{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,10]],"date-time":"2024-07-10T05:15:53Z","timestamp":1720588553529},"reference-count":31,"publisher":"Emerald","issue":"1","license":[{"start":{"date-parts":[[2010,2,23]],"date-time":"2010-02-23T00:00:00Z","timestamp":1266883200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,2,23]]},"abstract":"Purpose<\/jats:title>The purpose of this paper is to introduce and illustrate the importance of uncovering tacit perceptions during knowledge management (KM) audit, in order to identify cultural barriers that may interfere with KM initiatives. The goal of such KM initiatives is to leverage a firm's capacity to efficiently produce value from knowledge held by employees and embedded in processes. Current audit practices analyze the explicit information gained through interviews and questionnaires, focusing on the organization's culture, existing KM processes and the improved KM processes it wishes to implement. The paper seeks to suggest an approach for uncovering and analyzing tacit perceptions identified through interviews and discussions as an inherent part of KM audit.<\/jats:italic><\/jats:p><\/jats:sec>Design\/methodology\/approach<\/jats:title>The research was conducted during a KM audit in a large international software development organization. The research methodology was composed of two disciplines. The first, used for data collection, was a knowledge\u2010engineering and management methodology \u2013 the CommonKADS. The second, used for qualitative data analysis, was the grounded theory approach.<\/jats:italic><\/jats:p><\/jats:sec>Findings<\/jats:title>The KM activities currently taking place in the organization include creation, sharing, access, usage, and maintenance. In interviews and discussions, access was the most emphasized activity. The cultural barriers that were identified relate to the KM roles and responsibilities that occur in daily work. A business process analysis revealed different perspectives of KM from different stakeholders.<\/jats:italic><\/jats:p><\/jats:sec>Research limitations\/implications<\/jats:title>The findings of this study are based on a large, multi\u2010located and highly distributed, yet single organization. Additional research needs to be conducted in order to further validate and generalize the findings.<\/jats:italic><\/jats:p><\/jats:sec>Practical implications<\/jats:title>The principle of identifying tacit perceptions and cultural barriers illustrated in the study may be beneficial in any organization. Identifying the issues that need to be addressed before implementing a KM solution is critical for a successful implementation.<\/jats:italic><\/jats:p><\/jats:sec>Originality\/value<\/jats:title>The paper introduces the concept of uncovering tacit perceptions in order to identify cultural barriers that may interfere with a KM initiative. For this purpose, an analysis method was developed and used during a KM audit. Using this audit practice prior to a KM project will enable a better understanding of the risks and challenges that need to be managed to ensure success.<\/jats:italic><\/jats:p><\/jats:sec>","DOI":"10.1108\/13673271011015606","type":"journal-article","created":{"date-parts":[[2010,2,20]],"date-time":"2010-02-20T12:04:40Z","timestamp":1266667480000},"page":"114-127","source":"Crossref","is-referenced-by-count":22,"title":["Uncovering cultural perceptions and barriers during knowledge audit"],"prefix":"10.1108","volume":"14","author":[{"given":"Meira","family":"Levy","sequence":"first","affiliation":[]},{"given":"Irit","family":"Hadar","sequence":"additional","affiliation":[]},{"given":"Steven","family":"Greenspan","sequence":"additional","affiliation":[]},{"given":"Ethan","family":"Hadar","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"key":"key2022020219491243500_b1","doi-asserted-by":"crossref","unstructured":"Abdullah, M.S., Kimble, C., Benest, I. and Paige, R. (2006), \u201cKnowledge\u2010based systems: a re\u2010evaluation\u201d, Journal of Knowledge Management, Vol. 10 No. 3, pp. 127\u201042.","DOI":"10.1108\/13673270610670902"},{"key":"key2022020219491243500_b2","doi-asserted-by":"crossref","unstructured":"Alavi, M. and Leidner, D.E. (2001), \u201cReview: Knowledge management and knowledge management systems: conceptual foundations and research issues\u201d, MIS Quarterly, Vol. 25 No. 1, pp. 107\u201036.","DOI":"10.2307\/3250961"},{"key":"key2022020219491243500_b3","doi-asserted-by":"crossref","unstructured":"Biloslavo, R. and Trnav\u010devic, A. (2007), \u201cKnowledge management audit in a higher educational institution: a case study\u201d, Knowledge and Process Management, Vol. 14 No. 4, pp. 275\u201086.","DOI":"10.1002\/kpm.293"},{"key":"key2022020219491243500_b4","doi-asserted-by":"crossref","unstructured":"Burnett, S., Illingworth, L. and Webster, L. (2004), \u201cKnowledge auditing and mapping: a pragmatic approach\u201d, Knowledge and Process Management, Vol. 11 No. 1, pp. 25\u201037.","DOI":"10.1002\/kpm.194"},{"key":"key2022020219491243500_b5","doi-asserted-by":"crossref","unstructured":"Cress, U. and Martin, S. (2006), \u201cKnowledge sharing and rewards: a game\u2010theoretical perspective\u201d, Knowledge Management Research and Practice, Vol. 4, pp. 283\u201092.","DOI":"10.1057\/palgrave.kmrp.8500112"},{"key":"key2022020219491243500_b6","unstructured":"Davenport, T.H. and Prusak, L. (1998), Working Knowledge, Harvard Business School Press, Boston, MA."},{"key":"key2022020219491243500_b7","doi-asserted-by":"crossref","unstructured":"Debenham, J.K. and Clark, J. (1995), \u201cThe knowledge audit\u201d, Robotics and Computer\u2010Integrated Manufacturing, Vol. 11 No. 3, pp. 201\u201011.","DOI":"10.1016\/0736-5845(94)90035-3"},{"key":"key2022020219491243500_b8","doi-asserted-by":"crossref","unstructured":"Delong, D.W. and Fahey, L. (2000), \u201cDiagnosing cultural barriers to knowledge management\u201d, Academy of Management Executive, Vol. 14, pp. 113\u201027.","DOI":"10.5465\/ame.2000.3979820"},{"key":"key2022020219491243500_b9","doi-asserted-by":"crossref","unstructured":"Fahey, L. (1998), \u201cBusiness process redesign: the implications of tacit knowledge\u201d, Knowledge and Process Management, Vol. 5 No. 2, pp. 110\u201017.","DOI":"10.1002\/(SICI)1099-1441(199806)5:2<110::AID-KPM17>3.0.CO;2-H"},{"key":"key2022020219491243500_b10","unstructured":"Frappaolo, C. and Koulopoulos, T. (2000), \u201cWhy do a knowledge audit?\u201d, in Cortada, J. and Woods, J.A. (Eds), The Knowledge Management Yearbook 2000\u20102001, Butterworth\u2010Heinemann, Woburn, MA, pp. 418\u201024."},{"key":"key2022020219491243500_b11","doi-asserted-by":"crossref","unstructured":"Gill, G.T. (1995), \u201cEarly expert systems: where are they now?\u201d, MIS Quarterly, Vol. 19, pp. 51\u201081.","DOI":"10.2307\/249711"},{"key":"key2022020219491243500_b12","doi-asserted-by":"crossref","unstructured":"Gold, A.H., Malhotra, A. and Segars, A.H. (2001), \u201cKnowledge management: an organizational capabilities perspective\u201d, Journal of Management Information Systems, Vol. 18 No. 1, pp. 185\u2010214.","DOI":"10.1080\/07421222.2001.11045669"},{"key":"key2022020219491243500_b13","doi-asserted-by":"crossref","unstructured":"Hargadon, A.B. (1998), \u201cFirms as knowledge brokers: lessons in pursuing continuous innovation\u201d, California Management Review, Vol. 40, pp. 209\u201027.","DOI":"10.2307\/41165951"},{"key":"key2022020219491243500_b14","doi-asserted-by":"crossref","unstructured":"Holsapple, C.W. and Singh, M. (2003), \u201cThe knowledge chain model: activities for competitiveness\u201d, in Holsapple, C.W. (Ed.), Handbook on Knowledge Management, Vol. 2, Springer, New York, NY, chapter 43.","DOI":"10.1007\/978-3-540-24748-7_11"},{"key":"key2022020219491243500_b15","doi-asserted-by":"crossref","unstructured":"Hooff, B.V., Vijvers, J. and De Ridder, J. (2003), \u201cFoundations and applications of a knowledge management scan\u201d, European Management Journal, Vol. 21 No. 2, pp. 237\u201046.","DOI":"10.1016\/S0263-2373(03)00018-5"},{"key":"key2022020219491243500_b16","doi-asserted-by":"crossref","unstructured":"Huber, G.P. (1991), \u201cA theory of the effects of advanced information technologies on organizational design, intelligence, and decision making\u201d, Academy of Management Review, Vol. 15 No. 1, pp. 47\u201071.","DOI":"10.5465\/amr.1990.4308227"},{"key":"key2022020219491243500_b17","unstructured":"Jamieson, R. and Handzic, M. (2003), \u201cA framework for security, control and assurance of knowledge management systems\u201d, Handbook on Knowledge Management, Vol. 2, Springer, New York, NY, chapter 25."},{"key":"key2022020219491243500_b18","unstructured":"Joseph, E.C. (1991), \u201cKnowledge management audits\u201d, Proceedings of the IEEE International Conference on Technology and Innovation Management, Portland, OR, p. 442."},{"key":"key2022020219491243500_b20","unstructured":"Leidner, D.E. and Kayworth, T.R. (2008), \u201cKnowledge management and organizational culture\u201d, in Becerra\u2010Fernandez, I. and Leidner, D. (Eds), Knowledge Management: An Evolutionary View, M.E. Sharpe, New York, NY, pp. 40\u201060."},{"key":"key2022020219491243500_b19","doi-asserted-by":"crossref","unstructured":"Liebowitz, J., Rubenstein\u2010Montano, B., McCaw, D., Buchwalter, J. and Browning, C. (2000), \u201cThe knowledge audit\u201d, Knowledge and Process Management, Vol. 7 No. 1, pp. 3\u201010.","DOI":"10.1002\/(SICI)1099-1441(200001\/03)7:1<3::AID-KPM72>3.0.CO;2-0"},{"key":"key2022020219491243500_b21","doi-asserted-by":"crossref","unstructured":"Nonaka, I. and Takeuchi, H. (1995), The Knowledge Creating Company, Oxford University Press, Oxford.","DOI":"10.1093\/oso\/9780195092691.001.0001"},{"key":"key2022020219491243500_b22","doi-asserted-by":"crossref","unstructured":"O'Dell, C. and Grayson, J.C. (2003), \u201cIdentifying and transferring internal best practices\u201d, in Holsapple, C.W. (Ed.), Handbook on Knowledge Management, Vol. 1, Springer, New York, NY, chapter 31.","DOI":"10.1007\/978-3-540-24746-3_31"},{"key":"key2022020219491243500_b23","unstructured":"Polanyi, M. (1967), The Tacit Dimension, Anchor Books, Garden City, NY."},{"key":"key2022020219491243500_b24","doi-asserted-by":"crossref","unstructured":"Ruggles, R. (1998), \u201cThe state of the notion: knowledge management in practice\u201d, California Management Review, Vol. 40, pp. 80\u20109.","DOI":"10.2307\/41165944"},{"key":"key2022020219491243500_b25","doi-asserted-by":"crossref","unstructured":"Sackmann, A.S. and Friesl, M. (2007), \u201cExploring cultural impacts on knowledge sharing behavior in project teams \u2013 results from a simulation study\u201d, Journal of Knowledge Management, Vol. 11 No. 6, pp. 142\u201056.","DOI":"10.1108\/13673270710832226"},{"key":"key2022020219491243500_b26","doi-asserted-by":"crossref","unstructured":"Schreiber, G., Akkermans, H., Anjewierden, A., De Hoog, R., Shadbolt, N., De Velde, W.V. and Wielinga, B. (1999), Knowledge Engineering and Management: The CommonKADS Methodology, MIT Press, Cambridge, MA.","DOI":"10.7551\/mitpress\/4073.001.0001"},{"key":"key2022020219491243500_b27","unstructured":"Strauss, A. and Corbin, J. (1994), \u201cGrounded theory methodology: an overview\u201d, in Denzin, N.K. and Lincoln, Y.S. (Eds), Handbook of Qualitative Research, Sage Publications, Thousand Oaks, CA, chapter 1."},{"key":"key2022020219491243500_b28","unstructured":"Tiwana, A. (2001), The Essential Guide to Knowledge Management: E\u2010Business and CRM Applications, Prentice\u2010Hall, Upper Saddle River, NJ."},{"key":"key2022020219491243500_b29","doi-asserted-by":"crossref","unstructured":"Tsui, E., Garner, B.J. and Staab, S. (2000), \u201cThe role of artificial Intelligence in knowledge management\u201d, Knowledge\u2010based Systems, Vol. 13 No. 5, pp. 235\u20109.","DOI":"10.1016\/S0950-7051(00)00093-9"},{"key":"key2022020219491243500_b30","doi-asserted-by":"crossref","unstructured":"Von Krogh, G. (1998), \u201cCare in knowledge creation\u201d, California Management Review, Vol. 40, pp. 133\u201053.","DOI":"10.2307\/41165947"},{"key":"key2022020219491243500_b31","unstructured":"Watson, S. (1998), \u201cGetting to \u2018aha!\u2019. Companies use intranets to turn information and experience into knowledge \u2013 and gain competitive edge\u201d, Computer World, Vol. 32, pp. 1\u20105."}],"container-title":["Journal of Knowledge Management"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/13673271011015606","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/13673271011015606\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/13673271011015606\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,24]],"date-time":"2024-03-24T06:54:21Z","timestamp":1711263261000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/13673271011015606\/full\/html"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,2,23]]},"references-count":31,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2010,2,23]]}},"alternative-id":["10.1108\/13673271011015606"],"URL":"https:\/\/doi.org\/10.1108\/13673271011015606","relation":{},"ISSN":["1367-3270"],"issn-type":[{"value":"1367-3270","type":"print"}],"subject":[],"published":{"date-parts":[[2010,2,23]]}}}