<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Knowledge Re-Use As Engineering Re-Use: Extracting Values From Knowledge Management</article-title>
      </title-group>
      <contrib-group>
        <aff id="aff0">
          <label>0</label>
          <institution>Christopher Yeung and Tony Holden Department of Engineering</institution>
          ,
          <addr-line>Cambridge University 28 Trumpington Street, Cambridge CB2 1PZ</addr-line>
          ,
          <country country="UK">U.K</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>1998</year>
      </pub-date>
      <abstract>
        <p>This paper presents a knowledge-sharing framework for achieving effective knowledge reuse within industrial organisations. This knowledge re-use paradigm goes beyond traditional engineering re-use which focuses solely on re-applying tangible resources such as hardware components, software objects or information repositories in new situations. The Knowledge-Sharing Management (KSM) framework describes how managers can align knowledge management strategy with corporate core competence strategy by articulating the values and risks of knowledge re-use. A general knowledge-sharing process is abstracted into a five-stage process model (adoption, adaptation, absorption, integration, dissemination), supported by four pillar components (organisational infrastructure, actor, technological enabler, sharing channel), which together guide the design of the work environment and processes by integrating the concept of effective knowledge reuse.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1 Introduction</title>
      <p>Engineering re-use is the business strategy of using the
firm’s existing assets in new applications to create new
assets. An asset can be a tangible or intangible resource,
possessed or otherwise controlled by the company used in
achieving corporate goals. In other words, re-use in
general aims to exploit the value of economy of scale of
assets by leveraging resources spent in one application in
multiple other situations to reduce time to market,
development resources, costs and risks.</p>
      <p>Given that the value of knowledge now embodied in
The copyright of this paper belongs to the paper’s authors. Permission to copy
without fee all or part of this material is granted provided that the copies are not
made or distributed for direct commercial advantage.</p>
      <sec id="sec-1-1">
        <title>Proc. of the Third Int. Conf. on Practical Aspects of</title>
      </sec>
      <sec id="sec-1-2">
        <title>Knowledge Management (PAKM2000)</title>
        <p>Basel, Switzerland, 30-31 Oct. 2000, (U. Reimer, ed.)
http://sunsite.informatik.rwth-aachen.de/Publications/CEUR-WS/Vol-34/
products, services and business processes attribute an
increasingly larger portion of total costs, effective sharing
of knowledge can give significant economic and lead-time
advantages that potentially provide the key differentiating
factor in any engineering re-use initiative. From a
practical KM perspective, reusable assets can be
knowledge of the know-how, know-why and know-what
[Bla95] that constitutes an organisational memory
[Wal91] “in the business about customers, products,
processes and competitors” [KPM98]. In this aspect,
knowledge is as much about whom you know as it is about
what you know [Bad1991; Lot1998].</p>
        <p>However, firms have hitherto often not considered the
reuse of knowledge as part of the overall re-use strategy.
The knowledge factor was either ignored as it would
somehow be ‘picked-up’ by the person who attempted to
re-use a component, or because knowledge could only be
re-used unconsciously through some hidden cognitive
processes and ad-hoc organisational routines that defy
management. This study, conducted within a broader
framework of engineering re-use project involving
Cambridge University Engineering Department and 8
U.K. companies in the manufacturing engineering,
chemical, aerospace, automobile and defence industries, is
the initial work in developing the Knowledge-Sharing
Management (KSM) framework to articulate the salient
enablers and barriers to knowledge transfer. This initial
work leads to an engineering re-use approach which
considers the presently missing factor of tacit knowledge.</p>
      </sec>
      <sec id="sec-1-3">
        <title>1.1 Beyond Re-Using Tangible Outputs</title>
        <p>Traditionally, assets can be re-used in one of two ways,
either through the re-use of hardware, such as physical
parts or components, or through the re-use of software,
such as libraries of functions or objects [Mol99; Rei97;
Sut00]. Such a re-use paradigm is invariably based on the
logic that development efforts can be minimised by
reusing the tangible outputs produced from previous
undertakings. Tangible outputs are often those where the
knowledge of technology, design, experience of use and
lessons learnt are embedded. This ‘black-box’ concept
does not necessarily require thorough understanding of the
detail of designs, implementation or the inner workings of
the re-used object. One only needs to understand its
external interface as an individual component in order to
re-use it. This typically allows one to build upon others’
tangible outputs.</p>
      </sec>
      <sec id="sec-1-4">
        <title>Reusable Assets</title>
      </sec>
      <sec id="sec-1-5">
        <title>Asset Characteristics</title>
        <p>‘Black-box’ approach to re-use – definition of external interface
determines reusability, design rationales are abstracted and
information about implementation details are hidden inside the
‘black-box’.</p>
        <p>Recent attempts [Gru95; Pir95; Svi96] in the field of
reuse include ‘knowledge re-use’ from a knowledge
engineering approach. In this approach, it is the (formal)
representations of knowledge that are really get re-used.
Such imperative symbolic or connectionist representations
of knowledge are in fact static snapshots of elicited
domain knowledge extracted from subject experts.
Another approach to ‘knowledge re-use’ are the attempts
to re-interpret codified knowledge by data-mining
repositories of information, searching attributes of
scenarios to identify correlations of cases and repetitive
patterns [Bor97; Bru99; Kuh97; Lin99]. Knowledge has
to be codified with the use of a priori structured
articulation processes. In other words, merely the tangible
outputs are still being re-used.</p>
        <p>On the other hand, knowledge held by people is dynamic
and context dependent. Human cognition, subject to its
limited processing capability, is able to adapt the
conceptual model of knowledge to situate the application
context [Men98a]. The adaptation is often aided by tacit
knowledge developed through experience of use,
professional praxis, and repetitive practice. The above
‘black-box’ approach to re-use is thus insufficient in
allowing the knowledge user to understand and discern
contexts of application. Accustomed to a ‘black-box’
approach, practitioners are often unaware of the part tacit
knowledge is playing in re-use. They either ignore it or
reuse it sub-consciously, preferring instead to grapple with
tangibles. However, as knowledge increasingly commands
a larger portion of the total cost and value of the whole
product package, it is important to go beyond merely
reusing the tangible outputs. To do so, knowledge re-use
requires situated understanding and interpretation of the
lessons learnt, organisational best practices and
capabilities. It involves mobilising knowledge embedded
in decision-making processes and organisational routines
[Leo98; Nel82]. This implies re-using networks of
interlinking knowledge as a whole rather than individual
modules of knowledge. Effective re-use thus needs to
encompass a holistic KS methodology as an integral part
of the overall engineering re-use strategy. The following
table summarises the different re-use approaches from a
knowledge perspective:</p>
      </sec>
      <sec id="sec-1-6">
        <title>Knowledge Embodiment</title>
        <p>Knowledge embedded in
reusable components as objects.</p>
      </sec>
      <sec id="sec-1-7">
        <title>Unit Of Knowledge Re-Used</title>
        <p>Individual component level.</p>
      </sec>
      <sec id="sec-1-8">
        <title>Knowledge Re-Used</title>
        <p>Explicit and codified
knowledge of know-how.</p>
        <sec id="sec-1-8-1">
          <title>Knowledge encapsulated in</title>
          <p>objects, frames or codified in
repositories.</p>
          <p>Symbolic representations such
as domain rules, models,
frames or past cases.</p>
          <p>Elicited knowledge codified
into symbolic representations.</p>
        </sec>
      </sec>
      <sec id="sec-1-9">
        <title>Uncodified Knowledge</title>
      </sec>
      <sec id="sec-1-10">
        <title>Intangible / Process</title>
        <p>Individual, group,
organisational, and
interorganisational knowledge of
regulatory, functional,
positional and cultural assets.
Lessons learnt, experience,
skills, best practices and
capabilities are re-used with
historical, rational context
specific details.</p>
        <p>Knowledge interwoven with
decision-making process or
organisational routines.</p>
        <p>Network of interlinking
knowledge.</p>
        <sec id="sec-1-10-1">
          <title>Explicit as well as tacit</title>
          <p>knowledge, can be either
codified or uncodified
knowledge of know-how,
know-why and know-what.
Meta-cognitive knowledge
[Kha98] with ability to
familiarise new contexts,
perspectives and roles in
problem solving, learning and
discovery.</p>
        </sec>
      </sec>
      <sec id="sec-1-11">
        <title>Critical Success Factors</title>
      </sec>
      <sec id="sec-1-12">
        <title>Business Model</title>
      </sec>
      <sec id="sec-1-13">
        <title>Market Positioning</title>
      </sec>
      <sec id="sec-1-14">
        <title>Re-usable Knowledge</title>
      </sec>
      <sec id="sec-1-15">
        <title>Knowledge Re-Use Strategy</title>
      </sec>
      <sec id="sec-1-16">
        <title>Re-use Codified Knowledge In Tangible Outputs</title>
      </sec>
      <sec id="sec-1-17">
        <title>Hardware Software</title>
        <p>Technology oriented solution, with IT as the centrepiece.
Employ techniques of pattern matching, data mining or
casebased reasoning to identify re-usable assets.</p>
        <p>Employ techniques of artificial intelligence and knowledge
engineering to elicit and represent knowledge.</p>
        <p>Accuracy and speed of identifying relating reusable objects.
Dimensions of success factors: traceability, storage, retrieval,
and versioning.</p>
      </sec>
      <sec id="sec-1-18">
        <title>Uncodified Knowledge</title>
      </sec>
      <sec id="sec-1-19">
        <title>Intangible / Process</title>
        <p>Human oriented solution,
involving soft factors to
facilitate resolution of
organisational and cognitive
issues.</p>
        <p>IT as a technological enabler
to support the knowledge
reuse process.</p>
        <p>Re-use strategy aligns with
business strategy.</p>
        <p>Situated re-use approach fits
with context of organisational
culture and tasks.</p>
        <p>Re-use method not exceeding
the cognitive capabilities of
the work force.</p>
        <p>The business implications from the above discussions are that organisations need to adopt two different strategies for
reuse, with one based on the codification of explicit knowledge embedded in tangible objects, and the other on
personalised sharing of tacit knowledge [Han99]:</p>
      </sec>
    </sec>
    <sec id="sec-2">
      <title>2 Knowledge Re-Use Analysis</title>
      <p>Current methods for knowledge re-use analysis can be
viewed from three perspectives. Firstly, units of
knowledge re-used from a stakeholder perspective along
the supply chain [Por85], which may involve transferring
of individual, group and organisational knowledge
internal to the firm [Edv98; Nah98; Bak94] or
appropriation of external knowledge across firm
boundaries [Bad91]. Knowledge stakeholder perspective
can be used to map potential sources of knowledge and
where are the recipients [Hol98] of identified knowledge
transfers. Secondly, knowledge development lifecycle
[Sie99] is a useful guide to visualise the dynamic
development of knowledge over time [Non95; Rei96].
The knowledge lifecycle captures the temporal dimension
of dynamic knowledge development within the
organisation. Knowledge demand and knowledge supply
analysis can supplement to ensure availability of required
knowledge to the recipient at any particular point in the
knowledge lifecycle, serving as a guide for setting KS
targets and assessing results of knowledge development
over time. Thirdly is the dimension of re-usable
knowledge content from a typological perspective [Pol66;
Non91; Jen95; Bla95; Tee98a]. The knowledge typology
categorises the characteristics of knowledge content to be
shared, which, having considered the constraints of the
characteristics, provides the basis for specifying
appropriate technological tools and organisational
environment to support the sharing activities.</p>
      <p>Ruggles [Rug97] points out that information and
communication technology tools are useful in augmenting
KS activities by reducing the temporal, organisational,
spatial and social distances. But their limitations, that
tools themselves do not encourage or otherwise
discourage KS [Rug97; Fra98], need to be recognised. On
the impacts of organisational environment, Sanchez &amp;
Heene [San97b], Senge et al. [Sen94] and many
researchers [Gal94; Non94; Bah92; Dav98a; Che96;
Chi96; Mag98; Mal98; Man97; Mat96] have agreed on
the importance of organisational forms on facilitating or
otherwise hindering the flow of knowledge from the
knowledge carrier to the knowledge recipient. Jensen &amp;
Meckling [Jen95] in particular proposes the use of agency
and knowledge transfer costs to analyse the cost
effectiveness of knowledge flow in terms of co-location of
decision rights and possessed knowledge – that is, the role
and responsibility structure delegating the
decision24-3
making authorities to the knowledge carriers. The design
of organisational form should then take into consideration
the sum of agency cost and knowledge transfer cost in
supporting KS.</p>
      <sec id="sec-2-1">
        <title>Unit Of Knowledge</title>
        <p>Individual:
Human capital1 of creativity, skills,
cognitive ability to learn, absorb and
assimilate knowledge.</p>
        <p>Group:
Communities of practices.</p>
        <p>Organisational:
Social capital2,3 of culture.</p>
        <p>Structural capital1 of organisational
form and infrastructure.</p>
        <p>Organisational capital1 of business
process and innovation.</p>
        <p>Inter-organisational interface:
Relationship capital1,3 of
customersupplier network.</p>
        <p>Partnership / alliance network of
knowledge links4.
1: [Edv98]; 2: [Nah98]; 3: [Bak94];
4: [Bad91]</p>
      </sec>
      <sec id="sec-2-2">
        <title>Dynamic Knowledge Development</title>
      </sec>
      <sec id="sec-2-3">
        <title>Lifecycle</title>
        <p>Knowledge creation1, growth, re-use,
decay and attrition2 over time.
1: [Non95]; 2: [Rei96]
euR rsanT nK
lseab rfom leow
A ed gd
ss In e
tse to</p>
      </sec>
      <sec id="sec-2-4">
        <title>Knowledge Asset [Hal97]</title>
        <p>Regulatory assets:
Intellectual property, patent,
trademark, copyright, licence,
registered proprietary designs.
Functional assets:
Employee, distributor, supplier
know-how, know-why, know-what.
Innovation capability.</p>
        <p>Positional assets:
Reputation of company, product
brands, distribution network,
established market entry barrier,
customer base, unique access to
suppliers and partnership networks.
Cultural assets:
Not-invented here culture of re-use
versus originality, openness to share
re-usable assets.</p>
      </sec>
      <sec id="sec-2-5">
        <title>Knowledge Typology</title>
        <p>Tacit / Explicit [Pol66; Non91], General / Specific,
[Jen95] Know-How / Know-Why / Know-What
[Bla95], Positive / Negative [Tee98a], Autonomous
/ Systematic [Tee98a].
It is the intention of organisations to transform knowledge into assets, which can be owned and possessed by firms
having longer lasting values. Hall [Hal97] gives a clear categorisation of knowledge assets in terms of regulatory asset,
functional asset, positional asset and cultural asset. However, though there are many existing theories on exploiting
inter- and intra-firm knowledge [Bad91; Fra94; Mow96; Non94; Non95; Szu96; Tee98a], the linkage between
knowledge as a resource and knowledge as an asset is under-developed. What is not clear is how the transformation
takes place, how knowledge content can become re-usable assets and how to design the environment to facilitates KS
activities so that knowledge can be transformed into assets and knowledge re-use can effectively take place. This is the
gap which the KSM framework intends to fill. Figure 1 captures the relationship between the three knowledge re-use
perspectives and the transformation of knowledge into knowledge assets.
3</p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>Knowledge-Sharing Management Framework</title>
      <p>Following on from the above knowledge re-use analysis, we have developed a holistic KSM framework focusing on the
re-use and sharing of knowledge. This new framework is illustrated below.
minate
e
Diss</p>
      <p>Sharing</p>
      <p>Channel
Integrate</p>
      <p>Knowledge Sharing
(Knowledge Asset)
Technological</p>
      <p>Enabler
Reduce Risk
(Lower Cost)
Enhance Productivity
&amp; Effectiveness
(Higher Value)</p>
      <p>Organisational</p>
      <p>Infrastructure</p>
      <p>Core Competence
Competitive Advantage</p>
      <p>Actor</p>
      <p>A
d
a
p
t
sorb
b
A
The business context is provided by the competitive
advantages achieved through reduction of business risks
(costs) and enhancement of productivity and effectiveness
(values). A mapping of knowledge resources to targeted
re-usable knowledge assets can be used to support the
development of knowledge-based core competencies of
the firm. The mapping identifies required knowledge
resources to be mobilised to attain core competence
development objectives. The targeted core competencies
can provide the business rationales for KS initiatives in
terms of values of enhanced productivity and mitigated
risks. The risks mitigated can be upside risk of loss of
business opportunities and core competence as well as
downside risk of knowledge attrition. Gaps identified
between the knowledge resource-knowledge asset-core
competences mapping and the corporate strategic targets
can be used to align the KS strategy with the business
strategy of the firm. Development of the KS strategy can
then be guided with the use of the above KS process
model and the four pillars, which are also part of the new
approach, and are described in the next two sections.</p>
      <sec id="sec-3-1">
        <title>3.2 Knowledge Sharing Process Model</title>
        <p>To achieve re-use, knowledge needs to be effectively
shared between the knowledge carrier and the recipient.
An exposition of an abstracted knowledge-sharing process
is therefore useful. Previous attempts to describe the
process include Nonaka [Non91], Boisot et al. [Boi97],
Senge et al. [Sen94] and Rayport and Sviokla [Ray95]. By
extending Lang’s [Lan97] work, we have devised the
following five-stage KS process model:
Adoption: The recipient scans the environment, either
through informal socialisation or systematic search, to
identify threats and opportunities in abstracted
knowledge, tacit or explicit, relevant to the tasks at
hand. Background knowledge of the recipient is
helpful in the identification process (to be aware what,
where and who to look for). The knowledge identified
could be fuzzy and not situated in the current context.
The recipient also may not have the level of
understanding in interpreting or applying the
knowledge adopted.</p>
        <p>Adaptation: The logical cognitive processes of the
recipient, subject to a limited processing capability,
forces the adaptation of internalised conceptual models
of previously adopted knowledge to the current task
specific context. Domains of adopted knowledge are
analysed, either consciously or unconsciously, to
eliminate uncertainty, fuzziness and internal
contradictions, resulting in ‘implicit conceptual’ or
‘explicit interpretative’ changes [Men98a].</p>
        <p>Absorption: The recipient can start gaining experience
and competence in the use of the knowledge adapted
as it is situated to the environment and task. An
internalisation process starts to broaden the recipient’s
tacit knowledge base as causality of effects and
consequences are learned through applying the
knowledge. The recipient’s perceptions of the world
are framed by consultation with the adapted
knowledge and interactions with its context. To have
an effective internalisation process, the recipient must
believe that the adapted knowledge is complementary
to helping achieve his personal goal, and within the
bounds of the organisational, social and professional
norms he is operating in.
24-5
Integration: Discrete pieces of contextualised
knowledge are combined into a new whole, giving
structures and coherence to shape the integration while
reconciling inconsistency due to imperfect information
from multiple sources of knowledge. Individuals with
integrated knowledge either possess the skill of
systematic problem solving with the ability to
articulate the reasoning model and scientific theories
behind, or already master the ‘art’ [Zub88] of the
‘craft’ [Non91] capable of applying knowledge in
aggregates even in novel circumstances.</p>
        <p>Dissemination: Knowledge can be disseminated to
other members of the organisation through
personalised transfer (tacit-to-tacit) or multidirectional
diffusion (tacit-to-explicit, or explicit-to-explicit). The
scale of knowledge re-use then depends on the
dissemination mechanisms employed, which are
supported by the four pillars of KS described below.</p>
      </sec>
      <sec id="sec-3-2">
        <title>3.3 Four Pillars</title>
        <p>The barriers to KS implementation with respect to
knowledge re-use and sharing can be categorised into four
key areas. The four pillars of this framework are designed
to help managers identify what focal areas need to be
addressed in order to support the knowledge sharing
process as exemplified in our model.</p>
        <p>The sharing channel refers to the media selected and the
modes of communication used to share knowledge. The
sharing mode can be either ‘unilateral co-operative’
[Que97] – knowledge transfer is unidirectional when
knowledge resides in one party but not in the other – or
‘bilateral co-specialised’ [Que97; Lan97] – when all
parties involved do not possess the complete knowledge
required, but each shares their individual separate pieces
of knowledge to form a synergistic new whole. Unilateral</p>
      </sec>
      <sec id="sec-3-3">
        <title>Area Of Focus Soft Issues</title>
        <p>sharing of explicit knowledge can employ synchronous or
asynchronous communications, either geographically
colocated or dispersed. Sharing of tacit knowledge, whether
unilateral or bilateral, needs to employ personalised
faceto-face interactions, socialisation and learning-by-doing as
in mentoring apprentices.</p>
        <p>Organisational infrastructure refers to the organisational
form and how the designed form fits with facilitating the
flow of knowledge from the carrier to the recipient. The
design of organisational forms for KS, rather than basing
on traditional segregations according to product,
geographic, or functional boundaries, one must consider
the co-location of decision rights and possessed
knowledge to balance the trade-off between sub-optimal
decisions and resources required for knowledge transfer.
The design of the role and responsibility structure
delegating the decision-making authorities to the
knowledge carriers must fit with the cost-optimal point at
the minimum of the agency and transfer cost curves.
Actor refers to those human issues that bring about the
‘deep convictions’ and ‘changes in attitudes and beliefs’
[Sen94]. Without such changes, sharing and learning
cannot take place. Employees need to be convinced that
any KS initiative is essential and beneficial to achieving
their personal goals yet without diminishing their political
power within the professional and social communities they
operate in. The barriers of divisiveness and self-ownership
must be demolished to nurture a KS accepting culture
where people are capable of absorbing knowledge
received, through the fact they are motivated, committed
and willing to share knowledge. The following table
summarises three focal areas to achieving this.</p>
        <sec id="sec-3-3-1">
          <title>Originality versus not</title>
          <p>invented-here culture 19,20.
1: [Kla97]; 2: [Que97]; 3: [San97a]; 4: [Tee98a]; 5: [Arg91]; 6: [Van98]; 7: [Mye96]; 8: [Tam93]; 9: [Dav98a]; 10: [Mar96];
11: [KPM98]; 12: [Non91]; 13: [Non98]; 14: [Dav96]; 15: [Rei96]; 16: [Pru97]; 17: [Rug98]; 18: [Dow98]; 19: [Han99]; 20: [Dav98b];
21: [Hal97]; 22: [Tee98a]; 23: [Pra90]; 24: [Mil98]; 25: [Ear99]; 26: [Bei99]; 27: [Sta89]; 28: [Sen94]; 29: [Edv97];
Technological enabler is the employment of information
and communication technologies to augment KS
activities. Technology tools must have the support of the
other three pillars and the following characteristics, in
addition to the general performance criteria of accuracy,
relevancy, speed and reliability:</p>
          <p>Discovery: Re-usable knowledge must be accessible to
systematic search to retrieve relevant bodies of
24-6
knowledge by matching seekers’ requests with the best
sources of knowledge.</p>
          <p>Filtering: Explicit knowledge retrieved from
repositories must be filtered to extract pieces of
knowledge that situates in the current context to avoid
overloading the seeker’s cognitive processing
capability. Hypertext annotations to attach knowledge
with compound objects of relating knowledge or
versioning to capture historical background are
example devices to convey the context.</p>
          <p>Storage: Explicit knowledge captured must be
represented by an efficient codification scheme,
thereby forming an organisational memory generating
longer last value to the organisation. The attrition of
knowledge can be reduced when knowledge is
externalised and made available to others when
needed.</p>
          <p>Collaboration: Tools can intermediate to broker
knowledge seekers with carriers by bringing the two
together in knowledge activities by reducing the
temporal, organisational, social and spatial distances in
collaboration.</p>
          <p>Organisational Scale: KS tools can provide consistent
integrated architecture of structures and
representations enabling uniform access to
standardised knowledge repositories. Knowledge and
its outputs can be leveraged throughout the
organisation to benefit from economy of scale of
reuse through mass distribution.</p>
        </sec>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>4 How Knowledge Re-Use Adds Value</title>
      <p>The re-use of knowledge beyond tangible outputs has
implications for businesses in three ways. Firstly, any
knowledge re-use strategy must recognise the limitation of
mass volume transfer of tacit knowledge. As tacit
knowledge underpins the understanding, evaluation and
application of all knowledge, it is the key component in
any knowledge re-use process. But since tacit knowledge
is more difficult than tangible assets to imitate and
replicate, its marginal cost of re-use can be difficult to
justify. Such difficulty limits the values of economy of
scale achieved from the mass volume re-use of tacit
knowledge. This issue should then draw management
attention to geographic and decision authority
colocations. In practical terms, the former is the
organisational hierarchy designed to align the roles and
responsibilities of knowledge carriers with decision
makers and implementers. The latter are the organisational
infrastructures designed to bring together knowledge
carriers and recipients.</p>
      <p>Secondly, the implication of the context dependent nature
of knowledge is that it is futile to decontextualise
knowledge. In such a case, knowledge will become
information, and a knowledge carrier will lose the ability
to discern whether knowledge possessed is relevant to the
tasks at hand. The situated cognition argument concerning
re-use is, if knowledge is context dependent, and context
is ever changing in a constant state of flux in the
realworld, then re-use is logically impossible, since there is no
one model of knowledge known that can fit in all
situations. As Menzies [Men98b] eloquently pointed out,
any knowledge engineering approach excluding the
modelling of the environment within which a knowledge
base must operate will fail. The piece that solves the
puzzle is the tacit knowledge embedded in the KS
process. Tacit knowledge provides the clue allowing
individuals to adapt the conceptual model in their minds
and also clarifies the contextual correlations between the
original and the current situation. The search for re-usable
knowledge must therefore be found within the KS process
model described in (2.2). To elaborate, values attributed
to re-usable knowledge depends on the context as well as
the internalisation of the context imposed by the
knowledge ‘re-user’. It is in this sense difficult to attribute
quantitative consensual values directly to re-usable
knowledge. Any risks and rewards analysis of knowledge
re-use should thus base on indictors that measures the
effect of knowledge re-used to the specific tasks at hand,
that is, an indirect measurement approach with its
valuation subject to fluctuations with changing application
contexts and to how well the knowledge is internalised.
Thirdly, IT delivers its values by efficiently packaging
knowledge into objects, making distributions for re-use in
scale possible with explicit knowledge. IT enhances the
productivity of knowledge ‘re-user’ through the five key
roles of discovery, filtering, storage, collaboration and
organisational scale. However strong is IT’s ability to
raise the process speed and level of standardisation, IT
needs to be able to support the other three pillars to realise
the full benefits of the richness and dynamism of KS
activities.</p>
    </sec>
    <sec id="sec-5">
      <title>5 Future Work</title>
      <p>Faced with intense competitive pressure from
globalisation and shortened product development
lifecycle, companies need methods to exploit maximum
values from their existing knowledge assets to provide the
edge in competition. This paper describes our work to
date in extending the established idea of engineering
reuse to include the more intangible concepts of knowledge
re-use. It describes a generic Knowledge-Sharing
Management framework demonstrating how knowledge
management can realise practical business benefits in the
area of knowledge re-use. Our next step is to apply and
further develop this framework by operationalising it with
our industrial partners in the financial and manufacturing
sectors, refining the framework based on the feedbacks
and empirical data gathered in the process. Our final aim
is to provide a knowledge sharing management
methodology that provides practical guidance on the
design of organisational environments that facilitates the
implementation of knowledge sharing and re-use
programs.
[Boi97] Boisot, M., D. Griffiths, et al. (1997). The</p>
      <p>Dilemma of Competence: Differentiation Versus
Integration in the Pursuit of Learning, in Sanchez &amp;</p>
      <p>Heene 1997.
[Bor97] Borghoff, U. M. and R. Pareschi (1997).</p>
      <p>“Information Technology For Knowledge
Management.” Journal Of Universal Computer Science
3(8): 835 - 842.
[Bru99] Brusic, V. and J. Zeleznikow (1999).</p>
      <p>“Knowledge Discovery And Data Mining In Biological
Databases.” Knowledge Engineering Review 14(3):
257 - 277.
[Che96] Chesbrough, H. W. and D. J. Teece (1996).</p>
      <p>“When Is Virtual Virtuous? Organising for</p>
      <p>Innovation.” Harvard Business Review 74 (1): 65 - 73.
[Chi96] Ching, C., C. W. Holsapple, et al. (1996).</p>
      <p>“Toward IT Support For Co-ordination In Network
Organisations.” Information &amp; Management 30 (4):
179 - 199.
[Cho95] Choi, J.-I. and M. Hannafin (1995). “Situated</p>
      <p>Cognition And Learning Environments - Roles,
Structures, And Implications For Design.” Educational
Technology Research And Development 43 (2): 53
69.
[Dav96] Davenport, T. H., S. L. Jarvenpaa, et al. (1996).</p>
      <p>“Improving Knowledge Work Processes.” Sloan
Management Review 37 (4): 53 - 65.</p>
      <p>[Fra94] Fransman, M. (1994). “Information, Knowledge,</p>
      <p>Vision And Theories Of The Firm.” Industrial and</p>
      <p>Corporate Change 3 (3): 713 - 757.
[Fra98] Frappaolo, C. (1998). “Defining Knowledge</p>
      <p>Management: Four Basic Functions.” ComputerWorld
32 (8): 44 - 60.
[Gal94] Galbraith, J. R. (1994). Competing With Flexible</p>
      <p>Lateral Organisations. Massachusetts,
Addison</p>
      <p>Wesley.
[Gru95] Gruber, T. R. (1995). “Toward Principles For</p>
      <p>The Design Of Ontologies Used For Knowledge
Sharing.” International Journal Of Human-Computer</p>
      <p>Studies 43(5-6): 907 - 928.
[Kha98] Khan, T. M., J. E. M. Mitchell, et al. (1998). [Men98a] Menzies, T. and W. J. Clancey (1998). “The
“Situated learning using descriptive models.” Challenge Of Situated Cognition For Symbolic
International Journal Of Human-Computer Studies 49 Knowledge-Based Systems.” International Journal Of
(6): 771 - 796. Human-Computer Studies 49 (6): 767 - 769.
[Kuh97] Kuhn, O. and A. Abecker (1997). “Corporate</p>
      <p>Memories For Knowledge Management In Industrial
Practice: Prospects And Challenges.” Journal Of</p>
      <p>Universal Computer Science 3(8): 929 - 954.
[Kla97] Klavans, R. and D. L. Deeds (1997). Competence</p>
      <p>Building in Biotechnology Start-ups: The Role of
Scientific Discovery, Technical Development, and</p>
      <p>Absorptive Capacity, in Sanchez &amp; Heene 1997.
[KPM98] KPMG (1998). Knowledge Management</p>
      <p>Research Report, KPMG.
[Lan97] Lang, J. W. (1997). Leveraging Knowledge</p>
      <p>Across Firm Boundaries: Achieving Strategic
Flexibility Through Modularisation and Alliances, in</p>
      <p>Sanchez &amp; Heene 1997.
[Leo98] Leonard, D. and S. Sensiper (1998). “The Role</p>
      <p>Of Tacit Knowledge In Group Innovation.” California</p>
      <p>Management Review 40(3): 112 - 132.
[Lin99] Linger, H., F. Burstein, A. Zaslavsky and N.</p>
      <p>Crofts (1999). “A Framework For A Dynamic
Organisational Memory Information System.” Journal
Of Organisational Computing And Electronic</p>
      <p>Commerce 9(2-3): 189 - 203.
[Lot98] Lotus (1998). Knowledge Management White</p>
      <p>Paper, Lotus.
[Mag98] Magretta, J. (1998). “Fast, Global and</p>
      <p>Entrepreneurial: Supply Chain Management - Hong
Kong Style.” Harvard Business Review 76 (5): 102
114.</p>
      <p>[Men98b] Menzies, T. (1998). “Towards Situated</p>
      <p>Knowledge Acquisition.” International Journal Of</p>
      <p>Human-Computer Studies 49 (6): 867 - 893.
[Mil98] Miles, G., R. E. Miles, et al. (1998). “Some</p>
      <p>Conceptual And Research Barriers To The Utilisation
Of Knowledge.” California Management Review 40
(3): 281 - 290.
[Mol99] Molina, M., J. L. Sierra and J. Cuena (1999).</p>
      <p>“Reusable Knowledge-Based Components For
Building Software Applications: A Knowledge
Modelling Approach.” International Journal Of
Software Engineering And Knowledge Engineering
9(3): 297 - 317.
[Mow96] Mowery, D. C., J. E. Oxley, et al. (1996).</p>
      <p>“Strategic Alliances And Inter-Firm Knowledge
Transfer.” Strategic Management Journal 17 (SISI):
77 - 91.
[Mye96] Myers, P. S. E. (1996). Knowledge Management
and Organisational Design. Boston,
Butterworth</p>
      <p>Heinemann.
[Nah98] Nahapiet, J. and S. Ghoshal (1998). “Social</p>
      <p>Capital, Intellectual Capital, And The Organizational
Advantage.” Academy Of Management Review 23
(2): 242 - 266.
[Nel82] Nelson, R. R. and S. G. Winter (1982). An</p>
      <p>Evolutionary Theory Of Economic Change.</p>
      <p>Cambridge, Belknap Press.
[Non91] Nonaka, I. (1991). “The Knowledge-Creating</p>
      <p>Company.” Harvard Business Review 69 (6): 96 - 104.
[Mal98] Malone, T. W. and R. J. Laubacher (1998). “The</p>
      <p>Dawn of the E-Lance Economy.” Harvard Business [Non94] Nonaka, I. and H. Takeuchi (1994). “A Dynamic
Review 76 (5): 144 - 153. Theory Of Organisational Knowledge Creation.”
Organisation Science 5 (1): 14 - 37.
[Man97] Manasco, B. (1997). SUN's Knowledge Network</p>
      <p>Enhances Its Selling Skills. Originally appeared in May
1997 issue of Knowledge Inc. URL
http://webcom.com/quantera/Sun.html.
[Mar96] Marshall, C., L. Prusak, et al. (1996). “Financial</p>
      <p>Risk And The Need For Superior Knowledge
Management.” California Management Review 38 (3):
77 - 101.
[Mat96] Mathews, J. (1996). Organisational Foundations</p>
      <p>Of The Knowledge-Based Economy, Employment And
Growth In The Knowledge-Based Economy, OECD.</p>
      <p>[Non95] Nonaka, I. and H. Takeuchi (1995). The</p>
      <p>Knowledge-Creating Company: How Japanese
Companies Create The Dynamics Of Innovation. New</p>
      <p>York, Oxford University Press.
[Non98] Nonaka, I. and N. Konno (1998). “The Concept</p>
      <p>Of "Ba": Building A Foundation For Knowledge
Creation.” California Management Review 40 (3): 40
54.
24-9</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [Arg91]
          <string-name>
            <surname>Argyris</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          (
          <year>1991</year>
          ). “Teaching Smart People How To Learn.”
          <source>Harvard Business Review</source>
          <volume>69</volume>
          (
          <issue>3</issue>
          ):
          <fpage>99</fpage>
          -
          <lpage>109</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [Bad91]
          <string-name>
            <surname>Badaracco</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          (
          <year>1991</year>
          ).
          <article-title>The Knowledge Link: How Firms Compete Through Strategic Alliances</article-title>
          . Boston, Harvard Business School Press.
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [Bah92]
          <string-name>
            <surname>Bahrami</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          (
          <year>1992</year>
          ).
          <article-title>“The Emerging Flexible Organisation: Perspectives from Silicon Valley</article-title>
          .”
          <source>California Management Review</source>
          <volume>34</volume>
          (
          <issue>4</issue>
          ):
          <fpage>33</fpage>
          -
          <lpage>52</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [Bak94]
          <string-name>
            <surname>Baker</surname>
            ,
            <given-names>W.</given-names>
          </string-name>
          (
          <year>1994</year>
          ). Networking Smart. New York, McGraw-Hill.
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [Dav98a]
          <string-name>
            <surname>Davenport</surname>
            ,
            <given-names>T. H.</given-names>
          </string-name>
          and
          <string-name>
            <given-names>K.</given-names>
            <surname>Pearlson</surname>
          </string-name>
          (
          <year>1998</year>
          ).
          <article-title>“Two Cheers for the Virtual Office</article-title>
          .”
          <source>Sloan Management Review</source>
          <volume>39</volume>
          (
          <issue>4</issue>
          ):
          <fpage>51</fpage>
          -
          <lpage>65</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [Dav98b]
          <string-name>
            <surname>Davenport</surname>
            ,
            <given-names>T. H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>D. W. De Long</surname>
          </string-name>
          , et al. (
          <year>1998</year>
          ).
          <article-title>“Successful Knowledge Management Projects</article-title>
          .”
          <source>Sloan Management Review</source>
          <volume>39</volume>
          (
          <issue>2</issue>
          ):
          <fpage>43</fpage>
          -
          <lpage>57</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [Ear99]
          <string-name>
            <surname>Earl</surname>
            ,
            <given-names>M. J. and I. A.</given-names>
          </string-name>
          <string-name>
            <surname>Scott</surname>
          </string-name>
          (
          <year>1999</year>
          ).
          <article-title>“What Is a Chief Knowledge Officer?”</article-title>
          <source>Sloan Management Review</source>
          <volume>40</volume>
          (
          <issue>2</issue>
          ):
          <fpage>29</fpage>
          -
          <lpage>38</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [Bei99]
          <string-name>
            <surname>Beinhocker</surname>
            ,
            <given-names>E. D.</given-names>
          </string-name>
          (
          <year>1999</year>
          ). “Robust Adaptive Strategies.”
          <source>Sloan Management Review</source>
          <volume>40</volume>
          (
          <issue>3</issue>
          ):
          <fpage>95</fpage>
          -
          <lpage>106</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [Edv97]
          <string-name>
            <surname>Edvinsson</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          (
          <year>1997</year>
          ). “Developing Intellectual Capital At Skandia.
          <source>” Long Range Planning</source>
          <volume>30</volume>
          (
          <issue>3</issue>
          ):
          <fpage>366</fpage>
          -
          <lpage>373</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [Bla95]
          <string-name>
            <surname>Blackler</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          (
          <year>1995</year>
          ).
          <article-title>“Knowledge, Knowledge Work And Organisations: An Overview And Interpretation</article-title>
          .”
          <source>Organisation Studies</source>
          <volume>16</volume>
          (
          <issue>6</issue>
          ):
          <fpage>1021</fpage>
          -
          <lpage>1046</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [Hal97] Hall,
          <string-name>
            <surname>R.</surname>
          </string-name>
          (
          <year>1997</year>
          ).
          <source>Complex Systems</source>
          , Complex Learning, and Competence Building,
          <source>in Sanchez &amp; Heene</source>
          <year>1997</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [Han99]
          <string-name>
            <surname>Hansen</surname>
            ,
            <given-names>M. T.</given-names>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Nohria</surname>
          </string-name>
          , et al. (
          <year>1999</year>
          ).
          <article-title>“What's Your Strategy For Managing Knowledge?</article-title>
          .
          <source>” Harvard Business Review</source>
          <volume>77</volume>
          (
          <issue>2</issue>
          ):
          <fpage>106</fpage>
          -
          <lpage>116</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [Hol98]
          <string-name>
            <surname>Holtshouse</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          (
          <year>1998</year>
          ). “Knowledge Research Issues.”
          <source>California Management Review</source>
          <volume>40</volume>
          (
          <issue>3</issue>
          ):
          <fpage>277</fpage>
          -
          <lpage>280</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [Jen95]
          <string-name>
            <surname>Jensen</surname>
            ,
            <given-names>M. C.</given-names>
          </string-name>
          and
          <string-name>
            <given-names>W. H.</given-names>
            <surname>Meckling</surname>
          </string-name>
          (
          <year>1995</year>
          ). “Specific and
          <string-name>
            <given-names>General</given-names>
            <surname>Knowledge</surname>
          </string-name>
          , and Organisational Structure.
          <source>” Journal of Applied Corporate Finance</source>
          <volume>8</volume>
          (
          <issue>2</issue>
          ):
          <fpage>4</fpage>
          -
          <lpage>18</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [Pir95]
          <string-name>
            <surname>Pirlein</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          and
          <string-name>
            <given-names>R.</given-names>
            <surname>Studer</surname>
          </string-name>
          (
          <year>1995</year>
          ).
          <article-title>“An Environment For Reusing Ontologies Within A Knowledge Engineering Approach</article-title>
          .”
          <source>International Journal Of Human-Computer Studies</source>
          <volume>43</volume>
          (
          <issue>5-6</issue>
          ):
          <fpage>945</fpage>
          -
          <lpage>965</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [Pol66]
          <string-name>
            <surname>Polanyi</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          (
          <year>1966</year>
          ).
          <source>The Tacit Dimension, reprinted in Prusak</source>
          <year>1997</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [Por85]
          <string-name>
            <surname>Porter</surname>
            ,
            <given-names>M. E.</given-names>
          </string-name>
          and
          <string-name>
            <given-names>V. E.</given-names>
            <surname>Millar</surname>
          </string-name>
          (
          <year>1985</year>
          ).
          <source>“How Information Gives You Competitive Advantage.” Harvard Business Review</source>
          <volume>63</volume>
          (
          <issue>4</issue>
          ):
          <fpage>149</fpage>
          -
          <lpage>160</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [Pra90]
          <string-name>
            <surname>Prahalad</surname>
            ,
            <given-names>C. K.</given-names>
          </string-name>
          and
          <string-name>
            <given-names>G.</given-names>
            <surname>Hamel</surname>
          </string-name>
          (
          <year>1990</year>
          ).
          <source>“The Core Competence Of The Corporation.” Harvard Business Review</source>
          <volume>68</volume>
          (
          <issue>3</issue>
          ):
          <fpage>79</fpage>
          -
          <lpage>91</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [Pru97]
          <string-name>
            <surname>Prusak</surname>
            ,
            <given-names>L. E.</given-names>
          </string-name>
          (
          <year>1997</year>
          ).
          <source>Knowledge Organisations</source>
          . Boston, Butterworth-Heinemann.
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [Que97]
          <string-name>
            <surname>Quelin</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          (
          <year>1997</year>
          ).
          <article-title>Appropriability and the Creation of New Capabilities Through Strategic Alliances</article-title>
          ,
          <source>in Sanchez &amp; Heene</source>
          <year>1997</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [Rap98]
          <string-name>
            <surname>Rappaport</surname>
            ,
            <given-names>A. T.</given-names>
          </string-name>
          (
          <year>1998</year>
          ).
          <article-title>“Constructive Cognition In A Situated Background</article-title>
          .”
          <source>International Journal Of Human-Computer Studies</source>
          <volume>49</volume>
          (
          <issue>6</issue>
          ):
          <fpage>927</fpage>
          -
          <lpage>933</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [Ray95]
          <string-name>
            <surname>Rayport</surname>
            ,
            <given-names>J. F.</given-names>
          </string-name>
          and
          <string-name>
            <given-names>J. J.</given-names>
            <surname>Sviokla</surname>
          </string-name>
          (
          <year>1995</year>
          ).
          <article-title>“Exploiting the Virtual Value Chain</article-title>
          .”
          <source>Harvard Business Review</source>
          <volume>73</volume>
          (
          <issue>6</issue>
          ):
          <fpage>75</fpage>
          -
          <lpage>85</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [Sta89]
          <string-name>
            <surname>Stata</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          (
          <year>1989</year>
          ). “Organisational Learning - The Key To Management Innovation.”
          <source>Sloan Management Review</source>
          <volume>30</volume>
          (
          <issue>3</issue>
          ):
          <fpage>63</fpage>
          -
          <lpage>74</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          [Sut00]
          <string-name>
            <surname>Sutcliffe</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          (
          <year>2000</year>
          ).
          <article-title>“Domain Analysis For Software Reuse</article-title>
          .
          <source>” Journal Of Systems And Software</source>
          <volume>50</volume>
          (
          <issue>3</issue>
          ):
          <fpage>175</fpage>
          -
          <lpage>199</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          [Svi96]
          <string-name>
            <surname>Sviokla</surname>
            ,
            <given-names>J. J.</given-names>
          </string-name>
          (
          <year>1996</year>
          ).
          <source>“Knowledge Workers And Radically New Technology.” Sloan Management Review</source>
          <volume>37</volume>
          (
          <issue>4</issue>
          ):
          <fpage>25</fpage>
          -
          <lpage>40</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          [Szu96]
          <string-name>
            <surname>Szulanski</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          (
          <year>1996</year>
          ).
          <article-title>“Exploring Internal Stickiness: Impediments To The Transfer Of Best Practice Within The Firm</article-title>
          .”
          <source>Strategic Management Journal</source>
          <volume>17</volume>
          (SISI):
          <fpage>27</fpage>
          -
          <lpage>43</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          [Tam93]
          <string-name>
            <surname>Tampoe</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          (
          <year>1993</year>
          ).
          <article-title>“Motivating Knowledge Workers - The Challenge for the 1990s</article-title>
          .
          <source>” Long Range Planning</source>
          <volume>26</volume>
          (
          <issue>3</issue>
          ):
          <fpage>49</fpage>
          -
          <lpage>55</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          [Tee98a]
          <string-name>
            <surname>Teece</surname>
            ,
            <given-names>D. J.</given-names>
          </string-name>
          (
          <year>1998</year>
          ).
          <article-title>“Capturing Value from Knowledge Assets: The New Economy, Markets for Know-how and Intangible Assets</article-title>
          .”
          <source>California Management Review</source>
          <volume>40</volume>
          (
          <issue>3</issue>
          ):
          <fpage>55</fpage>
          -
          <lpage>79</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          [Rei96]
          <string-name>
            <surname>Reichheld</surname>
            ,
            <given-names>F. F.</given-names>
          </string-name>
          and
          <string-name>
            <given-names>T.</given-names>
            <surname>Teal</surname>
          </string-name>
          (
          <year>1996</year>
          ).
          <article-title>The Loyalty Effect: The Hidden Force Behind Growth</article-title>
          , Profits, and
          <string-name>
            <given-names>Lasting</given-names>
            <surname>Value</surname>
          </string-name>
          . Boston, Harvard Business School Press.
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          [Tee98b]
          <string-name>
            <surname>Teece</surname>
            ,
            <given-names>D. J.</given-names>
          </string-name>
          (
          <year>1998</year>
          ).
          <article-title>“Research Directions For Knowledge Management</article-title>
          .”
          <source>California Management Review</source>
          <volume>40</volume>
          (
          <issue>3</issue>
          ):
          <fpage>289</fpage>
          -
          <lpage>292</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          [Rei97]
          <string-name>
            <surname>Reifer</surname>
            ,
            <given-names>D. J.</given-names>
          </string-name>
          (
          <year>1997</year>
          ).
          <article-title>Practical Software Reuse - Strategies For Introducing Reuse Concepts In Your Organisation</article-title>
          . New York, John Wiley &amp; Sons.
        </mixed-citation>
      </ref>
      <ref id="ref32">
        <mixed-citation>
          [Rug97]
          <string-name>
            <surname>Ruggles</surname>
            ,
            <given-names>R. L. E.</given-names>
          </string-name>
          (
          <year>1997</year>
          ).
          <article-title>Knowledge Management Tools</article-title>
          . Boston, Butterworth-Heinemann.
        </mixed-citation>
      </ref>
      <ref id="ref33">
        <mixed-citation>
          [Rug98]
          <string-name>
            <surname>Ruggles</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          (
          <year>1998</year>
          ).
          <article-title>“The State Of The Notion: Knowledge Management in Practice</article-title>
          .”
          <source>California Management Review</source>
          <volume>40</volume>
          (
          <issue>3</issue>
          ):
          <fpage>80</fpage>
          -
          <lpage>89</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref34">
        <mixed-citation>
          <string-name>
            <surname>[San97a] Sanchez</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          (
          <year>1997</year>
          ).
          <article-title>Managing Articulated Knowledge in Competence-Based Competition</article-title>
          , in Sanchez &amp; Heene
          <year>1997</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref35">
        <mixed-citation>
          <string-name>
            <surname>[San97b] Sanchez</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          and
          <string-name>
            <given-names>A. E.</given-names>
            <surname>Heene</surname>
          </string-name>
          (
          <year>1997</year>
          ).
          <article-title>Strategic Learning and Knowledge Management</article-title>
          . New York, John Wiley.
        </mixed-citation>
      </ref>
      <ref id="ref36">
        <mixed-citation>
          [Sen94]
          <string-name>
            <surname>Senge</surname>
            ,
            <given-names>P. M.</given-names>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Roberts</surname>
          </string-name>
          , et al. (
          <year>1994</year>
          ).
          <article-title>The Fifth Discipline Fieldbook: Strategies and Tools for Building a Learning Organisation</article-title>
          . London, Nicholas Brealey.
        </mixed-citation>
      </ref>
      <ref id="ref37">
        <mixed-citation>
          [Sie99]
          <string-name>
            <surname>Siemieniuch</surname>
            ,
            <given-names>C. E.</given-names>
          </string-name>
          and
          <string-name>
            <given-names>M. A.</given-names>
            <surname>Sinclair</surname>
          </string-name>
          (
          <year>1999</year>
          ).
          <article-title>“Organizational Aspects Of Knowledge Lifecycle Management In Manufacturing</article-title>
          .”
          <source>International Journal Of Human-Computer Studies</source>
          <volume>51</volume>
          (
          <issue>3</issue>
          ):
          <fpage>517</fpage>
          -
          <lpage>547</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref38">
        <mixed-citation>
          <string-name>
            <surname>[Van98] Van De Ven</surname>
            ,
            <given-names>F. J. I. M.</given-names>
          </string-name>
          (
          <year>1998</year>
          ).
          <article-title>Knowledge Management: Common Sense</article-title>
          , But Is It Also Common Practice?
          <article-title>Knowledge Management Feedback Report</article-title>
          , KPMG.
        </mixed-citation>
      </ref>
      <ref id="ref39">
        <mixed-citation>
          [Wal91]
          <string-name>
            <surname>Walsh</surname>
            ,
            <given-names>J. P.</given-names>
          </string-name>
          and
          <string-name>
            <given-names>G. R.</given-names>
            <surname>Ungson</surname>
          </string-name>
          (
          <year>1991</year>
          ). “Organisational Memory.
          <source>” Academy Of Management Review</source>
          <volume>16</volume>
          (
          <issue>1</issue>
          ):
          <fpage>57</fpage>
          -
          <lpage>91</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref40">
        <mixed-citation>
          [Zub88]
          <string-name>
            <surname>Zuboff</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          (
          <year>1988</year>
          ).
          <source>In the Age of the Smart Machine: The Future of Work and Power</source>
          . Oxford, Heinemann Professional.
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>