysis of KS in WBE, using social network analysis is presented. In addition, several common social network analysis metrics, such as in-degree, out-degree, betweenness, clique, and community are presented. Each metric serves different purposes. For example, in-degree and outdegree are used to measure one.s connection with others; betweenness is used to measure a user.s importance in terms of bridging users together; and clique metrics is used to identify like-minded groups. In future, it is planned to extend the current study to examine other centrality measures such as closeness and hub, and their implications for the KS. Applying social network analysis for understanding on-line educational systems is an ongoing research area, and it is assumed that this study contributes to its continued growth. REFERENCES [1] Borgatti, S. Everett, M. & Freeman, L.C. (1992), UCINET IV, Version 1.0,Columbia: Analytic Technologies [2] Gupta, A. and Govindarajan, V. (2000) „Knowledge management's social dimension: Lessons from Nucor Steel., Sloan Management Review, Fall, pp. 71-8 [3] Kang, S., Morris, S. & Snell, S.A. (2003). Extending the human resource architecture: Implications from social capital theory. Working paper [4] Lawley, E. (2004). Blog research issues. Retrieved, from http://www.corante.com/many/archives/2004/06/24/blog_research_issues.p hp [5] Nonaka, I. (1998). The Knowledge-Creating Company. Harvard Business Review on Knowledge Management, Boston: Harvard Business School Press [6] Nonaka, I., & Takeuchi, H. (1995). The Knowledge- Creating Company. New York: Oxford university Press [7] Szulanski, G. (1996) „Exploring internal stickiness: Impediments to the transfer of best practice within the firm., Strategic Management Journal, vol. 17, pp. 27-43. [8] Shieh-Cheih, F., Fu-Sheng, T. and Kuo-Chien, C. (2005) „Knowledge sharing routines, task efficiency, and team service quality in instant service- giving settings., The Journal of American Academy of Business, vol. 6, no. 1. [9] Wasserman, S., & Faust, K. (1994). Social Network analysis and applications. Cambridge: Cambridge University Press