This link is a knowledge map in my class : http://dizagrup.blogspot.com/

  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS

C H A PT E R 4 Conceptualizing Knowledge Emergence

C H A PT E R 4
Conceptualizing Knowledge
Emergence
4.1 GATEKEEPERS,INFORMATION, STARS,AND BOUNDARY SPANNERS
The seminal work was that of Thomas J. Allen of MIT [Allen and Cohen, 1969, Allen,T.,1977] who conducted a number of studies relating to information flow in industrial and corporate R&D laboratories.Allen’s most ingenious contribution to the field was to seize upon the phenomenon that in many cases in the context of military R&D and procurement, the same contract is awarded to two different organizations to achieve the same end, typically in the case of a critical component of a larger system. Duplicative development contracts may, in fact, be very worthwhile insurance against the failure of a key component of a system. This duplication provided a wonderfully robustcontext in which to examine information flows and what distinguished the information flows in the more successful projects from the less successful.
Allen coined the term ‘Gatekeeper’ to describe the information flow stars that he discovered,the heavily connected nodes in the information flow pattern. The reason that he chose that term was that much of the development and project work that he investigated was classified military work, where there seemed to be something of a paradox, how was a team to be successful if it didn’t effectively connect with the world of information outside the organization? But how did it do that in a classified and communication restricted environment?What he discovered was that the information stars, the sociometric stars, were the answer to that paradox; they were the information channels through which external information reached the project team.That role was so crucial in the contexts that Allen typically investigated what he termed his sociometric stars “Gatekeepers.” They oversaw and guarded the gates through which external information reached the projects. Indeed, one might say that they were not just the gatekeepers, they themselves were the gates.
4.2 RESEARCH PRODUCTIVITY AND KNOWLEDGE
The ‘Gatekeepers, Information Stars & Boundary Spanner’ tradition is very consistent with a substantial body of work studying research productivity. Koenig,M. [1992a], for example, in the context of the U.S. pharmaceutical industry, studied the relationship between research productivity and the information environment in which that research was conducted. The productivity measure was, at base, simply the number of approved new drugs (new drug applications or NDAs) per millions of dollars of R&D budget. This measure, however, was refined by weighting the NDAs in regard to: 1) whether or not the Food and Drug Administration (FDA) judged the drug to be an “important therapeutic advance,” 2) the chemical novelty of the drug, and 3) the filing company’s patent position in regard to the drug, an indicator of where the bulk of the research was done. The study is compelling because of the high face validity of the measure of success, the successful introduction of new pharmaceutical agents, since that is what pharmaceutical companies are about after all, and because of the statistical robustness of the results, a consequence of the fact that the more successful companies were found to be not just twenty or thirty percent more productive than the not so successful companies, they were two or three hundred percent more productive.
The more productive companies were characterized by:
·         A relatively egalitarian managerial structure with unobtrusive status indicators in the R&D environment,
·          Less concern with protecting proprietary information,
·         Greater openness to outside information, greater use of their libraries and information centers, specifically, greater attendance by employees at professional meetings,
·         Greater information systems development effort,
·         Greater end-user use of information systems and more encouragement of browsing and serendipity. Increased time spent browsing and keeping abreast,

4.3 LACK OF RECOGNITION OFTHESE FINDINGS IN THE BUSINESS COMMUNITY
As Allen pointed out in his study, there is a surprising lack of recognition of these findings about the importance of information stars in the business community. This is, in fact, a subset of an even larger problem - the lack of recognition of or even obtuseness to the importance of information and information related managerial actions in the business community. For example, one major study that reviewed a large corpus of work on R&D innovation, [Goldhar et al., 1976], concluded that there are six characteristics of environments that are conducive to technological innovations. The three most important characteristics are all related to the information environment and information flow – specifically: 1) easy access to information by individuals; 2) free flow of information both into and out of the organizations; 3) rewards for sharing, seeking, and using “new” externally developed information sources. Note the ‘flow in and out’ and the ‘sharing, seeking, and using’. Number six is also information environment related, 6) the encouragement of mobility and interpersonal contacts. Yet in a remarkable oversight, the studies’ authors never remarked on the dramatic win, place, and show finish of information and knowledge factors.

4.4 COMMUNITY-BASEDMODELS
The Information Systems literature points to an abundance ofKMstrategies in the category of Computer Mediated Communication (CMC). Such systems provide the infrastructure for enabling the interactions needed for a group’s knowledge synergies and interactive activities [Maier, R., 2002] and may include bulletin boards, electronic meeting/conferencing, or online chat. In this model, the notion of space [Ruhleder, K., 2002], physical or otherwise, is important primarily because the meeting place or system provides an environment that allows for interactions to unfold, at the convenience of individual participants, often asynchronously. Further, such CMC interactions allow for the creation of persistent records [Robins, J., 2002] of the interactions. Chat and other kind of social media transcriptions can be preserved too as another example. To the extent that discourse occurs through such interactions, the dialectics can be archived for future reference and subsequent “reuse.” However,  asHislop, D. [2002] points out, while technology may provide the tools for interaction and communication, the application of technology alone may not be a sufficient condition for sustaining the creation and sharing of knowledge.

4.5 REPOSITORY MODEL
The knowledge management repository, a space to store and retrieve knowledge objects has long been a standard in KMprograms. It is a model that emphasizes the creation of quality knowledge content in online repositories with re-use as a goal. Markus, M. [2001] argues that the purpose and content of knowledge records in repositories often differ depending on who needs the documentation: the content producer, similar others, or dissimilar others. She emphasizes that a great deal of effort is required to produce quality content, and, as such, part of the burden of documenting and packaging knowledge objects can be transferred to intermediaries, saving time and energy of the organization’s staff. In addition, adding context is also another aspect of making content more usable. Markus proposes the roles of human intermediaries in what she terms as “repurposing” of repositories to make them more appropriate for use by others. Examples of activities that could be performed include abstracting, indexing, authoring, and sanitizing or scrubbing content. Because of the costs involved in repackaging and making repository knowledge content more usable to the knowledge seeker,Markus looks to an expanded role for technological support of core competencies of librarians, archivists, data curators, and other information professionals.

4.6 ACTIVITY-BASEDMODELS
While there has been significant work done in terms of Information Systems support for the coordination of work [Winograd,T., 1988], the next logical progression would be to link knowledge production and capture with work processes. For example, Blackler, F. [1995] considers knowledge in organizations as socially distributed collective activity systems, and emphasizes the significance of incoherence and dilemma as the key issues in social systems. Similarly, Engeström, Y. [1999] research, using activity systems as cycles of expansive learning in work practices, also points to the  importance of activities as providing the necessary context for grounding organizational knowledge. Based on such a historical-cultural perspective of activity, Hasan, H. [2003] proposed rudiments of a KM system influenced by activity-based models that would link work activities with people and content.

  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS

C H A PT E R 5 Knowledge “Acts”

C H A PT E R 5
Knowledge “Acts”
5.1 QUESTION ASKING AND ANSWERING
Question asking and answering is a foundational process by which what people know tacitly becomes expressed, and hence, externalized as knowledge. To support such a view, we borrow from speech acts theory [Searle, J., 1969] that amongst others categorizes question asking as a form of a speech act. In adapting the theory, Hirschheim et al. [1995] describe types of speech acts that pertain to aspects of either Knowledge Management (KM), or Information Management (IM). For example, Boahene and Ditsa [2003] suggest that Information Management systems target a base of expressive speech acts by mainly supporting the recall of meaning-attribution while Knowledge Management systems target regulative and constantive speech acts primarily to support the organization and management of dynamic complexity. They reason that IM addresses questions such as ‘Where,’ ‘Who,’ ‘When,’ and ‘What,’ while KM targets problems involving dynamic complexity, addressing solutions to questions such as ‘How’ and ‘Why.’ Quigley and Debons [1999] adopted a similar stance that considers information as texts that primarily answer ‘informative’ questions such as who, when, what, or where while knowledge is considered as texts that answer more ‘explanatory’ or ‘meaning related’ questions such as why or how.

5.2 POSTING CONTENT TOREPOSITORIES
Contributing content such as lessons-learned, project experiences, and success stories is another approach to knowledge sharing. The capturing of best practice has often been highlighted as a form of externalized knowledge. O’Dell and Jackson [1998] point out the importance of frameworks for classifying information.For example, they note that Chevron and other groups organize information in their best practice databases using the Process Classification Framework developed by APQC (American Productivity and Quality Council) and Arthur Andersen. Through such a framework, subunits can talk with each other more effectively via a common vocabulary.

5.3 (RE)USING KNOWLEDGE
Desouza et al. [2006] assert that the decision to consume knowledge can be framed as a problem of risk evaluation, with perceived complexity and relative advantage being identified as factors relating to intentions to “consume” knowledge. However, it is essential that the knowledge consumer is able to reasonably frame his or her knowledge needs. Belkin et al. [1982] found that during problem articulation, users have anomalous states of knowledge, and they may not be able to specify their information needs accurately. Since the publication of this seminal work legions of researchers have worked on systems that will help people formulate effective questions that will retrieve relevant information.McMahon et al. [2004], studying team work involving engineering design, suggest that both codification and personalization approaches to knowledge reuse are relevant. They recognize the notion of information value, allowing for the matching of information to the knowledge needs of the user. They propose that good representations of both information characteristics and user characteristics are essential.

5.4 KNOWLEDGE-BASED 
In general, decision making involves identifying alternatives, projecting probabilities and outcomes of alternatives, and evaluating outcomes according to known preferences and implications for stakeholders. Choo, C. [2002] suggests that decision making activity requires the establishment of shared meanings and the assumption of prior knowledge.
Shared meanings and purposes as well as newknowledge and capabilities, converge on decision making as the activity leading to the selection and initiation of action.Shared meanings, agendas, and identities select the premises, rules, and routines that structure decision making. New knowledge and capabilities make possible new alternatives and outcomes, expanding the range of available organizational responses [Choo, C., 2002, p. 86]. Choo further proposes that information flows are a central process that bridges knowledge creation and decision making activity. Information flows continuously between sense making, knowledge creating, and decision making, so that the outcome of information use in one mode provides the elaborated context and the expanded resources for information use in the other modes [Choo, C., 2002, p. 85].
Information used in one activity that results in new knowledge will, in turn, be used to guide selection of alternatives in future tasks that involve decision making. Codified rules and routines would be relied on to support evaluation of alternatives and selection of action decisions. Choice of alternatives, and decision outcomes then provide the backdrop upon which sense making, or justification, of decision rationale occurs. Such decision rationale, and its associated sense making can then be codified for (re)use in other contexts, applied to future activities that draw on it to create new instances of knowledge.

  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS

C H A PT E R 6 Knowledge Management in Practice

C H A PT E R 6
Knowledge Management in
Practice
6.1 KMIN PRACTICE – PROCESSES
A very useful way of thinking is to conceptualize KMas the actualization of what Powell,T. [2001a] calls the “Knowledge Value Chain.” The chain is straightforward, a pyramid, in fact, leading from Data at the bottom through Information, Knowledge, Intelligence, Decision, and Action, to Value. The notion is simple, but the explication is sophisticated and complex. Value to the organization is ultimately what KM is about.

6.1.1 FINDING INFORMATION AND KNOWLEDGE
Finding information and knowledge refers to processes that allow organizations to make sense and make use of data, information, and knowledge objects that may be present but are not codified, analyzed, nor accessible to members. Knowledge exists in all organizations, but all knowledge may not be explicit. Knowledge objects or artifacts are entities that represent knowledge existing within organizational members [McInerney, C., 2002]. A long-time employee may have a deep understanding of processes and guidelines, but he or she may never have written them down or compiled them in a document like a procedural manual.

6.1.2 SHARING INFORMATION AND KNOWLEDGE
Sharing of information for knowledge development is the most traditional collection of processes, easily understood, but often overlooked in a systematic knowledge management program. Sharing refers to the willingness and ability of the knowledgeable to share what they know to help others expand their own learning and knowing.Teaching and learning activities, such as online universities in industry, mentoring programs, apprenticeships, and training programs all serve as opportunities for individuals to share knowledge. The live interactions that occur in lectures and other kinds of learning sessions can now be captured fairly easily with digital video or audio equipment. Even devices have these capabilities.They can then be indexed and placed on a shared file platform or in an intranet. If indexed appropriately, knowledge workers can find the audio and video and use these things over and over again. The principals therefore wanted the person who needed the information or knowledge to have to come to them, so that the two contexts could be discussed and the applicability properly understood. The principles were, in general, quite willing to have it be broadcast that they had a lesson learned in a particular area, but in many cases, they did not want so much to be revealed that someone else would feel that they knew enough about that lesson to take it and run with it without consultation first.

6.2 KM IN PRACTICE - PROCEDURES AND PRACTICES
Note that KM is a complex topic, and in attempting to write about its various dimensions and to address it from different perspectives, some overlap is unavoidable.

6.2.1 KNOWLEDGE AUDIT
The obvious first step in launching a formalKMprogram throughout an organization is to conduct an information or knowledge audit.An audit answers the questions of what information and knowledge exists in the organization and where is it?Who maintains it?Who has access to it? Etc. The idea of an information auditory much predates KM as we have defined KM here. Accompanying, or more accurately a component of, the Information Resources Management (IRM) movement of the 1970’s was a strong emphasis upon the information or knowledge audit. The foremost exponent of the information or knowledge audit was Forrest (Woody) Horton. He and Burk developed a program called ‘InfoMapper’ [Burk and Horton, 1988] precisely to facilitate the conduct of an information audit.

6.2.2 TAGS,TAXONOMIES,AND CONTENTMANAGEMENT
Having identified and located information and knowledge, the obvious next step is to make it relocatable and retrievable, made possible by tagging and creating taxonomies. (Note that the term used by far the most frequently in this context in KM is “taxonomy.” The traditional professional information community would call what most authors in theKMfield call a taxonomy a classification scheme, or a classificatory or syndetic structure. But most writers in the KM domain come from the business world and are unaware of that terminology, and use the word “taxonomy” that they remember from their high school and college science courses.) Stage III of the development of KM, described above, can well be called the Taxonomy Stage.

6.2.3 LESSONS LEARNEDDATABASES
Lessons Learned databases are databases that attempt to capture and to make accessible knowledge that has been operationally obtained and typically would not have been captured in a fixed medium (to use copyright terminology). In theKMcontext, the emphasis is typically upon capturing knowledge embedded in persons and making it explicit.The lessons learned concept or practice is one that might be described as having been birthed by KM, as there is very little in the way of a direct antecedent. Early in the KM movement, the phrase typically used was “best practices,” but that phrase was soon replaced with “lessons learned.” The reasons were that “lessons learned” was broader and more inclusive, and because “best practice” seemed too restrictive and could be interpreted as meaning there was only one best practice in a situation.What might be a best practice in North American culture, might well not be a best practice in another culture.The major international consulting firms were very aware of this and led the movement to substitute the new term. “Best Practices” succeeded by “Lessons Learned” was the most common hallmark phrase of Stage I of KM development.

6.2.4 EXPERTISE LOCATION
If knowledge resides in people, then one of the best ways to learn what an expert knows is to talk with one. Locating the right expert with the knowledge you need, though, can be a problem. The basic function of an expertise locator system is straightforward, it is to identify and locate those persons within an organization who have expertise in a particular area. Such systems were commonly known as “Yellow Page” systems in the early days of KM, the name coming from the telephone book yellow pages, the section of the phone book, or a separate volume of the phone book, organized for subject search. In recent years, the term expertise locator or expertise location has replaced yellow pages as being rather more precise. After all the yellow pages metaphor with its implication of subject search could apply to many areas of KM, such as for example lessons learned and content management.
Expertise location systems are another aspect of KM that certainly predates KM thinking. The Mitre Corporation, for example, developed such a system in 1978. It was based upon creating a database developed from reformatted resumes retrieved from word-processing tapes, and upon the development of a competence area thesaurus to improve retrieval.However, even in a technologically sophisticated organization, generously, by the standards of the time, supplied with computer workstations, the system was underutilized, fell into disuse, and was for all practical purposes abandoned. More than two decades later, the system was essentially reinvented as part of a larger KM initiative [Mattox et al., 1999], by a development team that was totally unaware of the previous system and its thesaurus, which they would have called a “taxonomy,” and which had to be recreated. A journal article on the history of KM at Mitre [Maybury, M., 2003] starts its discussion in the late 1980s and makes no mention of the 1978 system. This is a good example of valuable organizational knowledge and expertise being lost due primarily to normal personnel turnover.

6.2.5 COMMUNITIES OF PRACTICE (COPS)
Communities of Practice (CoPs) are groups of individuals with shared interests that come together in person or virtually to tell stories, discuss best practices, and talk over lessons learned [Wenger, E., 1998a,Wenger and Snyder, 1999].Communities of practice emphasize the social nature of learning within or across organizations.
            The organization and maintenance of CoPs is not a simple and easy undertaking. As Durham, M. [2004] points out, there are several key roles to be filled, which she describes as manager, moderator, and thought leader. They need not necessarily be three separate people, but in some cases they will need to be. For a CoP, some questions that need to be thought about are: Who fills those roles? manager, moderator, and thought leader. How is the CoP managed? Are postings open, or does someone vet or edit the postings? How is the CoP kept fresh and vital? When and how (under what rules) are items removed?

6.3 PROCESSES,PROCEDURES,AND PRACTICESMATRIX
If we create a matrix in which the rows are KM Processes and the columns KM Procedures and Practices, and in which the ordering, top to bottom and left to right is roughly in chronological or serve, the matrix looks like:
 




Figure 6.1: Processes and Procedures & Practices Matrix.
That matrix reveals several interesting things. Almost everything one does in KM is designed to help find information and knowledge.However, if we assume that the main goal ofKMis to share knowledge and even more importantly to develop new knowledge, then the Knowledge Audit and the Tags, Taxonomies and Content Management stages are the underpinnings and the tools. It is the knowledge sharing and knowledge creation of one on one communications enabled by expertise locators, and the communal sharing and creation of knowledge enabled by communities of practice toward which KM development should be aimed.

  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS

Conflict of America Vs. Iran

the results of my response !!
Iran or Persia is a Middle Eastern country located in Southwest Asia. Iran is one of the founding members of the UN and the OIC and NAM epada. Iran is currently the object of conversation among many, especially after a conflict with a superpower, superpower, the U.S. hegemon of nuclear ownership.
Nuclear inspectors of the International Atomic Energy Agency (IAEA) in a secret report that has found new traces of plutonium and enriched uranium, both are potential materials maker warhead nuclear weapons in Iran.
The new trail they found in containers of nuclear waste storage site at Karaj, Iran. Nuclear monitoring agency of the United Nations (UN) can not be sure that Iran's nuclear program for peaceful purposes.
Iran's nuclear program actually started in 1959 when the Shah of Iran in power, with the purchase of research reactors to the United States. After the revolution of 1979, all nuclear activities are stopped and started again after the Iran-Iraq is complete. Iran became the state in favor of the Nuclear Non-Proliferation Treaty (NPT) in 1992. But in 2003 the IAEA in its report in June noted that Iran does not meet its obligations in accordance with the Safeguard Agreements, the IAEA mechanism to ensure that nuclear materials will be diverted to use to make nuclear weapons. Suspicions that Iran began developing nuclear weapons increasingly widespread.
In terms of the American conflict with Iran, particularly regarding the issue of Iran's nuclear program one of them is critic the United States where the United States focuses on the strengths and your opponent than Iran in possession of nuclear weapons and capabilities. Americans believe that Iran's ambition to use nuclear weapons to disrupt the peace and security of the United States, U.S. allies and alliances, as well as stability in the region. United States sees Iran's track record shows that problems of nuclear ownership, which is shown in which the eighteen-year history of Iran several times tried to hide its nuclear development program. United States sees Iran not give signs have made strategic decisions necessary to abandon the so-called active nuclear weapons program.
As a result of the embargo, starting with the rise in world oil prices. And Indonesia have an indirect effect of the war. As I know that the State of Iran and east Amid a global oil producer. With the oil embargo Caused suppky bernbagai State to increase of, one of Indonesia. Actual nuclear development is the development of science, for real. In the presence of nuclear development, will advance human knowledge. Starting from the source of energy to food technology.
However, any bias to be a nuclear threat when it used the wrong way. While the oil embargo by the United American is a great way to challenge indirectly the development of science. cause had been united merupaka iran science center and began to try to change it, then there is a variety of wars, threats by the United States.
America will continue to encourage a variety of sanctions for Iran and hope that Iran is really fulfilling its threat to close the Strait of Hormuz. Thus the Americans have reason to attack Iran which has been delayed several times due to weak excuse. On the basis of disruption of international interest, Americans expect to get international support.
Peace may be the best way, but the dispute for 32 years seems to be making Americans have run out of patience.

  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS

Conflict of America Vs. Iran


Will be completed in the Strait of Hormuz?

In the last three months of the conflict between Iran and the United States et al into the new episodes that can lead toward open warfare. War will break out if Iran closed the Strait of Hormuz. Iran will close the Strait of Hormuz if the European Union to realize the financial sanctions and an embargo on Iranian oil exports in July. The EU will continue to impose sanctions (following the U.S. sanctions that currently apply) if Iran does not halt its nuclear program. And Iran has insisted it will not stop nuclear program for peaceful purposes according to him.
Since the revolution of the mullahs led by Ayatollah Khoemeni in 1979 that overthrew U.S. ally, Shah Reza Pahlavi, Iran has become the target of America. Occupation of the U.S. Embassy in Tehran by student activists on 4 November 1979 followed by 52 diplomats hostage for 444 days, an American and shameful event is reason enough to sever diplomatic relations on April 7, 1980. Furthermore, under the pretext of human rights and democratic America dropped the various embargo vigorous, intelligent operations and military operations.
 On 24 April 1980, the American military operation with the password "Operation Eagle Claw" as a preliminary attack on Iran. This ends the operation failed, eight members of the U.S. military were killed and several were arrested. The assault was stopped as a signatory to Algiers Accords in Algeria on January 19, 1981. A day later, both parties mutually release the captives.
On January 1984, President Ronald Reagan declared Iran as "a sponsor of international terrorism" and mobilizing the countries in the world for not cooperating with Iran. On October 19, 1987, the American attack on Iran with the password "Operation Nimble Archer" and failed. On 18 April 1988, America returned to the attack with the password "Operation Praying Mantis" by attacking Iran's military position in the Persian Gulf and sank an Iranian-owned ships Frigate.
On July 3, 1988, the U.S. Navy ship launched a missile from the cruiser USS Vincennes and Airbus A300B2 aircraft to destroy Iran's flying over the Strait of Hormuz. Scheduled commercial aircraft is destroyed, 290 civilians were killed from six nations including 66 children. USS Vincennes in the Persian Gulf as part of "Operation Earnest Will". To the United Nations, Iran filed the incident as a terrorist act by the state. American responded that it is as "unintentional incident."
On October 1992, the U.S. sets sanctions on Iraq and Iran suspicion of allegedly developing weapons of mass destruction (WMD). In 1994, Conoco (American oil company) signed a contract with Iran oil investment of U.S. $ 1 billion. Feeling cheated, in March 1995, the U.S. set a total embargo on all types of investment and trade.
In 1993, the U.S. issued a policy of "dual containment" by publishing Ilsa (Iran Libya Sanctions Act), which contains sanctions for companies outside the United States that invests in Iran and Libya worth over 40 million U.S. $ a year. In 1996, the policy of "dual containment" is focused on Iran, come a ISA (Iran Sanction Act) which is a tightening of sanctions before, giving sanction to any company from any country that invests more than U.S. $ 20 million per year in oil industry Iran.


Triggers Nuclear Dispute

In 2000, the U.S. and its allies began to question Iran's nuclear program that Iran replied to the question of Israel's nuclear program, which began in 1952 with the help of American and British. Iran's nuclear program actually began long before the Islamic Revolution, on June 1967 when the government of Shah Pahlevi for the support of the U.S. and Germany established the TNRC (Tehran Nuclear Research Center) and has a five megawatt nuclear reactor scale. The deteriorating condition of the domestic force to stop Iran's nuclear program as well as the termination of cooperation with Siemens of Germany.
On August 2001, President Bush signed a bill extended the life of the Ilsa into a formal law. On January 29, 2002, U.S. President George W. Bush called Iran with Iraq and North Korea as a rogue nation "Axis of evil". Bush tried to attack a third country. Plans to attack North Korea canceled, because Americans are not supported by its close allies (South Korea and Japan) and was strongly opposed by China. Americans turned to Iraq, Iran peering.
In 2002 Iran stop its cooperation with IAEA and banning all forms of supervision and inspection of Iran's nuclear program. Iran IAEA reasonable and honest work is a part of American and Israeli espionage.
After Saddam Hussein fell, in June 2005, the U.S. preparing to attack Iran. Preparation is done by taking a base in Azerbaijan. Despite allegations, the U.S. gets fierce resistance from the Iraqi fighters, plan raids into Iran also suspended. United then used to conduct terror group Jundullah and sabotage against Iran's interests. In this action, Jundullah managed to kill about 400 Iranian soldiers. Jundullah itself an Islamic militant group based in Waziristan, Pakistan, organized and funded by the United States. ABC (the American Broadcasting Company) on this subject by quoting The Washington Times on April 3, 2007.
Stepping on the year 2006, the U.S. managed to garner support for the UN to impose sanctions against Iran over its nuclear program. Since then at least five United Nations imposed sanctions crucial to Iran. Iran refused to obey the Iran nuclear sanctions on the grounds for the sake of peace in order to meet domestic electricity demand, not for military purposes as charged America and its allies.

To the UN sanctions Nuclear Program Related

Dated March 23, 2007, Iran seized 15 British Marines are trying to make incursions into Iranian territory. Britain and the United inflamed, in October 2007 the U.S. dropped sanctions against Bank Sepah, Bank Arian, Kargoshaee Bank, Bank Melli and Bank Saderat Iran as an effort to trade blockade. Tensions increased in January 2008, when the U.S. Navy and Iran have faced each other in the Strait of Hormuz. In June 2008, Iran blockading the Strait of Hormuz for five hours in response to the Israeli invasion plan.
On April 2009, America dropped back IRPSA sanctions (the Iran Refined Petroleum Sanctions Act of 2009) which contains a threat to any person involved in Iran's oil refining industry. On June 18, 2009, Britain froze Iran's assets worth $ 1.59 billion. On 19 November 2009, the U.S. added sanctions include banning the sale IRPSA oil and gas exploration equipment to Iran, either by the state, enterprises and individuals. On July 26, 2010, the EU endorsed sanctions to restrict the activities of oil and gas investment in efforts to limit Iran's natural gas production.
On November 2011, the IAEA issued a report on Iran's nuclear program, the progress of Iran's nuclear program has reached the stage of the ability to make nuclear warheads for missiles. Asked Iran to stop its nuclear program or will be imposed an embargo on Iranian oil exports.



Failed Embargo, U.S. Prepare War

Various economic war being waged America and its allies since 1980 until today, not many reaping the rewards. Also with the latest sanctions are expected to make a variety of countries decided to trade relations with Iran. On January 26, 2012, India still bring in oil from Iran who is a supplier of 12 percent of its crude needs India. India to pay for this transaction in the currency of rupees which can then be used by Iran to pay for imports from India. Earlier India used U.S. $ to pay for Iranian oil. On February 3, 2012, China also sent two supertankers to carry around two million barrels of crude oil from Iran to the Khark Island, China. Two other ships, Davar and Hoda, also has been in the Iranian oil terminal to transport 2.4 million metric tons of crude oil to China.
Thirty-two years of living in Iran embargo did not make the weak. Similarly, for 32 years in the threat of war does not make Iran shriveled balls. But now, after looking at the military title of both parties, this is just hard to believe that in order "deterence". Chief Editor of the Russian National Defense magazine, Igor Korotchenko, predicted that war was imminent between the United States and Iran. America will continue to encourage a variety of sanctions for Iran and hope that Iran is really fulfilling its threat to close the Strait of Hormuz. Thus the Americans have reason to attack Iran which has been delayed several times due to weak excuse. On the basis of disruption of international interest, Americans expect to get international support.



  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS

Introduction Knowledge Management (KM)

Chapter 1

Introduction
1.1    WHAT IS KM?
1.      Davenport,T (1994) offered the following: “knowledge management is the process of capturing, distributing, and effectively using knowledge”
2.   Duhon, 1998 : “A discipline that promotes an integrated approach to identifying, capturing, evaluating, retrieving, and sharing all of an enterprise’s information assets. These assets may include databases, documents, policies, procedures, and previously uncaptured expertise and experience in individual workers”.
3.   The third definition by McInerney, C. [2002] is that “KM is an effort to increase useful knowledge within the organization.Ways to do this include encouraging communication, offering opportunities to learn, and promoting the sharing of appropriate knowledge objects or artifacts.”


1.2 THE HISTORY AND DEVELOPMENT OF KM
The appearance of the term “Knowledge Management” is a rather recent phenomenon. It appeared operationally only in the mid-1990s. The earliest print reference appears to have been used first in the context of library and information work. Marchand, D. [1985], then Dean of the School of Information Studies at Syracuse University, coined it in the 1980s as a descriptor for the final level in his stage hypothesis of information systems development [Koenig,M., 1992a]. However, the term, as presently used, appears to have been re-coined more or less anonymously somewhere among the major accountancy and consulting firms. The earliest reports seem to be from McKinsey & Co. Brook Manville, the first Director of Knowledge Management at McKinsey, reports that McKinsey launched an internal study whose title included the phrase Knowledge Management in 1987 (Manville, personal communication toMEDK, 2007). Larry Prusak, one of the acknowledged pioneers of the field, in a very corroborative communication, reports that Ernst & Young started using the term in 1992, and that McKinsey & Co. was using it “a bit earlier – about 1988?” (Prusak, personal communication to MEDK, 2007). Note that the early definition of KM cited above by Davenport (1994) stems from his work at Ernst & Young.

1.3 THE STAGES OF KM DEVELOPMENT
1.     “By the Internet out of Intellectual Capital” : Information Technology, Intellectual Capital, The Internet (including intranets, extranets, etc.) and Key Phrases: “best practices,” later replaced by the more politic “lessons learned

2.       Human and cultural dimensions, the HR, Human Relations stage : Communities of Practice, Organizational Culture,The Learning Organization (Senge), and Tacit Knowledge (Nonaka) incorporated into KM, Key Phrase: “communities of practice”.

3.      Content and Retrievability : Structuring content and assigning descriptors (index terms), Key Phrases: “ content management” and “taxonomies

4.       Access to External Information :  Emphases upon External Information and the recognition of the Importance of Context, Key Terms: “context” and “extranet

1.4 SUPPLEMENTARY WAYS OF LOOKING AT KM
1.4.1 THE IBM TWO BY TWO MATRIX
A MAP OF THE DOMAIN OF KNOWLEDGE MANAGEMENT

KM may also be displayed and to a degree defined graphically through mapping. The following

presents an expanded form of a graphic used by IBM in their KM consultancy to explain the value and purpose of KM.


1.4.2 THE FOREST AND THE TREES
KM-The New Business Potpourri or not Seeing the Forest for theTrees
What is that fundamentally important difference?

Think of all the management fads and enthusiasms of the late 20th century, 1975 – 2000.What is striking is how many of those management fads, enthusiasms, and topics are highly related with the management of information, knowledge flow in organizations or the management of information technology (IT). Below are some list of those management fads, enthusiasms, and topics that meet those criteria :  Enterprise Content Management (ECM), Supply Chain Management (SCM),Customer Relationship Management (CRM),Enterprise Resource Planning (ERP),Knowledge Management (KM),Intellectual Capital (IC),E-business,DataWarehousing / Data Mining,Core Competencies.

1.4.3 KM AS THE EXTENSION OFTHE SUCCESSFUL R&D ENVIRONMENT
Meta-Research, or KMis the Extension of the SuccessfulR&DEnvironment
A final way to view KMis to observeKMas the movement to replicate the information environment known to be conducive to successfulR&D- rich, deep, and opencommunication and information access - and deploy it broadly across the firm. The principles and practices of KM have developed in a very conducive environment, given that in this post-industrial information age, an increasingly larger proportion of the population consists of information workers.



C H A PT E R 2
Background Bibliographic
Analysis

One measure of the influence of a discipline is to track the “formal communications” or published works in that discipline. Ponzi observed that “knowledge management is one emerging discipline that remains strong and does not appear to be fading”. The authors have continued that tracking of the KM literature time series (Figure 2.1 below) through the 2009 literature. The KM business literature continues to grow.
Below (Figure 2.2) are the literature growth patterns of three of those major business enthusiasms. The difference is dramatic. Quality Circles, Business Process Engineering, and Total Quality Management all show an almostm identical pattern of approximately five years of dramatic, exponential, growth, then they peak and fall off to near nothing almost as quickly. KM, by contrast, has that same period of five years of exponential growth, 1994 to 1999, but in the decade since it has not declined, rather it has continued to grow steadily and consistently. All the hallmarks are here of a rather permanent development.

Figure 2.2: Literature graphs for “Quality Circles,” “TotalQuality Management,” and “Business Process
Reengineering.”
See Figure 2.3 below for the publication pattern. In general, the number of dissertations focusing on some aspect of knowledge management rises gradually until 2006 and has remained steady with about 100 theses produced each year in English with, however, a decline in 2008 and 2009.
Figure 2.3: Doctoral Dissertations and Masters Theses written with ‘Knowledge Management’ in the
Title, Abstract or KeyWord Fields 1996–2009.


C H A PT E R 3
Theorizing Knowledge in
Organizations

3.1 KNOWLEDGE AS RESOURCE AND PROCESS
Through the resource perspective, organizations view knowledge as a fundamental resource in addition to the traditional resources of land, labor, and capital. It is held that the knowledge that the firm possesses is a source of sustainable competitive advantage, and is, accordingly, regarded as a strategic resource of the firm in need of management attention. On the other hand, through the process view, organizations are thought of as information processing and knowledge generating systems [Grant, R., 1996]. Baumard, P. [1999] proposes looking at knowledge in organizations along two dimensions: tacit-explicit versus individual-collective. He defines four quadrants in which knowledge types are situated: tacit-individual (intuitiveness), tacit-collective (social practice), explicit-individual (expertise), and, explicit-collective (rules). Grounding the use of the quadrants in observations of exemplar case-study organizations, Baumard suggests that the creation of organizational knowledge can be tracked by locating actors’ responses (knowing) within the appropriate quadrants of the matrix.

3.2 INTERACTIONS FOR KNOWLEDGE CREATION
While knowledge itself may be perceived as a resource, its creation occurs through human interactions, whether physical or virtual. For example, for knowledge to emerge from within a group, interactions that occur among its members shape the knowledge that emerges from the mutual engagement and participation of the group members. Nonaka and Takeuchi are the most prominent theorists in the knowledge management domain. Their SECI (Socialization, Externalization, Combination, Internalization) model posits a spiral-type process in which knowledge goes from within a person’s own knowledge store to a more explicit state that can be shared socially with others.

3.3 ACTIVITY AS CONTEXT
Instead of examining knowledge per se, Blackler, F. [1995] and others propose that attention should focus on systems through which knowing and doing are achieved. By suggesting an alternative stance of knowing as mediated, situated, provisional, pragmatic, and contested, as opposed to a more classic viewof knowledge as embodied, embrained, encultured, and encoded, Blackler recognizes that knowledge permeates activity systems within the organization. Building on Engeström, Y. [1999] general model of socially distributed activity systems, Blackler, F. [1995] proposes that knowledge can be observed as emerging out of the tensions that arise within an organization’s activity systems, that is, among individuals and their communities, their environment (rules and regulations), and the instruments and resources that mediate their activities.


  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS