Searching for Answers: Knowledge Sourcing Strategies
نویسندگان
چکیده
It is well documented that individuals use their contacts to access the knowledge they require in order to get their job done. What is less studied is the variety of search strategies individuals follow when trying to access knowledge. For example, when do individuals turn to reference sources, such as the Internet or the library, when do they post queries en masse to a listserv, and when do they contact particular other individuals? In particular, what determines the sequence in which individuals access these knowledge sources? In order to address these questions, we are conducting a case study of a community of forensic scientists who are members of the state forensic DNA laboratories from around the United States. These labs are involved in analyzing crime scene evidence, typing samples from convicts, and administering the database of samples collected from casework and convicts. Because of the complexity and continuous evolution of the technology, members of the system depend on each others’ experience and expertise and are constantly seeking to augment their knowledge. Preliminary analysis supports a number of propositions: (1) There is a substantial variation of knowledge sourcing strategies from individual to individual. Some individuals immediately contact peers; others will only consult references and, at most, close confidantes. (2) The sequence of knowledge sourcing is contingent on the nature of the problem as well as on an individual’s personality. (3) Individuals predominantly reach outside their organization to source knowledge; either because they believe that the required knowledge is not available within the organization, or for fear of exposing themselves.
منابع مشابه
Utilizing End-user Requirements to Inform the Knowledge Supply Strategies of IT Project Teams
This research investigates the knowledge sourcing requirements of teams that implement novel IT projects. It then compares those requirements to the mainstream strategy proffered in the literature for knowledge reuse within project environments. Using a grounded theory approach, this research found that the knowledge sourcing requirements do not align with the mainstream strategy, which is base...
متن کاملFuzzy Clustering of Job Occupations in National Iranian South Oil Company; Strategic Sourcing in Talent Supply Chain Management
Talent management is one of the most important challenges faced by management of companies. Uncertainty in predicting competencies that are critical for companies and the inability to accurately estimate the voluntary of talents turnover, has required adapting concepts from the supply chain management, such as supply and strategic sourcing in talent management. The purpose of this research was ...
متن کاملAn Evaluation of Search Strategies for User-Generated Video Content
As the amount of user-generated content (UGC) on websites such as YouTube have experienced explosive growth, the demand for searching for relevant content has expanded at a similar pace. Unfortunately the minimally-required production effort and decentralization of content make these searches problematic. In addition, most UGC search efforts rely on notoriously noisy usersupplied tags and comme...
متن کاملComplementarity between internal knowledge creation and external knowledge sourcing in developing and least developed countries
In order to catch up with the technological frontier, firms in developing countries have been striving hard to promote technological advancement through internal R&D effort (make) as well as through external sourcing (buy). The adoption and learning process requires firms to set up effective strategies to catalyze the speed of their catching-up. This study uses the complementarity approach to i...
متن کاملThe Paradox of being Open: External Technology Sourcing and Knowledge Protection
This paper explores how a firm’s openness in its technology sourcing interplays with its simultaneous pursuit of knowledge protection strategies to enhance innovative performance. We argue that organizational knowledge protection mechanisms such as restricting employee mobility, secrecy and knowledge complexity influence the inverted-U relationship between a firm’s external technology sourcing ...
متن کامل