17
Yogesh Gautam B.Sc., MCA, Ph.D. (Computer Science) MBA, PGP Cyber Law

Yogesh Gautam B.Sc., MCA, Ph.D. (Computer Science) MBA, PGP Cyber Law

Embed Size (px)

Citation preview

Yogesh GautamB.Sc., MCA, Ph.D. (Computer Science)MBA, PGP Cyber Law

Using social technology to find, access, and validate existing knowledge, where, knowledge includes all forms of contents which could be objects, data, information, knowledge, and wisdom.

Early KM technologies included online corporate yellow pages as expertise locators and document management systems

Subsequent KM efforts leveraged semantic technologies for search and retrieval and the development of e-learning tools for communities of practice

More recently, development of social computing tools (such as bookmarks, blogs, and wikis) have allowed more unstructured approach to the transfer, capture and create knowledge.

These tools face challenges in distilling meaningful re-usable knowledge and ensuring that their content is transmissible through diverse channels.

The capture of explicit and tacit knowledge is done in the form of re-usable, media-rich, web-based Knowledge Assets. Elicitation techniques have to be developed to effectively gather, and contextually package and publish knowledge in ways that enable its timely re-use and adaptation by others.

The most valuable knowledge is in the

heads of experts (tacit knowledge)

They find it difficult to describe all they

know

Tacit knowledge is very difficult (sometimes

impossible) to describe

Experts tend to be busy

Many experts don’t communicate or share

knowledge easily

Tacit Knowledge has a limited life (~5-10 years

max)

You can’t force experts to “give away”

knowledge

Only a part of an expert’s knowledge is critical to

organisation

People have always retired from their jobs and taken valuable knowledge with them.

Everything retiring workers know need not be captured

Whether it is a situation where critical knowledge is about to be lost, or a systematic and sustainable solution is being pursued for knowledge retention, data capture requires technological skills

Outline Eliciting from individuals

Harvesting from Communities

Gathering from Networks

Exploring Cyberspace

Different methods of Knowledge capture

Must be a volunteered Process:

Identify experts & Engage them

Influenced by beliefs, perspectives, and

values.

Today’s knowledge is the result of centuries

of collective research.

Knowledge is changing at an accelerating

rate.

It takes a community of people to keep up

with new concepts, practices, and

technology

Networks are much bigger than communities (100s to 1,000,000s of members).

Participants don’t know most other participants

Limiting trust and security

Anticipate emerging issues Anticipate stakeholder actions Discover new stakeholders Discover potential partners Learn from others Learn about new technology Monitor institutional changes Monitor public opinion Find useful information Detect new risks ………………..

AgriDaksh

In terms of structured text (HTML files) mainly drawn from various technical bulletins

In database fields specifically designed for allowing flexibility in terms of storing and retrieving varied information.

In facts and rules stored in database in the form that can be used to build decision tree and inferred by Java Expert System Shell (JESS).

In crop ontology, that stores knowledge using Web Ontology Language (OWL).

 

Thank You …………