Page 150 -
P. 150
Knowledge Capture and Codifi cation 133
information to be gathered and used in decision making. BI therefore represents the
tools used for not only CI but also for customer profi ling, market research, and other
analyses.
Strategic Implications of Knowledge Capture and Codifi cation
Knowledge capture and codifi cation are particularly critical when there is an issue
of knowledge continuity (e.g., Field 2003 ; Beazley, Boenisch, and Harden 2003 ).
Whereas knowledge management is concerned with capturing and sharing know-how
valuable to colleagues who are performing similar jobs throughout a company, knowl-
edge continuity management focuses on passing critical knowledge from exiting
employees to their replacements. Whereas most of the literature focuses on the knowl-
edge transfer from this departing individual to his or her successor, the problem is not
so localized. Knowledge continuity should not focus solely on the specifi c knowledge
to be transferred between individuals. Instead, it should also address strategic concerns
at the group and organizational levels. The organization needs to be aware of its criti-
cal knowledge assets — these are captured and codifi ed in the form of a knowledge map
or taxonomy. Organizations also need to take into account the impact of a departure,
whether due to a baby boomer retiring or other reasons, on the communities that
they are members of. Their leaving may literally leave a serious gap in the fabric of
the community network.
At its core, knowledge continuity management is about communication ( Field
2003 ). That is, employees need to understand just what it is that they know, that
others need to know, and why this content needs to be shared with their peers. The
more critical a job is to the company, the more important it is that it be part of a
continuity management system. The more sophisticated, complex and tacit the knowl-
edge a worker possesses, the more diffi cult it will be to pass on — and even more
important that it be passed on. These challenges raise important questions concerning
security and access in addition to a code of ethics that ensures that all concerned are
treated in a professional manner.
Some recommendations from Field (2003) include:
• Set up a knowledge profi le for all critical workers.
• Foster mentoring relationships.
• Encourage communities of practice.
• Ensure that knowledge sharing is rewarded.