Robust Knowledge Management Approach for Continued …documents.grenadine.co/PMI Bangalore India...
Transcript of Robust Knowledge Management Approach for Continued …documents.grenadine.co/PMI Bangalore India...
Robust Knowledge Management Approach for
Continued Success
Leadership Challenges
Abstract ID : PMIBC-17-3-010
Authors : Srividya Natasa Misra & Boopathy Jayaraman
a
Project Management Practitioners’ Conference 2017
www.pmibanga lorechapter .o rg
Page 2
CONTENTS
Abstract ........................................................................................................................................................................ 3
Introduction .................................................................................................................................................................. 3
Details of the paper...................................................................................................................................................... 4
Conclusion ................................................................................................................................................................. 13
References ................................................................................................................................................................ 13
Project Management Practitioners’ Conference 2017
www.pmibanga lorechapter .o rg
Page 3
ABSTRACT
Leaders face various challenges both internal & external to the organizations which require them to arrive at
winning strategies to accomplish goals in line with their vision and the values of the organization.
One of the most important challenges the leaders face is managing and retaining knowledge in the organizations.
Due to high demand for cutting-edge technology skills in the competitive market, most of the organizations
experience disruption in business continuity if highly skilled associates possessing a wealth of knowledge quit.
We propose a 5 pronged approach. One is to keep the highly skilled associates who are core and critical to the
organizations knowledge base and business, engaged and motivated by recognizing their accomplishments and
providing better opportunities & incentives. The second one is developing the capabilities of less skilled associates
through cross skilling using experiential learning method and AGILE methodologies (Pair Programming, Behavior
Driven Development). The third one is to have a robust Knowledge Management System using SECI framework
(Socialization, Externalization, Combination, Internalization) which is live and continuously updated. The fourth one
is the automation of mundane tasks to engage employees with exciting & more value added tasks. The fifth one is
to protect the corporate knowledge (intellectual property).
Together, with these 5 approaches any leader can effectively address this perpetual challenge of Competency
development, Knowledge Management and Key Associates retention.
Keywords – Knowledge Management, Associate Engagement, Competency development, SECI, cross skilling,
experiential learning
INTRODUCTION
With the advent of automation and latest technologies and their demand in market, leadership in any industry face
an enormous challenge in retaining the best talents. One of the biggest challenge in knowledge attrition is not
having a robust knowledge management system. While automation is generally seen as a threat which might take
away the jobs, there are also opportunities that it brings with it.
To help retain the best talents and their vast wealth of knowledge, we propose a five pronged approach of
knowledge management which has been used widely and quite successfully across the industry.
This article vividly describes the approach, the tools and methodology which will help in coming up with a robust
knowledge management system specific to IT industry.
Project Management Practitioners’ Conference 2017
www.pmibanga lorechapter .o rg
Page 4
DETAILS OF THE PAPER
The five-pronged approach for Robust Knowledge Management for Continued Success is
Figure 1: Five-pronged Approach for Robust Knowledge Management
5 Pronged Approach of Competency Management
A. Motivate & Retain highly
skilled associates
B. Develop Capabilities of less skilled associates
C. Robust Knowledge
Management System
D. Automation
E. Safeguard Corporate
Knowledge & Intellectual
Property
Project Management Practitioners’ Conference 2017
www.pmibanga lorechapter .o rg
Page 5
A. Motivate & Retain the highly skilled associates
In today’s economy with the technology advancement and cut throat competition, where people connect
instantly and access information from various sources, organizations have realized that highly skilled
associates are one of the valuable assets for business success. Retaining them has become all the more
important & challenging due to high costs of recruitment and selection, not to mention the productivity loss
due to the learning curve of new or existing associates to scale up. Apart from monetary benefits,
associates want to feel valued, appreciated at workplace and proud of their contribution to the
organization’s growth.
Here are a few ways to keep the highly skilled associates motivated and engaged:
Raise expectations at workplace by engaging the associates with highly challenging tasks even
for daily operational activities. Give the associates the purpose of doing things by explaining “the
big picture” of how their work contribute to the business goals & success. Associates should feel
that they are continuously learning at work.
Empower the associates by letting them lead & take part in the decision making as possible.
Engage the potential associates seen as emerging leaders in reverse mentoring program to
mentor the senior executives to exchange ideas & challenge each other.
Frequent communication with the associates on the personal aspiration & career development
goals, work together to define the development plan and ensure the effectiveness of
implementation. Listen to the associates needs and translate them to fit to the organization goals.
Engage & mentor them in organization initiatives on latest technologies i.e. hackthon
competitions, seminars.
Guide them in realizing their passion to work in the implementation of ideas/innovation and
make them integral part of department/organization experts working groups
Bring positive reinforcement at workplace with Reward & Recognition program by giving
individuals a surprise bonus for their exceptional work. Create a culture of celebrating the success
of each & every milestone (small & big). Encourage the key members to take part in team building
activities and other organizational activities of their interest - cultural programs, mentoring / training
the junior associates, involve in Corporate Social Responsibility activities.
Encourage the associates to pursue their dreams/hobbies apart from the work-related activities
by accommodating them to participate in sports and cultural programs of their interest. Allow the
associates to take vacation time so that they can pursue their personal interests.
Engage the family members of the associates at workplace with programs like “Bring Family to
Office” or “Bring Child to Office”. Associates and their family members feel happy and delighted if
the family members get surprise gift as a token of appreciation. Some organizations already do
this effectively.
Project Management Practitioners’ Conference 2017
www.pmibanga lorechapter .o rg
Page 6
Evaluate & measure the associate engagement & motivation with periodic associate
satisfaction survey (at least once a year or even once in 2 years is still effective).The above means
of motivating associate would also result in the improved productivity and cost turnover. The
measures of these key performance indicators would gauge the effectiveness & success of
associate satisfaction.
B. Develop the capabilities of less skilled associates
Competency Management system supports the development of professional and methodological
capabilities of associates focusing on strategic and target-group oriented standard competencies. To
achieve business goals, here are the following steps to develop the capabilities of less skilled associates:
Figure 2: Steps to develop the capabilities of less skilled associates
• Identify current skills required vs the business needs
•Evaluate the current skills level
•Set the target skills level at least for next 1 year
Skills Gap Analysis
•Pair Programming
•Experiential Learning/On-job training/Hands-on
•Demos/Presentation on the learnings
•Gemba walk
•Classroom sessions
•External trainings
•Mentoring & coaching
•Continous feedback
•Conduct fun learning activitiesi.e. bug mining,monthly quizzes
Methods
• Identify the key performance indicators and evaluate periodically
•Feedback obtained from the associates & mentors on the methods
•Quality of deliverables
Evaluation
Project Management Practitioners’ Conference 2017
www.pmibanga lorechapter .o rg
Page 7
C. Robust Knowledge Management system 1) Defining Data, Information & Knowledge
Data is the facts or observations, which are unorganized and
unprocessed and therefore has very less meaning unless processed.
Information is organized and processed data and therefore are
meaningful, valuable, useful and relevant.
Knowledge is contextualized information gained with experience,
knowhow, understanding and insight.
Figure 3: Data to Information to Knowledge
2) Different types of Knowledge
Tacit knowledge can be defined as “skills, ideas and experiences that people have in their minds and are,
therefore, difficult to access because it is often not codified and may not necessarily be easily
expressed”(Chugh, 2015).In the field of knowledge management, the concept of tacit knowledge refers to a
knowledge which cannot be fully codified.
Explicit knowledge is knowledge that can be readily articulated, codified, accessed and verbalized. It can be
easily transmitted to others. Most forms of explicit knowledge can be stored in certain media. The most
common forms of explicit knowledge are manuals, documents, procedures etc.
3) The Need of Robust Knowledge Management System & SECI Framework
As per Gartner IT Glossary “Knowledge management (KM) is a business process that formalizes the
management and use of an enterprise’s intellectual assets. KM promotes a collaborative and integrative approach
to the creation, capture, organization, access and use of information assets, including the tacit, uncaptured
knowledge of people”
Knowledge Management is closely coupled to organization goals & strategy and enable in creating value to the
organization. KM therefore should create the right tools, store the knowledge and make it available for the right
people at the right time to augment the learning process.
Knoco Ltd conducted Global Knowledge Management Survey 2014 with various knowledge consultants &
practitioners by asking them to prioritize the key elements of their KM implementation from a list of 11 potential KM
approaches.
Knowledge
Information
Data
Project Management Practitioners’ Conference 2017
www.pmibanga lorechapter .o rg
Page 8
The survey results show these as the core components of KM:
Connecting people
Learning from experience
Improve access to documents
Retention of knowledge
Creation of best practices
Innovation
These KM core components required to be translated to business terms to solve the major business issue on how
to bring knowledge from different sources, Information Management, Recordkeeping, maintain capabilities over
time, speeding up the learning curve, standardization, business decision making and continuous improvement
In order to address these issues, there are various knowledge frameworks available in the industry which are
interdependent. This paper focuses on one of the frameworks “SECI” – (Socialization, Externalization,
Combination and Internalization)
The SECI model of knowledge dimensions is a model of knowledge creation that explains how tacit and explicit
knowledge are transformed into organizational knowledge. The SECI model was originally developed by Ikujiro
Nonaka in 1990 and later further refined by Hirotaka Takeuchi.
These four modes of conversion of knowledge support both the push & pull (knowledge supply and demand).In
ideal situation, push & pull should run synchronously to avoid the knowledge oversupply/shortage leading to
destruction of knowledge value. The balance between the push & pull should be reviewed periodically.
Figure 4 : SECI Framework
Project Management Practitioners’ Conference 2017
www.pmibanga lorechapter .o rg
Page 9
4) Real Time examples of SECI framework Model :
D. Automation
Due to changing business situation the traditional organizations are struggling to maintain the tightly coupled
legacy software which required them to coordinate development and deployment efforts across hundreds to
thousands of engineers, making frequent deliveries impossible. The deliveries they do to provide to customers
require lots of manual effort. As a result the largest traditional organizations are finding it challenging to compete &
deliver the software innovation that their business require. Besides, these organizations see high attrition rate due
to low motivation factor among associates working on mundane & repetitive tasks for a long period.
As per Garner reports, around 80% of the activities in IT Operations are procedural and repetitive and there is an
opportunity that to magnify the efficiency, applying Devops (Continuous Delivery) & Agile principles would reduce
the development cost and increase the no. of products/services delivered to the end-users. The gained capacity
would be utilized to focus on new business strategy topics, innovation and re-skilling the associates with
new technologies i.e. Digital, Artificial Intelligence, Virtual Reality, Cloud, IoT etc
To focus on the clear business objective of most of the organization to utilize freed-up capacity for innovation is to
improve the productivity of operational activities. Therefore, value stream mapping tool is used to understand the
cost and cycle time drivers to identify waste in the development processes.
Based on various reports and data, it has been observed that build, integration and testing processes are driving
factors both for cost and cycle time. Many large organizations have deployed Devops practices (Continuous
Delivery & Deployment) in accordance with Agile methodologies resulting in the reduction of cost and cycle time.
Project Management Practitioners’ Conference 2017
www.pmibanga lorechapter .o rg
Page 10
Continuous delivery is a DevOps software development practice where code changes are automatically built,
tested, and prepared for a release to production. It allows developers to automate function & non-functional testing
activities apart from unit tests to verify application updates before deploying to production. This helps developers
more thoroughly validate updates and discover issues early.
Every revision of source code that is committed triggers an automated workflow that builds, tests, and then stages
the update.
In continuous deployment, revisions are deployed to a production environment automatically without explicit
approval from a developer, making the entire software release process automated.
1) Scope for automation in the development life cycle
Project Management Practitioners’ Conference 2017
www.pmibanga lorechapter .o rg
Page 11
2) Major benefits from Automation & Continuous delivery approach:
Higher quality as focus is more on higher level testing activities such as exploratory testing, usability
testing, and performance and security testing apart from unit testing.
Low risk releases by applying patterns such as blue-green deployments (technique that reduces
downtime and risk by running two identical production environments called Blue and Green. At any time,
only one of the environments is live). If something unexpected happens in the live production environment
(let’s say Green), can immediate roll back to the last version by switching to Blue environment can be
done.
Faster time to market due to automate builds & testing activities results in the reduction of rework effort
and deliver to customer on faster pace.
Lower fixed costs associated with release process by build, test, deployment and environment
automation.
Continuous feedback from end users throughout the delivery lifecycle based on working software.
Alpha/Beta testing enable the development team to take a hypothesis-driven approach to product
development to test ideas with users before developing the complete features.
High motivation in the team as the team can engage more actively & regularly with users by
understanding their requirements, and see immediate outcome of the work. Moreover, the associates
would also engage on implementing new ideas/innovations.
E. Safeguard of Corporate Knowledge (Intellectual Property)
The four important pillars of the business are working capital, Fixed Assets, Intangible Assets and Intellectual
Property. Intellectual property is the result of creativity that includes industrial designs, copyrights, trademarks and
patents. For product based organizations operating in dynamic environment there is a need to actively protect their
interest by securing patents on innovating technologies.
The organization defines information security policy to ensure appropriate measures are put in place to protect
corporate information and the Information Technology Services (ITS) systems, and associated infrastructure.
The policy determines how the ITS services and infrastructure should be used in accordance with ITS industry
standards and to comply with strict audit requirements e.g. ISO/IEC 27001:2006.The objective of this policy is to
secure the business assets against theft, fraud, malicious or accidental damage, breach of privacy or
confidentiality.
To ensure the protection of the corporate knowledge, the organizations design and detail out the processes for
Design protection, Development Agreements, Invention Reports, License Agreements, Non-Disclosure
Project Management Practitioners’ Conference 2017
www.pmibanga lorechapter .o rg
Page 12
Agreements, Open Source Software, Patents and Utility Models, Patent Infringements, Patent-Portfolio
Management, Patent Monetization, Patent Searches, Patent Watch, Trademarks & Trademark Piracy.
1) Major four types of intellectual property rights are :
A patent grants property rights on an invention, allowing the patent holder to exclude others from making,
selling, or using the invention. Since patent rights are exclusive, anyone making, using or selling the
patented invention without the patent owner’s authorization is guilty of infringement.
Copyright is a legal right that grants the creator (an individual or the business) of an original work
exclusive rights for its use and distribution. In contrast to patents, copyright protects only the original
expression of ideas, and not the underlying ideas and also lasts for a longer period than patents.
A trademark is a word, phrase, symbol, or design, product name & packaging or domain names that
distinguishes the source of products or services of one business from its competitors. In order to qualify for
patent protection, the mark must be distinctive. Trademark search before registering for a trademark would
ensure that a similar trademark doesn’t already exist.
A trade secret is a formula, process, device, or other business information that companies keep private to
give them a business advantage over their competitors. Examples of trade secrets in software include:
• Survey results
• Computer algorithms
• Source code, Designs, Formulas
To ensure the trade secret protection, an appropriate protection program is developed to include steps
such as
• Non-disclosure agreements as joining formalities
• Restricted access to source code & client data
• Password protections
• Limiting the number of people with access to sensitive information & areas (restricted Offshore
Development centres) by restricting the people of carrying pen drives and smart phones
• Post-employment restrictive covenants
• Installation of anti-virus software
• Security practices such as restricted access to internet, download of file, connecting devices(Pen
drive/USB)to laptops/machines
This prevent others from taking or using the source code, development processes, and algorithms without
permission.
Project Management Practitioners’ Conference 2017
www.pmibanga lorechapter .o rg
Page 13
In case for any breach or infringement of the intellectual property rights, it should be reported to the Information
Security Officer immediately for investigation.
Disaster Recovery Plans, Business Continuity Plans, backup strategies and fail over plans for the core IT services
and infrastructure ensure that any outages or disasters can be recovered from in the shortest possible time with a
minimal amount of data loss.
Frequent awareness program to the associates on the Information Security policies and procedures, protection of
intellectual property rights should be imparted to ensure that the associates are vigilant on the policies. Besides,
periodic audits and assessments would ensure that the security of data and resources are monitored and tracked
and corrective and preventive measures are taken appropriately.
CONCLUSION
Retention of best talent and the vast wealth of knowledge is a challenge. However with the right approach and a
robust knowledge management approach, we can ensure that the knowledge is retained within the organization.
Though a robust knowledge management approach doesn’t fill the gap for a talent loss, however it goes a long
way in ensuring that incoming and existing talent have access to the right information and thereby reducing the
impact of attrition and also to reduce attrition.
REFERENCES
1. https://en.wikipedia.org/wiki/SECI_model_of_knowledge_dimensions
2. The Knowledge Manager's Handbook by John M. Nickles and Patrick Lambe
3. Continuous Delivery by Jez Humble (Author), David Farley (Author), Martin Fowler (Foreword)
4. Leading the transformation applying agile and devops principles at scale by by Gene Kim and Gary Gruver
5. Various sources from internet on Intellectual Property Rights
6. http://www.knowledge-management-tools.net/knowledge-management-systems.html
7. https://continuousdelivery.com/