Presentation is loading. Please wait.

Presentation is loading. Please wait.

Yogesh Gautam B.Sc., MCA, Ph.D. (Computer Science) MBA, PGP Cyber Law.

Similar presentations


Presentation on theme: "Yogesh Gautam B.Sc., MCA, Ph.D. (Computer Science) MBA, PGP Cyber Law."— Presentation transcript:

1 Yogesh Gautam B.Sc., MCA, Ph.D. (Computer Science) MBA, PGP Cyber Law

2  Using social technology to find, access, and validate existing knowledge, where, knowledge includes all forms of contents which could be objects, data, information, knowledge, and wisdom.

3

4  Early KM technologies included online corporate yellow pages as expertise locators and document management systemsonlineyellow pagesdocument management systems  Subsequent KM efforts leveraged semantic technologies for search and retrieval and the development of e-learning tools for communities of practicesemanticsearche-learning communities of practice

5  More recently, development of social computing tools (such as bookmarks, blogs, and wikis) have allowed more unstructured approach to the transfer, capture and create knowledge.bookmarkswikis  These tools face challenges in distilling meaningful re-usable knowledge and ensuring that their content is transmissible through diverse channels.channels

6  The capture of explicit and tacit knowledge is done in the form of re-usable, media-rich, web-based Knowledge Assets. Elicitation techniques have to be developed to effectively gather, and contextually package and publish knowledge in ways that enable its timely re-use and adaptation by others.

7  The most valuable knowledge is in the heads of experts (tacit knowledge)  They find it difficult to describe all they know  Tacit knowledge is very difficult (sometimes impossible) to describe  Experts tend to be busy

8  Many experts don’t communicate or share knowledge easily  Tacit Knowledge has a limited life (~5-10 years max)  You can’t force experts to “give away” knowledge  Only a part of an expert’s knowledge is critical to organisation

9  People have always retired from their jobs and taken valuable knowledge with them.  Everything retiring workers know need not be captured  Whether it is a situation where critical knowledge is about to be lost, or a systematic and sustainable solution is being pursued for knowledge retention, data capture requires technological skills

10  Outline Eliciting from individuals  Harvesting from Communities  Gathering from Networks  Exploring Cyberspace Different methods of Knowledge capture

11  Must be a volunteered Process:  Identify experts & Engage them  Influenced by beliefs, perspectives, and values.

12  Today’s knowledge is the result of centuries of collective research.  Knowledge is changing at an accelerating rate.  It takes a community of people to keep up with new concepts, practices, and technology

13  Networks are much bigger than communities (100s to 1,000,000s of members).  Participants don’t know most other participants  Limiting trust and security

14  Anticipate emerging issues  Anticipate stakeholder actions  Discover new stakeholders  Discover potential partners  Learn from others  Learn about new technology  Monitor institutional changes  Monitor public opinion  Find useful information  Detect new risk s ………………..

15 AgriDaksh

16  In terms of structured text (HTML files) mainly drawn from various technical bulletins  In database fields specifically designed for allowing flexibility in terms of storing and retrieving varied information.  In facts and rules stored in database in the form that can be used to build decision tree and inferred by Java Expert System Shell (JESS).  In crop ontology, that stores knowledge using Web Ontology Language (OWL). 

17 Thank You …………


Download ppt "Yogesh Gautam B.Sc., MCA, Ph.D. (Computer Science) MBA, PGP Cyber Law."

Similar presentations


Ads by Google